Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
YnsEArPlqx.exe

Overview

General Information

Sample name:YnsEArPlqx.exe
renamed because original name is a hash value
Original sample name:ab8e88bff0b907fc49b949d704490018.exe
Analysis ID:1460294
MD5:ab8e88bff0b907fc49b949d704490018
SHA1:559f2f2b61bd344293f7cbc78b72d8e368910ae3
SHA256:921c5314fc334bac928a8398da1c8341b1021cf92ae83bf8b872d422f2e7ef8f
Tags:exeRiseProStealer
Infos:

Detection

RisePro Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
Yara detected RisePro Stealer
AI detected suspicious sample
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject threads in other processes
Found stalling execution ending in API Sleep call
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Uses schtasks.exe or at.exe to add and modify task schedules
Contains capabilities to detect virtual machines
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Entry point lies outside standard sections
Found decision node followed by non-executed suspicious APIs
Found evasive API chain (date check)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • YnsEArPlqx.exe (PID: 7408 cmdline: "C:\Users\user\Desktop\YnsEArPlqx.exe" MD5: AB8E88BFF0B907FC49B949D704490018)
    • schtasks.exe (PID: 7528 cmdline: schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7536 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 7576 cmdline: schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7584 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • MPGPH131.exe (PID: 7632 cmdline: C:\ProgramData\MPGPH131\MPGPH131.exe MD5: AB8E88BFF0B907FC49B949D704490018)
  • MPGPH131.exe (PID: 7640 cmdline: C:\ProgramData\MPGPH131\MPGPH131.exe MD5: AB8E88BFF0B907FC49B949D704490018)
  • RageMP131.exe (PID: 7852 cmdline: "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe" MD5: AB8E88BFF0B907FC49B949D704490018)
  • RageMP131.exe (PID: 8008 cmdline: "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe" MD5: AB8E88BFF0B907FC49B949D704490018)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: YnsEArPlqx.exe PID: 7408JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
    Process Memory Space: MPGPH131.exe PID: 7632JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
      Process Memory Space: MPGPH131.exe PID: 7640JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
        Process Memory Space: RageMP131.exe PID: 7852JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
          Process Memory Space: RageMP131.exe PID: 8008JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security

            System Summary

            barindex
            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\YnsEArPlqx.exe, ProcessId: 7408, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RageMP131
            Timestamp:06/20/24-18:59:13.624078
            SID:2046269
            Source Port:49741
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/20/24-18:58:58.560662
            SID:2046269
            Source Port:49732
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/20/24-18:58:52.840391
            SID:2046269
            Source Port:49731
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/20/24-18:57:14.894991
            SID:2049060
            Source Port:49731
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/20/24-18:59:07.355875
            SID:2046269
            Source Port:49739
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/20/24-18:57:18.828226
            SID:2046266
            Source Port:58709
            Destination Port:49732
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/20/24-18:58:03.049093
            SID:2046267
            Source Port:58709
            Destination Port:49741
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/20/24-18:57:35.040865
            SID:2046266
            Source Port:58709
            Destination Port:49741
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/20/24-18:57:15.478080
            SID:2046266
            Source Port:58709
            Destination Port:49731
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/20/24-18:57:18.837910
            SID:2046266
            Source Port:58709
            Destination Port:49733
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/20/24-18:58:58.606045
            SID:2046269
            Source Port:49733
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/20/24-18:57:40.684951
            SID:2046267
            Source Port:58709
            Destination Port:49739
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/20/24-18:57:26.019896
            SID:2046266
            Source Port:58709
            Destination Port:49739
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/20/24-18:57:40.086663
            SID:2046267
            Source Port:58709
            Destination Port:49731
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/20/24-18:57:40.210568
            SID:2046267
            Source Port:58709
            Destination Port:49732
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/20/24-18:57:40.261626
            SID:2046267
            Source Port:58709
            Destination Port:49733
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: http://77.91.77.81/mine/amadka.exeisepro_botAvira URL Cloud: Label: phishing
            Source: http://77.91.77.81/mine/amadka.exeAvira URL Cloud: Label: phishing
            Source: http://77.91.77.81/cost/go.exeAvira URL Cloud: Label: phishing
            Source: http://77.91.77.81/mine/amadka.exe3377bAvira URL Cloud: Label: phishing
            Source: http://77.91.77.81/mine/amadka.exe.1Avira URL Cloud: Label: phishing
            Source: http://77.91.77.81/cost/lenin.exe0.1Avira URL Cloud: Label: phishing
            Source: http://77.91.77.81/cost/lenin.eAvira URL Cloud: Label: phishing
            Source: http://77.91.77.81/mine/amadka.exeBAvira URL Cloud: Label: phishing
            Source: http://77.91.77.81/cost/go.exeT3EUAvira URL Cloud: Label: phishing
            Source: http://77.91.77.81/mine/amadka.exeisepro_botA%Avira URL Cloud: Label: phishing
            Source: http://77.91.77.81/cost/lenin.exek.comAvira URL Cloud: Label: phishing
            Source: http://77.91.77.81/cost/go.exew9uAvira URL Cloud: Label: phishing
            Source: http://77.91.77.81/cost/lenin.exe/riseproAvira URL Cloud: Label: phishing
            Source: http://77.91.77.81/mine/amadka.exe0.1Avira URL Cloud: Label: phishing
            Source: http://77.91.77.81/cost/go.exeOPAvira URL Cloud: Label: phishing
            Source: http://77.91.77.81/cost/lenin.exeAvira URL Cloud: Label: malware
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeReversingLabs: Detection: 55%
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeReversingLabs: Detection: 55%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeJoe Sandbox ML: detected
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeJoe Sandbox ML: detected
            Source: YnsEArPlqx.exeJoe Sandbox ML: detected
            Source: YnsEArPlqx.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.4:49742 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.4:49744 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.4:49743 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.4:49745 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.75.166:443 -> 192.168.2.4:49747 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.75.166:443 -> 192.168.2.4:49746 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.75.166:443 -> 192.168.2.4:49748 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.75.166:443 -> 192.168.2.4:49749 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.4:49751 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.75.166:443 -> 192.168.2.4:49752 version: TLS 1.2
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeCode function: 0_2_00431F9C FindClose,FindFirstFileExW,GetLastError,0_2_00431F9C
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00431F9C FindClose,FindFirstFileExW,GetLastError,6_2_00431F9C
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_00431F9C FindClose,FindFirstFileExW,GetLastError,7_2_00431F9C

            Networking

            barindex
            Source: TrafficSnort IDS: 2049060 ET TROJAN RisePro TCP Heartbeat Packet 192.168.2.4:49731 -> 77.91.77.66:58709
            Source: TrafficSnort IDS: 2046266 ET TROJAN [ANY.RUN] RisePro TCP (Token) 77.91.77.66:58709 -> 192.168.2.4:49731
            Source: TrafficSnort IDS: 2046269 ET TROJAN [ANY.RUN] RisePro TCP (Activity) 192.168.2.4:49731 -> 77.91.77.66:58709
            Source: TrafficSnort IDS: 2046266 ET TROJAN [ANY.RUN] RisePro TCP (Token) 77.91.77.66:58709 -> 192.168.2.4:49732
            Source: TrafficSnort IDS: 2046266 ET TROJAN [ANY.RUN] RisePro TCP (Token) 77.91.77.66:58709 -> 192.168.2.4:49733
            Source: TrafficSnort IDS: 2046269 ET TROJAN [ANY.RUN] RisePro TCP (Activity) 192.168.2.4:49732 -> 77.91.77.66:58709
            Source: TrafficSnort IDS: 2046269 ET TROJAN [ANY.RUN] RisePro TCP (Activity) 192.168.2.4:49733 -> 77.91.77.66:58709
            Source: TrafficSnort IDS: 2046266 ET TROJAN [ANY.RUN] RisePro TCP (Token) 77.91.77.66:58709 -> 192.168.2.4:49739
            Source: TrafficSnort IDS: 2046269 ET TROJAN [ANY.RUN] RisePro TCP (Activity) 192.168.2.4:49739 -> 77.91.77.66:58709
            Source: TrafficSnort IDS: 2046266 ET TROJAN [ANY.RUN] RisePro TCP (Token) 77.91.77.66:58709 -> 192.168.2.4:49741
            Source: TrafficSnort IDS: 2046269 ET TROJAN [ANY.RUN] RisePro TCP (Activity) 192.168.2.4:49741 -> 77.91.77.66:58709
            Source: TrafficSnort IDS: 2046267 ET TROJAN [ANY.RUN] RisePro TCP (External IP) 77.91.77.66:58709 -> 192.168.2.4:49731
            Source: TrafficSnort IDS: 2046267 ET TROJAN [ANY.RUN] RisePro TCP (External IP) 77.91.77.66:58709 -> 192.168.2.4:49732
            Source: TrafficSnort IDS: 2046267 ET TROJAN [ANY.RUN] RisePro TCP (External IP) 77.91.77.66:58709 -> 192.168.2.4:49733
            Source: TrafficSnort IDS: 2046267 ET TROJAN [ANY.RUN] RisePro TCP (External IP) 77.91.77.66:58709 -> 192.168.2.4:49739
            Source: TrafficSnort IDS: 2046267 ET TROJAN [ANY.RUN] RisePro TCP (External IP) 77.91.77.66:58709 -> 192.168.2.4:49741
            Source: global trafficTCP traffic: 77.91.77.66 ports 0,5,7,8,58709,9
            Source: global trafficTCP traffic: 192.168.2.4:49731 -> 77.91.77.66:58709
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: ipinfo.ioConnection: Keep-Alive
            Source: Joe Sandbox ViewIP Address: 34.117.186.192 34.117.186.192
            Source: Joe Sandbox ViewIP Address: 34.117.186.192 34.117.186.192
            Source: Joe Sandbox ViewIP Address: 172.67.75.166 172.67.75.166
            Source: Joe Sandbox ViewIP Address: 77.91.77.66 77.91.77.66
            Source: Joe Sandbox ViewASN Name: FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRU FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRU
            Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
            Source: unknownDNS query: name: ipinfo.io
            Source: unknownDNS query: name: ipinfo.io
            Source: unknownDNS query: name: ipinfo.io
            Source: unknownDNS query: name: ipinfo.io
            Source: global trafficHTTP traffic detected: GET /widget/demo/8.46.123.33 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: ipinfo.io
            Source: global trafficHTTP traffic detected: GET /widget/demo/8.46.123.33 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: ipinfo.io
            Source: global trafficHTTP traffic detected: GET /widget/demo/8.46.123.33 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: ipinfo.io
            Source: global trafficHTTP traffic detected: GET /widget/demo/8.46.123.33 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: ipinfo.io
            Source: global trafficHTTP traffic detected: GET /demo/home.php?s=8.46.123.33 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: db-ip.com
            Source: global trafficHTTP traffic detected: GET /demo/home.php?s=8.46.123.33 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: db-ip.com
            Source: global trafficHTTP traffic detected: GET /demo/home.php?s=8.46.123.33 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: db-ip.com
            Source: global trafficHTTP traffic detected: GET /demo/home.php?s=8.46.123.33 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: db-ip.com
            Source: global trafficHTTP traffic detected: GET /widget/demo/8.46.123.33 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: ipinfo.io
            Source: global trafficHTTP traffic detected: GET /demo/home.php?s=8.46.123.33 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: db-ip.com
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeCode function: 0_2_00409280 recv,GetProcAddress,GetModuleHandleA,GetProcAddress,WSASend,0_2_00409280
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: ipinfo.ioConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /widget/demo/8.46.123.33 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: ipinfo.io
            Source: global trafficHTTP traffic detected: GET /widget/demo/8.46.123.33 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: ipinfo.io
            Source: global trafficHTTP traffic detected: GET /widget/demo/8.46.123.33 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: ipinfo.io
            Source: global trafficHTTP traffic detected: GET /widget/demo/8.46.123.33 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: ipinfo.io
            Source: global trafficHTTP traffic detected: GET /demo/home.php?s=8.46.123.33 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: db-ip.com
            Source: global trafficHTTP traffic detected: GET /demo/home.php?s=8.46.123.33 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: db-ip.com
            Source: global trafficHTTP traffic detected: GET /demo/home.php?s=8.46.123.33 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: db-ip.com
            Source: global trafficHTTP traffic detected: GET /demo/home.php?s=8.46.123.33 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: db-ip.com
            Source: global trafficHTTP traffic detected: GET /widget/demo/8.46.123.33 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: ipinfo.io
            Source: global trafficHTTP traffic detected: GET /demo/home.php?s=8.46.123.33 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: db-ip.com
            Source: global trafficDNS traffic detected: DNS query: ipinfo.io
            Source: global trafficDNS traffic detected: DNS query: db-ip.com
            Source: RageMP131.exe, 0000000C.00000002.3056865794.0000000000F59000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3055648642.0000000000EFF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/cost/go.exe
            Source: RageMP131.exe, 0000000C.00000002.3055648642.0000000000EFF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/cost/go.exeOP
            Source: MPGPH131.exe, 00000006.00000002.3055816885.0000000000EA4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/cost/go.exeT3EU
            Source: YnsEArPlqx.exe, 00000000.00000002.3055663083.0000000000D79000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/cost/go.exew9u
            Source: MPGPH131.exe, 00000006.00000002.3055816885.0000000000EA4000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3055578194.0000000000CF8000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3055648642.0000000000F20000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/cost/lenin.e
            Source: RageMP131.exe, 0000000C.00000002.3056865794.0000000000F59000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3055648642.0000000000F20000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/cost/lenin.exe
            Source: YnsEArPlqx.exe, 00000000.00000002.3055663083.0000000000D79000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/cost/lenin.exe/risepro
            Source: RageMP131.exe, 0000000C.00000002.3055648642.0000000000F20000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/cost/lenin.exe0.1
            Source: MPGPH131.exe, 00000006.00000002.3055816885.0000000000E5B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/cost/lenin.exek.com
            Source: RageMP131.exe, 0000000C.00000002.3055648642.0000000000F20000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/mine/amadka.exe
            Source: MPGPH131.exe, 00000006.00000002.3055816885.0000000000E5B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/mine/amadka.exe.1
            Source: RageMP131.exe, 0000000B.00000002.3056401980.0000000000C95000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3055648642.0000000000F20000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/mine/amadka.exe0.1
            Source: MPGPH131.exe, 00000007.00000002.3055578194.0000000000CF8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/mine/amadka.exe3377b
            Source: YnsEArPlqx.exe, 00000000.00000002.3055663083.0000000000D79000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/mine/amadka.exeB
            Source: MPGPH131.exe, 00000007.00000002.3055578194.0000000000CF8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/mine/amadka.exeisepro_bot
            Source: RageMP131.exe, 0000000C.00000002.3055648642.0000000000F20000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/mine/amadka.exeisepro_botA%
            Source: YnsEArPlqx.exe, 00000000.00000003.1815516370.0000000002980000.00000004.00001000.00020000.00000000.sdmp, YnsEArPlqx.exe, 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3053548356.000000000055D000.00000002.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000006.00000003.1854273690.0000000002860000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000003.1854619896.0000000002840000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3053457158.000000000055D000.00000002.00000001.01000000.00000004.sdmp, RageMP131.exe, 0000000B.00000003.1930519219.0000000002740000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3053466368.000000000055D000.00000002.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000C.00000002.3053447329.000000000055D000.00000002.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000C.00000003.2009098412.0000000002840000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.winimage.com/zLibDll
            Source: YnsEArPlqx.exe, 00000000.00000002.3055663083.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.3055816885.0000000000E5B000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3055578194.0000000000CF8000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000003.2933539587.0000000000C95000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3056401980.0000000000C95000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3055648642.0000000000F20000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/
            Source: RageMP131.exe, 0000000B.00000003.2933539587.0000000000C95000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3056401980.0000000000C95000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/L
            Source: RageMP131.exe, 0000000B.00000003.2933539587.0000000000C95000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3056401980.0000000000C95000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/V
            Source: MPGPH131.exe, 00000007.00000002.3055578194.0000000000CF8000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3055498202.0000000000C5B000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000003.2933539587.0000000000C95000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3056401980.0000000000C95000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3055648642.0000000000F20000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/demo/home.php?s=8.46.123.33
            Source: RageMP131.exe, 0000000C.00000002.3055648642.0000000000EC2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/demo/home.php?s=8.46.123.333
            Source: MPGPH131.exe, 00000007.00000002.3055578194.0000000000CF8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/demo/home.php?s=8.46.123.33f7
            Source: RageMP131.exe, 0000000C.00000002.3055648642.0000000000EFF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/demo/home.php?s=8.46.123.33k
            Source: YnsEArPlqx.exe, 00000000.00000002.3055663083.0000000000D79000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/demo/home.php?s=8.46.123.33w
            Source: RageMP131.exe, 0000000B.00000003.2933539587.0000000000C95000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3056401980.0000000000C95000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/h
            Source: MPGPH131.exe, 00000006.00000002.3055816885.0000000000E5B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/oV
            Source: MPGPH131.exe, 00000006.00000002.3055816885.0000000000E5B000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3055648642.0000000000EE9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com:443/demo/home.php?s=8.46.123.33
            Source: RageMP131.exe, 0000000B.00000002.3055498202.0000000000C5B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com:443/demo/home.php?s=8.46.123.338
            Source: YnsEArPlqx.exe, 00000000.00000002.3055663083.0000000000D79000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com:443/demo/home.php?s=8.46.123.33H
            Source: MPGPH131.exe, 00000007.00000002.3055578194.0000000000CF8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com:443/demo/home.php?s=8.46.123.33M
            Source: RageMP131.exe, 0000000C.00000002.3055648642.0000000000EA0000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3055648642.0000000000F20000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3055648642.0000000000EDC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/
            Source: YnsEArPlqx.exe, 00000000.00000002.3055663083.0000000000D57000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.3055816885.0000000000E45000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3055578194.0000000000CEB000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000003.2933539587.0000000000C7D000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3056401980.0000000000C7E000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3055648642.0000000000EDC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/Mozilla/5.0
            Source: YnsEArPlqx.exe, 00000000.00000003.1815516370.0000000002980000.00000004.00001000.00020000.00000000.sdmp, YnsEArPlqx.exe, 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3053548356.000000000055D000.00000002.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000006.00000003.1854273690.0000000002860000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000003.1854619896.0000000002840000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3053457158.000000000055D000.00000002.00000001.01000000.00000004.sdmp, RageMP131.exe, 0000000B.00000003.1930519219.0000000002740000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3053466368.000000000055D000.00000002.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000C.00000002.3053447329.000000000055D000.00000002.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000C.00000003.2009098412.0000000002840000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
            Source: MPGPH131.exe, 00000006.00000002.3055816885.0000000000E01000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/s
            Source: YnsEArPlqx.exe, 00000000.00000002.3055663083.0000000000D2C000.00000004.00000020.00020000.00000000.sdmp, YnsEArPlqx.exe, 00000000.00000002.3055663083.0000000000CDE000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.3055816885.0000000000DCD000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.3055816885.0000000000E1A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3055578194.0000000000CBF000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3055578194.0000000000C77000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3055498202.0000000000BFE000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3055498202.0000000000C4B000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3055648642.0000000000EBD000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3055648642.0000000000E7C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/widget/demo/8.46.123.33
            Source: MPGPH131.exe, 00000006.00000002.3055816885.0000000000E1A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/widget/demo/8.46.123.33NA
            Source: YnsEArPlqx.exe, 00000000.00000002.3055663083.0000000000D2C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/widget/demo/8.46.123.33P.tmp
            Source: YnsEArPlqx.exe, 00000000.00000002.3055663083.0000000000D57000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.3055816885.0000000000E45000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3055578194.0000000000CEB000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000003.2933668257.0000000000C76000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3056302312.0000000000C76000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3055648642.0000000000EDC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io:443/widget/demo/8.46.123.33
            Source: YnsEArPlqx.exe, 00000000.00000002.3055663083.0000000000D79000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.%9
            Source: MPGPH131.exe, 00000007.00000002.3055578194.0000000000CF8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.h
            Source: YnsEArPlqx.exe, 00000000.00000002.3055663083.0000000000CDE000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.3055816885.0000000000DCD000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3055578194.0000000000C77000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3055498202.0000000000BFE000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3055648642.0000000000E67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORT
            Source: YnsEArPlqx.exe, 00000000.00000002.3055663083.0000000000CDE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORTf
            Source: MPGPH131.exe, 00000006.00000002.3055816885.0000000000DCD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORTt
            Source: RageMP131.exe, 0000000C.00000002.3055648642.0000000000E67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORTv
            Source: MPGPH131.exe, 00000006.00000002.3055816885.0000000000E5B000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3055578194.0000000000CF8000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000003.2933539587.0000000000C95000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/risepro
            Source: RageMP131.exe, 0000000C.00000002.3055648642.0000000000F20000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3055648642.0000000000F4E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/risepro_bot
            Source: MPGPH131.exe, 00000006.00000002.3055816885.0000000000E5B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/risepro_bot3ABbfQUY
            Source: YnsEArPlqx.exe, 00000000.00000002.3055663083.0000000000D79000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/risepro_bot8
            Source: MPGPH131.exe, 00000006.00000002.3055816885.0000000000E5B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/risepro_botClyf(U3
            Source: RageMP131.exe, 0000000B.00000003.2933539587.0000000000C95000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3056401980.0000000000C95000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/risepro_botK:
            Source: MPGPH131.exe, 00000007.00000002.3055578194.0000000000CF8000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000003.2933539587.0000000000C95000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3056401980.0000000000C95000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3055648642.0000000000F20000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/risepro_botlater
            Source: RageMP131.exe, 0000000C.00000002.3055648642.0000000000F20000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/risepro_botrisep
            Source: YnsEArPlqx.exe, 00000000.00000002.3055663083.0000000000D79000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/risepro_bot~
            Source: MPGPH131.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
            Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
            Source: unknownHTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.4:49742 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.4:49744 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.4:49743 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.4:49745 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.75.166:443 -> 192.168.2.4:49747 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.75.166:443 -> 192.168.2.4:49746 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.75.166:443 -> 192.168.2.4:49748 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.75.166:443 -> 192.168.2.4:49749 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.4:49751 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.75.166:443 -> 192.168.2.4:49752 version: TLS 1.2

            System Summary

            barindex
            Source: YnsEArPlqx.exeStatic PE information: section name:
            Source: YnsEArPlqx.exeStatic PE information: section name:
            Source: YnsEArPlqx.exeStatic PE information: section name:
            Source: YnsEArPlqx.exeStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeCode function: 0_2_0043C9600_2_0043C960
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeCode function: 0_2_0043A9280_2_0043A928
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeCode function: 0_2_004371A00_2_004371A0
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeCode function: 0_2_0044DA860_2_0044DA86
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeCode function: 0_2_0044036F0_2_0044036F
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeCode function: 0_2_00458BB00_2_00458BB0
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeCode function: 0_2_004EFC400_2_004EFC40
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeCode function: 0_2_0042F5800_2_0042F580
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeCode function: 0_2_004526100_2_00452610
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeCode function: 0_2_004F2FD00_2_004F2FD0
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeCode function: 0_2_004547BF0_2_004547BF
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_0043C9606_2_0043C960
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_0043A9286_2_0043A928
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_004371A06_2_004371A0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_0044DA866_2_0044DA86
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_0044036F6_2_0044036F
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00458BB06_2_00458BB0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_004EFC406_2_004EFC40
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_0042F5806_2_0042F580
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_004526106_2_00452610
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_004F2FD06_2_004F2FD0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_004547BF6_2_004547BF
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_0043C9607_2_0043C960
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_0043A9287_2_0043A928
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_004371A07_2_004371A0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_0044DA867_2_0044DA86
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_0044036F7_2_0044036F
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_00458BB07_2_00458BB0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_004EFC407_2_004EFC40
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_0042F5807_2_0042F580
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_004526107_2_00452610
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_004F2FD07_2_004F2FD0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_004547BF7_2_004547BF
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: String function: 00434380 appears 48 times
            Source: YnsEArPlqx.exeBinary or memory string: OriginalFilename vs YnsEArPlqx.exe
            Source: YnsEArPlqx.exe, 00000000.00000000.1811623951.000000000058A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamedotnet.exe6 vs YnsEArPlqx.exe
            Source: YnsEArPlqx.exe, 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamedotnet.exe6 vs YnsEArPlqx.exe
            Source: YnsEArPlqx.exeBinary or memory string: OriginalFilenamedotnet.exe6 vs YnsEArPlqx.exe
            Source: YnsEArPlqx.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: YnsEArPlqx.exeStatic PE information: Section: ZLIB complexity 0.9987973597852029
            Source: YnsEArPlqx.exeStatic PE information: Section: ZLIB complexity 0.994140625
            Source: YnsEArPlqx.exeStatic PE information: Section: .reloc ZLIB complexity 1.5
            Source: RageMP131.exe.0.drStatic PE information: Section: ZLIB complexity 0.9987973597852029
            Source: RageMP131.exe.0.drStatic PE information: Section: ZLIB complexity 0.994140625
            Source: RageMP131.exe.0.drStatic PE information: Section: .reloc ZLIB complexity 1.5
            Source: MPGPH131.exe.0.drStatic PE information: Section: ZLIB complexity 0.9987973597852029
            Source: MPGPH131.exe.0.drStatic PE information: Section: ZLIB complexity 0.994140625
            Source: MPGPH131.exe.0.drStatic PE information: Section: .reloc ZLIB complexity 1.5
            Source: classification engineClassification label: mal100.troj.evad.winEXE@11/5@3/3
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeFile created: C:\Users\user\AppData\Local\RageMP131Jump to behavior
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7584:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7536:120:WilError_03
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeFile created: C:\Users\user\AppData\Local\Temp\rage131MP.tmpJump to behavior
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: YnsEArPlqx.exe, 00000000.00000003.1815516370.0000000002980000.00000004.00001000.00020000.00000000.sdmp, YnsEArPlqx.exe, 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3053548356.000000000055D000.00000002.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000006.00000003.1854273690.0000000002860000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000003.1854619896.0000000002840000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3053457158.000000000055D000.00000002.00000001.01000000.00000004.sdmp, RageMP131.exe, 0000000B.00000003.1930519219.0000000002740000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3053466368.000000000055D000.00000002.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000C.00000002.3053447329.000000000055D000.00000002.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000C.00000003.2009098412.0000000002840000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
            Source: YnsEArPlqx.exe, 00000000.00000003.1815516370.0000000002980000.00000004.00001000.00020000.00000000.sdmp, YnsEArPlqx.exe, 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3053548356.000000000055D000.00000002.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000006.00000003.1854273690.0000000002860000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000003.1854619896.0000000002840000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3053457158.000000000055D000.00000002.00000001.01000000.00000004.sdmp, RageMP131.exe, 0000000B.00000003.1930519219.0000000002740000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3053466368.000000000055D000.00000002.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000C.00000002.3053447329.000000000055D000.00000002.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000C.00000003.2009098412.0000000002840000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = sqlite_rename_table(sql, %Q), tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
            Source: YnsEArPlqx.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
            Source: MPGPH131.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
            Source: MPGPH131.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeFile read: C:\Users\user\Desktop\YnsEArPlqx.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\YnsEArPlqx.exe "C:\Users\user\Desktop\YnsEArPlqx.exe"
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\ProgramData\MPGPH131\MPGPH131.exe C:\ProgramData\MPGPH131\MPGPH131.exe
            Source: unknownProcess created: C:\ProgramData\MPGPH131\MPGPH131.exe C:\ProgramData\MPGPH131\MPGPH131.exe
            Source: unknownProcess created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
            Source: unknownProcess created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHESTJump to behavior
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHESTJump to behavior
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeSection loaded: d3d10warp.dllJump to behavior
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeSection loaded: dxcore.dllJump to behavior
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeSection loaded: webio.dllJump to behavior
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: d3d10warp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: dxcore.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: webio.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: schannel.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: d3d10warp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: dxcore.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: webio.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: schannel.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: d3d10warp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: dxcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: webio.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: d3d10warp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: dxcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: webio.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: gpapi.dllJump to behavior
            Source: YnsEArPlqx.exeStatic file information: File size 3270672 > 1048576
            Source: YnsEArPlqx.exeStatic PE information: Raw size of .boot is bigger than: 0x100000 < 0x267000
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeCode function: 0_2_004CF280 VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAllocEx,LoadLibraryA,GetProcAddress,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,WaitForSingleObject,0_2_004CF280
            Source: initial sampleStatic PE information: section where entry point is pointing to: .boot
            Source: YnsEArPlqx.exeStatic PE information: section name:
            Source: YnsEArPlqx.exeStatic PE information: section name:
            Source: YnsEArPlqx.exeStatic PE information: section name:
            Source: YnsEArPlqx.exeStatic PE information: section name:
            Source: YnsEArPlqx.exeStatic PE information: section name: .themida
            Source: YnsEArPlqx.exeStatic PE information: section name: .boot
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name: .themida
            Source: RageMP131.exe.0.drStatic PE information: section name: .boot
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name: .themida
            Source: MPGPH131.exe.0.drStatic PE information: section name: .boot
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeCode function: 0_2_0058901C push eax; iretd 0_2_0058901D
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeCode function: 0_2_006E1593 push ecx; mov dword ptr [esp], ebp0_2_00822BC8
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeCode function: 0_2_006E1593 push 57F325EEh; mov dword ptr [esp], eax0_2_00822C06
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeCode function: 0_2_006E1593 push edi; mov dword ptr [esp], ebp0_2_00822C19
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeCode function: 0_2_006E1593 push eax; mov dword ptr [esp], ecx0_2_00822C1D
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeCode function: 0_2_006E1593 push 0F00E9F4h; mov dword ptr [esp], eax0_2_00822C7A
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeCode function: 0_2_00433F59 push ecx; ret 0_2_00433F6C
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_006E1593 push ecx; mov dword ptr [esp], ebp6_2_00822BC8
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_006E1593 push 57F325EEh; mov dword ptr [esp], eax6_2_00822C06
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_006E1593 push edi; mov dword ptr [esp], ebp6_2_00822C19
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_006E1593 push eax; mov dword ptr [esp], ecx6_2_00822C1D
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_006E1593 push 0F00E9F4h; mov dword ptr [esp], eax6_2_00822C7A
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00433F59 push ecx; ret 6_2_00433F6C
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_006E1593 push ecx; mov dword ptr [esp], ebp7_2_00822BC8
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_006E1593 push 57F325EEh; mov dword ptr [esp], eax7_2_00822C06
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_006E1593 push edi; mov dword ptr [esp], ebp7_2_00822C19
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_006E1593 push eax; mov dword ptr [esp], ecx7_2_00822C1D
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_006E1593 push 0F00E9F4h; mov dword ptr [esp], eax7_2_00822C7A
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_00433F59 push ecx; ret 7_2_00433F6C
            Source: YnsEArPlqx.exeStatic PE information: section name: entropy: 7.981638520890903
            Source: RageMP131.exe.0.drStatic PE information: section name: entropy: 7.981638520890903
            Source: MPGPH131.exe.0.drStatic PE information: section name: entropy: 7.981638520890903
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeFile created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeJump to dropped file
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeFile created: C:\ProgramData\MPGPH131\MPGPH131.exeJump to dropped file
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeFile created: C:\ProgramData\MPGPH131\MPGPH131.exeJump to dropped file

            Boot Survival

            barindex
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RageMP131Jump to behavior
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RageMP131Jump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeStalling execution: Execution stalls by calling Sleepgraph_0-13672
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeStalling execution: Execution stalls by calling Sleepgraph_6-14101
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeSystem information queried: FirmwareTableInformationJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSystem information queried: FirmwareTableInformationJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSystem information queried: FirmwareTableInformationJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSystem information queried: FirmwareTableInformationJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSystem information queried: FirmwareTableInformationJump to behavior
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_0-13677
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_6-14116
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_6-16081
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-16274
            Source: C:\Users\user\Desktop\YnsEArPlqx.exe TID: 7412Thread sleep count: 212 > 30Jump to behavior
            Source: C:\Users\user\Desktop\YnsEArPlqx.exe TID: 7624Thread sleep count: 39 > 30Jump to behavior
            Source: C:\Users\user\Desktop\YnsEArPlqx.exe TID: 7412Thread sleep count: 313 > 30Jump to behavior
            Source: C:\Users\user\Desktop\YnsEArPlqx.exe TID: 7412Thread sleep time: -31613s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\YnsEArPlqx.exe TID: 7412Thread sleep count: 146 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7636Thread sleep count: 41 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7636Thread sleep count: 185 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7676Thread sleep count: 38 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7636Thread sleep count: 313 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7636Thread sleep time: -31613s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7636Thread sleep count: 143 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7644Thread sleep count: 40 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7644Thread sleep count: 184 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7672Thread sleep count: 39 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7644Thread sleep count: 311 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7644Thread sleep time: -31411s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7644Thread sleep count: 145 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7856Thread sleep count: 127 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7952Thread sleep count: 35 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7856Thread sleep count: 317 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7856Thread sleep time: -32017s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7856Thread sleep count: 144 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 8012Thread sleep count: 91 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 8012Thread sleep count: 244 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 8028Thread sleep count: 35 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 8012Thread sleep count: 284 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 8012Thread sleep count: 144 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 8012Thread sleep count: 121 > 30Jump to behavior
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeLast function: Thread delayed
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeLast function: Thread delayed
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeLast function: Thread delayed
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeCode function: 0_2_00431F9C FindClose,FindFirstFileExW,GetLastError,0_2_00431F9C
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00431F9C FindClose,FindFirstFileExW,GetLastError,6_2_00431F9C
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_00431F9C FindClose,FindFirstFileExW,GetLastError,7_2_00431F9C
            Source: MPGPH131.exe, 00000006.00000002.3055816885.0000000000DCD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&
            Source: YnsEArPlqx.exe, 00000000.00000002.3055663083.0000000000D79000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWx
            Source: RageMP131.exe, 0000000C.00000002.3055648642.0000000000EC2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}E
            Source: RageMP131.exe, 0000000C.00000002.3055648642.0000000000E60000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&s
            Source: RageMP131.exe, 0000000C.00000002.3055648642.0000000000EC0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ?\#disk&ven_vmware&prouask#4&1656f219&0&0000f5-b6bf-11d0-94f2-00a08b
            Source: RageMP131.exe, 0000000C.00000003.2035826187.0000000000EC8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: MPGPH131.exe, 00000006.00000002.3055816885.0000000000E1A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWP
            Source: YnsEArPlqx.exe, 00000000.00000003.1840354529.0000000000D44000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}Cz
            Source: YnsEArPlqx.exe, 00000000.00000002.3055663083.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.3055816885.0000000000E5B000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3055578194.0000000000CF8000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3055578194.0000000000CBF000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000003.2933539587.0000000000C95000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3056401980.0000000000C95000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3055648642.0000000000EFF000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3055648642.0000000000EB1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: MPGPH131.exe, 00000006.00000002.3055816885.0000000000E5B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWen-GBn
            Source: RageMP131.exe, 0000000B.00000003.1945525195.0000000000C61000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: RageMP131.exe, 0000000C.00000003.2035826187.0000000000EC8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}Q
            Source: YnsEArPlqx.exe, 00000000.00000002.3055663083.0000000000D2C000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3055498202.0000000000C4B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@
            Source: RageMP131.exe, 0000000B.00000002.3055498202.0000000000BF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&9
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeCode function: 0_2_00438A64 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00438A64
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeCode function: 0_2_004CF280 VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAllocEx,LoadLibraryA,GetProcAddress,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,WaitForSingleObject,0_2_004CF280
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeCode function: 0_2_00438A64 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00438A64
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeCode function: 0_2_0043451D SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0043451D
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00438A64 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_00438A64
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_0043451D SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_0043451D
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_00438A64 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_00438A64
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_0043451D SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_0043451D

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeCode function: 0_2_004CF280 VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAllocEx,LoadLibraryA,GetProcAddress,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,WaitForSingleObject,0_2_004CF280
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_004CF280 VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAllocEx,LoadLibraryA,GetProcAddress,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,WaitForSingleObject,6_2_004CF280
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_004CF280 VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAllocEx,LoadLibraryA,GetProcAddress,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,WaitForSingleObject,7_2_004CF280
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeCode function: GetLocaleInfoW,0_2_004531CA
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeCode function: EnumSystemLocalesW,0_2_0044B1B1
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_004532F3
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,0_2_00452B5A
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeCode function: GetLocaleInfoW,0_2_004533F9
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_004534CF
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeCode function: GetLocaleInfoW,0_2_00452D5F
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeCode function: EnumSystemLocalesW,0_2_00452E51
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeCode function: EnumSystemLocalesW,0_2_00452E06
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeCode function: EnumSystemLocalesW,0_2_00452EEC
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00452F77
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeCode function: GetLocaleInfoW,0_2_0044B734
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,6_2_004531CA
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: EnumSystemLocalesW,6_2_0044B1B1
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,6_2_004532F3
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,6_2_00452B5A
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,6_2_004533F9
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,6_2_004534CF
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,6_2_00452D5F
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: EnumSystemLocalesW,6_2_00452E51
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: EnumSystemLocalesW,6_2_00452E06
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: EnumSystemLocalesW,6_2_00452EEC
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,6_2_00452F77
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,6_2_0044B734
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,7_2_004531CA
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: EnumSystemLocalesW,7_2_0044B1B1
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,7_2_004532F3
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,7_2_00452B5A
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,7_2_004533F9
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,7_2_004534CF
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,7_2_00452D5F
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: EnumSystemLocalesW,7_2_00452E51
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: EnumSystemLocalesW,7_2_00452E06
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: EnumSystemLocalesW,7_2_00452EEC
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,7_2_00452F77
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,7_2_0044B734
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeCode function: 0_2_0043361D GetSystemTimePreciseAsFileTime,GetSystemTimePreciseAsFileTime,GetSystemTimeAsFileTime,0_2_0043361D
            Source: C:\Users\user\Desktop\YnsEArPlqx.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: Process Memory Space: YnsEArPlqx.exe PID: 7408, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 7632, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 7640, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 7852, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 8008, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: Process Memory Space: YnsEArPlqx.exe PID: 7408, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 7632, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 7640, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 7852, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 8008, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
            Command and Scripting Interpreter
            1
            Scheduled Task/Job
            11
            Process Injection
            1
            Masquerading
            OS Credential Dumping1
            System Time Discovery
            Remote Services1
            Archive Collected Data
            11
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts1
            Scheduled Task/Job
            1
            Registry Run Keys / Startup Folder
            1
            Scheduled Task/Job
            12
            Virtualization/Sandbox Evasion
            LSASS Memory321
            Security Software Discovery
            Remote Desktop ProtocolData from Removable Media1
            Non-Standard Port
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts2
            Native API
            1
            DLL Side-Loading
            1
            Registry Run Keys / Startup Folder
            11
            Process Injection
            Security Account Manager12
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared Drive2
            Ingress Tool Transfer
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
            DLL Side-Loading
            1
            Deobfuscate/Decode Files or Information
            NTDS1
            System Network Configuration Discovery
            Distributed Component Object ModelInput Capture2
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
            Obfuscated Files or Information
            LSA Secrets1
            File and Directory Discovery
            SSHKeylogging13
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
            Software Packing
            Cached Domain Credentials23
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            DLL Side-Loading
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1460294 Sample: YnsEArPlqx.exe Startdate: 20/06/2024 Architecture: WINDOWS Score: 100 35 ipinfo.io 2->35 37 db-ip.com 2->37 45 Snort IDS alert for network traffic 2->45 47 Antivirus detection for URL or domain 2->47 49 Yara detected RisePro Stealer 2->49 51 4 other signatures 2->51 8 YnsEArPlqx.exe 1 9 2->8         started        13 MPGPH131.exe 2 2->13         started        15 RageMP131.exe 2 2->15         started        17 2 other processes 2->17 signatures3 process4 dnsIp5 39 77.91.77.66, 49731, 49732, 49733 FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRU Russian Federation 8->39 41 ipinfo.io 34.117.186.192, 443, 49742, 49743 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 8->41 43 db-ip.com 172.67.75.166, 443, 49746, 49747 CLOUDFLARENETUS United States 8->43 27 C:\Users\user\AppData\Local\...\RageMP131.exe, PE32 8->27 dropped 29 C:\ProgramData\MPGPH131\MPGPH131.exe, PE32 8->29 dropped 31 C:\Users\...\RageMP131.exe:Zone.Identifier, ASCII 8->31 dropped 33 C:\...\MPGPH131.exe:Zone.Identifier, ASCII 8->33 dropped 53 Query firmware table information (likely to detect VMs) 8->53 55 Found stalling execution ending in API Sleep call 8->55 57 Contains functionality to inject threads in other processes 8->57 59 Uses schtasks.exe or at.exe to add and modify task schedules 8->59 19 schtasks.exe 1 8->19         started        21 schtasks.exe 1 8->21         started        61 Multi AV Scanner detection for dropped file 13->61 63 Machine Learning detection for dropped file 13->63 65 Tries to detect sandboxes / dynamic malware analysis system (registry check) 13->65 file6 signatures7 process8 process9 23 conhost.exe 19->23         started        25 conhost.exe 21->25         started       

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            YnsEArPlqx.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\RageMP131\RageMP131.exe100%Joe Sandbox ML
            C:\ProgramData\MPGPH131\MPGPH131.exe100%Joe Sandbox ML
            C:\ProgramData\MPGPH131\MPGPH131.exe55%ReversingLabsWin32.Trojan.RiseProStealer
            C:\Users\user\AppData\Local\RageMP131\RageMP131.exe55%ReversingLabsWin32.Trojan.RiseProStealer
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            https://ipinfo.io/0%URL Reputationsafe
            https://t.me/RiseProSUPPORTv0%Avira URL Cloudsafe
            https://t.me/RiseProSUPPORTt0%Avira URL Cloudsafe
            http://77.91.77.81/mine/amadka.exeisepro_bot100%Avira URL Cloudphishing
            http://77.91.77.81/mine/amadka.exe100%Avira URL Cloudphishing
            http://77.91.77.81/cost/go.exe100%Avira URL Cloudphishing
            https://ipinfo.io:443/widget/demo/8.46.123.330%Avira URL Cloudsafe
            https://db-ip.com:443/demo/home.php?s=8.46.123.33H0%Avira URL Cloudsafe
            http://77.91.77.81/mine/amadka.exe3377b100%Avira URL Cloudphishing
            http://77.91.77.81/mine/amadka.exe.1100%Avira URL Cloudphishing
            https://db-ip.com:443/demo/home.php?s=8.46.123.33M0%Avira URL Cloudsafe
            https://t.me/RiseProSUPPORTf0%Avira URL Cloudsafe
            https://ipinfo.io/widget/demo/8.46.123.33NA0%Avira URL Cloudsafe
            https://ipinfo.io/widget/demo/8.46.123.33P.tmp0%Avira URL Cloudsafe
            http://77.91.77.81/cost/lenin.exe0.1100%Avira URL Cloudphishing
            https://ipinfo.io/s0%Avira URL Cloudsafe
            https://db-ip.com/0%Avira URL Cloudsafe
            https://db-ip.com/oV0%Avira URL Cloudsafe
            https://t.me/risepro0%Avira URL Cloudsafe
            https://ipinfo.io/widget/demo/8.46.123.330%Avira URL Cloudsafe
            https://db-ip.com/demo/home.php?s=8.46.123.33f70%Avira URL Cloudsafe
            http://77.91.77.81/cost/lenin.e100%Avira URL Cloudphishing
            https://db-ip.com:443/demo/home.php?s=8.46.123.330%Avira URL Cloudsafe
            http://77.91.77.81/mine/amadka.exeB100%Avira URL Cloudphishing
            https://db-ip.com/demo/home.php?s=8.46.123.3330%Avira URL Cloudsafe
            http://77.91.77.81/cost/go.exeT3EU100%Avira URL Cloudphishing
            https://db-ip.com/L0%Avira URL Cloudsafe
            https://t.me/risepro_bot80%Avira URL Cloudsafe
            http://77.91.77.81/mine/amadka.exeisepro_botA%100%Avira URL Cloudphishing
            https://t.me/risepro_botrisep0%Avira URL Cloudsafe
            https://db-ip.com/V0%Avira URL Cloudsafe
            https://t.me/risepro_bot~0%Avira URL Cloudsafe
            https://t.me/risepro_botClyf(U30%Avira URL Cloudsafe
            https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll0%Avira URL Cloudsafe
            https://t.me/RiseProSUPPORT0%Avira URL Cloudsafe
            https://t.me/risepro_botK:0%Avira URL Cloudsafe
            https://t.me/risepro_bot3ABbfQUY0%Avira URL Cloudsafe
            https://ipinfo.io/Mozilla/5.00%Avira URL Cloudsafe
            http://77.91.77.81/cost/lenin.exek.com100%Avira URL Cloudphishing
            http://77.91.77.81/cost/go.exew9u100%Avira URL Cloudphishing
            http://77.91.77.81/cost/lenin.exe/risepro100%Avira URL Cloudphishing
            https://db-ip.com/h0%Avira URL Cloudsafe
            https://t.me/risepro_botlater0%Avira URL Cloudsafe
            https://t.me/risepro_bot0%Avira URL Cloudsafe
            https://t.%90%Avira URL Cloudsafe
            http://77.91.77.81/mine/amadka.exe0.1100%Avira URL Cloudphishing
            http://77.91.77.81/cost/go.exeOP100%Avira URL Cloudphishing
            https://www.maxmind.com/en/locate-my-ip-address0%Avira URL Cloudsafe
            http://www.winimage.com/zLibDll0%Avira URL Cloudsafe
            https://db-ip.com/demo/home.php?s=8.46.123.33w0%Avira URL Cloudsafe
            https://db-ip.com/demo/home.php?s=8.46.123.330%Avira URL Cloudsafe
            https://db-ip.com/demo/home.php?s=8.46.123.33k0%Avira URL Cloudsafe
            http://77.91.77.81/cost/lenin.exe100%Avira URL Cloudmalware
            https://db-ip.com:443/demo/home.php?s=8.46.123.3380%Avira URL Cloudsafe
            https://t.h0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            ipinfo.io
            34.117.186.192
            truefalse
              unknown
              db-ip.com
              172.67.75.166
              truefalse
                unknown
                NameMaliciousAntivirus DetectionReputation
                https://ipinfo.io/widget/demo/8.46.123.33false
                • Avira URL Cloud: safe
                unknown
                https://ipinfo.io/false
                • URL Reputation: safe
                unknown
                https://db-ip.com/demo/home.php?s=8.46.123.33false
                • Avira URL Cloud: safe
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://77.91.77.81/mine/amadka.exeRageMP131.exe, 0000000C.00000002.3055648642.0000000000F20000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: phishing
                unknown
                http://77.91.77.81/mine/amadka.exeisepro_botMPGPH131.exe, 00000007.00000002.3055578194.0000000000CF8000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: phishing
                unknown
                https://ipinfo.io:443/widget/demo/8.46.123.33YnsEArPlqx.exe, 00000000.00000002.3055663083.0000000000D57000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.3055816885.0000000000E45000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3055578194.0000000000CEB000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000003.2933668257.0000000000C76000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3056302312.0000000000C76000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3055648642.0000000000EDC000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://db-ip.com:443/demo/home.php?s=8.46.123.33MMPGPH131.exe, 00000007.00000002.3055578194.0000000000CF8000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://t.me/RiseProSUPPORTvRageMP131.exe, 0000000C.00000002.3055648642.0000000000E67000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://77.91.77.81/cost/go.exeRageMP131.exe, 0000000C.00000002.3056865794.0000000000F59000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3055648642.0000000000EFF000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: phishing
                unknown
                https://t.me/RiseProSUPPORTtMPGPH131.exe, 00000006.00000002.3055816885.0000000000DCD000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://77.91.77.81/mine/amadka.exe.1MPGPH131.exe, 00000006.00000002.3055816885.0000000000E5B000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: phishing
                unknown
                http://77.91.77.81/mine/amadka.exe3377bMPGPH131.exe, 00000007.00000002.3055578194.0000000000CF8000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: phishing
                unknown
                https://db-ip.com:443/demo/home.php?s=8.46.123.33HYnsEArPlqx.exe, 00000000.00000002.3055663083.0000000000D79000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://db-ip.com/YnsEArPlqx.exe, 00000000.00000002.3055663083.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.3055816885.0000000000E5B000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3055578194.0000000000CF8000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000003.2933539587.0000000000C95000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3056401980.0000000000C95000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3055648642.0000000000F20000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://db-ip.com/oVMPGPH131.exe, 00000006.00000002.3055816885.0000000000E5B000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://ipinfo.io/widget/demo/8.46.123.33NAMPGPH131.exe, 00000006.00000002.3055816885.0000000000E1A000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://t.me/RiseProSUPPORTfYnsEArPlqx.exe, 00000000.00000002.3055663083.0000000000CDE000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://77.91.77.81/cost/lenin.exe0.1RageMP131.exe, 0000000C.00000002.3055648642.0000000000F20000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: phishing
                unknown
                https://t.me/riseproMPGPH131.exe, 00000006.00000002.3055816885.0000000000E5B000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3055578194.0000000000CF8000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000003.2933539587.0000000000C95000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://ipinfo.io/widget/demo/8.46.123.33P.tmpYnsEArPlqx.exe, 00000000.00000002.3055663083.0000000000D2C000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://ipinfo.io/sMPGPH131.exe, 00000006.00000002.3055816885.0000000000E01000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://db-ip.com/demo/home.php?s=8.46.123.33f7MPGPH131.exe, 00000007.00000002.3055578194.0000000000CF8000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://77.91.77.81/cost/lenin.eMPGPH131.exe, 00000006.00000002.3055816885.0000000000EA4000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3055578194.0000000000CF8000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3055648642.0000000000F20000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: phishing
                unknown
                https://db-ip.com:443/demo/home.php?s=8.46.123.33MPGPH131.exe, 00000006.00000002.3055816885.0000000000E5B000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3055648642.0000000000EE9000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://77.91.77.81/mine/amadka.exeBYnsEArPlqx.exe, 00000000.00000002.3055663083.0000000000D79000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: phishing
                unknown
                https://db-ip.com/demo/home.php?s=8.46.123.333RageMP131.exe, 0000000C.00000002.3055648642.0000000000EC2000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://t.me/risepro_bot8YnsEArPlqx.exe, 00000000.00000002.3055663083.0000000000D79000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://db-ip.com/LRageMP131.exe, 0000000B.00000003.2933539587.0000000000C95000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3056401980.0000000000C95000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://77.91.77.81/mine/amadka.exeisepro_botA%RageMP131.exe, 0000000C.00000002.3055648642.0000000000F20000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: phishing
                unknown
                http://77.91.77.81/cost/go.exeT3EUMPGPH131.exe, 00000006.00000002.3055816885.0000000000EA4000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: phishing
                unknown
                https://t.me/risepro_botrisepRageMP131.exe, 0000000C.00000002.3055648642.0000000000F20000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://db-ip.com/VRageMP131.exe, 0000000B.00000003.2933539587.0000000000C95000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3056401980.0000000000C95000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://t.me/risepro_botClyf(U3MPGPH131.exe, 00000006.00000002.3055816885.0000000000E5B000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://t.me/risepro_bot~YnsEArPlqx.exe, 00000000.00000002.3055663083.0000000000D79000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dllYnsEArPlqx.exe, 00000000.00000003.1815516370.0000000002980000.00000004.00001000.00020000.00000000.sdmp, YnsEArPlqx.exe, 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3053548356.000000000055D000.00000002.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000006.00000003.1854273690.0000000002860000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000003.1854619896.0000000002840000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3053457158.000000000055D000.00000002.00000001.01000000.00000004.sdmp, RageMP131.exe, 0000000B.00000003.1930519219.0000000002740000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3053466368.000000000055D000.00000002.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000C.00000002.3053447329.000000000055D000.00000002.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000C.00000003.2009098412.0000000002840000.00000004.00001000.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://t.me/risepro_botK:RageMP131.exe, 0000000B.00000003.2933539587.0000000000C95000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3056401980.0000000000C95000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://t.me/RiseProSUPPORTYnsEArPlqx.exe, 00000000.00000002.3055663083.0000000000CDE000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.3055816885.0000000000DCD000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3055578194.0000000000C77000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3055498202.0000000000BFE000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3055648642.0000000000E67000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://t.me/risepro_bot3ABbfQUYMPGPH131.exe, 00000006.00000002.3055816885.0000000000E5B000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://77.91.77.81/cost/lenin.exek.comMPGPH131.exe, 00000006.00000002.3055816885.0000000000E5B000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: phishing
                unknown
                https://ipinfo.io/Mozilla/5.0YnsEArPlqx.exe, 00000000.00000002.3055663083.0000000000D57000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.3055816885.0000000000E45000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3055578194.0000000000CEB000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000003.2933539587.0000000000C7D000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3056401980.0000000000C7E000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3055648642.0000000000EDC000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://77.91.77.81/cost/go.exew9uYnsEArPlqx.exe, 00000000.00000002.3055663083.0000000000D79000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: phishing
                unknown
                http://77.91.77.81/cost/lenin.exe/riseproYnsEArPlqx.exe, 00000000.00000002.3055663083.0000000000D79000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: phishing
                unknown
                https://db-ip.com/hRageMP131.exe, 0000000B.00000003.2933539587.0000000000C95000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3056401980.0000000000C95000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://t.me/risepro_botRageMP131.exe, 0000000C.00000002.3055648642.0000000000F20000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3055648642.0000000000F4E000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://t.me/risepro_botlaterMPGPH131.exe, 00000007.00000002.3055578194.0000000000CF8000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000003.2933539587.0000000000C95000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3056401980.0000000000C95000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3055648642.0000000000F20000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://t.%9YnsEArPlqx.exe, 00000000.00000002.3055663083.0000000000D79000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://77.91.77.81/mine/amadka.exe0.1RageMP131.exe, 0000000B.00000002.3056401980.0000000000C95000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3055648642.0000000000F20000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: phishing
                unknown
                https://www.maxmind.com/en/locate-my-ip-addressMPGPH131.exefalse
                • Avira URL Cloud: safe
                unknown
                http://77.91.77.81/cost/go.exeOPRageMP131.exe, 0000000C.00000002.3055648642.0000000000EFF000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: phishing
                unknown
                http://www.winimage.com/zLibDllYnsEArPlqx.exe, 00000000.00000003.1815516370.0000000002980000.00000004.00001000.00020000.00000000.sdmp, YnsEArPlqx.exe, 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3053548356.000000000055D000.00000002.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000006.00000003.1854273690.0000000002860000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000003.1854619896.0000000002840000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3053457158.000000000055D000.00000002.00000001.01000000.00000004.sdmp, RageMP131.exe, 0000000B.00000003.1930519219.0000000002740000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3053466368.000000000055D000.00000002.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000C.00000002.3053447329.000000000055D000.00000002.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000C.00000003.2009098412.0000000002840000.00000004.00001000.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://db-ip.com/demo/home.php?s=8.46.123.33wYnsEArPlqx.exe, 00000000.00000002.3055663083.0000000000D79000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://t.hMPGPH131.exe, 00000007.00000002.3055578194.0000000000CF8000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://db-ip.com/demo/home.php?s=8.46.123.33kRageMP131.exe, 0000000C.00000002.3055648642.0000000000EFF000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://77.91.77.81/cost/lenin.exeRageMP131.exe, 0000000C.00000002.3056865794.0000000000F59000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3055648642.0000000000F20000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: malware
                unknown
                https://db-ip.com:443/demo/home.php?s=8.46.123.338RageMP131.exe, 0000000B.00000002.3055498202.0000000000C5B000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                34.117.186.192
                ipinfo.ioUnited States
                139070GOOGLE-AS-APGoogleAsiaPacificPteLtdSGfalse
                172.67.75.166
                db-ip.comUnited States
                13335CLOUDFLARENETUSfalse
                77.91.77.66
                unknownRussian Federation
                42861FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRUtrue
                Joe Sandbox version:40.0.0 Tourmaline
                Analysis ID:1460294
                Start date and time:2024-06-20 18:56:06 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 8m 34s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:14
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:YnsEArPlqx.exe
                renamed because original name is a hash value
                Original Sample Name:ab8e88bff0b907fc49b949d704490018.exe
                Detection:MAL
                Classification:mal100.troj.evad.winEXE@11/5@3/3
                EGA Information:
                • Successful, ratio: 100%
                HCA Information:Failed
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                • Not all processes where analyzed, report is missing behavior information
                • Report creation exceeded maximum time and may have missing disassembly code information.
                • Report size exceeded maximum capacity and may have missing behavior information.
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                • VT rate limit hit for: YnsEArPlqx.exe
                TimeTypeDescription
                12:58:13API Interceptor56x Sleep call for process: RageMP131.exe modified
                12:58:13API Interceptor87x Sleep call for process: MPGPH131.exe modified
                12:58:13API Interceptor42x Sleep call for process: YnsEArPlqx.exe modified
                17:57:14Task SchedulerRun new task: MPGPH131 HR path: C:\ProgramData\MPGPH131\MPGPH131.exe
                17:57:14Task SchedulerRun new task: MPGPH131 LG path: C:\ProgramData\MPGPH131\MPGPH131.exe
                17:57:14AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run RageMP131 C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                17:57:22AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run RageMP131 C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                34.117.186.192HP-patchedUS-deobfuscated.exeGet hashmaliciousUnknownBrowse
                • ipinfo.io/
                HP-patchedUS-deobfuscated.exeGet hashmaliciousUnknownBrowse
                • ipinfo.io/
                HP-patchedUS-deobfuscated.exeGet hashmaliciousUnknownBrowse
                • ipinfo.io/
                SecuriteInfo.com.Win32.Evo-gen.24318.16217.exeGet hashmaliciousUnknownBrowse
                • ipinfo.io/json
                SecuriteInfo.com.Win32.Evo-gen.28489.31883.exeGet hashmaliciousUnknownBrowse
                • ipinfo.io/json
                Raptor.HardwareService.Setup 1.msiGet hashmaliciousUnknownBrowse
                • ipinfo.io/ip
                Conferma_Pdf_Editor.exeGet hashmaliciousPlanet StealerBrowse
                • ipinfo.io/
                Conferma_Pdf_Editor.exeGet hashmaliciousPlanet StealerBrowse
                • ipinfo.io/
                w.shGet hashmaliciousXmrigBrowse
                • /ip
                Raptor.HardwareService.Setup_2.3.6.0.msiGet hashmaliciousUnknownBrowse
                • ipinfo.io/ip
                172.67.75.166T17sbXrL3i.exeGet hashmaliciousRisePro StealerBrowse
                  file.exeGet hashmaliciousRisePro StealerBrowse
                    https://curious-kringle-id4964-024b3b3.netlify.app/form.htmlGet hashmaliciousUnknownBrowse
                      4Ip0IVHqJ3.exeGet hashmaliciousRisePro StealerBrowse
                        https://gacw-no-reply-restriction-appeal-case.netlify.app/feedback_id_38258467296/Get hashmaliciousUnknownBrowse
                          http://rules-prohibiting-violative-advertisi.netlify.app/appeal_case_ID_78234127826/Get hashmaliciousUnknownBrowse
                            SecuriteInfo.com.Win32.Evo-gen.23207.8804.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                              jv9lMYVHh0.exeGet hashmaliciousRisePro StealerBrowse
                                5i5Cl02eCU.exeGet hashmaliciousRisePro StealerBrowse
                                  file.exeGet hashmaliciousRisePro StealerBrowse
                                    77.91.77.66AlCsIOd0pd.exeGet hashmaliciousRisePro StealerBrowse
                                      setup.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                                        D44CPdpkNk.exeGet hashmaliciousRisePro StealerBrowse
                                          WGEfBWbWQI.exeGet hashmaliciousRisePro StealerBrowse
                                            2bT2lTwRku.exeGet hashmaliciousRisePro StealerBrowse
                                              T17sbXrL3i.exeGet hashmaliciousRisePro StealerBrowse
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                ipinfo.iosetup.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                                                • 34.117.186.192
                                                D44CPdpkNk.exeGet hashmaliciousRisePro StealerBrowse
                                                • 34.117.186.192
                                                1kBeqS7E3z.exeGet hashmaliciousLummaC, RisePro Stealer, VidarBrowse
                                                • 34.117.186.192
                                                WGEfBWbWQI.exeGet hashmaliciousRisePro StealerBrowse
                                                • 34.117.186.192
                                                2bT2lTwRku.exeGet hashmaliciousRisePro StealerBrowse
                                                • 34.117.186.192
                                                T17sbXrL3i.exeGet hashmaliciousRisePro StealerBrowse
                                                • 34.117.186.192
                                                http://telegliam.icu/Get hashmaliciousUnknownBrowse
                                                • 34.117.186.192
                                                https://ingresar-365-msn.glitch.me/Get hashmaliciousUnknownBrowse
                                                • 34.117.186.192
                                                Jr7B1jZMaT.exeGet hashmaliciousNovaSentinelBrowse
                                                • 34.117.186.192
                                                file.exeGet hashmaliciousRisePro StealerBrowse
                                                • 34.117.186.192
                                                db-ip.comsetup.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                                                • 104.26.5.15
                                                D44CPdpkNk.exeGet hashmaliciousRisePro StealerBrowse
                                                • 104.26.4.15
                                                1kBeqS7E3z.exeGet hashmaliciousLummaC, RisePro Stealer, VidarBrowse
                                                • 104.26.4.15
                                                WGEfBWbWQI.exeGet hashmaliciousRisePro StealerBrowse
                                                • 104.26.4.15
                                                2bT2lTwRku.exeGet hashmaliciousRisePro StealerBrowse
                                                • 104.26.5.15
                                                T17sbXrL3i.exeGet hashmaliciousRisePro StealerBrowse
                                                • 172.67.75.166
                                                file.exeGet hashmaliciousRisePro StealerBrowse
                                                • 172.67.75.166
                                                https://curious-kringle-id4964-024b3b3.netlify.app/form.htmlGet hashmaliciousUnknownBrowse
                                                • 104.26.5.15
                                                https://glist43-dase23-ac9ae33.netlify.app/dev.html/Get hashmaliciousUnknownBrowse
                                                • 104.26.5.15
                                                4Ip0IVHqJ3.exeGet hashmaliciousRisePro StealerBrowse
                                                • 172.67.75.166
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRUAlCsIOd0pd.exeGet hashmaliciousRisePro StealerBrowse
                                                • 77.91.77.66
                                                setup.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                                                • 77.91.77.81
                                                setup.exeGet hashmaliciousPython Stealer, Amadey, Monster Stealer, PureLog Stealer, RedLine, XWorm, zgRATBrowse
                                                • 77.91.77.81
                                                FN MultiHack v2.exeGet hashmaliciousRedLineBrowse
                                                • 77.91.77.6
                                                D44CPdpkNk.exeGet hashmaliciousRisePro StealerBrowse
                                                • 77.91.77.66
                                                https://drive.google.com/file/d/1SCCeBL3Md8Sct7wQF5bfbtLysFqXCW6y/view?ts=667387acGet hashmaliciousUnknownBrowse
                                                • 77.91.77.5
                                                https://drive.google.com/file/d/1SCCeBL3Md8Sct7wQF5bfbtLysFqXCW6y/view?ts=667387acGet hashmaliciousUnknownBrowse
                                                • 77.91.77.5
                                                WGEfBWbWQI.exeGet hashmaliciousRisePro StealerBrowse
                                                • 77.91.77.66
                                                2bT2lTwRku.exeGet hashmaliciousRisePro StealerBrowse
                                                • 77.91.77.66
                                                T17sbXrL3i.exeGet hashmaliciousRisePro StealerBrowse
                                                • 77.91.77.66
                                                GOOGLE-AS-APGoogleAsiaPacificPteLtdSGhttps://www.barstoolsports.com/blog/3517288/i-would-fucking-kill-you-right-now-if-i-could-kelly-and-tate-finally-met-in-chicago-and-boy-oh-boy-was-it-fireworks#story-commentsGet hashmaliciousUnknownBrowse
                                                • 34.117.239.71
                                                https://my.visme.co/v/pvmd79je-dj6mqvGet hashmaliciousUnknownBrowse
                                                • 34.117.77.79
                                                setup.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                                                • 34.117.186.192
                                                D44CPdpkNk.exeGet hashmaliciousRisePro StealerBrowse
                                                • 34.117.186.192
                                                1kBeqS7E3z.exeGet hashmaliciousLummaC, RisePro Stealer, VidarBrowse
                                                • 34.117.186.192
                                                WGEfBWbWQI.exeGet hashmaliciousRisePro StealerBrowse
                                                • 34.117.186.192
                                                2bT2lTwRku.exeGet hashmaliciousRisePro StealerBrowse
                                                • 34.117.186.192
                                                T17sbXrL3i.exeGet hashmaliciousRisePro StealerBrowse
                                                • 34.117.186.192
                                                http://h3200457.wixsite.com/my-site-1/Get hashmaliciousUnknownBrowse
                                                • 34.117.60.144
                                                http://telegliam.icu/Get hashmaliciousUnknownBrowse
                                                • 34.117.186.192
                                                CLOUDFLARENETUShttps://www.barstoolsports.com/blog/3517288/i-would-fucking-kill-you-right-now-if-i-could-kelly-and-tate-finally-met-in-chicago-and-boy-oh-boy-was-it-fireworks#story-commentsGet hashmaliciousUnknownBrowse
                                                • 172.64.151.101
                                                FAX_202405_136088.xhtmlGet hashmaliciousUnknownBrowse
                                                • 104.18.11.207
                                                SecuriteInfo.com.Trojan.PackedNET.2926.9666.23696.exeGet hashmaliciousAgentTeslaBrowse
                                                • 172.67.74.152
                                                ATT001_PlayVM.htmlGet hashmaliciousUnknownBrowse
                                                • 172.64.151.101
                                                Products volume.exeGet hashmaliciousFormBookBrowse
                                                • 104.21.84.156
                                                aaaaa.shtml.htmlGet hashmaliciousHTMLPhisherBrowse
                                                • 104.18.11.207
                                                https://airtable.com/appLxB5sOmdo2GJo9/shrh1CoBQsbhadVcVGet hashmaliciousHTMLPhisherBrowse
                                                • 172.64.155.119
                                                OFS Fitel, LLC In-Service Agreement.docGet hashmaliciousUnknownBrowse
                                                • 104.18.2.35
                                                ACH Receipt.htmlGet hashmaliciousHTMLPhisherBrowse
                                                • 188.114.96.3
                                                https://docs.google.com/drawings/d/1qLrBv5e6nFXfFVtMDNkicLQy_velV_hePF-fb4qRTSc/previewGet hashmaliciousUnknownBrowse
                                                • 1.1.1.1
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                a0e9f5d64349fb13191bc781f81f42e1Invoice.docmGet hashmaliciousUnknownBrowse
                                                • 34.117.186.192
                                                • 172.67.75.166
                                                file.exeGet hashmaliciousLummaC, PureLog Stealer, zgRATBrowse
                                                • 34.117.186.192
                                                • 172.67.75.166
                                                Setup.exeGet hashmaliciousLummaC, Amadey, LummaC StealerBrowse
                                                • 34.117.186.192
                                                • 172.67.75.166
                                                setup.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                                                • 34.117.186.192
                                                • 172.67.75.166
                                                setup.exeGet hashmaliciousLummaCBrowse
                                                • 34.117.186.192
                                                • 172.67.75.166
                                                setup.exeGet hashmaliciousLummaCBrowse
                                                • 34.117.186.192
                                                • 172.67.75.166
                                                Galaxy Swapper v2.0.3.exeGet hashmaliciousLummaC, XmrigBrowse
                                                • 34.117.186.192
                                                • 172.67.75.166
                                                setup.exeGet hashmaliciousLummaCBrowse
                                                • 34.117.186.192
                                                • 172.67.75.166
                                                setup.exeGet hashmaliciousLummaCBrowse
                                                • 34.117.186.192
                                                • 172.67.75.166
                                                file.exeGet hashmaliciousLummaCBrowse
                                                • 34.117.186.192
                                                • 172.67.75.166
                                                No context
                                                Process:C:\Users\user\Desktop\YnsEArPlqx.exe
                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):3270672
                                                Entropy (8bit):7.967404431164332
                                                Encrypted:false
                                                SSDEEP:98304:e5tF1/fIhf2JK5KtqWaUMrXYQjC4fbEaSNthtA:Ib4haKUt1aUWI4xfbnSHhu
                                                MD5:AB8E88BFF0B907FC49B949D704490018
                                                SHA1:559F2F2B61BD344293F7CBC78B72D8E368910AE3
                                                SHA-256:921C5314FC334BAC928A8398DA1C8341B1021CF92AE83BF8B872D422F2E7EF8F
                                                SHA-512:C2388EDC661CBAAECCF2FF9A2C153B5D201CF7A2C605570EB992AFA3878A0F24C96E1443713E9330833001A4D2BE245E6F49F281C663118ADEB76ECF7D2E41B5
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                • Antivirus: ReversingLabs, Detection: 55%
                                                Reputation:low
                                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......j.....s...s...s.e.p.%.s.e.v...s.e.t./.s..y..*.s..yw.=.s..yp.4.s..yv.u.s.e.w.6.s.e.u./.s.e.r.5.s...r...s..zz.2.s..z../.s..../.s..zq./.s.Rich..s.................PE..L....iLf...............'.....|......X.X...........@...........................~.......2......................................a..........8....................p~..............................p...............................6..@................... ........................... ..` 2~..........................@..@ 0I...P......................@....rsrc...8...........................@..@ X........r..................@..B.idata.......`.......r..............@....tls.........p.......v...................themida..>..........x..............`....boot....p&...X..p&..x..............`..`.reloc.......p~.......1................@................................................................
                                                Process:C:\Users\user\Desktop\YnsEArPlqx.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):26
                                                Entropy (8bit):3.95006375643621
                                                Encrypted:false
                                                SSDEEP:3:ggPYV:rPYV
                                                MD5:187F488E27DB4AF347237FE461A079AD
                                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                Malicious:true
                                                Reputation:high, very likely benign file
                                                Preview:[ZoneTransfer]....ZoneId=0
                                                Process:C:\Users\user\Desktop\YnsEArPlqx.exe
                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):3270672
                                                Entropy (8bit):7.967404431164332
                                                Encrypted:false
                                                SSDEEP:98304:e5tF1/fIhf2JK5KtqWaUMrXYQjC4fbEaSNthtA:Ib4haKUt1aUWI4xfbnSHhu
                                                MD5:AB8E88BFF0B907FC49B949D704490018
                                                SHA1:559F2F2B61BD344293F7CBC78B72D8E368910AE3
                                                SHA-256:921C5314FC334BAC928A8398DA1C8341B1021CF92AE83BF8B872D422F2E7EF8F
                                                SHA-512:C2388EDC661CBAAECCF2FF9A2C153B5D201CF7A2C605570EB992AFA3878A0F24C96E1443713E9330833001A4D2BE245E6F49F281C663118ADEB76ECF7D2E41B5
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                • Antivirus: ReversingLabs, Detection: 55%
                                                Reputation:low
                                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......j.....s...s...s.e.p.%.s.e.v...s.e.t./.s..y..*.s..yw.=.s..yp.4.s..yv.u.s.e.w.6.s.e.u./.s.e.r.5.s...r...s..zz.2.s..z../.s..../.s..zq./.s.Rich..s.................PE..L....iLf...............'.....|......X.X...........@...........................~.......2......................................a..........8....................p~..............................p...............................6..@................... ........................... ..` 2~..........................@..@ 0I...P......................@....rsrc...8...........................@..@ X........r..................@..B.idata.......`.......r..............@....tls.........p.......v...................themida..>..........x..............`....boot....p&...X..p&..x..............`..`.reloc.......p~.......1................@................................................................
                                                Process:C:\Users\user\Desktop\YnsEArPlqx.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):26
                                                Entropy (8bit):3.95006375643621
                                                Encrypted:false
                                                SSDEEP:3:ggPYV:rPYV
                                                MD5:187F488E27DB4AF347237FE461A079AD
                                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                Malicious:true
                                                Reputation:high, very likely benign file
                                                Preview:[ZoneTransfer]....ZoneId=0
                                                Process:C:\Users\user\Desktop\YnsEArPlqx.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:modified
                                                Size (bytes):13
                                                Entropy (8bit):2.8731406795131336
                                                Encrypted:false
                                                SSDEEP:3:L1VcuRn:TRRn
                                                MD5:D2322FA1329556D66DDD87C7F6D2456D
                                                SHA1:FEFE77CAE67D8ADEECAC37F97DA6B7BB3CF2CA4F
                                                SHA-256:382F74819EB312810D9DC06212DFCACFE2AB3B3585DB98DFA83BB35EF0396E70
                                                SHA-512:BD20A13F63A556FF645BC9FE1E5CC59E7B160C106207B2999881F8B4D661A597850A2BE1FA24A9E8FB6F6E4DCCB109EDF327A5E313F80054EC296F5715551970
                                                Malicious:false
                                                Reputation:low
                                                Preview:1718909364668
                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Entropy (8bit):7.967404431164332
                                                TrID:
                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                • DOS Executable Generic (2002/1) 0.02%
                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                File name:YnsEArPlqx.exe
                                                File size:3'270'672 bytes
                                                MD5:ab8e88bff0b907fc49b949d704490018
                                                SHA1:559f2f2b61bd344293f7cbc78b72d8e368910ae3
                                                SHA256:921c5314fc334bac928a8398da1c8341b1021cf92ae83bf8b872d422f2e7ef8f
                                                SHA512:c2388edc661cbaaeccf2ff9a2c153b5d201cf7a2c605570eb992afa3878a0f24c96e1443713e9330833001a4d2be245e6f49f281c663118adeb76ecf7d2e41b5
                                                SSDEEP:98304:e5tF1/fIhf2JK5KtqWaUMrXYQjC4fbEaSNthtA:Ib4haKUt1aUWI4xfbnSHhu
                                                TLSH:C0E53367CC66D2E5F27D54332B36890CA63A91A26E2355B5782F133068F2C4D87E1DCE
                                                File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......j.....s...s...s.e.p.%.s.e.v...s.e.t./.s..y..*.s..yw.=.s..yp.4.s..yv.u.s.e.w.6.s.e.u./.s.e.r.5.s...r...s..zz.2.s..z../.s...../.s
                                                Icon Hash:8596a1a0a1a1b171
                                                Entrypoint:0x980058
                                                Entrypoint Section:.boot
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                DLL Characteristics:TERMINAL_SERVER_AWARE
                                                Time Stamp:0x664C6914 [Tue May 21 09:27:48 2024 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:6
                                                OS Version Minor:0
                                                File Version Major:6
                                                File Version Minor:0
                                                Subsystem Version Major:6
                                                Subsystem Version Minor:0
                                                Import Hash:63814aaf116ba6abb6496ce4bcad24c6
                                                Instruction
                                                call 00007FE248B82EC0h
                                                push ebx
                                                mov ebx, esp
                                                push ebx
                                                mov esi, dword ptr [ebx+08h]
                                                mov edi, dword ptr [ebx+10h]
                                                cld
                                                mov dl, 80h
                                                mov al, byte ptr [esi]
                                                inc esi
                                                mov byte ptr [edi], al
                                                inc edi
                                                mov ebx, 00000002h
                                                add dl, dl
                                                jne 00007FE248B82D77h
                                                mov dl, byte ptr [esi]
                                                inc esi
                                                adc dl, dl
                                                jnc 00007FE248B82D5Ch
                                                add dl, dl
                                                jne 00007FE248B82D77h
                                                mov dl, byte ptr [esi]
                                                inc esi
                                                adc dl, dl
                                                jnc 00007FE248B82DC3h
                                                xor eax, eax
                                                add dl, dl
                                                jne 00007FE248B82D77h
                                                mov dl, byte ptr [esi]
                                                inc esi
                                                adc dl, dl
                                                jnc 00007FE248B82E57h
                                                add dl, dl
                                                jne 00007FE248B82D77h
                                                mov dl, byte ptr [esi]
                                                inc esi
                                                adc dl, dl
                                                adc eax, eax
                                                add dl, dl
                                                jne 00007FE248B82D77h
                                                mov dl, byte ptr [esi]
                                                inc esi
                                                adc dl, dl
                                                adc eax, eax
                                                add dl, dl
                                                jne 00007FE248B82D77h
                                                mov dl, byte ptr [esi]
                                                inc esi
                                                adc dl, dl
                                                adc eax, eax
                                                add dl, dl
                                                jne 00007FE248B82D77h
                                                mov dl, byte ptr [esi]
                                                inc esi
                                                adc dl, dl
                                                adc eax, eax
                                                je 00007FE248B82D7Ah
                                                push edi
                                                mov eax, eax
                                                sub edi, eax
                                                mov al, byte ptr [edi]
                                                pop edi
                                                mov byte ptr [edi], al
                                                inc edi
                                                mov ebx, 00000002h
                                                jmp 00007FE248B82D0Bh
                                                mov eax, 00000001h
                                                add dl, dl
                                                jne 00007FE248B82D77h
                                                mov dl, byte ptr [esi]
                                                inc esi
                                                adc dl, dl
                                                adc eax, eax
                                                add dl, dl
                                                jne 00007FE248B82D77h
                                                mov dl, byte ptr [esi]
                                                inc esi
                                                adc dl, dl
                                                jc 00007FE248B82D5Ch
                                                sub eax, ebx
                                                mov ebx, 00000001h
                                                jne 00007FE248B82D9Ah
                                                mov ecx, 00000001h
                                                add dl, dl
                                                jne 00007FE248B82D77h
                                                mov dl, byte ptr [esi]
                                                inc esi
                                                adc dl, dl
                                                adc ecx, ecx
                                                add dl, dl
                                                jne 00007FE248B82D77h
                                                mov dl, byte ptr [esi]
                                                inc esi
                                                adc dl, dl
                                                jc 00007FE248B82D5Ch
                                                push esi
                                                mov esi, edi
                                                sub esi, ebp
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x19618b0x184.idata
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x18a0000x1638.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x7e70000x10.reloc
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x1970180x18.tls
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x18369c0x40
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                0x10000x15bbc80x9d200261dcbc24cbc9eb16e95b23575219f53False0.9987973597852029data7.981638520890903IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                0x15d0000x27e320x10a009c4edc30bf568b4831d47c2fa8adcadeFalse0.994140625data7.943472834836404IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                0x1850000x49300x800b28ebea9ebe41ba142a74e93b46ebac9False0.98681640625data7.721777854568001IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .rsrc0x18a0000x16380x1800fe6f3fdb9e7e97cba92d8ce4e4fcc95bFalse0.7220052083333334data6.54017046361188IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                0x18c0000x98580x720055d409a165ae6286b51388ca331aeab8False0.9794750548245614data7.934264573672369IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                .idata0x1960000x10000x4001b20e07443fa333ff9692026d1e6c6c2False0.3984375data3.42439969016873IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .tls0x1970000x10000x20054a50a058e0f3b6aa2fe1b22e2033106False0.056640625data0.18120187678200297IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .themida0x1980000x3e80000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .boot0x5800000x2670000x2670000a00394383a54186173259ab3252cfacunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .reloc0x7e70000x10000x10f5bc99b71bad9e8a775cc32747e3ca58False1.5GLS_BINARY_LSB_FIRST2.474601752714581IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                RT_ICON0x18a4400x1060PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedRussianRussia0.8838263358778626
                                                RT_GROUP_ICON0x18b4a00x14dataRussianRussia1.05
                                                RT_VERSION0x18a1300x310dataRussianRussia0.45408163265306123
                                                RT_MANIFEST0x18b4b80x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                                                DLLImport
                                                kernel32.dllGetModuleHandleA
                                                USER32.dllwsprintfA
                                                GDI32.dllCreateCompatibleBitmap
                                                ADVAPI32.dllRegQueryValueExA
                                                SHELL32.dllShellExecuteA
                                                ole32.dllCoInitialize
                                                WS2_32.dllWSAStartup
                                                CRYPT32.dllCryptUnprotectData
                                                SHLWAPI.dllPathFindExtensionA
                                                gdiplus.dllGdipGetImageEncoders
                                                SETUPAPI.dllSetupDiEnumDeviceInfo
                                                ntdll.dllRtlUnicodeStringToAnsiString
                                                RstrtMgr.DLLRmStartSession
                                                Language of compilation systemCountry where language is spokenMap
                                                RussianRussia
                                                EnglishUnited States
                                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                06/20/24-18:59:13.624078TCP2046269ET TROJAN [ANY.RUN] RisePro TCP (Activity)4974158709192.168.2.477.91.77.66
                                                06/20/24-18:58:58.560662TCP2046269ET TROJAN [ANY.RUN] RisePro TCP (Activity)4973258709192.168.2.477.91.77.66
                                                06/20/24-18:58:52.840391TCP2046269ET TROJAN [ANY.RUN] RisePro TCP (Activity)4973158709192.168.2.477.91.77.66
                                                06/20/24-18:57:14.894991TCP2049060ET TROJAN RisePro TCP Heartbeat Packet4973158709192.168.2.477.91.77.66
                                                06/20/24-18:59:07.355875TCP2046269ET TROJAN [ANY.RUN] RisePro TCP (Activity)4973958709192.168.2.477.91.77.66
                                                06/20/24-18:57:18.828226TCP2046266ET TROJAN [ANY.RUN] RisePro TCP (Token)587094973277.91.77.66192.168.2.4
                                                06/20/24-18:58:03.049093TCP2046267ET TROJAN [ANY.RUN] RisePro TCP (External IP)587094974177.91.77.66192.168.2.4
                                                06/20/24-18:57:35.040865TCP2046266ET TROJAN [ANY.RUN] RisePro TCP (Token)587094974177.91.77.66192.168.2.4
                                                06/20/24-18:57:15.478080TCP2046266ET TROJAN [ANY.RUN] RisePro TCP (Token)587094973177.91.77.66192.168.2.4
                                                06/20/24-18:57:18.837910TCP2046266ET TROJAN [ANY.RUN] RisePro TCP (Token)587094973377.91.77.66192.168.2.4
                                                06/20/24-18:58:58.606045TCP2046269ET TROJAN [ANY.RUN] RisePro TCP (Activity)4973358709192.168.2.477.91.77.66
                                                06/20/24-18:57:40.684951TCP2046267ET TROJAN [ANY.RUN] RisePro TCP (External IP)587094973977.91.77.66192.168.2.4
                                                06/20/24-18:57:26.019896TCP2046266ET TROJAN [ANY.RUN] RisePro TCP (Token)587094973977.91.77.66192.168.2.4
                                                06/20/24-18:57:40.086663TCP2046267ET TROJAN [ANY.RUN] RisePro TCP (External IP)587094973177.91.77.66192.168.2.4
                                                06/20/24-18:57:40.210568TCP2046267ET TROJAN [ANY.RUN] RisePro TCP (External IP)587094973277.91.77.66192.168.2.4
                                                06/20/24-18:57:40.261626TCP2046267ET TROJAN [ANY.RUN] RisePro TCP (External IP)587094973377.91.77.66192.168.2.4
                                                TimestampSource PortDest PortSource IPDest IP
                                                Jun 20, 2024 18:57:14.867392063 CEST4973158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:57:14.872680902 CEST587094973177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:57:14.872773886 CEST4973158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:57:14.894990921 CEST4973158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:57:14.900186062 CEST587094973177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:57:15.478080034 CEST587094973177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:57:15.526962996 CEST4973158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:57:18.209875107 CEST4973258709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:57:18.215310097 CEST587094973277.91.77.66192.168.2.4
                                                Jun 20, 2024 18:57:18.215409994 CEST4973258709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:57:18.219486952 CEST4973358709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:57:18.224916935 CEST587094973377.91.77.66192.168.2.4
                                                Jun 20, 2024 18:57:18.225008965 CEST4973358709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:57:18.238785982 CEST4973258709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:57:18.239044905 CEST4973358709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:57:18.244168043 CEST587094973277.91.77.66192.168.2.4
                                                Jun 20, 2024 18:57:18.244507074 CEST587094973377.91.77.66192.168.2.4
                                                Jun 20, 2024 18:57:18.605303049 CEST4973158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:57:18.610707045 CEST587094973177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:57:18.828226089 CEST587094973277.91.77.66192.168.2.4
                                                Jun 20, 2024 18:57:18.837909937 CEST587094973377.91.77.66192.168.2.4
                                                Jun 20, 2024 18:57:18.870759964 CEST4973258709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:57:18.886356115 CEST4973358709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:57:21.949140072 CEST4973258709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:57:21.949143887 CEST4973358709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:57:21.954988956 CEST587094973277.91.77.66192.168.2.4
                                                Jun 20, 2024 18:57:21.955049992 CEST587094973377.91.77.66192.168.2.4
                                                Jun 20, 2024 18:57:25.393862963 CEST4973958709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:57:25.398869991 CEST587094973977.91.77.66192.168.2.4
                                                Jun 20, 2024 18:57:25.398960114 CEST4973958709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:57:25.410298109 CEST4973958709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:57:25.415654898 CEST587094973977.91.77.66192.168.2.4
                                                Jun 20, 2024 18:57:26.019896030 CEST587094973977.91.77.66192.168.2.4
                                                Jun 20, 2024 18:57:26.073909998 CEST4973958709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:57:29.136550903 CEST4973958709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:57:29.141423941 CEST587094973977.91.77.66192.168.2.4
                                                Jun 20, 2024 18:57:34.425412893 CEST4974158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:57:34.430507898 CEST587094974177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:57:34.430629015 CEST4974158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:57:34.440203905 CEST4974158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:57:34.445101023 CEST587094974177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:57:35.040864944 CEST587094974177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:57:35.089631081 CEST4974158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:57:38.168387890 CEST4974158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:57:38.173934937 CEST587094974177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:57:40.086663008 CEST587094973177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:57:40.136542082 CEST4973158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:57:40.189471960 CEST49742443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:57:40.189557076 CEST4434974234.117.186.192192.168.2.4
                                                Jun 20, 2024 18:57:40.189647913 CEST49742443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:57:40.190637112 CEST49742443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:57:40.190690041 CEST4434974234.117.186.192192.168.2.4
                                                Jun 20, 2024 18:57:40.210567951 CEST587094973277.91.77.66192.168.2.4
                                                Jun 20, 2024 18:57:40.261501074 CEST4973258709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:57:40.261626005 CEST587094973377.91.77.66192.168.2.4
                                                Jun 20, 2024 18:57:40.269562006 CEST49743443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:57:40.269599915 CEST4434974334.117.186.192192.168.2.4
                                                Jun 20, 2024 18:57:40.269674063 CEST49743443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:57:40.270838976 CEST49743443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:57:40.270886898 CEST4434974334.117.186.192192.168.2.4
                                                Jun 20, 2024 18:57:40.290296078 CEST49744443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:57:40.290406942 CEST4434974434.117.186.192192.168.2.4
                                                Jun 20, 2024 18:57:40.290482998 CEST49744443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:57:40.291460991 CEST49744443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:57:40.291516066 CEST4434974434.117.186.192192.168.2.4
                                                Jun 20, 2024 18:57:40.308362961 CEST4973358709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:57:40.684951067 CEST587094973977.91.77.66192.168.2.4
                                                Jun 20, 2024 18:57:40.706904888 CEST4434974234.117.186.192192.168.2.4
                                                Jun 20, 2024 18:57:40.707005024 CEST49742443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:57:40.711128950 CEST49742443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:57:40.711186886 CEST4434974234.117.186.192192.168.2.4
                                                Jun 20, 2024 18:57:40.711622000 CEST4434974234.117.186.192192.168.2.4
                                                Jun 20, 2024 18:57:40.727715969 CEST49745443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:57:40.727813005 CEST4434974534.117.186.192192.168.2.4
                                                Jun 20, 2024 18:57:40.727895975 CEST49745443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:57:40.728888035 CEST49745443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:57:40.728923082 CEST4434974534.117.186.192192.168.2.4
                                                Jun 20, 2024 18:57:40.730259895 CEST4973958709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:57:40.755664110 CEST49742443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:57:40.790704012 CEST4434974434.117.186.192192.168.2.4
                                                Jun 20, 2024 18:57:40.790915966 CEST49744443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:57:40.791215897 CEST4434974334.117.186.192192.168.2.4
                                                Jun 20, 2024 18:57:40.791320086 CEST49743443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:57:40.792150021 CEST49744443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:57:40.792197943 CEST4434974434.117.186.192192.168.2.4
                                                Jun 20, 2024 18:57:40.792450905 CEST49743443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:57:40.792462111 CEST4434974334.117.186.192192.168.2.4
                                                Jun 20, 2024 18:57:40.792578936 CEST4434974434.117.186.192192.168.2.4
                                                Jun 20, 2024 18:57:40.792800903 CEST4434974334.117.186.192192.168.2.4
                                                Jun 20, 2024 18:57:40.796545982 CEST4434974234.117.186.192192.168.2.4
                                                Jun 20, 2024 18:57:40.839626074 CEST49744443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:57:40.842360973 CEST49743443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:57:40.860759020 CEST49744443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:57:40.869853973 CEST49743443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:57:40.883080959 CEST4434974234.117.186.192192.168.2.4
                                                Jun 20, 2024 18:57:40.883428097 CEST4434974234.117.186.192192.168.2.4
                                                Jun 20, 2024 18:57:40.883512020 CEST49742443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:57:40.886112928 CEST49742443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:57:40.886162043 CEST4434974234.117.186.192192.168.2.4
                                                Jun 20, 2024 18:57:40.886192083 CEST49742443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:57:40.886209965 CEST4434974234.117.186.192192.168.2.4
                                                Jun 20, 2024 18:57:40.896604061 CEST49746443192.168.2.4172.67.75.166
                                                Jun 20, 2024 18:57:40.896667957 CEST44349746172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:57:40.896748066 CEST49746443192.168.2.4172.67.75.166
                                                Jun 20, 2024 18:57:40.897015095 CEST49746443192.168.2.4172.67.75.166
                                                Jun 20, 2024 18:57:40.897043943 CEST44349746172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:57:40.904494047 CEST4434974434.117.186.192192.168.2.4
                                                Jun 20, 2024 18:57:40.912532091 CEST4434974334.117.186.192192.168.2.4
                                                Jun 20, 2024 18:57:41.000684023 CEST4434974434.117.186.192192.168.2.4
                                                Jun 20, 2024 18:57:41.000818014 CEST4434974434.117.186.192192.168.2.4
                                                Jun 20, 2024 18:57:41.001025915 CEST49744443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:57:41.001121044 CEST49744443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:57:41.001121044 CEST49744443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:57:41.001166105 CEST4434974434.117.186.192192.168.2.4
                                                Jun 20, 2024 18:57:41.001205921 CEST4434974434.117.186.192192.168.2.4
                                                Jun 20, 2024 18:57:41.002507925 CEST49747443192.168.2.4172.67.75.166
                                                Jun 20, 2024 18:57:41.002594948 CEST44349747172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:57:41.002676010 CEST49747443192.168.2.4172.67.75.166
                                                Jun 20, 2024 18:57:41.003042936 CEST49747443192.168.2.4172.67.75.166
                                                Jun 20, 2024 18:57:41.003132105 CEST44349747172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:57:41.009438038 CEST4434974334.117.186.192192.168.2.4
                                                Jun 20, 2024 18:57:41.009916067 CEST4434974334.117.186.192192.168.2.4
                                                Jun 20, 2024 18:57:41.009967089 CEST49743443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:57:41.010067940 CEST49743443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:57:41.010082960 CEST4434974334.117.186.192192.168.2.4
                                                Jun 20, 2024 18:57:41.010093927 CEST49743443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:57:41.010099888 CEST4434974334.117.186.192192.168.2.4
                                                Jun 20, 2024 18:57:41.011152983 CEST49748443192.168.2.4172.67.75.166
                                                Jun 20, 2024 18:57:41.011173010 CEST44349748172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:57:41.011234999 CEST49748443192.168.2.4172.67.75.166
                                                Jun 20, 2024 18:57:41.011461020 CEST49748443192.168.2.4172.67.75.166
                                                Jun 20, 2024 18:57:41.011472940 CEST44349748172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:57:41.334681034 CEST4434974534.117.186.192192.168.2.4
                                                Jun 20, 2024 18:57:41.334783077 CEST49745443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:57:41.335994005 CEST49745443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:57:41.336009979 CEST4434974534.117.186.192192.168.2.4
                                                Jun 20, 2024 18:57:41.336256027 CEST4434974534.117.186.192192.168.2.4
                                                Jun 20, 2024 18:57:41.384072065 CEST49745443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:57:41.424527884 CEST4434974534.117.186.192192.168.2.4
                                                Jun 20, 2024 18:57:41.508068085 CEST4434974534.117.186.192192.168.2.4
                                                Jun 20, 2024 18:57:41.508239985 CEST4434974534.117.186.192192.168.2.4
                                                Jun 20, 2024 18:57:41.508344889 CEST49745443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:57:41.508753061 CEST49745443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:57:41.508790016 CEST4434974534.117.186.192192.168.2.4
                                                Jun 20, 2024 18:57:41.508824110 CEST49745443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:57:41.508838892 CEST4434974534.117.186.192192.168.2.4
                                                Jun 20, 2024 18:57:41.510406971 CEST49749443192.168.2.4172.67.75.166
                                                Jun 20, 2024 18:57:41.510494947 CEST44349749172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:57:41.510646105 CEST49749443192.168.2.4172.67.75.166
                                                Jun 20, 2024 18:57:41.510972023 CEST49749443192.168.2.4172.67.75.166
                                                Jun 20, 2024 18:57:41.511009932 CEST44349749172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:57:41.516624928 CEST44349747172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:57:41.516690969 CEST49747443192.168.2.4172.67.75.166
                                                Jun 20, 2024 18:57:41.518430948 CEST49747443192.168.2.4172.67.75.166
                                                Jun 20, 2024 18:57:41.518444061 CEST44349747172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:57:41.518704891 CEST44349747172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:57:41.520112991 CEST49747443192.168.2.4172.67.75.166
                                                Jun 20, 2024 18:57:41.525110006 CEST44349746172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:57:41.525235891 CEST49746443192.168.2.4172.67.75.166
                                                Jun 20, 2024 18:57:41.526875973 CEST49746443192.168.2.4172.67.75.166
                                                Jun 20, 2024 18:57:41.526887894 CEST44349746172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:57:41.527396917 CEST44349746172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:57:41.528537035 CEST49746443192.168.2.4172.67.75.166
                                                Jun 20, 2024 18:57:41.533680916 CEST44349748172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:57:41.533914089 CEST49748443192.168.2.4172.67.75.166
                                                Jun 20, 2024 18:57:41.534756899 CEST49748443192.168.2.4172.67.75.166
                                                Jun 20, 2024 18:57:41.534763098 CEST44349748172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:57:41.535790920 CEST44349748172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:57:41.536973000 CEST49748443192.168.2.4172.67.75.166
                                                Jun 20, 2024 18:57:41.560578108 CEST44349747172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:57:41.572501898 CEST44349746172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:57:41.580496073 CEST44349748172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:57:41.670669079 CEST44349747172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:57:41.670747042 CEST44349747172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:57:41.670828104 CEST49747443192.168.2.4172.67.75.166
                                                Jun 20, 2024 18:57:41.671272993 CEST49747443192.168.2.4172.67.75.166
                                                Jun 20, 2024 18:57:41.671322107 CEST44349747172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:57:41.671353102 CEST49747443192.168.2.4172.67.75.166
                                                Jun 20, 2024 18:57:41.671370029 CEST44349747172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:57:41.671797037 CEST4973358709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:57:41.677098989 CEST587094973377.91.77.66192.168.2.4
                                                Jun 20, 2024 18:57:41.707526922 CEST44349746172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:57:41.707797050 CEST44349746172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:57:41.707895994 CEST49746443192.168.2.4172.67.75.166
                                                Jun 20, 2024 18:57:41.708054066 CEST49746443192.168.2.4172.67.75.166
                                                Jun 20, 2024 18:57:41.708096981 CEST44349746172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:57:41.708134890 CEST49746443192.168.2.4172.67.75.166
                                                Jun 20, 2024 18:57:41.708153009 CEST44349746172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:57:41.708522081 CEST4973158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:57:41.709861994 CEST44349748172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:57:41.710084915 CEST44349748172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:57:41.710143089 CEST49748443192.168.2.4172.67.75.166
                                                Jun 20, 2024 18:57:41.710211039 CEST49748443192.168.2.4172.67.75.166
                                                Jun 20, 2024 18:57:41.710232019 CEST44349748172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:57:41.710256100 CEST49748443192.168.2.4172.67.75.166
                                                Jun 20, 2024 18:57:41.710268021 CEST44349748172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:57:41.711057901 CEST4973258709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:57:41.713349104 CEST587094973177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:57:41.716022968 CEST587094973277.91.77.66192.168.2.4
                                                Jun 20, 2024 18:57:41.985795021 CEST44349749172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:57:41.985903025 CEST49749443192.168.2.4172.67.75.166
                                                Jun 20, 2024 18:57:41.987131119 CEST49749443192.168.2.4172.67.75.166
                                                Jun 20, 2024 18:57:41.987164021 CEST44349749172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:57:41.987513065 CEST44349749172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:57:41.991270065 CEST49749443192.168.2.4172.67.75.166
                                                Jun 20, 2024 18:57:42.036530018 CEST44349749172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:57:42.152816057 CEST44349749172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:57:42.153099060 CEST44349749172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:57:42.153202057 CEST49749443192.168.2.4172.67.75.166
                                                Jun 20, 2024 18:57:42.153469086 CEST49749443192.168.2.4172.67.75.166
                                                Jun 20, 2024 18:57:42.153507948 CEST44349749172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:57:42.153534889 CEST49749443192.168.2.4172.67.75.166
                                                Jun 20, 2024 18:57:42.153549910 CEST44349749172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:57:42.153923035 CEST4973958709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:57:42.159673929 CEST587094973977.91.77.66192.168.2.4
                                                Jun 20, 2024 18:57:49.464940071 CEST4973158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:57:49.470344067 CEST587094973177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:57:52.715127945 CEST4973258709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:57:52.720165014 CEST587094973277.91.77.66192.168.2.4
                                                Jun 20, 2024 18:57:52.808721066 CEST4973358709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:57:52.814178944 CEST587094973377.91.77.66192.168.2.4
                                                Jun 20, 2024 18:57:59.480479002 CEST4973958709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:57:59.485503912 CEST587094973977.91.77.66192.168.2.4
                                                Jun 20, 2024 18:58:02.366193056 CEST587094973177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:58:02.417916059 CEST4973158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:58:02.451795101 CEST587094973277.91.77.66192.168.2.4
                                                Jun 20, 2024 18:58:02.465960026 CEST587094973377.91.77.66192.168.2.4
                                                Jun 20, 2024 18:58:02.496141911 CEST4973258709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:58:02.511650085 CEST4973358709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:58:02.721391916 CEST587094973977.91.77.66192.168.2.4
                                                Jun 20, 2024 18:58:02.761667967 CEST4973958709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:58:03.049093008 CEST587094974177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:58:03.105618000 CEST4974158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:58:03.190819979 CEST49751443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:58:03.190865040 CEST4434975134.117.186.192192.168.2.4
                                                Jun 20, 2024 18:58:03.190953970 CEST49751443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:58:03.191906929 CEST49751443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:58:03.191932917 CEST4434975134.117.186.192192.168.2.4
                                                Jun 20, 2024 18:58:03.659512997 CEST4434975134.117.186.192192.168.2.4
                                                Jun 20, 2024 18:58:03.659627914 CEST49751443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:58:03.660859108 CEST49751443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:58:03.660887957 CEST4434975134.117.186.192192.168.2.4
                                                Jun 20, 2024 18:58:03.661843061 CEST4434975134.117.186.192192.168.2.4
                                                Jun 20, 2024 18:58:03.701503992 CEST49751443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:58:03.748549938 CEST4434975134.117.186.192192.168.2.4
                                                Jun 20, 2024 18:58:03.828887939 CEST4434975134.117.186.192192.168.2.4
                                                Jun 20, 2024 18:58:03.829221010 CEST4434975134.117.186.192192.168.2.4
                                                Jun 20, 2024 18:58:03.829324007 CEST49751443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:58:03.829612017 CEST49751443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:58:03.829665899 CEST4434975134.117.186.192192.168.2.4
                                                Jun 20, 2024 18:58:03.829696894 CEST49751443192.168.2.434.117.186.192
                                                Jun 20, 2024 18:58:03.829714060 CEST4434975134.117.186.192192.168.2.4
                                                Jun 20, 2024 18:58:03.832252026 CEST49752443192.168.2.4172.67.75.166
                                                Jun 20, 2024 18:58:03.832298994 CEST44349752172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:58:03.832386017 CEST49752443192.168.2.4172.67.75.166
                                                Jun 20, 2024 18:58:03.832801104 CEST49752443192.168.2.4172.67.75.166
                                                Jun 20, 2024 18:58:03.832832098 CEST44349752172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:58:04.384896994 CEST44349752172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:58:04.385020018 CEST49752443192.168.2.4172.67.75.166
                                                Jun 20, 2024 18:58:04.386295080 CEST49752443192.168.2.4172.67.75.166
                                                Jun 20, 2024 18:58:04.386311054 CEST44349752172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:58:04.387135983 CEST44349752172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:58:04.388725996 CEST49752443192.168.2.4172.67.75.166
                                                Jun 20, 2024 18:58:04.436502934 CEST44349752172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:58:04.556865931 CEST44349752172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:58:04.557096958 CEST44349752172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:58:04.557162046 CEST49752443192.168.2.4172.67.75.166
                                                Jun 20, 2024 18:58:04.557215929 CEST49752443192.168.2.4172.67.75.166
                                                Jun 20, 2024 18:58:04.557245016 CEST44349752172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:58:04.557271004 CEST49752443192.168.2.4172.67.75.166
                                                Jun 20, 2024 18:58:04.557285070 CEST44349752172.67.75.166192.168.2.4
                                                Jun 20, 2024 18:58:04.557780981 CEST4974158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:58:04.562638998 CEST587094974177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:58:09.293189049 CEST4974158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:58:09.298407078 CEST587094974177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:58:18.632580042 CEST587094973177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:58:18.683968067 CEST4973158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:58:18.699707985 CEST4973158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:58:18.704699993 CEST587094973177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:58:18.746516943 CEST587094973277.91.77.66192.168.2.4
                                                Jun 20, 2024 18:58:18.793112040 CEST4973258709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:58:18.808842897 CEST4973258709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:58:18.813803911 CEST587094973277.91.77.66192.168.2.4
                                                Jun 20, 2024 18:58:18.814426899 CEST587094973377.91.77.66192.168.2.4
                                                Jun 20, 2024 18:58:18.840141058 CEST4973358709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:58:18.845093012 CEST587094973377.91.77.66192.168.2.4
                                                Jun 20, 2024 18:58:19.420250893 CEST587094973977.91.77.66192.168.2.4
                                                Jun 20, 2024 18:58:19.449507952 CEST4973958709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:58:19.454644918 CEST587094973977.91.77.66192.168.2.4
                                                Jun 20, 2024 18:58:19.634773016 CEST587094974177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:58:19.683732986 CEST4974158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:58:21.761961937 CEST4973158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:58:21.769064903 CEST587094973177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:58:25.012032032 CEST4973258709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:58:25.017864943 CEST587094973277.91.77.66192.168.2.4
                                                Jun 20, 2024 18:58:25.058866024 CEST4973358709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:58:25.064270020 CEST587094973377.91.77.66192.168.2.4
                                                Jun 20, 2024 18:58:31.965137959 CEST4973958709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:58:31.970119953 CEST587094973977.91.77.66192.168.2.4
                                                Jun 20, 2024 18:58:35.120271921 CEST587094973177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:58:35.168335915 CEST4973158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:58:36.594540119 CEST587094973277.91.77.66192.168.2.4
                                                Jun 20, 2024 18:58:36.608009100 CEST587094973377.91.77.66192.168.2.4
                                                Jun 20, 2024 18:58:36.637063026 CEST4973258709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:58:36.652693033 CEST4973358709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:58:38.152647018 CEST587094973977.91.77.66192.168.2.4
                                                Jun 20, 2024 18:58:38.202181101 CEST4973958709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:58:38.512538910 CEST587094974177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:58:38.543402910 CEST4974158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:58:38.548664093 CEST587094974177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:58:41.654438019 CEST4974158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:58:41.659532070 CEST587094974177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:58:46.579662085 CEST587094973177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:58:46.615417004 CEST587094973277.91.77.66192.168.2.4
                                                Jun 20, 2024 18:58:46.621339083 CEST4973158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:58:46.625395060 CEST587094973377.91.77.66192.168.2.4
                                                Jun 20, 2024 18:58:46.668185949 CEST4973358709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:58:46.668193102 CEST4973258709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:58:46.684319973 CEST4973258709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:58:46.684467077 CEST4973158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:58:46.684617996 CEST4973358709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:58:46.689163923 CEST587094973277.91.77.66192.168.2.4
                                                Jun 20, 2024 18:58:46.689290047 CEST587094973177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:58:46.689438105 CEST587094973377.91.77.66192.168.2.4
                                                Jun 20, 2024 18:58:46.800071955 CEST587094973977.91.77.66192.168.2.4
                                                Jun 20, 2024 18:58:46.855700016 CEST4973958709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:58:46.856758118 CEST4973958709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:58:46.862021923 CEST587094973977.91.77.66192.168.2.4
                                                Jun 20, 2024 18:58:48.391851902 CEST587094974177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:58:48.433866978 CEST4974158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:58:52.840390921 CEST4973158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:58:52.847284079 CEST587094973177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:58:55.355422974 CEST587094973177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:58:55.402640104 CEST4973158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:58:55.439012051 CEST587094973277.91.77.66192.168.2.4
                                                Jun 20, 2024 18:58:55.464445114 CEST587094973377.91.77.66192.168.2.4
                                                Jun 20, 2024 18:58:55.480784893 CEST4973258709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:58:55.513658047 CEST4973358709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:58:55.705344915 CEST587094973977.91.77.66192.168.2.4
                                                Jun 20, 2024 18:58:55.748805046 CEST4973958709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:58:55.837332010 CEST587094974177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:58:55.887082100 CEST4974158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:58:55.934210062 CEST4974158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:58:55.939651012 CEST587094974177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:58:58.560662031 CEST4973258709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:58:58.566133976 CEST587094973277.91.77.66192.168.2.4
                                                Jun 20, 2024 18:58:58.606045008 CEST4973358709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:58:58.611638069 CEST587094973377.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.855362892 CEST587094973177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.855537891 CEST587094973177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.855609894 CEST4973158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:03.855878115 CEST587094973177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.855892897 CEST587094973177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.855909109 CEST587094973177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.855936050 CEST587094973177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.855950117 CEST4973158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:03.855951071 CEST587094973177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.855989933 CEST4973158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:03.856003046 CEST587094973177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.856019020 CEST587094973177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.856050968 CEST4973158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:03.856446981 CEST587094973177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.856463909 CEST587094973177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.856478930 CEST587094973177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.856616974 CEST4973158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:03.856981993 CEST587094973177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.856995106 CEST587094973177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.857064009 CEST4973158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:03.857400894 CEST587094973177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.857465982 CEST587094973177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.857481003 CEST587094973177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.857518911 CEST4973158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:03.890222073 CEST587094973277.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.890256882 CEST587094973277.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.890310049 CEST587094973277.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.890326977 CEST587094973277.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.890341997 CEST587094973277.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.890355110 CEST4973258709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:03.890439987 CEST4973258709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:03.890707970 CEST587094973277.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.890753031 CEST4973258709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:03.891439915 CEST587094973277.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.891453981 CEST587094973277.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.891468048 CEST587094973277.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.891484022 CEST587094973277.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.891495943 CEST4973258709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:03.891498089 CEST587094973277.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.891515017 CEST587094973277.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.891529083 CEST4973258709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:03.891557932 CEST4973258709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:03.891727924 CEST587094973277.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.891753912 CEST587094973277.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.891768932 CEST587094973277.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.891793966 CEST4973258709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:03.902725935 CEST4973158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:03.902962923 CEST587094973377.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.903286934 CEST587094973377.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.903357983 CEST4973358709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:03.903570890 CEST587094973377.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.903584957 CEST587094973377.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.903636932 CEST4973358709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:03.903678894 CEST587094973377.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.903692961 CEST587094973377.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.903740883 CEST4973358709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:03.904050112 CEST587094973377.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.904494047 CEST587094973377.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.904544115 CEST4973358709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:03.904566050 CEST587094973377.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.904578924 CEST587094973377.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.904620886 CEST4973358709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:03.904733896 CEST587094973377.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.904901028 CEST587094973377.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.904913902 CEST587094973377.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.904938936 CEST587094973377.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.904952049 CEST4973358709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:03.904953957 CEST587094973377.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.904972076 CEST587094973377.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.904997110 CEST4973358709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:03.905028105 CEST4973358709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:03.905575037 CEST587094973377.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.908236980 CEST587094973377.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.908297062 CEST4973358709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:03.933921099 CEST4973258709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:03.982393026 CEST587094973177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.982443094 CEST587094973177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.982479095 CEST587094973177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.982513905 CEST4973158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:03.982515097 CEST587094973177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:03.982577085 CEST4973158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:04.012788057 CEST587094973277.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:04.012854099 CEST587094973277.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:04.012885094 CEST587094973277.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:04.012924910 CEST4973258709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:04.012958050 CEST587094973277.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:04.012991905 CEST587094973277.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:04.013025999 CEST4973258709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:04.013029099 CEST587094973277.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:04.013098001 CEST4973258709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:04.021223068 CEST587094973377.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:04.021384001 CEST587094973377.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:04.021418095 CEST587094973377.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:04.021451950 CEST587094973377.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:04.021461010 CEST4973358709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:04.021488905 CEST587094973377.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:04.021500111 CEST4973358709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:04.027765989 CEST4973358709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:04.027870893 CEST4973258709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:04.032684088 CEST587094973377.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:04.032716990 CEST587094973277.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:04.070729017 CEST587094973977.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:04.070976973 CEST587094973977.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:04.071012974 CEST587094973977.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:04.071059942 CEST4973958709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:04.071085930 CEST587094973977.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:04.071141005 CEST4973958709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:04.071779966 CEST587094973977.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:04.071832895 CEST587094973977.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:04.071888924 CEST4973958709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:04.073100090 CEST587094973977.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:04.073129892 CEST587094973977.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:04.073189020 CEST4973958709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:04.073784113 CEST587094973977.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:04.073813915 CEST587094973977.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:04.073868990 CEST4973958709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:04.073923111 CEST587094973977.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:04.073993921 CEST587094973977.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:04.074023962 CEST587094973177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:04.074044943 CEST4973958709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:04.074179888 CEST587094973977.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:04.074297905 CEST587094973977.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:04.074331045 CEST587094973977.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:04.074354887 CEST4973958709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:04.074811935 CEST587094973977.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:04.074863911 CEST4973958709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:04.075196981 CEST587094973977.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:04.076070070 CEST587094973977.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:04.076132059 CEST4973958709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:04.076296091 CEST587094973977.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:04.121471882 CEST4973158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:04.121541977 CEST4973958709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:04.137613058 CEST4973158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:04.142573118 CEST587094973177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:04.157079935 CEST587094974177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:04.187741995 CEST587094973977.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:04.188908100 CEST587094973977.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:04.188963890 CEST4973958709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:04.188966036 CEST587094973977.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:04.189017057 CEST587094973977.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:04.189065933 CEST587094973977.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:04.189066887 CEST4973958709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:04.189116001 CEST587094973977.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:04.189173937 CEST4973958709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:04.199547052 CEST4974158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:04.247224092 CEST4973958709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:04.252103090 CEST587094973977.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:07.355875015 CEST4973958709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:07.362529039 CEST587094973977.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:10.077682018 CEST587094973177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:10.108182907 CEST587094973277.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:10.121596098 CEST4973158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:10.138931036 CEST587094973377.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:10.152730942 CEST4973258709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:10.184130907 CEST4973358709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:10.267925024 CEST587094973977.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:10.277990103 CEST4973958709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:10.282882929 CEST587094973977.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:10.357955933 CEST587094974177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:10.358006954 CEST587094974177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:10.358066082 CEST4974158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:10.358159065 CEST587094974177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:10.358189106 CEST587094974177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:10.358246088 CEST4974158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:10.358541012 CEST587094974177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:10.358577013 CEST587094974177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:10.358612061 CEST587094974177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:10.358663082 CEST4974158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:10.358700037 CEST587094974177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:10.358757973 CEST4974158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:10.358772039 CEST587094974177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:10.359008074 CEST587094974177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:10.359038115 CEST587094974177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:10.359069109 CEST4974158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:10.359175920 CEST587094974177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:10.359204054 CEST587094974177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:10.359231949 CEST4974158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:10.359621048 CEST587094974177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:10.359648943 CEST587094974177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:10.359690905 CEST4974158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:10.359745026 CEST587094974177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:10.359778881 CEST587094974177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:10.359802008 CEST4974158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:10.364290953 CEST587094974177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:10.364351988 CEST4974158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:10.482995987 CEST587094974177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:10.483170033 CEST587094974177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:10.483205080 CEST587094974177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:10.483239889 CEST587094974177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:10.483252048 CEST4974158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:10.483297110 CEST4974158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:10.488450050 CEST587094974177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:10.488501072 CEST587094974177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:10.488565922 CEST4974158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:10.496721029 CEST4974158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:10.501696110 CEST587094974177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:13.624078035 CEST4974158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:13.629488945 CEST587094974177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:15.470177889 CEST587094973177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:15.528093100 CEST4973158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:15.533096075 CEST587094973177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:15.538882017 CEST587094973277.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:15.554799080 CEST587094973377.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:15.590244055 CEST4973258709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:15.605875969 CEST4973358709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:15.637245893 CEST4973358709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:15.637370110 CEST4973258709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:15.642118931 CEST587094973377.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:15.642208099 CEST587094973277.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:15.685239077 CEST587094973977.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:15.730901003 CEST4973958709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:15.943691015 CEST587094974177.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:15.943802118 CEST587094973977.91.77.66192.168.2.4
                                                Jun 20, 2024 18:59:15.943872929 CEST4973958709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:15.965406895 CEST4974158709192.168.2.477.91.77.66
                                                Jun 20, 2024 18:59:15.970355988 CEST587094974177.91.77.66192.168.2.4
                                                TimestampSource PortDest PortSource IPDest IP
                                                Jun 20, 2024 18:57:40.177056074 CEST6222653192.168.2.41.1.1.1
                                                Jun 20, 2024 18:57:40.185633898 CEST53622261.1.1.1192.168.2.4
                                                Jun 20, 2024 18:57:40.888211966 CEST5989253192.168.2.41.1.1.1
                                                Jun 20, 2024 18:57:40.896069050 CEST53598921.1.1.1192.168.2.4
                                                Jun 20, 2024 18:58:03.178292036 CEST5446553192.168.2.41.1.1.1
                                                Jun 20, 2024 18:58:03.186853886 CEST53544651.1.1.1192.168.2.4
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Jun 20, 2024 18:57:40.177056074 CEST192.168.2.41.1.1.10x3b85Standard query (0)ipinfo.ioA (IP address)IN (0x0001)false
                                                Jun 20, 2024 18:57:40.888211966 CEST192.168.2.41.1.1.10x2b33Standard query (0)db-ip.comA (IP address)IN (0x0001)false
                                                Jun 20, 2024 18:58:03.178292036 CEST192.168.2.41.1.1.10x3f5bStandard query (0)ipinfo.ioA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Jun 20, 2024 18:57:40.185633898 CEST1.1.1.1192.168.2.40x3b85No error (0)ipinfo.io34.117.186.192A (IP address)IN (0x0001)false
                                                Jun 20, 2024 18:57:40.896069050 CEST1.1.1.1192.168.2.40x2b33No error (0)db-ip.com172.67.75.166A (IP address)IN (0x0001)false
                                                Jun 20, 2024 18:57:40.896069050 CEST1.1.1.1192.168.2.40x2b33No error (0)db-ip.com104.26.5.15A (IP address)IN (0x0001)false
                                                Jun 20, 2024 18:57:40.896069050 CEST1.1.1.1192.168.2.40x2b33No error (0)db-ip.com104.26.4.15A (IP address)IN (0x0001)false
                                                Jun 20, 2024 18:58:03.186853886 CEST1.1.1.1192.168.2.40x3f5bNo error (0)ipinfo.io34.117.186.192A (IP address)IN (0x0001)false
                                                • ipinfo.io
                                                • https:
                                                • db-ip.com
                                                Session IDSource IPSource PortDestination IPDestination Port
                                                0192.168.2.44973034.117.186.192443
                                                TimestampBytes transferredDirectionData
                                                2024-06-20 16:56:58 UTC59OUTGET / HTTP/1.1
                                                Host: ipinfo.io
                                                Connection: Keep-Alive
                                                2024-06-20 16:56:58 UTC513INHTTP/1.1 200 OK
                                                server: nginx/1.24.0
                                                date: Thu, 20 Jun 2024 16:56:58 GMT
                                                content-type: application/json; charset=utf-8
                                                Content-Length: 319
                                                access-control-allow-origin: *
                                                x-frame-options: SAMEORIGIN
                                                x-xss-protection: 1; mode=block
                                                x-content-type-options: nosniff
                                                referrer-policy: strict-origin-when-cross-origin
                                                x-envoy-upstream-service-time: 1
                                                via: 1.1 google
                                                strict-transport-security: max-age=2592000; includeSubDomains
                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                Connection: close
                                                2024-06-20 16:56:58 UTC319INData Raw: 7b 0a 20 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 68 6f 73 74 6e 61 6d 65 22 3a 20 22 73 74 61 74 69 63 2d 63 70 65 2d 38 2d 34 36 2d 31 32 33 2d 33 33 2e 63 65 6e 74 75 72 79 6c 69 6e 6b 2e 63 6f 6d 22 2c 0a 20 20 22 63 69 74 79 22 3a 20 22 4e 65 77 20 59 6f 72 6b 20 43 69 74 79 22 2c 0a 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 53 22 2c 0a 20 20 22 6c 6f 63 22 3a 20 22 34 30 2e 37 31 34 33 2c 2d 37 34 2e 30 30 36 30 22 2c 0a 20 20 22 6f 72 67 22 3a 20 22 41 53 33 33 35 36 20 4c 65 76 65 6c 20 33 20 50 61 72 65 6e 74 2c 20 4c 4c 43 22 2c 0a 20 20 22 70 6f 73 74 61 6c 22 3a 20 22 31 30 30 30 31 22 2c 0a 20 20 22 74 69 6d 65 7a 6f 6e 65 22 3a 20 22
                                                Data Ascii: { "ip": "8.46.123.33", "hostname": "static-cpe-8-46-123-33.centurylink.com", "city": "New York City", "region": "New York", "country": "US", "loc": "40.7143,-74.0060", "org": "AS3356 Level 3 Parent, LLC", "postal": "10001", "timezone": "


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                1192.168.2.44974234.117.186.1924437408C:\Users\user\Desktop\YnsEArPlqx.exe
                                                TimestampBytes transferredDirectionData
                                                2024-06-20 16:57:40 UTC236OUTGET /widget/demo/8.46.123.33 HTTP/1.1
                                                Connection: Keep-Alive
                                                Referer: https://ipinfo.io/
                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                                                Host: ipinfo.io
                                                2024-06-20 16:57:40 UTC514INHTTP/1.1 200 OK
                                                server: nginx/1.24.0
                                                date: Thu, 20 Jun 2024 16:57:40 GMT
                                                content-type: application/json; charset=utf-8
                                                Content-Length: 1025
                                                access-control-allow-origin: *
                                                x-frame-options: SAMEORIGIN
                                                x-xss-protection: 1; mode=block
                                                x-content-type-options: nosniff
                                                referrer-policy: strict-origin-when-cross-origin
                                                x-envoy-upstream-service-time: 2
                                                via: 1.1 google
                                                strict-transport-security: max-age=2592000; includeSubDomains
                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                Connection: close
                                                2024-06-20 16:57:40 UTC876INData Raw: 7b 0a 20 20 22 69 6e 70 75 74 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 64 61 74 61 22 3a 20 7b 0a 20 20 20 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 20 20 22 68 6f 73 74 6e 61 6d 65 22 3a 20 22 73 74 61 74 69 63 2d 63 70 65 2d 38 2d 34 36 2d 31 32 33 2d 33 33 2e 63 65 6e 74 75 72 79 6c 69 6e 6b 2e 63 6f 6d 22 2c 0a 20 20 20 20 22 63 69 74 79 22 3a 20 22 4e 65 77 20 59 6f 72 6b 20 43 69 74 79 22 2c 0a 20 20 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 53 22 2c 0a 20 20 20 20 22 6c 6f 63 22 3a 20 22 34 30 2e 37 31 34 33 2c 2d 37 34 2e 30 30 36 30 22 2c 0a 20 20 20 20 22 6f 72 67 22 3a 20 22 41 53 33 33 35 36 20 4c 65 76 65 6c 20
                                                Data Ascii: { "input": "8.46.123.33", "data": { "ip": "8.46.123.33", "hostname": "static-cpe-8-46-123-33.centurylink.com", "city": "New York City", "region": "New York", "country": "US", "loc": "40.7143,-74.0060", "org": "AS3356 Level
                                                2024-06-20 16:57:40 UTC149INData Raw: 65 6d 61 69 6c 22 3a 20 22 61 62 75 73 65 40 61 75 70 2e 6c 75 6d 65 6e 2e 63 6f 6d 22 2c 0a 20 20 20 20 20 20 22 6e 61 6d 65 22 3a 20 22 43 65 6e 74 75 72 79 6c 69 6e 6b 20 41 62 75 73 65 20 44 65 73 6b 22 2c 0a 20 20 20 20 20 20 22 6e 65 74 77 6f 72 6b 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 30 2f 32 34 22 2c 0a 20 20 20 20 20 20 22 70 68 6f 6e 65 22 3a 20 22 2b 31 2d 38 37 37 2d 38 38 36 2d 36 35 31 35 22 0a 20 20 20 20 7d 0a 20 20 7d 0a 7d
                                                Data Ascii: email": "abuse@aup.lumen.com", "name": "Centurylink Abuse Desk", "network": "8.46.123.0/24", "phone": "+1-877-886-6515" } }}


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                2192.168.2.44974434.117.186.1924437632C:\ProgramData\MPGPH131\MPGPH131.exe
                                                TimestampBytes transferredDirectionData
                                                2024-06-20 16:57:40 UTC236OUTGET /widget/demo/8.46.123.33 HTTP/1.1
                                                Connection: Keep-Alive
                                                Referer: https://ipinfo.io/
                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                                                Host: ipinfo.io
                                                2024-06-20 16:57:40 UTC514INHTTP/1.1 200 OK
                                                server: nginx/1.24.0
                                                date: Thu, 20 Jun 2024 16:57:40 GMT
                                                content-type: application/json; charset=utf-8
                                                Content-Length: 1025
                                                access-control-allow-origin: *
                                                x-frame-options: SAMEORIGIN
                                                x-xss-protection: 1; mode=block
                                                x-content-type-options: nosniff
                                                referrer-policy: strict-origin-when-cross-origin
                                                x-envoy-upstream-service-time: 3
                                                via: 1.1 google
                                                strict-transport-security: max-age=2592000; includeSubDomains
                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                Connection: close
                                                2024-06-20 16:57:40 UTC876INData Raw: 7b 0a 20 20 22 69 6e 70 75 74 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 64 61 74 61 22 3a 20 7b 0a 20 20 20 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 20 20 22 68 6f 73 74 6e 61 6d 65 22 3a 20 22 73 74 61 74 69 63 2d 63 70 65 2d 38 2d 34 36 2d 31 32 33 2d 33 33 2e 63 65 6e 74 75 72 79 6c 69 6e 6b 2e 63 6f 6d 22 2c 0a 20 20 20 20 22 63 69 74 79 22 3a 20 22 4e 65 77 20 59 6f 72 6b 20 43 69 74 79 22 2c 0a 20 20 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 53 22 2c 0a 20 20 20 20 22 6c 6f 63 22 3a 20 22 34 30 2e 37 31 34 33 2c 2d 37 34 2e 30 30 36 30 22 2c 0a 20 20 20 20 22 6f 72 67 22 3a 20 22 41 53 33 33 35 36 20 4c 65 76 65 6c 20
                                                Data Ascii: { "input": "8.46.123.33", "data": { "ip": "8.46.123.33", "hostname": "static-cpe-8-46-123-33.centurylink.com", "city": "New York City", "region": "New York", "country": "US", "loc": "40.7143,-74.0060", "org": "AS3356 Level
                                                2024-06-20 16:57:40 UTC149INData Raw: 65 6d 61 69 6c 22 3a 20 22 61 62 75 73 65 40 61 75 70 2e 6c 75 6d 65 6e 2e 63 6f 6d 22 2c 0a 20 20 20 20 20 20 22 6e 61 6d 65 22 3a 20 22 43 65 6e 74 75 72 79 6c 69 6e 6b 20 41 62 75 73 65 20 44 65 73 6b 22 2c 0a 20 20 20 20 20 20 22 6e 65 74 77 6f 72 6b 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 30 2f 32 34 22 2c 0a 20 20 20 20 20 20 22 70 68 6f 6e 65 22 3a 20 22 2b 31 2d 38 37 37 2d 38 38 36 2d 36 35 31 35 22 0a 20 20 20 20 7d 0a 20 20 7d 0a 7d
                                                Data Ascii: email": "abuse@aup.lumen.com", "name": "Centurylink Abuse Desk", "network": "8.46.123.0/24", "phone": "+1-877-886-6515" } }}


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                3192.168.2.44974334.117.186.1924437640C:\ProgramData\MPGPH131\MPGPH131.exe
                                                TimestampBytes transferredDirectionData
                                                2024-06-20 16:57:40 UTC236OUTGET /widget/demo/8.46.123.33 HTTP/1.1
                                                Connection: Keep-Alive
                                                Referer: https://ipinfo.io/
                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                                                Host: ipinfo.io
                                                2024-06-20 16:57:41 UTC514INHTTP/1.1 200 OK
                                                server: nginx/1.24.0
                                                date: Thu, 20 Jun 2024 16:57:40 GMT
                                                content-type: application/json; charset=utf-8
                                                Content-Length: 1025
                                                access-control-allow-origin: *
                                                x-frame-options: SAMEORIGIN
                                                x-xss-protection: 1; mode=block
                                                x-content-type-options: nosniff
                                                referrer-policy: strict-origin-when-cross-origin
                                                x-envoy-upstream-service-time: 3
                                                via: 1.1 google
                                                strict-transport-security: max-age=2592000; includeSubDomains
                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                Connection: close
                                                2024-06-20 16:57:41 UTC876INData Raw: 7b 0a 20 20 22 69 6e 70 75 74 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 64 61 74 61 22 3a 20 7b 0a 20 20 20 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 20 20 22 68 6f 73 74 6e 61 6d 65 22 3a 20 22 73 74 61 74 69 63 2d 63 70 65 2d 38 2d 34 36 2d 31 32 33 2d 33 33 2e 63 65 6e 74 75 72 79 6c 69 6e 6b 2e 63 6f 6d 22 2c 0a 20 20 20 20 22 63 69 74 79 22 3a 20 22 4e 65 77 20 59 6f 72 6b 20 43 69 74 79 22 2c 0a 20 20 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 53 22 2c 0a 20 20 20 20 22 6c 6f 63 22 3a 20 22 34 30 2e 37 31 34 33 2c 2d 37 34 2e 30 30 36 30 22 2c 0a 20 20 20 20 22 6f 72 67 22 3a 20 22 41 53 33 33 35 36 20 4c 65 76 65 6c 20
                                                Data Ascii: { "input": "8.46.123.33", "data": { "ip": "8.46.123.33", "hostname": "static-cpe-8-46-123-33.centurylink.com", "city": "New York City", "region": "New York", "country": "US", "loc": "40.7143,-74.0060", "org": "AS3356 Level
                                                2024-06-20 16:57:41 UTC149INData Raw: 65 6d 61 69 6c 22 3a 20 22 61 62 75 73 65 40 61 75 70 2e 6c 75 6d 65 6e 2e 63 6f 6d 22 2c 0a 20 20 20 20 20 20 22 6e 61 6d 65 22 3a 20 22 43 65 6e 74 75 72 79 6c 69 6e 6b 20 41 62 75 73 65 20 44 65 73 6b 22 2c 0a 20 20 20 20 20 20 22 6e 65 74 77 6f 72 6b 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 30 2f 32 34 22 2c 0a 20 20 20 20 20 20 22 70 68 6f 6e 65 22 3a 20 22 2b 31 2d 38 37 37 2d 38 38 36 2d 36 35 31 35 22 0a 20 20 20 20 7d 0a 20 20 7d 0a 7d
                                                Data Ascii: email": "abuse@aup.lumen.com", "name": "Centurylink Abuse Desk", "network": "8.46.123.0/24", "phone": "+1-877-886-6515" } }}


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                4192.168.2.44974534.117.186.1924437852C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                                                TimestampBytes transferredDirectionData
                                                2024-06-20 16:57:41 UTC236OUTGET /widget/demo/8.46.123.33 HTTP/1.1
                                                Connection: Keep-Alive
                                                Referer: https://ipinfo.io/
                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                                                Host: ipinfo.io
                                                2024-06-20 16:57:41 UTC514INHTTP/1.1 200 OK
                                                server: nginx/1.24.0
                                                date: Thu, 20 Jun 2024 16:57:41 GMT
                                                content-type: application/json; charset=utf-8
                                                Content-Length: 1025
                                                access-control-allow-origin: *
                                                x-frame-options: SAMEORIGIN
                                                x-xss-protection: 1; mode=block
                                                x-content-type-options: nosniff
                                                referrer-policy: strict-origin-when-cross-origin
                                                x-envoy-upstream-service-time: 1
                                                via: 1.1 google
                                                strict-transport-security: max-age=2592000; includeSubDomains
                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                Connection: close
                                                2024-06-20 16:57:41 UTC876INData Raw: 7b 0a 20 20 22 69 6e 70 75 74 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 64 61 74 61 22 3a 20 7b 0a 20 20 20 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 20 20 22 68 6f 73 74 6e 61 6d 65 22 3a 20 22 73 74 61 74 69 63 2d 63 70 65 2d 38 2d 34 36 2d 31 32 33 2d 33 33 2e 63 65 6e 74 75 72 79 6c 69 6e 6b 2e 63 6f 6d 22 2c 0a 20 20 20 20 22 63 69 74 79 22 3a 20 22 4e 65 77 20 59 6f 72 6b 20 43 69 74 79 22 2c 0a 20 20 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 53 22 2c 0a 20 20 20 20 22 6c 6f 63 22 3a 20 22 34 30 2e 37 31 34 33 2c 2d 37 34 2e 30 30 36 30 22 2c 0a 20 20 20 20 22 6f 72 67 22 3a 20 22 41 53 33 33 35 36 20 4c 65 76 65 6c 20
                                                Data Ascii: { "input": "8.46.123.33", "data": { "ip": "8.46.123.33", "hostname": "static-cpe-8-46-123-33.centurylink.com", "city": "New York City", "region": "New York", "country": "US", "loc": "40.7143,-74.0060", "org": "AS3356 Level
                                                2024-06-20 16:57:41 UTC149INData Raw: 65 6d 61 69 6c 22 3a 20 22 61 62 75 73 65 40 61 75 70 2e 6c 75 6d 65 6e 2e 63 6f 6d 22 2c 0a 20 20 20 20 20 20 22 6e 61 6d 65 22 3a 20 22 43 65 6e 74 75 72 79 6c 69 6e 6b 20 41 62 75 73 65 20 44 65 73 6b 22 2c 0a 20 20 20 20 20 20 22 6e 65 74 77 6f 72 6b 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 30 2f 32 34 22 2c 0a 20 20 20 20 20 20 22 70 68 6f 6e 65 22 3a 20 22 2b 31 2d 38 37 37 2d 38 38 36 2d 36 35 31 35 22 0a 20 20 20 20 7d 0a 20 20 7d 0a 7d
                                                Data Ascii: email": "abuse@aup.lumen.com", "name": "Centurylink Abuse Desk", "network": "8.46.123.0/24", "phone": "+1-877-886-6515" } }}


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                5192.168.2.449747172.67.75.1664437632C:\ProgramData\MPGPH131\MPGPH131.exe
                                                TimestampBytes transferredDirectionData
                                                2024-06-20 16:57:41 UTC260OUTGET /demo/home.php?s=8.46.123.33 HTTP/1.1
                                                Connection: Keep-Alive
                                                Content-Type: application/x-www-form-urlencoded
                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                                                Host: db-ip.com
                                                2024-06-20 16:57:41 UTC655INHTTP/1.1 200 OK
                                                Date: Thu, 20 Jun 2024 16:57:41 GMT
                                                Content-Type: application/json
                                                Transfer-Encoding: chunked
                                                Connection: close
                                                x-iplb-request-id: A29E9FE1:D714_93878F2E:0050_66745F85_14B39213:7B63
                                                x-iplb-instance: 59128
                                                CF-Cache-Status: DYNAMIC
                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=HcbdHTtm2uVTP4Mc5vf6eNWdfb6Ft2A3SgY6kjX50L8q8LFjzI6%2B%2BoW3fetUlMEbQmDtEuqgEsFLQr9i10OXEsHNuErlCYvvQWSB%2FxOrhnkPQsHQPtbUJd8nLw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                Server: cloudflare
                                                CF-RAY: 896d4ca2e9d941f9-EWR
                                                alt-svc: h3=":443"; ma=86400
                                                2024-06-20 16:57:41 UTC85INData Raw: 34 66 0d 0a 7b 22 73 74 61 74 75 73 22 3a 22 6f 6b 22 2c 22 64 65 6d 6f 49 6e 66 6f 22 3a 7b 22 65 72 72 6f 72 22 3a 22 6f 76 65 72 20 71 75 65 72 79 20 6c 69 6d 69 74 2c 20 70 6c 65 61 73 65 20 74 72 79 20 61 67 61 69 6e 20 6c 61 74 65 72 22 7d 7d 0d 0a
                                                Data Ascii: 4f{"status":"ok","demoInfo":{"error":"over query limit, please try again later"}}
                                                2024-06-20 16:57:41 UTC5INData Raw: 30 0d 0a 0d 0a
                                                Data Ascii: 0


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                6192.168.2.449746172.67.75.1664437408C:\Users\user\Desktop\YnsEArPlqx.exe
                                                TimestampBytes transferredDirectionData
                                                2024-06-20 16:57:41 UTC260OUTGET /demo/home.php?s=8.46.123.33 HTTP/1.1
                                                Connection: Keep-Alive
                                                Content-Type: application/x-www-form-urlencoded
                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                                                Host: db-ip.com
                                                2024-06-20 16:57:41 UTC667INHTTP/1.1 200 OK
                                                Date: Thu, 20 Jun 2024 16:57:41 GMT
                                                Content-Type: application/json
                                                Transfer-Encoding: chunked
                                                Connection: close
                                                x-iplb-request-id: AC466E06:B3FC_93878F2E:0050_66745F85_14B39214:7B63
                                                x-iplb-instance: 59128
                                                CF-Cache-Status: DYNAMIC
                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2Bc0yxZJ1%2Fnb7ma9BR3PjeKUhvXaJcckcQh93aipnmSMWbqYrCU7NGVsyuegQD%2BLcIHBcW7jUZaItcvAlff7g1xZd%2F3x%2B7%2FpVb81JGTuOaOS2%2FL%2BcEkvUM8T%2B7Q%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                Server: cloudflare
                                                CF-RAY: 896d4ca30e1b17a5-EWR
                                                alt-svc: h3=":443"; ma=86400
                                                2024-06-20 16:57:41 UTC85INData Raw: 34 66 0d 0a 7b 22 73 74 61 74 75 73 22 3a 22 6f 6b 22 2c 22 64 65 6d 6f 49 6e 66 6f 22 3a 7b 22 65 72 72 6f 72 22 3a 22 6f 76 65 72 20 71 75 65 72 79 20 6c 69 6d 69 74 2c 20 70 6c 65 61 73 65 20 74 72 79 20 61 67 61 69 6e 20 6c 61 74 65 72 22 7d 7d 0d 0a
                                                Data Ascii: 4f{"status":"ok","demoInfo":{"error":"over query limit, please try again later"}}
                                                2024-06-20 16:57:41 UTC5INData Raw: 30 0d 0a 0d 0a
                                                Data Ascii: 0


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                7192.168.2.449748172.67.75.1664437640C:\ProgramData\MPGPH131\MPGPH131.exe
                                                TimestampBytes transferredDirectionData
                                                2024-06-20 16:57:41 UTC260OUTGET /demo/home.php?s=8.46.123.33 HTTP/1.1
                                                Connection: Keep-Alive
                                                Content-Type: application/x-www-form-urlencoded
                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                                                Host: db-ip.com
                                                2024-06-20 16:57:41 UTC653INHTTP/1.1 200 OK
                                                Date: Thu, 20 Jun 2024 16:57:41 GMT
                                                Content-Type: application/json
                                                Transfer-Encoding: chunked
                                                Connection: close
                                                x-iplb-request-id: AC466ED9:BFFA_93878F2E:0050_66745F85_14C7BFE1:4F34
                                                x-iplb-instance: 59215
                                                CF-Cache-Status: DYNAMIC
                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=8YoK0LJLyX0LAZq5adY8GhpzxjxdbYxGx1S8ymxVoqA6GU%2BhTn3wcGwGmE9tzJtzlqpobHWts%2BcIf1YkJDGeEn6yWBKW99R1sG81Qu2BLWHjKObhviKunZofEA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                Server: cloudflare
                                                CF-RAY: 896d4ca31c6a80d0-EWR
                                                alt-svc: h3=":443"; ma=86400
                                                2024-06-20 16:57:41 UTC85INData Raw: 34 66 0d 0a 7b 22 73 74 61 74 75 73 22 3a 22 6f 6b 22 2c 22 64 65 6d 6f 49 6e 66 6f 22 3a 7b 22 65 72 72 6f 72 22 3a 22 6f 76 65 72 20 71 75 65 72 79 20 6c 69 6d 69 74 2c 20 70 6c 65 61 73 65 20 74 72 79 20 61 67 61 69 6e 20 6c 61 74 65 72 22 7d 7d 0d 0a
                                                Data Ascii: 4f{"status":"ok","demoInfo":{"error":"over query limit, please try again later"}}
                                                2024-06-20 16:57:41 UTC5INData Raw: 30 0d 0a 0d 0a
                                                Data Ascii: 0


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                8192.168.2.449749172.67.75.1664437852C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                                                TimestampBytes transferredDirectionData
                                                2024-06-20 16:57:41 UTC260OUTGET /demo/home.php?s=8.46.123.33 HTTP/1.1
                                                Connection: Keep-Alive
                                                Content-Type: application/x-www-form-urlencoded
                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                                                Host: db-ip.com
                                                2024-06-20 16:57:42 UTC659INHTTP/1.1 200 OK
                                                Date: Thu, 20 Jun 2024 16:57:42 GMT
                                                Content-Type: application/json
                                                Transfer-Encoding: chunked
                                                Connection: close
                                                x-iplb-request-id: AC46E715:6DD8_93878F2E:0050_66745F86_14B3922A:7B63
                                                x-iplb-instance: 59128
                                                CF-Cache-Status: DYNAMIC
                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=vpwLOtZz2G5NUXqOespxGiz%2FBKgieP70dT%2Bw1AJLekUyzAuB0o9Yvr898O60kyoaO7M15Il%2BxNi7%2BnNSXmlkJ794u9s1krwG%2F3QT6RWpGBJyJMGwBe9WZtae8A%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                Server: cloudflare
                                                CF-RAY: 896d4ca5dc397295-EWR
                                                alt-svc: h3=":443"; ma=86400
                                                2024-06-20 16:57:42 UTC85INData Raw: 34 66 0d 0a 7b 22 73 74 61 74 75 73 22 3a 22 6f 6b 22 2c 22 64 65 6d 6f 49 6e 66 6f 22 3a 7b 22 65 72 72 6f 72 22 3a 22 6f 76 65 72 20 71 75 65 72 79 20 6c 69 6d 69 74 2c 20 70 6c 65 61 73 65 20 74 72 79 20 61 67 61 69 6e 20 6c 61 74 65 72 22 7d 7d 0d 0a
                                                Data Ascii: 4f{"status":"ok","demoInfo":{"error":"over query limit, please try again later"}}
                                                2024-06-20 16:57:42 UTC5INData Raw: 30 0d 0a 0d 0a
                                                Data Ascii: 0


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                9192.168.2.44975134.117.186.1924438008C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                                                TimestampBytes transferredDirectionData
                                                2024-06-20 16:58:03 UTC236OUTGET /widget/demo/8.46.123.33 HTTP/1.1
                                                Connection: Keep-Alive
                                                Referer: https://ipinfo.io/
                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                                                Host: ipinfo.io
                                                2024-06-20 16:58:03 UTC514INHTTP/1.1 200 OK
                                                server: nginx/1.24.0
                                                date: Thu, 20 Jun 2024 16:58:03 GMT
                                                content-type: application/json; charset=utf-8
                                                Content-Length: 1025
                                                access-control-allow-origin: *
                                                x-frame-options: SAMEORIGIN
                                                x-xss-protection: 1; mode=block
                                                x-content-type-options: nosniff
                                                referrer-policy: strict-origin-when-cross-origin
                                                x-envoy-upstream-service-time: 2
                                                via: 1.1 google
                                                strict-transport-security: max-age=2592000; includeSubDomains
                                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                Connection: close
                                                2024-06-20 16:58:03 UTC876INData Raw: 7b 0a 20 20 22 69 6e 70 75 74 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 64 61 74 61 22 3a 20 7b 0a 20 20 20 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 20 20 22 68 6f 73 74 6e 61 6d 65 22 3a 20 22 73 74 61 74 69 63 2d 63 70 65 2d 38 2d 34 36 2d 31 32 33 2d 33 33 2e 63 65 6e 74 75 72 79 6c 69 6e 6b 2e 63 6f 6d 22 2c 0a 20 20 20 20 22 63 69 74 79 22 3a 20 22 4e 65 77 20 59 6f 72 6b 20 43 69 74 79 22 2c 0a 20 20 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 53 22 2c 0a 20 20 20 20 22 6c 6f 63 22 3a 20 22 34 30 2e 37 31 34 33 2c 2d 37 34 2e 30 30 36 30 22 2c 0a 20 20 20 20 22 6f 72 67 22 3a 20 22 41 53 33 33 35 36 20 4c 65 76 65 6c 20
                                                Data Ascii: { "input": "8.46.123.33", "data": { "ip": "8.46.123.33", "hostname": "static-cpe-8-46-123-33.centurylink.com", "city": "New York City", "region": "New York", "country": "US", "loc": "40.7143,-74.0060", "org": "AS3356 Level
                                                2024-06-20 16:58:03 UTC149INData Raw: 65 6d 61 69 6c 22 3a 20 22 61 62 75 73 65 40 61 75 70 2e 6c 75 6d 65 6e 2e 63 6f 6d 22 2c 0a 20 20 20 20 20 20 22 6e 61 6d 65 22 3a 20 22 43 65 6e 74 75 72 79 6c 69 6e 6b 20 41 62 75 73 65 20 44 65 73 6b 22 2c 0a 20 20 20 20 20 20 22 6e 65 74 77 6f 72 6b 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 30 2f 32 34 22 2c 0a 20 20 20 20 20 20 22 70 68 6f 6e 65 22 3a 20 22 2b 31 2d 38 37 37 2d 38 38 36 2d 36 35 31 35 22 0a 20 20 20 20 7d 0a 20 20 7d 0a 7d
                                                Data Ascii: email": "abuse@aup.lumen.com", "name": "Centurylink Abuse Desk", "network": "8.46.123.0/24", "phone": "+1-877-886-6515" } }}


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                10192.168.2.449752172.67.75.1664438008C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                                                TimestampBytes transferredDirectionData
                                                2024-06-20 16:58:04 UTC260OUTGET /demo/home.php?s=8.46.123.33 HTTP/1.1
                                                Connection: Keep-Alive
                                                Content-Type: application/x-www-form-urlencoded
                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                                                Host: db-ip.com
                                                2024-06-20 16:58:04 UTC657INHTTP/1.1 200 OK
                                                Date: Thu, 20 Jun 2024 16:58:04 GMT
                                                Content-Type: application/json
                                                Transfer-Encoding: chunked
                                                Connection: close
                                                x-iplb-request-id: A29E9BB3:866C_93878F2E:0050_66745F9C_14B39570:7B63
                                                x-iplb-instance: 59128
                                                CF-Cache-Status: DYNAMIC
                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=KGJ5SYB7Y4e4XV8agE04lOslY6J3qfrwxLZu1IBBBct7GIlm5qcbzEv7gbhOBZ%2BPKJiR%2BeI8oMJKFsBnGMTKn9tQrmkXYHuk3IHdARmQfKCIbhRg7T%2F%2F70f1Dw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                Server: cloudflare
                                                CF-RAY: 896d4d31eda743bf-EWR
                                                alt-svc: h3=":443"; ma=86400
                                                2024-06-20 16:58:04 UTC85INData Raw: 34 66 0d 0a 7b 22 73 74 61 74 75 73 22 3a 22 6f 6b 22 2c 22 64 65 6d 6f 49 6e 66 6f 22 3a 7b 22 65 72 72 6f 72 22 3a 22 6f 76 65 72 20 71 75 65 72 79 20 6c 69 6d 69 74 2c 20 70 6c 65 61 73 65 20 74 72 79 20 61 67 61 69 6e 20 6c 61 74 65 72 22 7d 7d 0d 0a
                                                Data Ascii: 4f{"status":"ok","demoInfo":{"error":"over query limit, please try again later"}}
                                                2024-06-20 16:58:04 UTC5INData Raw: 30 0d 0a 0d 0a
                                                Data Ascii: 0


                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:0
                                                Start time:12:57:10
                                                Start date:20/06/2024
                                                Path:C:\Users\user\Desktop\YnsEArPlqx.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\YnsEArPlqx.exe"
                                                Imagebase:0x400000
                                                File size:3'270'672 bytes
                                                MD5 hash:AB8E88BFF0B907FC49B949D704490018
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:low
                                                Has exited:false

                                                Target ID:2
                                                Start time:12:57:13
                                                Start date:20/06/2024
                                                Path:C:\Windows\SysWOW64\schtasks.exe
                                                Wow64 process (32bit):true
                                                Commandline:schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
                                                Imagebase:0x1c0000
                                                File size:187'904 bytes
                                                MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:3
                                                Start time:12:57:13
                                                Start date:20/06/2024
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff7699e0000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:4
                                                Start time:12:57:13
                                                Start date:20/06/2024
                                                Path:C:\Windows\SysWOW64\schtasks.exe
                                                Wow64 process (32bit):true
                                                Commandline:schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
                                                Imagebase:0x1c0000
                                                File size:187'904 bytes
                                                MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:5
                                                Start time:12:57:13
                                                Start date:20/06/2024
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff7699e0000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:6
                                                Start time:12:57:14
                                                Start date:20/06/2024
                                                Path:C:\ProgramData\MPGPH131\MPGPH131.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\ProgramData\MPGPH131\MPGPH131.exe
                                                Imagebase:0x400000
                                                File size:3'270'672 bytes
                                                MD5 hash:AB8E88BFF0B907FC49B949D704490018
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Antivirus matches:
                                                • Detection: 100%, Joe Sandbox ML
                                                • Detection: 55%, ReversingLabs
                                                Reputation:low
                                                Has exited:false

                                                Target ID:7
                                                Start time:12:57:14
                                                Start date:20/06/2024
                                                Path:C:\ProgramData\MPGPH131\MPGPH131.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\ProgramData\MPGPH131\MPGPH131.exe
                                                Imagebase:0x400000
                                                File size:3'270'672 bytes
                                                MD5 hash:AB8E88BFF0B907FC49B949D704490018
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:low
                                                Has exited:false

                                                Target ID:11
                                                Start time:12:57:22
                                                Start date:20/06/2024
                                                Path:C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
                                                Imagebase:0x400000
                                                File size:3'270'672 bytes
                                                MD5 hash:AB8E88BFF0B907FC49B949D704490018
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Antivirus matches:
                                                • Detection: 100%, Joe Sandbox ML
                                                • Detection: 55%, ReversingLabs
                                                Reputation:low
                                                Has exited:false

                                                Target ID:12
                                                Start time:12:57:30
                                                Start date:20/06/2024
                                                Path:C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
                                                Imagebase:0x400000
                                                File size:3'270'672 bytes
                                                MD5 hash:AB8E88BFF0B907FC49B949D704490018
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Reputation:low
                                                Has exited:false

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:4.5%
                                                  Dynamic/Decrypted Code Coverage:100%
                                                  Signature Coverage:4.5%
                                                  Total number of Nodes:2000
                                                  Total number of Limit Nodes:34
                                                  execution_graph 13667 4c7b00 13668 4c7ecc 13667->13668 13670 4c7b3e std::ios_base::_Ios_base_dtor __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 13667->13670 13669 4c7b87 setsockopt recv WSAGetLastError 13669->13668 13669->13670 13670->13669 13672 4c7eb7 Sleep 13670->13672 13673 4c7e15 recv 13670->13673 13675 4c7eaf Sleep 13670->13675 13680 4c7ee1 13670->13680 13683 4c7cd6 setsockopt recv 13670->13683 13684 418dc0 42 API calls 13670->13684 13687 4c8590 WSAStartup 13670->13687 13700 418dc0 13670->13700 13709 4163b0 13670->13709 13714 4c7ef0 13670->13714 13786 433069 13670->13786 13789 409280 13670->13789 13672->13668 13672->13670 13673->13675 13675->13672 13677 4c7c2d recv 13677->13670 13678 4c7c4e recv 13677->13678 13678->13670 13805 438c70 13680->13805 13683->13670 13684->13683 13688 4c8696 13687->13688 13689 4c85c8 13687->13689 13688->13670 13689->13688 13690 4c85fe getaddrinfo 13689->13690 13691 4c8690 WSACleanup 13690->13691 13692 4c8646 13690->13692 13691->13688 13693 4c86a4 FreeAddrInfoW 13692->13693 13694 4c8654 socket 13692->13694 13693->13691 13695 4c86b0 13693->13695 13694->13691 13696 4c866a connect 13694->13696 13695->13670 13697 4c867c closesocket 13696->13697 13698 4c86a0 13696->13698 13697->13694 13699 4c8686 FreeAddrInfoW 13697->13699 13698->13693 13699->13691 13702 418de2 std::locale::_Setgloballocale 13700->13702 13703 418e11 13700->13703 13701 418ef8 13702->13677 13703->13701 13810 4032d0 13703->13810 13705 418e66 std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 13706 418ecb std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 13705->13706 13824 402fe0 13705->13824 13706->13677 13708 418eb8 13708->13677 13711 4163d8 13709->13711 13710 4163e7 13710->13670 13711->13710 13712 4032d0 std::_Throw_Cpp_error 42 API calls 13711->13712 13713 41642a std::locale::_Locimp::_Locimp 13712->13713 13713->13670 13715 4c7f6c 13714->13715 13716 4c7f3e 13714->13716 13718 4c7f8e 13715->13718 13719 4c7f74 13715->13719 13717 402cf0 std::_Throw_Cpp_error 42 API calls 13716->13717 13720 4c7f50 13717->13720 13722 4c7f96 13718->13722 13723 4c7fb0 13718->13723 14149 416290 13719->14149 13727 409280 45 API calls 13720->13727 13724 416290 42 API calls 13722->13724 13725 4c7fb8 13723->13725 13726 4c7fd5 13723->13726 13754 4c7f64 13724->13754 13730 416290 42 API calls 13725->13730 13725->13754 13728 4c7fdd 13726->13728 13729 4c7ffb 13726->13729 13727->13754 14153 4412b7 13728->14153 13734 4c801b 13729->13734 13735 4c82c0 13729->13735 13729->13754 13730->13754 13732 402df0 std::_Throw_Cpp_error 42 API calls 13733 4c84f1 13732->13733 13733->13670 14101 405400 13734->14101 13736 4c82c8 13735->13736 13737 4c831b 13735->13737 14201 41b430 13736->14201 13740 4c8376 13737->13740 13741 4c8323 13737->13741 13742 4c837e 13740->13742 13743 4c83d1 13740->13743 13744 41b430 55 API calls 13741->13744 13745 41b430 55 API calls 13742->13745 13747 4c842c 13743->13747 13748 4c83d9 13743->13748 13744->13754 13745->13754 13746 4c82a5 14198 432baa 13746->14198 13752 4c8484 13747->13752 13753 4c8434 13747->13753 13751 41b430 55 API calls 13748->13751 13751->13754 13752->13754 14210 458b00 13752->14210 13755 41b430 55 API calls 13753->13755 13754->13732 13755->13754 13757 4c849a 14215 4162c0 13757->14215 13761 402df0 std::_Throw_Cpp_error 42 API calls 13761->13754 13762 402df0 42 API calls std::_Throw_Cpp_error 13764 4c8040 13762->13764 13763 4c810b 14118 402d30 13763->14118 13764->13746 13764->13762 13764->13763 14111 402cf0 13764->14111 14115 41ace0 13764->14115 13768 4c8140 14135 402df0 13768->14135 13770 4c814f 13771 4c81b2 GetCurrentProcess 13770->13771 13774 4c81e5 13770->13774 13772 4163b0 std::_Throw_Cpp_error 42 API calls 13771->13772 13773 4c81ce 13772->13773 14159 4cf280 VirtualAllocEx WriteProcessMemory 13773->14159 14146 439820 13774->14146 13777 4c81dd 13779 4c8279 13777->13779 14192 415230 13779->14192 13784 402df0 std::_Throw_Cpp_error 42 API calls 13784->13746 16273 43361d 13786->16273 13790 4163b0 std::_Throw_Cpp_error 42 API calls 13789->13790 13793 4092d4 13790->13793 13791 402df0 std::_Throw_Cpp_error 42 API calls 13792 409482 13791->13792 13794 418dc0 42 API calls 13792->13794 13796 409523 std::locale::_Locimp::_Locimp 13792->13796 13793->13791 13794->13796 13795 4095f0 GetModuleHandleA GetProcAddress WSASend 13795->13796 13797 4096e2 std::ios_base::_Ios_base_dtor 13795->13797 13796->13795 13796->13797 13798 40975d std::ios_base::_Ios_base_dtor 13797->13798 13799 438c70 std::_Throw_Cpp_error 40 API calls 13797->13799 13798->13670 13800 40979c 13799->13800 13801 402df0 std::_Throw_Cpp_error 42 API calls 13800->13801 13802 4097d7 13801->13802 13803 402df0 std::_Throw_Cpp_error 42 API calls 13802->13803 13804 4097f0 13803->13804 13804->13670 13806 438bac ___std_exception_copy 40 API calls 13805->13806 13807 438c7f 13806->13807 13808 438c8d __Getctype 11 API calls 13807->13808 13809 438c8c 13808->13809 13811 4032e2 13810->13811 13812 403306 13810->13812 13814 4032e9 13811->13814 13815 40331f 13811->13815 13813 403318 13812->13813 13816 433672 std::_Facet_Register 42 API calls 13812->13816 13813->13705 13829 433672 13814->13829 13840 402b50 13815->13840 13819 403310 13816->13819 13819->13705 13820 4032ef 13821 4032f8 13820->13821 13822 438c70 std::_Throw_Cpp_error 40 API calls 13820->13822 13821->13705 13823 403329 13822->13823 13825 403007 13824->13825 13826 403017 std::ios_base::_Ios_base_dtor 13824->13826 13825->13826 13827 438c70 std::_Throw_Cpp_error 40 API calls 13825->13827 13826->13708 13828 403036 13827->13828 13832 433677 13829->13832 13831 433691 13831->13820 13832->13831 13835 402b50 Concurrency::cancel_current_task 13832->13835 13846 4423ec 13832->13846 13864 445a89 13832->13864 13834 43369d 13834->13834 13835->13834 13853 4351fb 13835->13853 13837 402b6c 13856 434b15 13837->13856 13841 402b5e Concurrency::cancel_current_task 13840->13841 13842 4351fb Concurrency::cancel_current_task RaiseException 13841->13842 13843 402b6c 13842->13843 13844 434b15 ___std_exception_copy 41 API calls 13843->13844 13845 402bac 13844->13845 13845->13820 13851 44b094 __Getctype 13846->13851 13847 44b0d2 13867 4416ff 13847->13867 13848 44b0bd RtlAllocateHeap 13850 44b0d0 13848->13850 13848->13851 13850->13832 13851->13847 13851->13848 13852 445a89 std::_Facet_Register 2 API calls 13851->13852 13852->13851 13854 435242 RaiseException 13853->13854 13855 435215 13853->13855 13854->13837 13855->13854 13857 434b22 13856->13857 13863 402bac 13856->13863 13858 4423ec ___std_exception_copy 15 API calls 13857->13858 13857->13863 13859 434b3f 13858->13859 13862 434b4f 13859->13862 13991 4499a5 13859->13991 14000 441c96 13862->14000 13863->13820 14090 445ab5 13864->14090 13870 449f93 GetLastError 13867->13870 13869 441704 13869->13850 13871 449faf 13870->13871 13872 449fa9 13870->13872 13876 449fb3 SetLastError 13871->13876 13898 44b69b 13871->13898 13893 44b65c 13872->13893 13876->13869 13880 449fe8 13882 44b69b __Getctype 6 API calls 13880->13882 13881 449ff9 13883 44b69b __Getctype 6 API calls 13881->13883 13885 449ff6 13882->13885 13884 44a005 13883->13884 13886 44a020 13884->13886 13887 44a009 13884->13887 13910 44b01a 13885->13910 13916 449c70 13886->13916 13890 44b69b __Getctype 6 API calls 13887->13890 13890->13885 13892 44b01a __freea 12 API calls 13892->13876 13921 44b449 13893->13921 13895 44b678 13896 44b681 13895->13896 13897 44b693 TlsGetValue 13895->13897 13896->13871 13899 44b449 std::locale::_Setgloballocale 5 API calls 13898->13899 13900 44b6b7 13899->13900 13901 44b6d5 TlsSetValue 13900->13901 13902 449fcb 13900->13902 13902->13876 13903 44a65a 13902->13903 13907 44a667 __Getctype 13903->13907 13904 44a6a7 13908 4416ff __floor_pentium4 13 API calls 13904->13908 13905 44a692 RtlAllocateHeap 13906 449fe0 13905->13906 13905->13907 13906->13880 13906->13881 13907->13904 13907->13905 13909 445a89 std::_Facet_Register 2 API calls 13907->13909 13908->13906 13909->13907 13911 44b025 HeapFree 13910->13911 13912 44b04f 13910->13912 13911->13912 13913 44b03a GetLastError 13911->13913 13912->13876 13914 44b047 __freea 13913->13914 13915 4416ff __floor_pentium4 12 API calls 13914->13915 13915->13912 13935 449b04 13916->13935 13922 44b479 13921->13922 13926 44b475 std::locale::_Setgloballocale 13921->13926 13922->13926 13927 44b37e 13922->13927 13925 44b493 GetProcAddress 13925->13926 13926->13895 13928 44b38f std::locale::_Setgloballocale 13927->13928 13929 44b425 13928->13929 13930 44b3ad LoadLibraryExW 13928->13930 13934 44b3fb LoadLibraryExW 13928->13934 13929->13925 13929->13926 13931 44b42c 13930->13931 13932 44b3c8 GetLastError 13930->13932 13931->13929 13933 44b43e FreeLibrary 13931->13933 13932->13928 13933->13929 13934->13928 13934->13931 13936 449b10 std::locale::_Setgloballocale 13935->13936 13949 44424b RtlEnterCriticalSection 13936->13949 13938 449b1a 13950 449b4a 13938->13950 13941 449c16 13942 449c22 std::locale::_Setgloballocale 13941->13942 13954 44424b RtlEnterCriticalSection 13942->13954 13944 449c2c 13955 449df7 13944->13955 13946 449c44 13959 449c64 13946->13959 13949->13938 13953 444293 RtlLeaveCriticalSection 13950->13953 13952 449b38 13952->13941 13953->13952 13954->13944 13956 449e2d __Getctype 13955->13956 13957 449e06 __Getctype 13955->13957 13956->13946 13957->13956 13962 452146 13957->13962 13990 444293 RtlLeaveCriticalSection 13959->13990 13961 449c52 13961->13892 13964 4521c6 13962->13964 13965 45215c 13962->13965 13963 4522b7 __Getctype 14 API calls 13977 452222 13963->13977 13966 44b01a __freea 14 API calls 13964->13966 13989 452214 13964->13989 13965->13964 13970 44b01a __freea 14 API calls 13965->13970 13985 45218f 13965->13985 13967 4521e8 13966->13967 13968 44b01a __freea 14 API calls 13967->13968 13971 4521fb 13968->13971 13969 44b01a __freea 14 API calls 13972 4521bb 13969->13972 13974 452184 13970->13974 13976 44b01a __freea 14 API calls 13971->13976 13978 44b01a __freea 14 API calls 13972->13978 13973 452282 13979 44b01a __freea 14 API calls 13973->13979 13980 45144a __Getctype 14 API calls 13974->13980 13975 44b01a __freea 14 API calls 13982 4521a6 13975->13982 13983 452209 13976->13983 13977->13973 13981 44b01a 14 API calls __freea 13977->13981 13978->13964 13984 452288 13979->13984 13980->13985 13981->13977 13986 4518a9 __Getctype 14 API calls 13982->13986 13987 44b01a __freea 14 API calls 13983->13987 13984->13956 13985->13975 13988 4521b1 13985->13988 13986->13988 13987->13989 13988->13969 13989->13963 13990->13961 13992 4499b3 13991->13992 13995 4499c1 13991->13995 13992->13995 13998 4499d9 13992->13998 13993 4416ff __floor_pentium4 14 API calls 13994 4499c9 13993->13994 14003 438c60 13994->14003 13995->13993 13997 4499d3 13997->13862 13998->13997 13999 4416ff __floor_pentium4 14 API calls 13998->13999 13999->13994 14001 44b01a __freea 14 API calls 14000->14001 14002 441cae 14001->14002 14002->13863 14006 438bac 14003->14006 14007 438bbe ___std_exception_copy 14006->14007 14012 438be3 14007->14012 14009 438bd6 14023 43899c 14009->14023 14013 438bf3 14012->14013 14014 438bfa 14012->14014 14029 438a01 GetLastError 14013->14029 14020 438c08 14014->14020 14033 4389d8 14014->14033 14017 438c2f 14017->14020 14036 438c8d IsProcessorFeaturePresent 14017->14036 14019 438c5f 14021 438bac ___std_exception_copy 40 API calls 14019->14021 14020->14009 14022 438c6c 14021->14022 14022->14009 14024 4389a8 14023->14024 14025 4389bf 14024->14025 14068 438a47 14024->14068 14027 4389d2 14025->14027 14028 438a47 ___std_exception_copy 40 API calls 14025->14028 14027->13997 14028->14027 14030 438a1a 14029->14030 14040 44a044 14030->14040 14034 4389e3 GetLastError SetLastError 14033->14034 14035 4389fc 14033->14035 14034->14017 14035->14017 14037 438c99 14036->14037 14062 438a64 14037->14062 14041 44a057 14040->14041 14045 44a05d 14040->14045 14043 44b65c __Getctype 6 API calls 14041->14043 14042 44b69b __Getctype 6 API calls 14044 44a077 14042->14044 14043->14045 14046 438a32 SetLastError 14044->14046 14047 44a65a __Getctype 14 API calls 14044->14047 14045->14042 14045->14046 14046->14014 14048 44a087 14047->14048 14049 44a0a4 14048->14049 14050 44a08f 14048->14050 14052 44b69b __Getctype 6 API calls 14049->14052 14051 44b69b __Getctype 6 API calls 14050->14051 14054 44a09b 14051->14054 14053 44a0b0 14052->14053 14055 44a0b4 14053->14055 14056 44a0c3 14053->14056 14059 44b01a __freea 14 API calls 14054->14059 14057 44b69b __Getctype 6 API calls 14055->14057 14058 449c70 __Getctype 14 API calls 14056->14058 14057->14054 14060 44a0ce 14058->14060 14059->14046 14061 44b01a __freea 14 API calls 14060->14061 14061->14046 14063 438a80 std::locale::_Setgloballocale 14062->14063 14064 438aac IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 14063->14064 14065 438b7d std::locale::_Setgloballocale 14064->14065 14066 433d77 _ValidateLocalCookies 5 API calls 14065->14066 14067 438b9b GetCurrentProcess TerminateProcess 14066->14067 14067->14019 14069 438a51 14068->14069 14070 438a5a 14068->14070 14071 438a01 ___std_exception_copy 16 API calls 14069->14071 14070->14025 14072 438a56 14071->14072 14072->14070 14075 4441c6 14072->14075 14076 44f620 std::locale::_Setgloballocale RtlEnterCriticalSection RtlLeaveCriticalSection 14075->14076 14077 4441cb 14076->14077 14078 4441d6 14077->14078 14081 44f665 std::locale::_Setgloballocale 39 API calls 14077->14081 14079 4441e0 IsProcessorFeaturePresent 14078->14079 14080 4441ff 14078->14080 14082 4441ec 14079->14082 14083 4436e2 std::locale::_Setgloballocale 20 API calls 14080->14083 14081->14078 14084 438a64 std::locale::_Setgloballocale 8 API calls 14082->14084 14086 444209 14083->14086 14084->14080 14085 44b7f4 std::locale::_Setgloballocale 6 API calls 14085->14086 14086->14085 14087 44423e 14086->14087 14088 438a63 14086->14088 14089 444262 __Getctype RtlDeleteCriticalSection 14087->14089 14089->14088 14091 445ac1 std::locale::_Setgloballocale 14090->14091 14096 44424b RtlEnterCriticalSection 14091->14096 14093 445acc std::locale::_Setgloballocale 14097 445b03 14093->14097 14096->14093 14100 444293 RtlLeaveCriticalSection 14097->14100 14099 445a94 14099->13832 14100->14099 14219 432b99 14101->14219 14104 405410 14105 405419 14104->14105 14107 432534 std::_Throw_Cpp_error 78 API calls 14104->14107 14105->13764 14108 405430 14107->14108 14230 43953c 14108->14230 14112 402d13 14111->14112 14112->14112 14113 403040 std::_Throw_Cpp_error 42 API calls 14112->14113 14114 402d25 14113->14114 14114->13764 14116 41ad10 14115->14116 14116->14116 14796 41fbf0 14116->14796 14119 403040 std::_Throw_Cpp_error 42 API calls 14118->14119 14120 402d55 14119->14120 14121 4d62c0 14120->14121 14122 4d6358 14121->14122 14134 4d6361 std::locale::_Setgloballocale 14121->14134 14805 41e4b0 14122->14805 14125 4d654f 14128 4d6553 14125->14128 14909 416130 14125->14909 14129 4d6580 std::ios_base::_Ios_base_dtor 14128->14129 14130 438c70 std::_Throw_Cpp_error 40 API calls 14128->14130 14129->13768 14131 4d65ce 14130->14131 14132 433069 __Xtime_get_ticks 2 API calls 14131->14132 14133 4d65d6 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 14132->14133 14133->13768 14134->14125 14134->14128 14828 4f4760 14134->14828 14839 424160 14134->14839 14136 402e13 14135->14136 14137 402e2e std::ios_base::_Ios_base_dtor 14135->14137 14136->14137 14138 438c70 std::_Throw_Cpp_error 40 API calls 14136->14138 14137->13770 14139 402e5f 14138->14139 14140 402e88 14139->14140 14141 4032d0 std::_Throw_Cpp_error 42 API calls 14139->14141 14140->13770 14143 402eee std::locale::_Locimp::_Locimp 14141->14143 14142 402f3c std::locale::_Locimp::_Locimp 14142->13770 14143->14142 14144 402fe0 std::_Throw_Cpp_error 40 API calls 14143->14144 14145 402f2b 14144->14145 14145->13770 15007 43975e 14146->15007 14150 4162b1 14149->14150 14151 41629d 14149->14151 14150->13754 14152 416130 42 API calls 14151->14152 14152->14150 14154 4412ca ___std_exception_copy 14153->14154 15058 43d6a5 14154->15058 14156 4412e4 14157 43899c ___std_exception_copy 40 API calls 14156->14157 14158 4412f1 14157->14158 14158->13754 14160 4cf31d 14159->14160 14161 4cf35a VirtualAllocEx 14159->14161 14162 4cf323 WriteProcessMemory 14160->14162 14163 4cf3cf std::locale::_Setgloballocale 14161->14163 14162->14162 14164 4cf357 14162->14164 15274 41ab20 14163->15274 14164->14161 14167 418f00 std::_Throw_Cpp_error 42 API calls 14168 4cf47f 14167->14168 14169 402df0 std::_Throw_Cpp_error 42 API calls 14168->14169 14170 4cf4c9 14169->14170 15279 403440 14170->15279 14173 4cf56d 14174 4cf58b std::ios_base::_Ios_base_dtor 14173->14174 14176 4cf5c9 14173->14176 14175 402df0 std::_Throw_Cpp_error 42 API calls 14174->14175 14177 4cf5b6 14175->14177 14178 438c70 std::_Throw_Cpp_error 40 API calls 14176->14178 14177->13777 14179 4cf5ce 14178->14179 14179->13777 14180 441628 14181 44163b ___std_exception_copy 14180->14181 15536 44140a 14181->15536 14183 441650 14184 43899c ___std_exception_copy 40 API calls 14183->14184 14185 44165d 14184->14185 14186 43d0a8 14185->14186 14187 43d0bb ___std_exception_copy 14186->14187 15706 43cf83 14187->15706 14189 43d0c7 14190 43899c ___std_exception_copy 40 API calls 14189->14190 14191 43d0d3 14190->14191 14191->13779 14193 41524c 14192->14193 14196 415286 14192->14196 14193->14196 14197 402df0 std::_Throw_Cpp_error 42 API calls 14193->14197 14194 402df0 std::_Throw_Cpp_error 42 API calls 14195 415294 14194->14195 14195->13784 14196->14194 14197->14193 14199 432bb6 RtlReleaseSRWLockExclusive 14198->14199 14200 432bc4 14198->14200 14199->14200 14200->13754 15798 417ef0 14201->15798 14203 41b48d 15817 422100 14203->15817 14207 41b503 15887 41d490 14207->15887 14209 41b512 14209->13754 16242 458bb0 14210->16242 14212 458b31 std::locale::_Locimp::_Locimp 14213 403040 std::_Throw_Cpp_error 42 API calls 14212->14213 14214 458b7c 14213->14214 14214->13757 14216 4162ce 14215->14216 14218 4162d3 14215->14218 14217 402df0 std::_Throw_Cpp_error 42 API calls 14216->14217 14217->14218 14218->13761 14236 432bc8 GetCurrentThreadId 14219->14236 14222 432534 14223 43254a std::_Throw_Cpp_error 14222->14223 14262 4324e7 14223->14262 14231 43954f ___std_exception_copy 14230->14231 14770 4393db 14231->14770 14233 43955e 14234 43899c ___std_exception_copy 40 API calls 14233->14234 14235 405450 14234->14235 14235->13764 14237 432bf2 14236->14237 14238 432c11 14236->14238 14239 432bf7 RtlAcquireSRWLockExclusive 14237->14239 14247 432c07 14237->14247 14240 432c31 14238->14240 14241 432c1a 14238->14241 14239->14247 14243 432c90 14240->14243 14249 432c49 14240->14249 14242 432c25 RtlAcquireSRWLockExclusive 14241->14242 14241->14247 14242->14247 14245 432c97 RtlTryAcquireSRWLockExclusive 14243->14245 14243->14247 14245->14247 14246 405409 14246->14104 14246->14222 14254 433d77 14247->14254 14249->14247 14250 432c80 RtlTryAcquireSRWLockExclusive 14249->14250 14251 43302b 14249->14251 14250->14247 14250->14249 14252 433069 __Xtime_get_ticks 2 API calls 14251->14252 14253 433036 __aulldiv __aullrem 14252->14253 14253->14249 14255 433d80 IsProcessorFeaturePresent 14254->14255 14256 433d7f 14254->14256 14258 43455a 14255->14258 14256->14246 14261 43451d SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 14258->14261 14260 43463d 14260->14246 14261->14260 14263 4324f3 __EH_prolog3_GS 14262->14263 14264 402cf0 std::_Throw_Cpp_error 42 API calls 14263->14264 14265 432507 14264->14265 14285 4036e0 14265->14285 14267 43251c 14268 402df0 std::_Throw_Cpp_error 42 API calls 14267->14268 14269 432524 14268->14269 14301 433f6d 14269->14301 14286 4163b0 std::_Throw_Cpp_error 42 API calls 14285->14286 14287 403731 14286->14287 14288 40375a 14287->14288 14304 418f00 14287->14304 14290 418f00 std::_Throw_Cpp_error 42 API calls 14288->14290 14291 40378a 14290->14291 14292 402df0 std::_Throw_Cpp_error 42 API calls 14291->14292 14293 4037a4 14292->14293 14294 434b15 ___std_exception_copy 41 API calls 14293->14294 14296 40381e 14294->14296 14295 40385f std::ios_base::_Ios_base_dtor 14295->14267 14296->14295 14297 438c70 std::_Throw_Cpp_error 40 API calls 14296->14297 14298 4038b0 14297->14298 14313 434b78 14298->14313 14300 4038f5 std::ios_base::_Ios_base_dtor 14300->14267 14302 433d77 _ValidateLocalCookies 5 API calls 14301->14302 14303 433f77 14302->14303 14303->14303 14305 418f22 std::locale::_Locimp::_Locimp 14304->14305 14306 418f4f 14304->14306 14305->14288 14307 4032d0 std::_Throw_Cpp_error 42 API calls 14306->14307 14308 41902f std::ios_base::_Ios_base_dtor 14306->14308 14309 418fa4 std::locale::_Locimp::_Locimp 14307->14309 14308->14288 14310 419002 std::locale::_Locimp::_Locimp 14309->14310 14311 402fe0 std::_Throw_Cpp_error 40 API calls 14309->14311 14310->14288 14312 418fef 14311->14312 14312->14288 14314 434b85 14313->14314 14315 434b8c 14313->14315 14316 441c96 __freea 14 API calls 14314->14316 14315->14300 14316->14315 14771 4393e7 std::locale::_Setgloballocale 14770->14771 14772 4393f0 14771->14772 14773 439414 14771->14773 14774 438be3 ___std_exception_copy 40 API calls 14772->14774 14784 441250 RtlEnterCriticalSection 14773->14784 14783 439409 14774->14783 14776 43941d 14777 439432 14776->14777 14785 44a1e9 14776->14785 14779 4394cf 14777->14779 14780 43949e 14777->14780 14792 439507 14779->14792 14781 438be3 ___std_exception_copy 40 API calls 14780->14781 14781->14783 14783->14233 14784->14776 14786 44a1f5 14785->14786 14787 44a20a 14785->14787 14788 4416ff __floor_pentium4 14 API calls 14786->14788 14787->14777 14789 44a1fa 14788->14789 14790 438c60 ___std_exception_copy 40 API calls 14789->14790 14791 44a205 14790->14791 14791->14777 14795 441264 RtlLeaveCriticalSection 14792->14795 14794 43950d 14794->14783 14795->14794 14797 41fc12 std::locale::_Locimp::_Locimp 14796->14797 14799 41fc8d 14796->14799 14798 41fd5e 14799->14798 14800 4032d0 std::_Throw_Cpp_error 42 API calls 14799->14800 14801 41fce1 std::locale::_Locimp::_Locimp 14800->14801 14802 41fd3a std::locale::_Locimp::_Locimp 14801->14802 14803 402fe0 std::_Throw_Cpp_error 40 API calls 14801->14803 14804 41fd27 14803->14804 14806 41e4c2 14805->14806 14807 41e528 14805->14807 14808 41e4ca 14806->14808 14813 41e4f9 14806->14813 14920 403330 14807->14920 14810 41e4d1 14808->14810 14811 41e52d 14808->14811 14814 433672 std::_Facet_Register 42 API calls 14810->14814 14816 402b50 Concurrency::cancel_current_task 42 API calls 14811->14816 14812 41e516 14812->14134 14813->14812 14815 433672 std::_Facet_Register 42 API calls 14813->14815 14817 41e4d7 14814->14817 14818 41e503 14815->14818 14816->14817 14819 41e4e0 14817->14819 14820 438c70 std::_Throw_Cpp_error 40 API calls 14817->14820 14818->14134 14819->14134 14821 41e537 14820->14821 14923 416ad0 14821->14923 14823 41e574 14824 404900 std::_Throw_Cpp_error 42 API calls 14823->14824 14826 41e5fb 14824->14826 14825 41e613 14825->14134 14826->14825 14927 419b60 14826->14927 14829 4f4767 14828->14829 14830 4f476c 14828->14830 14829->14134 14831 4423ec ___std_exception_copy 15 API calls 14830->14831 14837 4f47af 14830->14837 14831->14837 14832 4f47c2 14832->14134 14833 4f4877 14833->14134 14834 441c96 __freea 14 API calls 14835 4f4867 14834->14835 14835->14134 14836 4f4821 14836->14833 14836->14834 14837->14832 14837->14836 14838 441c96 __freea 14 API calls 14837->14838 14838->14836 14840 424195 14839->14840 14841 424288 14839->14841 14843 4241b1 14840->14843 14844 424202 14840->14844 14845 4241f2 14840->14845 14842 403330 42 API calls 14841->14842 14846 42428d 14842->14846 14848 433672 std::_Facet_Register 42 API calls 14843->14848 14851 433672 std::_Facet_Register 42 API calls 14844->14851 14856 4241cf std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 14844->14856 14845->14843 14845->14846 14847 402b50 Concurrency::cancel_current_task 42 API calls 14846->14847 14850 424292 14847->14850 14849 4241c4 14848->14849 14849->14850 14849->14856 14852 438c70 std::_Throw_Cpp_error 40 API calls 14850->14852 14851->14856 14853 424297 14852->14853 14854 4242fa 14853->14854 14855 4243e9 14853->14855 14973 426ff0 14854->14973 14857 403330 42 API calls 14855->14857 14968 4277d0 14856->14968 14858 4243ee 14857->14858 14861 42445a 14858->14861 14862 424549 14858->14862 14865 426ff0 42 API calls 14861->14865 14864 403330 42 API calls 14862->14864 14863 42425e 14863->14134 14872 42454e 14864->14872 14867 424496 14865->14867 14866 42470b 14869 403330 42 API calls 14866->14869 14871 4163b0 std::_Throw_Cpp_error 42 API calls 14867->14871 14868 424706 14873 402b50 Concurrency::cancel_current_task 42 API calls 14868->14873 14874 4246af 14869->14874 14870 424336 14981 427830 14870->14981 14886 4244c4 14871->14886 14872->14866 14872->14868 14875 424615 14872->14875 14876 4245ee 14872->14876 14873->14866 14877 438c70 std::_Throw_Cpp_error 40 API calls 14874->14877 14900 4246d1 std::ios_base::_Ios_base_dtor 14874->14900 14883 433672 std::_Facet_Register 42 API calls 14875->14883 14888 4245ff 14875->14888 14876->14868 14878 4245f9 14876->14878 14879 424715 14877->14879 14880 433672 std::_Facet_Register 42 API calls 14878->14880 14998 41d010 14879->14998 14880->14888 14883->14888 14884 4243b0 14884->14134 14889 427830 42 API calls 14886->14889 14888->14874 14888->14900 14988 431f9c 14888->14988 14891 424510 14889->14891 14890 42472f 14892 4351fb Concurrency::cancel_current_task RaiseException 14890->14892 14891->14134 14893 424738 14892->14893 14894 424798 14893->14894 14895 42475b 14893->14895 14896 42477f 14893->14896 14897 402b50 Concurrency::cancel_current_task 42 API calls 14894->14897 14895->14894 14898 424762 14895->14898 14899 424791 14896->14899 14903 433672 std::_Facet_Register 42 API calls 14896->14903 14901 424768 14897->14901 14902 433672 std::_Facet_Register 42 API calls 14898->14902 14899->14134 14900->14134 14905 438c70 std::_Throw_Cpp_error 40 API calls 14901->14905 14908 424771 14901->14908 14902->14901 14906 424789 14903->14906 14907 4247a2 14905->14907 14906->14134 14908->14134 14910 416143 std::locale::_Locimp::_Locimp 14909->14910 14911 416174 14909->14911 14910->14128 14912 416200 14911->14912 14913 416180 14911->14913 14915 418f00 std::_Throw_Cpp_error 42 API calls 14912->14915 14914 4032d0 std::_Throw_Cpp_error 42 API calls 14913->14914 14918 4161bf std::locale::_Locimp::_Locimp 14914->14918 14916 416232 14915->14916 14916->14128 14917 4161ed 14917->14128 14918->14917 14919 402fe0 std::_Throw_Cpp_error 40 API calls 14918->14919 14919->14917 14931 431cea 14920->14931 14924 416b02 14923->14924 14925 416b1d 14924->14925 14957 4150e0 14924->14957 14925->14823 14928 419bbb 14927->14928 14929 419b96 14927->14929 14928->14825 14929->14928 14965 4188a0 14929->14965 14944 431a9f 14931->14944 14934 4351fb Concurrency::cancel_current_task RaiseException 14935 431d09 14934->14935 14947 431af4 14935->14947 14938 4351fb Concurrency::cancel_current_task RaiseException 14939 431d29 14938->14939 14950 431b37 14939->14950 14942 4351fb Concurrency::cancel_current_task RaiseException 14943 431d49 14942->14943 14954 4034e0 14944->14954 14948 4034e0 std::invalid_argument::invalid_argument 41 API calls 14947->14948 14949 431b06 14948->14949 14949->14938 14951 431b4b std::regex_error::regex_error 14950->14951 14952 4034e0 std::invalid_argument::invalid_argument 41 API calls 14951->14952 14953 431b54 14952->14953 14953->14942 14955 434b15 ___std_exception_copy 41 API calls 14954->14955 14956 403522 14955->14956 14956->14934 14958 415117 14957->14958 14964 4151b5 14957->14964 14959 416ad0 42 API calls 14958->14959 14960 415120 14959->14960 14961 41519d 14960->14961 14962 404900 std::_Throw_Cpp_error 42 API calls 14960->14962 14963 419b60 42 API calls 14961->14963 14961->14964 14962->14961 14963->14964 14964->14925 14966 404900 std::_Throw_Cpp_error 42 API calls 14965->14966 14967 4188bf 14966->14967 14967->14928 14969 4277dc 14968->14969 14970 4277f9 std::ios_base::_Ios_base_dtor 14968->14970 14969->14970 14971 438c70 std::_Throw_Cpp_error 40 API calls 14969->14971 14970->14863 14972 427824 14971->14972 14974 426ff9 14973->14974 14975 42703c 14973->14975 14974->14975 14976 433672 std::_Facet_Register 42 API calls 14974->14976 14978 427013 14974->14978 14975->14975 14976->14978 14977 433672 std::_Facet_Register 42 API calls 14979 427035 14977->14979 14978->14977 14980 42701c 14978->14980 14979->14870 14980->14870 14984 427882 std::ios_base::_Ios_base_dtor 14981->14984 14985 42783d 14981->14985 14982 402df0 std::_Throw_Cpp_error 42 API calls 14982->14985 14983 427853 14983->14984 14986 438c70 std::_Throw_Cpp_error 40 API calls 14983->14986 14984->14884 14985->14982 14985->14983 14987 4278b6 14986->14987 14989 431fb2 14988->14989 14990 431fa5 FindClose 14988->14990 14989->14888 14990->14989 14991 431fb6 14990->14991 14992 4441c6 __Getctype 40 API calls 14991->14992 14993 431fbb 14992->14993 14994 431f9c 40 API calls 14993->14994 14995 431fca FindFirstFileExW 14994->14995 14996 431fe5 14995->14996 14997 431fe9 GetLastError 14995->14997 14996->14888 14997->14996 14999 41d01a 14998->14999 15000 41d02e 14998->15000 14999->15000 15001 431f9c 43 API calls 14999->15001 15002 419910 15000->15002 15001->14999 15003 419928 15002->15003 15004 419938 std::ios_base::_Ios_base_dtor 15002->15004 15003->15004 15005 438c70 std::_Throw_Cpp_error 40 API calls 15003->15005 15004->14890 15006 41994d 15005->15006 15010 43976a std::locale::_Setgloballocale 15007->15010 15008 439771 15009 4416ff __floor_pentium4 14 API calls 15008->15009 15011 439776 15009->15011 15010->15008 15012 439791 15010->15012 15013 438c60 ___std_exception_copy 40 API calls 15011->15013 15014 4397a3 15012->15014 15015 439796 15012->15015 15023 439781 15013->15023 15024 44a8ef 15014->15024 15016 4416ff __floor_pentium4 14 API calls 15015->15016 15016->15023 15019 4397b3 15021 4416ff __floor_pentium4 14 API calls 15019->15021 15020 4397c0 15032 4397fe 15020->15032 15021->15023 15023->13779 15023->14180 15025 44a8fb std::locale::_Setgloballocale 15024->15025 15036 44424b RtlEnterCriticalSection 15025->15036 15027 44a909 15037 44a993 15027->15037 15034 439802 15032->15034 15057 441264 RtlLeaveCriticalSection 15034->15057 15035 439813 15035->15023 15036->15027 15045 44a9b6 15037->15045 15038 44a916 15050 44a94f 15038->15050 15039 44aa0e 15040 44a65a __Getctype 14 API calls 15039->15040 15041 44aa17 15040->15041 15043 44b01a __freea 14 API calls 15041->15043 15044 44aa20 15043->15044 15044->15038 15046 44b7f4 std::locale::_Setgloballocale 6 API calls 15044->15046 15045->15038 15045->15039 15045->15045 15053 441250 RtlEnterCriticalSection 15045->15053 15054 441264 RtlLeaveCriticalSection 15045->15054 15047 44aa3f 15046->15047 15055 441250 RtlEnterCriticalSection 15047->15055 15056 444293 RtlLeaveCriticalSection 15050->15056 15052 4397ac 15052->15019 15052->15020 15053->15045 15054->15045 15055->15038 15056->15052 15057->15035 15072 43ce79 15058->15072 15060 43d6ff 15066 43d723 15060->15066 15079 43e1d0 15060->15079 15061 43d6b7 15061->15060 15062 43d6cc 15061->15062 15071 43d6e7 std::_Locinfo::_Locinfo_dtor 15061->15071 15064 438be3 ___std_exception_copy 40 API calls 15062->15064 15064->15071 15068 43d747 15066->15068 15086 43ce94 15066->15086 15067 43d7cf 15069 43ce22 40 API calls 15067->15069 15068->15067 15093 43ce22 15068->15093 15069->15071 15071->14156 15073 43ce91 15072->15073 15074 43ce7e 15072->15074 15073->15061 15075 4416ff __floor_pentium4 14 API calls 15074->15075 15076 43ce83 15075->15076 15077 438c60 ___std_exception_copy 40 API calls 15076->15077 15078 43ce8e 15077->15078 15078->15061 15080 438a47 ___std_exception_copy 40 API calls 15079->15080 15081 43e1e0 15080->15081 15099 44a15a 15081->15099 15087 43cea0 15086->15087 15089 43ceb6 15086->15089 15088 44454e __Getctype 40 API calls 15087->15088 15091 43ceab std::_Locinfo::_Locinfo_dtor 15088->15091 15090 43cec6 15089->15090 15243 449a39 15089->15243 15090->15066 15091->15066 15094 43ce33 15093->15094 15095 43ce47 15093->15095 15094->15095 15096 4416ff __floor_pentium4 14 API calls 15094->15096 15095->15067 15097 43ce3c 15096->15097 15098 438c60 ___std_exception_copy 40 API calls 15097->15098 15098->15095 15100 44a171 15099->15100 15101 43e1fd 15099->15101 15100->15101 15102 452392 __Getctype 40 API calls 15100->15102 15103 44a1b8 15101->15103 15102->15101 15104 43e20a 15103->15104 15105 44a1cf 15103->15105 15104->15066 15105->15104 15107 4506bd 15105->15107 15108 449e42 __Getctype 40 API calls 15107->15108 15109 4506c2 15108->15109 15112 4505d5 15109->15112 15111 4506cd 15111->15104 15113 4505e1 std::locale::_Setgloballocale 15112->15113 15119 4505fb 15113->15119 15127 44424b RtlEnterCriticalSection 15113->15127 15116 4441c6 __Getctype 40 API calls 15120 450674 15116->15120 15117 450602 15117->15111 15118 450637 15128 450654 15118->15128 15119->15116 15119->15117 15122 4506b0 15120->15122 15131 449efd 15120->15131 15121 45060b 15121->15118 15123 44b01a __freea 14 API calls 15121->15123 15122->15111 15123->15118 15127->15121 15179 444293 RtlLeaveCriticalSection 15128->15179 15130 45065b 15130->15119 15132 449f0e 15131->15132 15133 449f08 15131->15133 15134 44b69b __Getctype 6 API calls 15132->15134 15153 449f14 15132->15153 15135 44b65c __Getctype 6 API calls 15133->15135 15136 449f28 15134->15136 15135->15132 15137 44a65a __Getctype 14 API calls 15136->15137 15136->15153 15139 449f38 15137->15139 15138 4441c6 __Getctype 40 API calls 15140 449f92 15138->15140 15141 449f55 15139->15141 15142 449f40 15139->15142 15143 44b69b __Getctype 6 API calls 15141->15143 15144 44b69b __Getctype 6 API calls 15142->15144 15145 449f61 15143->15145 15146 449f4c 15144->15146 15147 449f74 15145->15147 15148 449f65 15145->15148 15151 44b01a __freea 14 API calls 15146->15151 15150 449c70 __Getctype 14 API calls 15147->15150 15149 44b69b __Getctype 6 API calls 15148->15149 15149->15146 15152 449f7f 15150->15152 15151->15153 15154 44b01a __freea 14 API calls 15152->15154 15153->15138 15155 449f19 15153->15155 15154->15155 15156 450480 15155->15156 15157 4505d5 std::_Locinfo::_Locinfo_dtor 50 API calls 15156->15157 15158 4504aa 15157->15158 15180 450207 15158->15180 15163 4504dc 15165 44b01a __freea 14 API calls 15163->15165 15164 4504ea 15194 4506d0 15164->15194 15167 4504c3 15165->15167 15167->15122 15169 450522 15170 4416ff __floor_pentium4 14 API calls 15169->15170 15172 450527 15170->15172 15171 450569 15174 4505b2 15171->15174 15205 4500f9 15171->15205 15175 44b01a __freea 14 API calls 15172->15175 15173 45053d std::_Locinfo::_Locinfo_dtor 15173->15171 15176 44b01a __freea 14 API calls 15173->15176 15178 44b01a __freea 14 API calls 15174->15178 15175->15167 15176->15171 15178->15167 15179->15130 15213 4395ae 15180->15213 15183 450228 GetOEMCP 15185 450251 15183->15185 15184 45023a 15184->15185 15186 45023f GetACP 15184->15186 15185->15167 15187 44b094 15185->15187 15186->15185 15188 44b0d2 15187->15188 15192 44b0a2 __Getctype 15187->15192 15190 4416ff __floor_pentium4 14 API calls 15188->15190 15189 44b0bd RtlAllocateHeap 15191 44b0d0 15189->15191 15189->15192 15190->15191 15191->15163 15191->15164 15192->15188 15192->15189 15193 445a89 std::_Facet_Register 2 API calls 15192->15193 15193->15192 15195 450207 std::_Locinfo::_Locinfo_dtor 48 API calls 15194->15195 15197 4506f0 15195->15197 15196 4507f5 std::_Locinfo::_Locinfo_dtor 15200 433d77 _ValidateLocalCookies 5 API calls 15196->15200 15197->15196 15198 450748 std::_Locinfo::_Locinfo_dtor std::locale::_Setgloballocale 15197->15198 15199 45072d IsValidCodePage 15197->15199 15221 4502db 15198->15221 15199->15196 15202 45073f 15199->15202 15201 450517 15200->15201 15201->15169 15201->15173 15202->15198 15203 450768 GetCPInfo 15202->15203 15203->15196 15203->15198 15206 450105 std::locale::_Setgloballocale 15205->15206 15232 44424b RtlEnterCriticalSection 15206->15232 15208 45010f 15233 450146 15208->15233 15214 4395c5 15213->15214 15215 4395cc 15213->15215 15214->15183 15214->15184 15215->15214 15216 449e42 __Getctype 40 API calls 15215->15216 15217 4395ed 15216->15217 15218 44a12d __Getctype 40 API calls 15217->15218 15219 439603 15218->15219 15220 44a18b std::_Locinfo::_Locinfo_dtor 50 API calls 15219->15220 15220->15214 15222 450303 GetCPInfo 15221->15222 15223 4503cc 15221->15223 15222->15223 15229 45031b 15222->15229 15225 433d77 _ValidateLocalCookies 5 API calls 15223->15225 15224 44f44d std::_Locinfo::_Locinfo_dtor 49 API calls 15226 450383 15224->15226 15227 45047e 15225->15227 15228 44a8a6 std::_Locinfo::_Locinfo_dtor 49 API calls 15226->15228 15227->15196 15230 4503a4 15228->15230 15229->15224 15231 44a8a6 std::_Locinfo::_Locinfo_dtor 49 API calls 15230->15231 15231->15223 15232->15208 15234 43ceeb std::_Locinfo::_Locinfo_dtor 40 API calls 15233->15234 15235 450168 15234->15235 15236 43ceeb std::_Locinfo::_Locinfo_dtor 40 API calls 15235->15236 15237 450187 15236->15237 15238 45011c 15237->15238 15239 44b01a __freea 14 API calls 15237->15239 15240 45013a 15238->15240 15239->15238 15241 444293 std::_Lockit::~_Lockit RtlLeaveCriticalSection 15240->15241 15242 450128 15241->15242 15242->15174 15244 4395ae std::_Locinfo::_Locinfo_dtor 50 API calls 15243->15244 15245 449a56 15244->15245 15249 449a66 15245->15249 15250 44f44d 15245->15250 15247 433d77 _ValidateLocalCookies 5 API calls 15248 449b02 15247->15248 15248->15090 15249->15247 15251 4395ae std::_Locinfo::_Locinfo_dtor 49 API calls 15250->15251 15252 44f46d 15251->15252 15265 44b17a 15252->15265 15254 44f529 15257 433d77 _ValidateLocalCookies 5 API calls 15254->15257 15255 44f521 15268 433275 15255->15268 15256 44f49a 15256->15254 15256->15255 15259 44b094 std::_Locinfo::_Locinfo_dtor 15 API calls 15256->15259 15261 44f4bf std::_Locinfo::_Locinfo_dtor std::locale::_Setgloballocale 15256->15261 15260 44f54c 15257->15260 15259->15261 15260->15249 15261->15255 15262 44b17a std::_Locinfo::_Locinfo_dtor MultiByteToWideChar 15261->15262 15263 44f508 15262->15263 15263->15255 15264 44f50f GetStringTypeW 15263->15264 15264->15255 15272 44b0e2 15265->15272 15269 43327f 15268->15269 15271 433290 15268->15271 15270 441c96 __freea 14 API calls 15269->15270 15269->15271 15270->15271 15271->15254 15273 44b0f3 MultiByteToWideChar 15272->15273 15273->15256 15275 41ab55 15274->15275 15277 41aba3 15275->15277 15283 41e8a0 15275->15283 15278 41ab83 15278->14167 15280 403459 15279->15280 15287 440dd7 15280->15287 15284 41e8ce 15283->15284 15286 41e8f8 std::locale::_Locimp::_Locimp 15283->15286 15285 4032d0 std::_Throw_Cpp_error 42 API calls 15284->15285 15285->15286 15286->15278 15288 440deb ___std_exception_copy 15287->15288 15293 43e565 15288->15293 15291 43899c ___std_exception_copy 40 API calls 15292 403467 WriteProcessMemory WriteProcessMemory CreateRemoteThread WaitForSingleObject 15291->15292 15292->14173 15292->14174 15294 43e591 15293->15294 15295 43e5b4 15293->15295 15296 438be3 ___std_exception_copy 40 API calls 15294->15296 15295->15294 15299 43e5bc 15295->15299 15297 43e5a9 15296->15297 15298 433d77 _ValidateLocalCookies 5 API calls 15297->15298 15300 43e6d7 15298->15300 15304 43faa7 15299->15304 15300->15291 15322 440b0d 15304->15322 15307 43facc 15308 438be3 ___std_exception_copy 40 API calls 15307->15308 15309 43e63d 15308->15309 15319 43f28d 15309->15319 15312 43e1d0 std::_Locinfo::_Locinfo_dtor 50 API calls 15314 43faf4 std::_Locinfo::_Locinfo_dtor 15312->15314 15314->15309 15314->15312 15315 43fbd0 15314->15315 15326 43f49b 15314->15326 15329 43fed4 15314->15329 15363 44036f 15314->15363 15316 438be3 ___std_exception_copy 40 API calls 15315->15316 15317 43fbea 15316->15317 15318 438be3 ___std_exception_copy 40 API calls 15317->15318 15318->15309 15320 44b01a __freea 14 API calls 15319->15320 15321 43f29d 15320->15321 15321->15297 15323 43fac1 15322->15323 15324 440b18 15322->15324 15323->15307 15323->15309 15323->15314 15325 438be3 ___std_exception_copy 40 API calls 15324->15325 15325->15323 15392 43e842 15326->15392 15328 43f4d6 15328->15314 15330 43fef2 15329->15330 15331 43fedb 15329->15331 15332 438be3 ___std_exception_copy 40 API calls 15330->15332 15335 43ff31 15330->15335 15333 4403f4 15331->15333 15334 440394 15331->15334 15331->15335 15338 43ff26 15332->15338 15336 44042d 15333->15336 15337 4403f9 15333->15337 15339 44041a 15334->15339 15340 44039a 15334->15340 15335->15314 15341 440432 15336->15341 15342 44044a 15336->15342 15343 440426 15337->15343 15344 4403fb 15337->15344 15338->15314 15427 43ebfc 15339->15427 15350 4403eb 15340->15350 15351 44039f 15340->15351 15341->15339 15341->15350 15362 4403c5 15341->15362 15438 440a4d 15342->15438 15434 440a30 15343->15434 15345 4403ae 15344->15345 15353 44040a 15344->15353 15361 440453 15345->15361 15402 440785 15345->15402 15350->15361 15416 43ed89 15350->15416 15351->15345 15354 4403d8 15351->15354 15351->15362 15353->15339 15355 44040e 15353->15355 15354->15361 15412 440916 15354->15412 15355->15361 15423 4409ab 15355->15423 15357 433d77 _ValidateLocalCookies 5 API calls 15359 4406cc 15357->15359 15359->15314 15361->15357 15362->15361 15441 44c5ba 15362->15441 15364 4403f4 15363->15364 15365 440394 15363->15365 15366 44042d 15364->15366 15367 4403f9 15364->15367 15368 44041a 15365->15368 15369 44039a 15365->15369 15370 440432 15366->15370 15371 44044a 15366->15371 15372 440426 15367->15372 15373 4403fb 15367->15373 15377 43ebfc 41 API calls 15368->15377 15379 4403eb 15369->15379 15380 44039f 15369->15380 15370->15368 15370->15379 15390 4403c5 15370->15390 15376 440a4d 41 API calls 15371->15376 15374 440a30 41 API calls 15372->15374 15375 4403ae 15373->15375 15382 44040a 15373->15382 15374->15390 15378 440785 52 API calls 15375->15378 15391 440453 15375->15391 15376->15390 15377->15390 15378->15390 15381 43ed89 41 API calls 15379->15381 15379->15391 15380->15375 15383 4403d8 15380->15383 15380->15390 15381->15390 15382->15368 15384 44040e 15382->15384 15385 440916 51 API calls 15383->15385 15383->15391 15387 4409ab 40 API calls 15384->15387 15384->15391 15385->15390 15386 433d77 _ValidateLocalCookies 5 API calls 15388 4406cc 15386->15388 15387->15390 15388->15314 15389 44c5ba 51 API calls 15389->15390 15390->15389 15390->15391 15391->15386 15393 43ce79 std::_Locinfo::_Locinfo_dtor 40 API calls 15392->15393 15394 43e854 15393->15394 15395 43e869 15394->15395 15398 43e89c 15394->15398 15401 43e884 std::_Locinfo::_Locinfo_dtor 15394->15401 15396 438be3 ___std_exception_copy 40 API calls 15395->15396 15396->15401 15397 43e933 15399 43ce22 40 API calls 15397->15399 15398->15397 15400 43ce22 40 API calls 15398->15400 15399->15401 15400->15397 15401->15328 15403 44079f 15402->15403 15451 43e790 15403->15451 15405 4407de 15462 44c439 15405->15462 15408 43e1d0 std::_Locinfo::_Locinfo_dtor 50 API calls 15409 440895 15408->15409 15410 43e1d0 std::_Locinfo::_Locinfo_dtor 50 API calls 15409->15410 15411 4408c8 15409->15411 15410->15411 15411->15362 15411->15411 15414 440931 15412->15414 15413 440967 15413->15362 15414->15413 15415 44c5ba 51 API calls 15414->15415 15415->15413 15417 43ed9e 15416->15417 15418 43ede7 15417->15418 15419 43edc0 15417->15419 15421 43eddd 15418->15421 15422 43e790 15 API calls 15418->15422 15420 438be3 ___std_exception_copy 40 API calls 15419->15420 15420->15421 15421->15362 15422->15421 15426 4409c1 15423->15426 15424 438be3 ___std_exception_copy 40 API calls 15425 4409e2 15424->15425 15425->15362 15426->15424 15426->15425 15428 43ec11 15427->15428 15429 43ec33 15428->15429 15431 43ec5a 15428->15431 15430 438be3 ___std_exception_copy 40 API calls 15429->15430 15432 43ec50 15430->15432 15431->15432 15433 43e790 15 API calls 15431->15433 15432->15362 15433->15432 15435 440a3c 15434->15435 15526 43ea6f 15435->15526 15437 440a4c 15437->15362 15439 43ed89 41 API calls 15438->15439 15440 440a62 15439->15440 15440->15362 15443 44c5cf 15441->15443 15442 44c610 15448 44c5d3 std::_Locinfo::_Locinfo_dtor std::locale::_Setgloballocale 15442->15448 15450 44c5fc std::locale::_Setgloballocale 15442->15450 15533 44ec55 15442->15533 15443->15442 15445 43e1d0 std::_Locinfo::_Locinfo_dtor 50 API calls 15443->15445 15443->15448 15443->15450 15444 438be3 ___std_exception_copy 40 API calls 15444->15448 15445->15442 15447 44c6cb 15447->15448 15449 44c6e1 GetLastError 15447->15449 15448->15362 15449->15448 15449->15450 15450->15444 15450->15448 15452 43e7a5 15451->15452 15453 43e7b7 15451->15453 15452->15405 15453->15452 15454 44b094 std::_Locinfo::_Locinfo_dtor 15 API calls 15453->15454 15455 43e7db 15454->15455 15456 43e7e3 15455->15456 15457 43e7ee 15455->15457 15458 44b01a __freea 14 API calls 15456->15458 15481 43f2a7 15457->15481 15458->15452 15461 44b01a __freea 14 API calls 15461->15452 15463 44c46e 15462->15463 15465 44c44a 15462->15465 15463->15465 15466 44c4a1 15463->15466 15464 438be3 ___std_exception_copy 40 API calls 15478 440871 15464->15478 15465->15464 15467 44c509 15466->15467 15468 44c4da 15466->15468 15469 44c537 15467->15469 15470 44c532 15467->15470 15484 44c2dd 15468->15484 15492 44bb66 15469->15492 15473 44c55f 15470->15473 15474 44c599 15470->15474 15475 44c564 15473->15475 15476 44c57f 15473->15476 15519 44be93 15474->15519 15502 44c20e 15475->15502 15512 44c08a 15476->15512 15478->15408 15478->15409 15482 44b01a __freea 14 API calls 15481->15482 15483 43e7f9 15482->15483 15483->15461 15485 44c2f3 15484->15485 15486 44c2fe 15484->15486 15485->15478 15487 4499a5 ___std_exception_copy 40 API calls 15486->15487 15488 44c359 15487->15488 15489 44c363 15488->15489 15490 438c8d __Getctype 11 API calls 15488->15490 15489->15478 15491 44c371 15490->15491 15493 44bb79 15492->15493 15494 44bb88 15493->15494 15495 44bbaa 15493->15495 15496 438be3 ___std_exception_copy 40 API calls 15494->15496 15497 44bbbf 15495->15497 15499 44bc12 15495->15499 15501 44bba0 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z std::locale::_Setgloballocale __allrem _strrchr 15496->15501 15498 44be93 52 API calls 15497->15498 15498->15501 15500 43e1d0 std::_Locinfo::_Locinfo_dtor 50 API calls 15499->15500 15499->15501 15500->15501 15501->15478 15503 4547bf 42 API calls 15502->15503 15504 44c23e 15503->15504 15505 4546c5 40 API calls 15504->15505 15506 44c27c 15505->15506 15507 44c2bc 15506->15507 15508 44c295 15506->15508 15510 44c283 15506->15510 15509 44bf37 50 API calls 15507->15509 15511 44c120 50 API calls 15508->15511 15509->15510 15510->15478 15511->15510 15513 4547bf 42 API calls 15512->15513 15514 44c0b9 15513->15514 15515 4546c5 40 API calls 15514->15515 15516 44c0fa 15515->15516 15517 44c101 15516->15517 15518 44c120 50 API calls 15516->15518 15517->15478 15518->15517 15520 4547bf 42 API calls 15519->15520 15521 44bebd 15520->15521 15522 4546c5 40 API calls 15521->15522 15523 44bf0b 15522->15523 15524 44bf12 15523->15524 15525 44bf37 50 API calls 15523->15525 15524->15478 15525->15524 15527 43ea84 15526->15527 15528 43eacd 15527->15528 15529 43eaa6 15527->15529 15531 43e790 15 API calls 15528->15531 15532 43eac3 15528->15532 15530 438be3 ___std_exception_copy 40 API calls 15529->15530 15530->15532 15531->15532 15532->15437 15534 44ec68 std::_Locinfo::_Locinfo_dtor 15533->15534 15535 44eca6 WideCharToMultiByte 15534->15535 15535->15447 15537 441418 15536->15537 15543 441440 15536->15543 15538 441425 15537->15538 15539 441447 15537->15539 15537->15543 15540 438be3 ___std_exception_copy 40 API calls 15538->15540 15544 441363 15539->15544 15540->15543 15543->14183 15545 44136f std::locale::_Setgloballocale 15544->15545 15552 441250 RtlEnterCriticalSection 15545->15552 15547 44137d 15553 4413be 15547->15553 15552->15547 15563 44c8aa 15553->15563 15560 4413b2 15705 441264 RtlLeaveCriticalSection 15560->15705 15562 44139b 15562->14183 15583 44c86c 15563->15583 15565 4413d6 15570 441481 15565->15570 15566 44c8bb 15566->15565 15567 44b094 std::_Locinfo::_Locinfo_dtor 15 API calls 15566->15567 15568 44c914 15567->15568 15569 44b01a __freea 14 API calls 15568->15569 15569->15565 15573 441493 15570->15573 15574 4413f4 15570->15574 15571 4414a1 15572 438be3 ___std_exception_copy 40 API calls 15571->15572 15572->15574 15573->15571 15573->15574 15577 4414d7 std::locale::_Locimp::_Locimp 15573->15577 15579 44c955 15574->15579 15576 44a1e9 40 API calls 15576->15577 15577->15574 15577->15576 15599 439a91 15577->15599 15605 449678 15577->15605 15580 44c960 15579->15580 15581 44138a 15579->15581 15580->15581 15582 439a91 73 API calls 15580->15582 15581->15560 15582->15581 15585 44c878 15583->15585 15584 44c8a2 15584->15566 15585->15584 15586 44a1e9 40 API calls 15585->15586 15587 44c893 15586->15587 15590 453be3 15587->15590 15589 44c899 15589->15566 15591 453bf0 15590->15591 15592 453bfd 15590->15592 15593 4416ff __floor_pentium4 14 API calls 15591->15593 15594 453c09 15592->15594 15595 4416ff __floor_pentium4 14 API calls 15592->15595 15596 453bf5 15593->15596 15594->15589 15597 453c2a 15595->15597 15596->15589 15598 438c60 ___std_exception_copy 40 API calls 15597->15598 15598->15596 15600 439ad1 15599->15600 15601 439aaa 15599->15601 15600->15577 15601->15600 15602 44a1e9 40 API calls 15601->15602 15603 439ac6 15602->15603 15604 449678 73 API calls 15603->15604 15604->15600 15607 449684 std::locale::_Setgloballocale 15605->15607 15606 44968c 15606->15577 15607->15606 15608 4496c5 15607->15608 15610 44970b 15607->15610 15609 438be3 ___std_exception_copy 40 API calls 15608->15609 15609->15606 15616 44e6c4 RtlEnterCriticalSection 15610->15616 15612 449711 15613 44972f 15612->15613 15617 449789 15612->15617 15645 449781 15613->15645 15616->15612 15618 4497b1 15617->15618 15644 4497d4 15617->15644 15619 4497b5 15618->15619 15621 449810 15618->15621 15620 438be3 ___std_exception_copy 40 API calls 15619->15620 15620->15644 15622 44982e 15621->15622 15655 44263d 15621->15655 15648 4492ce 15622->15648 15626 449846 15630 449875 15626->15630 15631 44984e 15626->15631 15627 44988d 15628 4498f6 WriteFile 15627->15628 15629 4498a1 15627->15629 15632 449918 GetLastError 15628->15632 15628->15644 15634 4498e2 15629->15634 15635 4498a9 15629->15635 15663 448e9f GetConsoleOutputCP 15630->15663 15631->15644 15658 449266 15631->15658 15632->15644 15691 44934b 15634->15691 15636 4498ce 15635->15636 15637 4498ae 15635->15637 15683 44950f 15636->15683 15640 4498b7 15637->15640 15637->15644 15676 449426 15640->15676 15642 449888 15642->15644 15644->15613 15704 44e779 RtlLeaveCriticalSection 15645->15704 15647 449787 15647->15606 15649 453be3 40 API calls 15648->15649 15651 4492e0 15649->15651 15650 449344 15650->15626 15650->15627 15651->15650 15652 44930e 15651->15652 15653 43e1d0 std::_Locinfo::_Locinfo_dtor 50 API calls 15651->15653 15652->15650 15654 449328 GetConsoleMode 15652->15654 15653->15652 15654->15650 15698 44251c 15655->15698 15657 442656 15657->15622 15659 4492bd 15658->15659 15662 449288 15658->15662 15659->15644 15660 453db0 CreateFileW CloseHandle WriteConsoleW GetLastError WriteConsoleW 15660->15662 15661 4492bf GetLastError 15661->15659 15662->15659 15662->15660 15662->15661 15664 448f11 15663->15664 15672 448f18 std::locale::_Locimp::_Locimp 15663->15672 15665 43e1d0 std::_Locinfo::_Locinfo_dtor 50 API calls 15664->15665 15665->15672 15666 433d77 _ValidateLocalCookies 5 API calls 15667 44925f 15666->15667 15667->15642 15668 44c724 50 API calls 15668->15672 15669 4491ce 15669->15666 15669->15669 15670 44ec55 std::_Locinfo::_Locinfo_dtor WideCharToMultiByte 15670->15672 15671 449147 WriteFile 15671->15672 15673 44923d GetLastError 15671->15673 15672->15668 15672->15669 15672->15670 15672->15671 15674 453ca8 5 API calls std::_Locinfo::_Locinfo_dtor 15672->15674 15675 449185 WriteFile 15672->15675 15673->15669 15674->15672 15675->15672 15675->15673 15680 449435 15676->15680 15677 4494f4 15679 433d77 _ValidateLocalCookies 5 API calls 15677->15679 15678 4494aa WriteFile 15678->15680 15681 4494f6 GetLastError 15678->15681 15682 44950d 15679->15682 15680->15677 15680->15678 15681->15677 15682->15644 15684 44951e 15683->15684 15687 44ec55 std::_Locinfo::_Locinfo_dtor WideCharToMultiByte 15684->15687 15688 449628 GetLastError 15684->15688 15689 4495dd WriteFile 15684->15689 15690 449626 15684->15690 15685 433d77 _ValidateLocalCookies 5 API calls 15686 44963f 15685->15686 15686->15642 15687->15684 15688->15690 15689->15684 15689->15688 15690->15685 15696 44935a 15691->15696 15692 44940b 15693 433d77 _ValidateLocalCookies 5 API calls 15692->15693 15694 449424 15693->15694 15694->15642 15695 4493ca WriteFile 15695->15696 15697 44940d GetLastError 15695->15697 15696->15692 15696->15695 15697->15692 15699 44e940 40 API calls 15698->15699 15700 44252e 15699->15700 15701 44254a SetFilePointerEx 15700->15701 15703 442536 15700->15703 15702 442562 GetLastError 15701->15702 15701->15703 15702->15703 15703->15657 15704->15647 15705->15562 15707 43cf8f std::locale::_Setgloballocale 15706->15707 15708 43cf99 15707->15708 15709 43cfbc 15707->15709 15711 438be3 ___std_exception_copy 40 API calls 15708->15711 15710 43cfb4 15709->15710 15717 441250 RtlEnterCriticalSection 15709->15717 15710->14189 15711->15710 15713 43cfda 15718 43d01a 15713->15718 15715 43cfe7 15732 43d012 15715->15732 15717->15713 15719 43d027 15718->15719 15720 43d04a 15718->15720 15721 438be3 ___std_exception_copy 40 API calls 15719->15721 15722 439a91 73 API calls 15720->15722 15731 43d042 15720->15731 15721->15731 15723 43d062 15722->15723 15735 44b054 15723->15735 15726 44a1e9 40 API calls 15727 43d076 15726->15727 15739 448d2c 15727->15739 15730 44b01a __freea 14 API calls 15730->15731 15731->15715 15797 441264 RtlLeaveCriticalSection 15732->15797 15734 43d018 15734->15710 15736 43d06a 15735->15736 15737 44b06b 15735->15737 15736->15726 15737->15736 15738 44b01a __freea 14 API calls 15737->15738 15738->15736 15741 448d55 15739->15741 15745 43d07d 15739->15745 15740 448da4 15742 438be3 ___std_exception_copy 40 API calls 15740->15742 15741->15740 15743 448d7c 15741->15743 15742->15745 15746 448c9b 15743->15746 15745->15730 15745->15731 15747 448ca7 std::locale::_Setgloballocale 15746->15747 15754 44e6c4 RtlEnterCriticalSection 15747->15754 15749 448cb5 15751 448ce6 15749->15751 15755 448dff 15749->15755 15768 448d20 15751->15768 15754->15749 15771 44e940 15755->15771 15757 448e15 15784 44e8af 15757->15784 15758 448e0f 15758->15757 15759 448e47 15758->15759 15761 44e940 40 API calls 15758->15761 15759->15757 15762 44e940 40 API calls 15759->15762 15763 448e3e 15761->15763 15764 448e53 FindCloseChangeNotification 15762->15764 15765 44e940 40 API calls 15763->15765 15764->15757 15766 448e5f GetLastError 15764->15766 15765->15759 15766->15757 15767 448e6d 15767->15751 15796 44e779 RtlLeaveCriticalSection 15768->15796 15770 448d09 15770->15745 15772 44e962 15771->15772 15773 44e94d 15771->15773 15775 4416ec 14 API calls 15772->15775 15777 44e987 15772->15777 15793 4416ec 15773->15793 15778 44e992 15775->15778 15777->15758 15780 4416ff __floor_pentium4 14 API calls 15778->15780 15779 4416ff __floor_pentium4 14 API calls 15781 44e95a 15779->15781 15782 44e99a 15780->15782 15781->15758 15783 438c60 ___std_exception_copy 40 API calls 15782->15783 15783->15781 15785 44e925 15784->15785 15786 44e8be 15784->15786 15787 4416ff __floor_pentium4 14 API calls 15785->15787 15786->15785 15792 44e8e8 15786->15792 15788 44e92a 15787->15788 15789 4416ec 14 API calls 15788->15789 15790 44e915 15789->15790 15790->15767 15791 44e90f SetStdHandle 15791->15790 15792->15790 15792->15791 15794 449f93 std::locale::_Setgloballocale 14 API calls 15793->15794 15795 4416f1 15794->15795 15795->15779 15796->15770 15797->15734 15799 417f1d 15798->15799 15805 418034 15798->15805 15800 417fcb 15799->15800 15801 417f83 15799->15801 15802 417f24 15799->15802 15803 417f2b 15799->15803 15804 417f7c 15799->15804 15800->14203 15808 433672 std::_Facet_Register 42 API calls 15801->15808 15890 41c3a0 15802->15890 15810 433672 std::_Facet_Register 42 API calls 15803->15810 15895 41cf80 15804->15895 15806 402cf0 std::_Throw_Cpp_error 42 API calls 15805->15806 15811 417f29 15805->15811 15812 41804f 15806->15812 15808->15811 15810->15811 15811->14203 15900 407f90 15812->15900 15814 418062 15815 4351fb Concurrency::cancel_current_task RaiseException 15814->15815 15816 418073 15815->15816 15819 42215f 15817->15819 15968 44133b 15819->15968 15822 41b4f0 15823 41db10 15822->15823 15824 41db56 15823->15824 15825 41de3d 15823->15825 16020 41ebb0 15824->16020 15827 41fd70 42 API calls 15825->15827 15829 41de87 15827->15829 15828 41dba4 15831 41fd70 42 API calls 15828->15831 15830 41eda0 55 API calls 15829->15830 15884 41df5e std::ios_base::_Ios_base_dtor 15829->15884 15832 41dee2 15830->15832 15833 41dbc1 15831->15833 15836 4075c0 42 API calls 15832->15836 15886 41dcc3 std::ios_base::_Ios_base_dtor 15833->15886 16026 41eda0 15833->16026 15834 417ef0 42 API calls 15840 41dfc7 15834->15840 15835 41de38 std::ios_base::_Ios_base_dtor 15835->14207 15841 41df06 15836->15841 15838 41dd82 15847 417ef0 42 API calls 15838->15847 15857 41dd9f 15838->15857 15839 41dcec 15843 417ef0 42 API calls 15839->15843 15840->15835 15844 438c70 std::_Throw_Cpp_error 40 API calls 15840->15844 15845 41f440 55 API calls 15841->15845 15842 41dc1c 16079 4075c0 15842->16079 15862 41dd01 15843->15862 15848 41e06f 15844->15848 15849 41df1f 15845->15849 15847->15857 16140 4190b0 15848->16140 15850 41e093 15849->15850 15854 402df0 std::_Throw_Cpp_error 42 API calls 15849->15854 15856 4190b0 41 API calls 15850->15856 15859 41df40 15854->15859 15861 41e0a1 15856->15861 15863 4135b0 40 API calls 15857->15863 15858 4351fb Concurrency::cancel_current_task RaiseException 15864 41e08e 15858->15864 15865 407a20 14 API calls 15859->15865 15860 41dc56 15860->15848 15866 41dc6b 15860->15866 15867 4351fb Concurrency::cancel_current_task RaiseException 15861->15867 16135 4135b0 15862->16135 15877 41dd6c 15863->15877 15868 438c70 std::_Throw_Cpp_error 40 API calls 15864->15868 15869 41df4f 15865->15869 15870 402df0 std::_Throw_Cpp_error 42 API calls 15866->15870 15871 41e0b2 15867->15871 15868->15850 15873 402df0 std::_Throw_Cpp_error 42 API calls 15869->15873 15874 41dc77 15870->15874 15875 438c70 std::_Throw_Cpp_error 40 API calls 15871->15875 15872 4135b0 40 API calls 15878 41de26 15872->15878 15873->15884 15880 41e0b7 15875->15880 15877->15872 15881 4135b0 40 API calls 15878->15881 15881->15835 15884->15834 15884->15840 15884->15871 15886->15838 15886->15839 15888 402df0 std::_Throw_Cpp_error 42 API calls 15887->15888 15889 41d4cb 15888->15889 15889->14209 15891 433672 std::_Facet_Register 42 API calls 15890->15891 15892 41c3c3 15891->15892 15893 433672 std::_Facet_Register 42 API calls 15892->15893 15894 41c3ec 15893->15894 15894->15811 15896 433672 std::_Facet_Register 42 API calls 15895->15896 15897 41cfb7 15896->15897 15898 403040 std::_Throw_Cpp_error 42 API calls 15897->15898 15899 41cfee 15898->15899 15899->15811 15915 407350 15900->15915 15902 408029 15940 41ad80 15902->15940 15905 402df0 std::_Throw_Cpp_error 42 API calls 15906 40804c 15905->15906 15907 408076 std::ios_base::_Ios_base_dtor 15906->15907 15909 4080df 15906->15909 15944 4072b0 15907->15944 15912 438c70 std::_Throw_Cpp_error 40 API calls 15909->15912 15911 402df0 std::_Throw_Cpp_error 42 API calls 15913 4080cb 15911->15913 15914 4080e4 15912->15914 15913->15814 15914->15814 15947 404d70 15915->15947 15924 418f00 std::_Throw_Cpp_error 42 API calls 15925 4073e6 15924->15925 15926 402df0 std::_Throw_Cpp_error 42 API calls 15925->15926 15927 40744c 15926->15927 15928 407476 std::ios_base::_Ios_base_dtor 15927->15928 15930 4074bf 15927->15930 15929 402df0 std::_Throw_Cpp_error 42 API calls 15928->15929 15931 40749e 15929->15931 15932 438c70 std::_Throw_Cpp_error 40 API calls 15930->15932 15933 402df0 std::_Throw_Cpp_error 42 API calls 15931->15933 15934 4074c4 15932->15934 15935 4074aa 15933->15935 15936 434b78 ___std_exception_destroy 14 API calls 15934->15936 15935->15902 15937 407511 15936->15937 15938 434b78 ___std_exception_destroy 14 API calls 15937->15938 15939 407527 std::ios_base::_Ios_base_dtor 15938->15939 15939->15902 15941 41adb4 15940->15941 15942 418f00 std::_Throw_Cpp_error 42 API calls 15941->15942 15943 40803d 15942->15943 15943->15905 15945 434b15 ___std_exception_copy 41 API calls 15944->15945 15946 40731a 15945->15946 15946->15911 15949 404da6 15947->15949 15948 404dd8 15951 41ac50 15948->15951 15949->15948 15950 403040 std::_Throw_Cpp_error 42 API calls 15949->15950 15950->15948 15952 41ac81 15951->15952 15952->15952 15953 41acd3 15952->15953 15954 41e8a0 42 API calls 15952->15954 15955 4073af 15954->15955 15956 41abb0 15955->15956 15957 41abe1 15956->15957 15958 418f00 std::_Throw_Cpp_error 42 API calls 15957->15958 15959 4073c2 15958->15959 15960 41ae20 15959->15960 15963 41e710 15960->15963 15962 4073d1 15962->15924 15964 41e753 15963->15964 15965 4032d0 std::_Throw_Cpp_error 42 API calls 15964->15965 15966 41e758 std::locale::_Locimp::_Locimp 15964->15966 15967 41e843 std::locale::_Locimp::_Locimp 15965->15967 15966->15962 15967->15962 15969 449e42 __Getctype 40 API calls 15968->15969 15970 441346 15969->15970 15971 44a12d __Getctype 40 API calls 15970->15971 15972 42225f 15971->15972 15973 41fd70 15972->15973 15976 41fd84 15973->15976 15980 41fde4 15973->15980 15975 41ff6c 15975->15822 15981 41fdc2 15976->15981 15987 429e20 15976->15987 15979 41fecc 15979->15975 15986 429e20 42 API calls 15979->15986 16013 4208f0 15979->16013 15984 41fe74 15980->15984 16009 4201e0 15980->16009 15981->15980 15982 429e20 42 API calls 15981->15982 15983 41fe58 15981->15983 15982->15983 15983->15984 16005 421430 15983->16005 15984->15822 15986->15979 15988 429e62 15987->15988 15989 429f76 15987->15989 15991 429eba 15988->15991 15994 429e7c 15988->15994 15995 429eca 15988->15995 15990 403330 42 API calls 15989->15990 15992 429f7b 15990->15992 15991->15992 15991->15994 15996 402b50 Concurrency::cancel_current_task 42 API calls 15992->15996 15993 433672 std::_Facet_Register 42 API calls 15997 429e8f 15993->15997 15994->15993 15998 433672 std::_Facet_Register 42 API calls 15995->15998 16002 429e9a std::locale::_Locimp::_Locimp 15995->16002 15999 429f80 15996->15999 15997->15999 15997->16002 15998->16002 16000 438c70 std::_Throw_Cpp_error 40 API calls 15999->16000 16001 429f85 16000->16001 16003 4277d0 40 API calls 16002->16003 16004 429f47 16003->16004 16004->15981 16006 421443 16005->16006 16007 421471 16006->16007 16008 429e20 42 API calls 16006->16008 16007->15980 16008->16007 16010 4201f0 16009->16010 16011 429e20 42 API calls 16010->16011 16012 420260 16010->16012 16011->16010 16012->15979 16014 421430 42 API calls 16013->16014 16016 4208fc 16014->16016 16015 42090a 16015->15979 16016->16015 16017 429e20 42 API calls 16016->16017 16018 420995 16016->16018 16017->16016 16018->16015 16019 429e20 42 API calls 16018->16019 16019->16018 16021 41ec6d 16020->16021 16022 417ef0 42 API calls 16021->16022 16023 41ec8d 16022->16023 16143 4216c0 16023->16143 16025 41ecdf 16025->15828 16027 41ee46 16026->16027 16028 41ef4d 16026->16028 16029 41f425 16027->16029 16032 41e8a0 42 API calls 16027->16032 16030 418f00 std::_Throw_Cpp_error 42 API calls 16028->16030 16036 438c70 std::_Throw_Cpp_error 40 API calls 16029->16036 16031 41ef5b 16030->16031 16033 41ef6a 16031->16033 16041 41f191 16031->16041 16034 41ee79 16032->16034 16035 41f440 55 API calls 16033->16035 16037 418f00 std::_Throw_Cpp_error 42 API calls 16034->16037 16038 41ef79 16035->16038 16039 41f42f 16036->16039 16040 41ee93 16037->16040 16046 403040 std::_Throw_Cpp_error 42 API calls 16038->16046 16042 438c70 std::_Throw_Cpp_error 40 API calls 16039->16042 16043 418f00 std::_Throw_Cpp_error 42 API calls 16040->16043 16041->16041 16047 403040 std::_Throw_Cpp_error 42 API calls 16041->16047 16044 41f434 16042->16044 16045 41eee3 16043->16045 16048 438c70 std::_Throw_Cpp_error 40 API calls 16044->16048 16045->16029 16049 41ef1f std::ios_base::_Ios_base_dtor 16045->16049 16050 41efba 16046->16050 16051 41f1c9 16047->16051 16077 41f375 std::ios_base::_Ios_base_dtor 16048->16077 16053 402df0 std::_Throw_Cpp_error 42 API calls 16049->16053 16052 418f00 std::_Throw_Cpp_error 42 API calls 16050->16052 16054 41fbf0 42 API calls 16051->16054 16056 41efcd 16052->16056 16053->16028 16057 41f1e0 16054->16057 16055 438c70 std::_Throw_Cpp_error 40 API calls 16058 41f43e 16055->16058 16059 41e710 42 API calls 16056->16059 16060 418f00 std::_Throw_Cpp_error 42 API calls 16057->16060 16061 41f019 16059->16061 16064 41f22f std::ios_base::_Ios_base_dtor 16060->16064 16062 418f00 std::_Throw_Cpp_error 42 API calls 16061->16062 16063 41f032 16062->16063 16065 418f00 std::_Throw_Cpp_error 42 API calls 16063->16065 16064->16044 16068 41f18c std::ios_base::_Ios_base_dtor 16064->16068 16067 41f081 std::ios_base::_Ios_base_dtor 16065->16067 16066 402df0 std::_Throw_Cpp_error 42 API calls 16073 41f0e3 std::ios_base::_Ios_base_dtor 16066->16073 16067->16039 16067->16066 16069 403040 std::_Throw_Cpp_error 42 API calls 16068->16069 16078 41f3f2 std::ios_base::_Ios_base_dtor 16068->16078 16071 41f30c 16069->16071 16070 41f161 std::ios_base::_Ios_base_dtor 16072 402df0 std::_Throw_Cpp_error 42 API calls 16070->16072 16074 41fbf0 42 API calls 16071->16074 16072->16068 16073->16039 16073->16070 16075 41f323 16074->16075 16076 418f00 std::_Throw_Cpp_error 42 API calls 16075->16076 16076->16077 16077->16055 16077->16078 16078->15842 16226 404e30 16079->16226 16082 404e30 42 API calls 16083 40762b 16082->16083 16084 41ace0 42 API calls 16083->16084 16085 407640 16084->16085 16086 41abb0 42 API calls 16085->16086 16087 407656 16086->16087 16088 41e710 42 API calls 16087->16088 16092 40766d std::ios_base::_Ios_base_dtor 16088->16092 16089 40770a std::ios_base::_Ios_base_dtor 16090 402df0 std::_Throw_Cpp_error 42 API calls 16089->16090 16093 40773b 16090->16093 16091 407a09 16094 438c70 std::_Throw_Cpp_error 40 API calls 16091->16094 16092->16089 16092->16091 16095 402df0 std::_Throw_Cpp_error 42 API calls 16093->16095 16096 407a0e 16094->16096 16097 40774a 16095->16097 16098 438c70 std::_Throw_Cpp_error 40 API calls 16096->16098 16100 407350 42 API calls 16097->16100 16099 407a13 16098->16099 16101 4077a4 16100->16101 16102 418f00 std::_Throw_Cpp_error 42 API calls 16101->16102 16103 4077b9 16102->16103 16104 41e710 42 API calls 16103->16104 16105 40780c 16104->16105 16106 418f00 std::_Throw_Cpp_error 42 API calls 16105->16106 16107 407828 16106->16107 16108 41ad80 42 API calls 16107->16108 16110 407879 std::ios_base::_Ios_base_dtor 16108->16110 16109 402df0 std::_Throw_Cpp_error 42 API calls 16112 4078e8 std::ios_base::_Ios_base_dtor 16109->16112 16110->16096 16110->16109 16111 402df0 std::_Throw_Cpp_error 42 API calls 16113 407947 16111->16113 16112->16096 16112->16111 16113->16096 16114 407975 std::ios_base::_Ios_base_dtor 16113->16114 16115 402df0 std::_Throw_Cpp_error 42 API calls 16114->16115 16116 4079a6 16115->16116 16117 4072b0 41 API calls 16116->16117 16118 4079ca 16117->16118 16119 402df0 std::_Throw_Cpp_error 42 API calls 16118->16119 16120 4079f3 16119->16120 16121 41f440 16120->16121 16122 41f630 16121->16122 16128 41f4c9 std::ios_base::_Ios_base_dtor std::locale::_Locimp::_Locimp 16121->16128 16122->15860 16124 41f647 16126 438c70 std::_Throw_Cpp_error 40 API calls 16124->16126 16125 4032d0 std::_Throw_Cpp_error 42 API calls 16125->16128 16129 41f651 16126->16129 16127 418f00 std::_Throw_Cpp_error 42 API calls 16127->16128 16128->16122 16128->16124 16128->16125 16128->16127 16230 4034a0 16128->16230 16129->15860 16129->16129 16136 4135d1 16135->16136 16137 4135f1 std::ios_base::_Ios_base_dtor 16135->16137 16136->16137 16138 438c70 std::_Throw_Cpp_error 40 API calls 16136->16138 16137->15877 16139 413625 16138->16139 16139->15877 16237 416590 16140->16237 16146 4217d0 16143->16146 16145 4216da std::locale::_Setgloballocale 16145->16025 16147 421809 16146->16147 16153 421838 16146->16153 16148 421923 16147->16148 16150 42181b 16147->16150 16163 421990 16148->16163 16150->16153 16154 429f90 16150->16154 16153->16145 16155 429fc2 16154->16155 16156 42a0a3 16154->16156 16175 42d190 16155->16175 16157 403330 42 API calls 16156->16157 16161 42a000 std::locale::_Locimp::_Locimp 16157->16161 16159 438c70 std::_Throw_Cpp_error 40 API calls 16160 42a0ad 16159->16160 16161->16159 16162 42a05f std::ios_base::_Ios_base_dtor 16161->16162 16162->16153 16164 431cea 42 API calls 16163->16164 16166 42199a 16164->16166 16165 421928 16166->16165 16167 402cf0 std::_Throw_Cpp_error 42 API calls 16166->16167 16168 421a03 16167->16168 16169 41ace0 42 API calls 16168->16169 16170 421a18 16169->16170 16183 407cf0 16170->16183 16172 421a2d 16173 4351fb Concurrency::cancel_current_task RaiseException 16172->16173 16174 421a3e 16173->16174 16176 42d1d9 16175->16176 16177 42d199 16175->16177 16176->16176 16177->16176 16178 42d1b0 16177->16178 16181 433672 std::_Facet_Register 42 API calls 16177->16181 16179 42d1b9 16178->16179 16180 433672 std::_Facet_Register 42 API calls 16178->16180 16179->16161 16182 42d1d2 16180->16182 16181->16178 16182->16161 16184 407350 42 API calls 16183->16184 16185 407d80 16184->16185 16186 41ad80 42 API calls 16185->16186 16187 407d94 16186->16187 16188 402df0 std::_Throw_Cpp_error 42 API calls 16187->16188 16189 407da3 16188->16189 16190 407dcd std::ios_base::_Ios_base_dtor 16189->16190 16193 407e33 16189->16193 16191 4072b0 41 API calls 16190->16191 16192 407dfd 16191->16192 16194 402df0 std::_Throw_Cpp_error 42 API calls 16192->16194 16195 438c70 std::_Throw_Cpp_error 40 API calls 16193->16195 16196 407e1e 16194->16196 16197 407e38 16195->16197 16196->16172 16198 407350 42 API calls 16197->16198 16199 407ece 16198->16199 16200 41ad80 42 API calls 16199->16200 16201 407ee2 16200->16201 16202 402df0 std::_Throw_Cpp_error 42 API calls 16201->16202 16203 407ef1 16202->16203 16204 407f1b std::ios_base::_Ios_base_dtor 16203->16204 16206 407f81 16203->16206 16205 4072b0 41 API calls 16204->16205 16207 407f4b 16205->16207 16209 438c70 std::_Throw_Cpp_error 40 API calls 16206->16209 16208 402df0 std::_Throw_Cpp_error 42 API calls 16207->16208 16210 407f6c 16208->16210 16211 407f86 16209->16211 16210->16172 16212 407350 42 API calls 16211->16212 16213 408029 16212->16213 16214 41ad80 42 API calls 16213->16214 16215 40803d 16214->16215 16216 402df0 std::_Throw_Cpp_error 42 API calls 16215->16216 16217 40804c 16216->16217 16218 408076 std::ios_base::_Ios_base_dtor 16217->16218 16220 4080df 16217->16220 16219 4072b0 41 API calls 16218->16219 16221 4080aa 16219->16221 16223 438c70 std::_Throw_Cpp_error 40 API calls 16220->16223 16222 402df0 std::_Throw_Cpp_error 42 API calls 16221->16222 16224 4080cb 16222->16224 16225 4080e4 16223->16225 16224->16172 16225->16172 16227 404e66 16226->16227 16227->16227 16228 404ea8 16227->16228 16229 403040 std::_Throw_Cpp_error 42 API calls 16227->16229 16228->16082 16229->16228 16233 403380 16230->16233 16234 403399 16233->16234 16235 440dd7 53 API calls 16234->16235 16238 434b15 ___std_exception_copy 41 API calls 16237->16238 16239 4165ce 16238->16239 16240 434b15 ___std_exception_copy 41 API calls 16239->16240 16241 416601 16240->16241 16241->15858 16243 458e17 16242->16243 16244 458c08 16242->16244 16243->14212 16246 458d38 std::locale::_Setgloballocale 16244->16246 16249 4387b0 16244->16249 16258 403130 16244->16258 16246->16243 16247 403130 42 API calls 16246->16247 16247->16246 16250 4387e3 16249->16250 16255 4387c7 16249->16255 16251 449e42 __Getctype 40 API calls 16250->16251 16252 4387e8 16251->16252 16253 44a12d __Getctype 40 API calls 16252->16253 16254 4387f8 16253->16254 16254->16255 16256 449a39 50 API calls 16254->16256 16255->16244 16257 43882a 16256->16257 16257->16244 16259 4032b3 16258->16259 16260 40316f 16258->16260 16261 403330 42 API calls 16259->16261 16262 403189 16260->16262 16264 4031d7 16260->16264 16265 4031c7 16260->16265 16263 4032b8 16261->16263 16267 433672 std::_Facet_Register 42 API calls 16262->16267 16266 402b50 Concurrency::cancel_current_task 42 API calls 16263->16266 16268 433672 std::_Facet_Register 42 API calls 16264->16268 16271 40319c std::locale::_Locimp::_Locimp 16264->16271 16265->16262 16265->16263 16266->16271 16267->16271 16268->16271 16269 438c70 std::_Throw_Cpp_error 40 API calls 16270 4032c2 16269->16270 16271->16269 16272 40326b std::ios_base::_Ios_base_dtor 16271->16272 16272->16244 16274 433659 GetSystemTimeAsFileTime 16273->16274 16275 43364d GetSystemTimePreciseAsFileTime 16273->16275 16276 433077 16274->16276 16275->16276 16276->13670 16881 4247b0 16882 4248ed 16881->16882 16883 4247ed 16881->16883 16884 403330 42 API calls 16882->16884 16888 424a30 42 API calls 16883->16888 16885 4248f2 16884->16885 16886 424a23 16885->16886 16887 42493d 16885->16887 16889 403330 42 API calls 16886->16889 16891 424a30 42 API calls 16887->16891 16893 424827 16888->16893 16890 424a28 16889->16890 16892 424977 16891->16892 16900 413d50 16892->16900 16895 41e1e0 40 API calls 16893->16895 16896 4248b4 16895->16896 16897 42499f 16898 41e1e0 40 API calls 16897->16898 16899 4249ea 16898->16899 16901 413d8f 16900->16901 16927 413df7 std::locale::_Locimp::_Locimp 16900->16927 16902 413d96 16901->16902 16903 413e69 16901->16903 16904 413f7d 16901->16904 16905 413f1e 16901->16905 16901->16927 16906 433672 std::_Facet_Register 42 API calls 16902->16906 16909 433672 std::_Facet_Register 42 API calls 16903->16909 16907 433672 std::_Facet_Register 42 API calls 16904->16907 16972 417e80 16905->16972 16910 413da0 16906->16910 16911 413f8a 16907->16911 16912 413e73 16909->16912 16913 433672 std::_Facet_Register 42 API calls 16910->16913 16916 413fd3 16911->16916 16917 41408e 16911->16917 16911->16927 16912->16927 16933 42bf30 16912->16933 16915 413dd2 16913->16915 16960 42f460 16915->16960 16920 414004 16916->16920 16921 413fdb 16916->16921 16919 403330 42 API calls 16917->16919 16922 414093 16919->16922 16924 433672 std::_Facet_Register 42 API calls 16920->16924 16921->16922 16923 413fe6 16921->16923 16925 402b50 Concurrency::cancel_current_task 42 API calls 16922->16925 16926 433672 std::_Facet_Register 42 API calls 16923->16926 16924->16927 16929 413fec 16925->16929 16926->16929 16927->16897 16928 413d50 104 API calls 16930 413eb1 16928->16930 16929->16927 16931 438c70 std::_Throw_Cpp_error 40 API calls 16929->16931 16930->16927 16930->16928 16932 41409d 16931->16932 16934 42bf42 16933->16934 16935 42bfab 16933->16935 16937 42bf7c 16934->16937 16938 42bf4d 16934->16938 16936 403330 42 API calls 16935->16936 16940 42bfb0 16936->16940 16939 42bf99 16937->16939 16942 433672 std::_Facet_Register 42 API calls 16937->16942 16938->16940 16941 42bf54 16938->16941 16939->16930 16943 402b50 Concurrency::cancel_current_task 42 API calls 16940->16943 16944 433672 std::_Facet_Register 42 API calls 16941->16944 16946 42bf86 16942->16946 16945 42bf5a 16943->16945 16944->16945 16947 42bf63 16945->16947 16948 438c70 std::_Throw_Cpp_error 40 API calls 16945->16948 16946->16930 16947->16930 16949 42bfba 16948->16949 16950 42c077 16949->16950 16951 42c00c 16949->16951 16954 42c013 std::locale::_Locimp::_Locimp 16949->16954 16953 403330 42 API calls 16950->16953 16977 41fab0 16951->16977 16955 42c07c 16953->16955 16954->16930 16956 433672 std::_Facet_Register 42 API calls 16955->16956 16957 42c0ae 16956->16957 16958 403040 std::_Throw_Cpp_error 42 API calls 16957->16958 16959 42c0f2 16958->16959 16959->16930 16961 42f498 16960->16961 16971 42f53f 16960->16971 16962 433672 std::_Facet_Register 42 API calls 16961->16962 16963 42f4ba 16962->16963 16964 4163b0 std::_Throw_Cpp_error 42 API calls 16963->16964 16965 42f4d0 16964->16965 16966 413d50 104 API calls 16965->16966 16967 42f4e0 16966->16967 16968 42f460 104 API calls 16967->16968 16969 42f531 16968->16969 16970 42f460 104 API calls 16969->16970 16970->16971 16971->16927 16973 433672 std::_Facet_Register 42 API calls 16972->16973 16974 417ea6 16973->16974 16975 4163b0 std::_Throw_Cpp_error 42 API calls 16974->16975 16976 417ec5 16975->16976 16976->16927 16978 41fac2 16977->16978 16979 41fb2b 16977->16979 16981 41facd 16978->16981 16982 41fafc 16978->16982 16980 402b50 Concurrency::cancel_current_task 42 API calls 16979->16980 16985 41fada 16980->16985 16981->16979 16983 41fad4 16981->16983 16984 41fb19 16982->16984 16987 433672 std::_Facet_Register 42 API calls 16982->16987 16986 433672 std::_Facet_Register 42 API calls 16983->16986 16984->16954 16988 438c70 std::_Throw_Cpp_error 40 API calls 16985->16988 16990 41fae3 16985->16990 16986->16985 16989 41fb06 16987->16989 16991 41fb35 16988->16991 16989->16954 16990->16954 16993 41fb5b std::locale::_Setgloballocale 16991->16993 16995 429c70 16991->16995 16993->16954 16994 41fb7f 16994->16954 16996 429dc4 16995->16996 17001 429ca2 16995->17001 16997 403330 42 API calls 16996->16997 17012 429d04 std::locale::_Locimp::_Locimp 16997->17012 16998 429dbf 16999 402b50 Concurrency::cancel_current_task 42 API calls 16998->16999 16999->16996 17000 438c70 std::_Throw_Cpp_error 40 API calls 17002 429dce 17000->17002 17001->16998 17003 429cf3 17001->17003 17004 429d1d 17001->17004 17014 419950 17002->17014 17003->16998 17006 429cfe 17003->17006 17009 433672 std::_Facet_Register 42 API calls 17004->17009 17004->17012 17008 433672 std::_Facet_Register 42 API calls 17006->17008 17007 429dd9 17010 4351fb Concurrency::cancel_current_task RaiseException 17007->17010 17008->17012 17009->17012 17011 429de2 17010->17011 17012->17000 17013 429d8f std::ios_base::_Ios_base_dtor 17012->17013 17013->16994 17015 419968 17014->17015 17016 419978 std::ios_base::_Ios_base_dtor 17014->17016 17015->17016 17017 438c70 std::_Throw_Cpp_error 40 API calls 17015->17017 17016->17007 17018 41998d 17017->17018 17019 419a4f 17018->17019 17026 432b74 17018->17026 17019->17007 17025 419a04 17025->17007 17027 432af7 17026->17027 17028 4199cc 17027->17028 17055 439815 17027->17055 17028->17019 17034 4183b0 17028->17034 17033 43d0a8 78 API calls 17033->17028 17035 418463 17034->17035 17036 41843c 17034->17036 17038 41c430 17035->17038 17107 44120a 17036->17107 17039 432470 std::_Lockit::_Lockit 7 API calls 17038->17039 17040 41c45f 17039->17040 17041 432470 std::_Lockit::_Lockit 7 API calls 17040->17041 17046 41c4a9 std::_Throw_Cpp_error 17040->17046 17042 41c481 17041->17042 17045 4324c8 std::_Lockit::~_Lockit 2 API calls 17042->17045 17043 4324c8 std::_Lockit::~_Lockit 2 API calls 17044 41c5c9 17043->17044 17044->17025 17045->17046 17047 41c4f8 17046->17047 17048 433672 std::_Facet_Register 42 API calls 17046->17048 17047->17043 17049 41c506 17048->17049 17050 404040 std::_Throw_Cpp_error 75 API calls 17049->17050 17051 41c536 17050->17051 17052 404100 std::_Throw_Cpp_error 73 API calls 17051->17052 17053 41c592 17052->17053 17054 4326f7 std::_Facet_Register 42 API calls 17053->17054 17054->17047 17057 43975e std::locale::_Setgloballocale 17055->17057 17056 439771 17058 4416ff __floor_pentium4 14 API calls 17056->17058 17057->17056 17060 439791 17057->17060 17059 439776 17058->17059 17061 438c60 ___std_exception_copy 40 API calls 17059->17061 17062 4397a3 17060->17062 17063 439796 17060->17063 17071 432b43 17061->17071 17065 44a8ef 17 API calls 17062->17065 17064 4416ff __floor_pentium4 14 API calls 17063->17064 17064->17071 17066 4397ac 17065->17066 17067 4397b3 17066->17067 17068 4397c0 17066->17068 17069 4416ff __floor_pentium4 14 API calls 17067->17069 17070 4397fe RtlLeaveCriticalSection 17068->17070 17069->17071 17070->17071 17071->17028 17072 43d5f6 17071->17072 17073 43d609 ___std_exception_copy 17072->17073 17078 43d34d 17073->17078 17076 43899c ___std_exception_copy 40 API calls 17077 432b5e 17076->17077 17077->17028 17077->17033 17080 43d359 std::locale::_Setgloballocale 17078->17080 17079 43d35f 17081 438be3 ___std_exception_copy 40 API calls 17079->17081 17080->17079 17082 43d3a2 17080->17082 17088 43d37a 17081->17088 17089 441250 RtlEnterCriticalSection 17082->17089 17084 43d3ae 17090 43d4d0 17084->17090 17086 43d3c4 17099 43d3ed 17086->17099 17088->17076 17089->17084 17091 43d4e3 17090->17091 17092 43d4f6 17090->17092 17091->17086 17102 43d3f7 17092->17102 17094 43d5a7 17094->17086 17095 43d519 17095->17094 17096 439a91 73 API calls 17095->17096 17098 43d547 17096->17098 17097 44263d 42 API calls 17097->17094 17098->17097 17106 441264 RtlLeaveCriticalSection 17099->17106 17101 43d3f5 17101->17088 17103 43d408 17102->17103 17105 43d460 17102->17105 17104 4425fd 42 API calls 17103->17104 17103->17105 17104->17105 17105->17095 17106->17101 17108 441216 17107->17108 17111 44122b 17107->17111 17109 4416ff __floor_pentium4 14 API calls 17108->17109 17110 44121b 17109->17110 17112 438c60 ___std_exception_copy 40 API calls 17110->17112 17111->17035 17113 441226 17112->17113 17113->17035

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 75 409280-4092dd call 4163b0 78 409413-409521 call 402df0 call 4ea420 75->78 79 4092e3-4092e9 75->79 93 409523-409535 78->93 94 409537-40953f call 418dc0 78->94 80 4092f0-409313 79->80 82 409324-409331 80->82 83 409315-40931f 80->83 86 409342-40934f 82->86 87 409333-40933d 82->87 85 409403-409406 83->85 89 409409-40940d 85->89 90 409360-40936d 86->90 91 409351-40935b 86->91 87->85 89->78 89->80 95 40937e-40938b 90->95 96 40936f-409379 90->96 91->85 99 409544-409597 call 4ea420 * 2 93->99 94->99 97 409399-4093a6 95->97 98 40938d-409397 95->98 96->85 101 4093b4-4093c1 97->101 102 4093a8-4093b2 97->102 98->85 112 409599-4095c8 call 4ea420 call 435270 99->112 113 4095cb-4095e1 call 4ea420 99->113 104 4093c3-4093cd 101->104 105 4093cf-4093dc 101->105 102->85 104->85 107 4093ea-4093f4 105->107 108 4093de-4093e8 105->108 107->89 111 4093f6-4093ff 107->111 108->85 111->85 112->113 118 4096e2 113->118 119 4095e7-4095ed 113->119 122 4096e6-4096f0 118->122 121 4095f0-4096ce GetModuleHandleA GetProcAddress WSASend 119->121 124 4096d4-4096dc 121->124 125 40975f-409763 121->125 126 4096f2-4096fe 122->126 127 40971e-40973d 122->127 124->118 124->121 125->122 128 409700-40970e 126->128 129 409714-40971b call 4338f3 126->129 130 40976f-409796 127->130 131 40973f-40974b 127->131 128->129 132 409797-4097fe call 438c70 call 402df0 * 2 128->132 129->127 134 409765-40976c call 4338f3 131->134 135 40974d-40975b 131->135 134->130 135->132 139 40975d 135->139 139->134
                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(Ws2_32.dll,?,?,?,?,0054D15C,00000000,74D723A0,-00589880), ref: 004096A6
                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 004096B4
                                                  • WSASend.WS2_32(?,?,00000001,00000000,00000000,00000000,00000000,?,?,?,?,0054D15C,00000000,74D723A0,-00589880), ref: 004096C9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: AddressHandleModuleProcSend
                                                  • String ID: Ws2_32.dll
                                                  • API String ID: 2819740048-3093949381
                                                  • Opcode ID: 7294c9645cf97d84db5cacd27826e0eca47045cda1462dd577437eb231bc3e12
                                                  • Instruction ID: 188670ed5cfc709ed037a390f66f33add7af100e18449b0941b00ad524943a05
                                                  • Opcode Fuzzy Hash: 7294c9645cf97d84db5cacd27826e0eca47045cda1462dd577437eb231bc3e12
                                                  • Instruction Fuzzy Hash: 7C02CE70D04298DEDF25CFA4C8907ADBBB0EF59304F24429EE4456B2C6D7781D86CB96

                                                  Control-flow Graph

                                                  APIs
                                                  • setsockopt.WS2_32(00000370,0000FFFF,00001006,?,00000008), ref: 004C7BA6
                                                  • recv.WS2_32(?,00000004,00000002), ref: 004C7BC1
                                                  • WSAGetLastError.WS2_32 ref: 004C7BC5
                                                  • recv.WS2_32(00000000,0000000C,00000002,00000000), ref: 004C7C43
                                                  • recv.WS2_32(00000000,0000000C,00000008), ref: 004C7C64
                                                  • setsockopt.WS2_32(0000FFFF,00001006,?,00000008,?), ref: 004C7D00
                                                  • recv.WS2_32(00000000,?,00000008), ref: 004C7D1B
                                                    • Part of subcall function 004C8590: WSAStartup.WS2_32 ref: 004C85BA
                                                    • Part of subcall function 004C8590: getaddrinfo.WS2_32(?,?,?,00589328), ref: 004C863C
                                                    • Part of subcall function 004C8590: socket.WS2_32(?,?,?), ref: 004C865D
                                                    • Part of subcall function 004C8590: connect.WS2_32(00000000,00559BFC,?), ref: 004C8671
                                                    • Part of subcall function 004C8590: closesocket.WS2_32(00000000), ref: 004C867D
                                                    • Part of subcall function 004C8590: FreeAddrInfoW.WS2_32(?), ref: 004C868A
                                                    • Part of subcall function 004C8590: WSACleanup.WS2_32 ref: 004C8690
                                                  • recv.WS2_32(?,00000004,00000008), ref: 004C7E23
                                                  • __Xtime_get_ticks.LIBCPMT ref: 004C7E2A
                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004C7E38
                                                  • Sleep.KERNELBASE(00000001,00000000,?,00002710,00000000), ref: 004C7EB1
                                                  • Sleep.KERNELBASE(00000064,?,00002710,00000000), ref: 004C7EB9
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: recv$Sleepsetsockopt$AddrCleanupErrorFreeInfoLastStartupUnothrow_t@std@@@Xtime_get_ticks__ehfuncinfo$??2@closesocketconnectgetaddrinfosocket
                                                  • String ID:
                                                  • API String ID: 3089209366-0
                                                  • Opcode ID: d803b51f4fef140545f14ed8f9c08ccca676a723a1ae9220af6ecf2f2423aebf
                                                  • Instruction ID: b3d54dcccad81d83ab75f13ba9899d4b50e1d8608cabcccfb3508871926cac68
                                                  • Opcode Fuzzy Hash: d803b51f4fef140545f14ed8f9c08ccca676a723a1ae9220af6ecf2f2423aebf
                                                  • Instruction Fuzzy Hash: 9EB1AC71D043089BEB10DBA8CC49BAEBBB1BB54314F24025EE815BB2D2D7785D88DF95

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 56 4c8590-4c85c2 WSAStartup 57 4c85c8-4c85f2 call 4ea420 * 2 56->57 58 4c8696-4c869f 56->58 63 4c85fe-4c8644 getaddrinfo 57->63 64 4c85f4-4c85f8 57->64 65 4c8646-4c864c 63->65 66 4c8690 WSACleanup 63->66 64->58 64->63 67 4c864e 65->67 68 4c86a4-4c86ae FreeAddrInfoW 65->68 66->58 69 4c8654-4c8668 socket 67->69 68->66 70 4c86b0-4c86b8 68->70 69->66 71 4c866a-4c867a connect 69->71 72 4c867c-4c8684 closesocket 71->72 73 4c86a0 71->73 72->69 74 4c8686-4c868a FreeAddrInfoW 72->74 73->68 74->66
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: AddrFreeInfo$CleanupStartupclosesocketconnectgetaddrinfosocket
                                                  • String ID:
                                                  • API String ID: 448659506-0
                                                  • Opcode ID: 52d29ec15fbf37ccd53ab56e21f2e3f1d11727fcf2b6a4206c2cbc59116a4c78
                                                  • Instruction ID: ffa07009e3086412046aa5b15573dbd5c691e56a3beb11943292ef2f0f62f1de
                                                  • Opcode Fuzzy Hash: 52d29ec15fbf37ccd53ab56e21f2e3f1d11727fcf2b6a4206c2cbc59116a4c78
                                                  • Instruction Fuzzy Hash: 9531C1726043009BD7208F25DC48B2BB7E5FB94729F114B1EF9A4922E0D7759C089AA7

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 146 449789-4497ab 147 4497b1-4497b3 146->147 148 44999e 146->148 150 4497b5-4497d4 call 438be3 147->150 151 4497df-449802 147->151 149 4499a0-4499a4 148->149 159 4497d7-4497da 150->159 153 449804-449806 151->153 154 449808-44980e 151->154 153->154 155 449810-449821 153->155 154->150 154->155 157 449834-449844 call 4492ce 155->157 158 449823-449831 call 44263d 155->158 164 449846-44984c 157->164 165 44988d-44989f 157->165 158->157 159->149 168 449875-44988b call 448e9f 164->168 169 44984e-449851 164->169 166 4498f6-449916 WriteFile 165->166 167 4498a1-4498a7 165->167 170 449921 166->170 171 449918-44991e GetLastError 166->171 173 4498e2-4498f4 call 44934b 167->173 174 4498a9-4498ac 167->174 184 44986e-449870 168->184 175 449853-449856 169->175 176 44985c-44986b call 449266 169->176 178 449924-44992f 170->178 171->170 196 4498c9-4498cc 173->196 179 4498ce-4498e0 call 44950f 174->179 180 4498ae-4498b1 174->180 175->176 181 449936-449939 175->181 176->184 185 449931-449934 178->185 186 449999-44999c 178->186 179->196 187 44993c-44993e 180->187 188 4498b7-4498c4 call 449426 180->188 181->187 184->178 185->181 186->149 192 449940-449945 187->192 193 44996c-449978 187->193 188->196 197 449947-449959 192->197 198 44995e-449967 call 4416c8 192->198 199 449982-449994 193->199 200 44997a-449980 193->200 196->184 197->159 198->159 199->159 200->148 200->199
                                                  APIs
                                                    • Part of subcall function 00448E9F: GetConsoleOutputCP.KERNEL32(E9FAE29F,00000000,00000000,?), ref: 00448F02
                                                  • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0044990E
                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?), ref: 00449918
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: ConsoleErrorFileLastOutputWrite
                                                  • String ID:
                                                  • API String ID: 2915228174-0
                                                  • Opcode ID: 2beaef352ff8862ad6b8b16251cd0bd229135013537871e9a6efb1225fc67aec
                                                  • Instruction ID: 4c198159cf300fc4e9085a349e24ad4d45033eb13303bb4f9288eddf9455663d
                                                  • Opcode Fuzzy Hash: 2beaef352ff8862ad6b8b16251cd0bd229135013537871e9a6efb1225fc67aec
                                                  • Instruction Fuzzy Hash: 9961C5B1C14119BFEF11DFA8C844AAFBBB9AF49304F14014AE800A7316D739DD05EB65

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 203 448dff-448e13 call 44e940 206 448e15-448e17 203->206 207 448e19-448e21 203->207 210 448e67-448e87 call 44e8af 206->210 208 448e23-448e2a 207->208 209 448e2c-448e2f 207->209 208->209 211 448e37-448e4b call 44e940 * 2 208->211 212 448e31-448e35 209->212 213 448e4d-448e5d call 44e940 FindCloseChangeNotification 209->213 220 448e99 210->220 221 448e89-448e97 call 4416c8 210->221 211->206 211->213 212->211 212->213 213->206 225 448e5f-448e65 GetLastError 213->225 223 448e9b-448e9e 220->223 221->223 225->210
                                                  APIs
                                                  • FindCloseChangeNotification.KERNELBASE(00000000,00000000,?,?,00448CE6,00000000,?,0057A178,0000000C,00448DA2,?,?,?), ref: 00448E55
                                                  • GetLastError.KERNEL32(?,00448CE6,00000000,?,0057A178,0000000C,00448DA2,?,?,?), ref: 00448E5F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: ChangeCloseErrorFindLastNotification
                                                  • String ID:
                                                  • API String ID: 1687624791-0
                                                  • Opcode ID: 1fe827fdfe079599b9b1dab25e2b646f0beb01ea40d46a72429d261cc15a62e7
                                                  • Instruction ID: bfed174018f4c3fae0b74bea86efe9ace0911028d3bee9629bfc5162a0057b67
                                                  • Opcode Fuzzy Hash: 1fe827fdfe079599b9b1dab25e2b646f0beb01ea40d46a72429d261cc15a62e7
                                                  • Instruction Fuzzy Hash: 6E1125336042102AF6252236A84677F67499B82738F39061FF918CB2D2DF689C81825D

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 228 44251c-442534 call 44e940 231 442536-44253d 228->231 232 44254a-442560 SetFilePointerEx 228->232 235 442544-442548 231->235 233 442575-44257f 232->233 234 442562-442573 GetLastError call 4416c8 232->234 233->235 238 442581-442596 233->238 234->235 236 44259b-44259e 235->236 238->236
                                                  APIs
                                                  • SetFilePointerEx.KERNELBASE(00000000,?,?,?,?,?,00000000,?,?,?,00442626,?,?,?,?,?), ref: 00442558
                                                  • GetLastError.KERNEL32(?,?,?,?,00442626,?,?,?,?,?,00000000,?,00000000), ref: 00442565
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: ErrorFileLastPointer
                                                  • String ID:
                                                  • API String ID: 2976181284-0
                                                  • Opcode ID: 0df1753fdbe4f7a704092f8361e7cfb0c7cc0fcadc70f8748e4d2d33b1623b65
                                                  • Instruction ID: bcffdd1dd92d970d4fbe8e398a8ab980657c5c2bf717c74f1f656664416c076e
                                                  • Opcode Fuzzy Hash: 0df1753fdbe4f7a704092f8361e7cfb0c7cc0fcadc70f8748e4d2d33b1623b65
                                                  • Instruction Fuzzy Hash: 9B012632610615BFDF158F69DC1699E3B29EB84334F240209F8019B2E1E6B5ED429BA4

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 240 4032d0-4032e0 241 4032e2-4032e7 240->241 242 403306-403308 240->242 245 4032e9-4032ea call 433672 241->245 246 40331f call 402b50 241->246 243 403318-40331e 242->243 244 40330a-403317 call 433672 242->244 252 4032ef-4032f6 245->252 251 403324-403329 call 438c70 246->251 252->251 253 4032f8-403305 252->253
                                                  APIs
                                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0040331F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: Concurrency::cancel_current_task
                                                  • String ID:
                                                  • API String ID: 118556049-0
                                                  • Opcode ID: 0fd589d96c9d07b1efa01aec19e4ff46bb0766daf2056f60d33bc81ca57302d3
                                                  • Instruction ID: ac639495c118a2832fc09027b5ebf4fad0cef292c7be368858978faeea3118d5
                                                  • Opcode Fuzzy Hash: 0fd589d96c9d07b1efa01aec19e4ff46bb0766daf2056f60d33bc81ca57302d3
                                                  • Instruction Fuzzy Hash: 63F024321001009BCB246F61D4565EAB7ECDF28366B50083FFC8DD7292EB3EDA408788

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 256 44a65a-44a665 257 44a667-44a671 256->257 258 44a673-44a679 256->258 257->258 259 44a6a7-44a6b2 call 4416ff 257->259 260 44a692-44a6a3 RtlAllocateHeap 258->260 261 44a67b-44a67c 258->261 266 44a6b4-44a6b6 259->266 262 44a6a5 260->262 263 44a67e-44a685 call 448280 260->263 261->260 262->266 263->259 269 44a687-44a690 call 445a89 263->269 269->259 269->260
                                                  APIs
                                                  • RtlAllocateHeap.NTDLL(00000008,?,00000001), ref: 0044A69B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: AllocateHeap
                                                  • String ID:
                                                  • API String ID: 1279760036-0
                                                  • Opcode ID: 89032516e5b3e6299283371760f336f91a06b383302663fb1c071aa923d3998c
                                                  • Instruction ID: 9689b7dccde3e7d2c1426315cc49502dff6dd5535dcc2f3da2dc3831567fdc71
                                                  • Opcode Fuzzy Hash: 89032516e5b3e6299283371760f336f91a06b383302663fb1c071aa923d3998c
                                                  • Instruction Fuzzy Hash: 4CF0E0311905246BFB216A66DC05B5B375CAF41760F1E8117EC84EB190CA3CDC3146EE

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 272 44b094-44b0a0 273 44b0d2-44b0dd call 4416ff 272->273 274 44b0a2-44b0a4 272->274 281 44b0df-44b0e1 273->281 275 44b0a6-44b0a7 274->275 276 44b0bd-44b0ce RtlAllocateHeap 274->276 275->276 278 44b0d0 276->278 279 44b0a9-44b0b0 call 448280 276->279 278->281 279->273 284 44b0b2-44b0bb call 445a89 279->284 284->273 284->276
                                                  APIs
                                                  • RtlAllocateHeap.NTDLL(00000000,00000001,?), ref: 0044B0C6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: AllocateHeap
                                                  • String ID:
                                                  • API String ID: 1279760036-0
                                                  • Opcode ID: c639ae0624eff34eb8e57d07392fb4ffc7a0b3e65f726cef66c68c9318aea675
                                                  • Instruction ID: 07eaf642519ac51a5bd3283dd2addbb445c80e248ae9cef49388ffb333b33e8c
                                                  • Opcode Fuzzy Hash: c639ae0624eff34eb8e57d07392fb4ffc7a0b3e65f726cef66c68c9318aea675
                                                  • Instruction Fuzzy Hash: 99E022322006206BFF313AA69C14B5B764CEF413A3F190227EC25A62D1DB3CCC0092EE
                                                  APIs
                                                  • VirtualAllocEx.KERNEL32(00000000,00000000,?,00003000,00000040), ref: 004CF2F1
                                                  • WriteProcessMemory.KERNEL32(00000000,00000000,?,?,00000000), ref: 004CF30D
                                                  • WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 004CF342
                                                  • VirtualAllocEx.KERNEL32(?,00000000,00001000,00003000,00000040), ref: 004CF36B
                                                  • WriteProcessMemory.KERNEL32(?,00000000,?,00000218,00000000), ref: 004CF50F
                                                  • WriteProcessMemory.KERNEL32(?,00000218,004CF5E0,-00000010,00000000), ref: 004CF531
                                                  • CreateRemoteThread.KERNEL32(?,00000000,00000000,00000218,00000000,00000000,00000000), ref: 004CF544
                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004CF54D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: MemoryProcessWrite$AllocVirtual$CreateObjectRemoteSingleThreadWait
                                                  • String ID: %s|%s$131
                                                  • API String ID: 2137838514-1629954864
                                                  • Opcode ID: b88fb1ed2ebfd2a655c4879da0ce9de7ec8f2c0603ef1b71525654192dd42d6d
                                                  • Instruction ID: 2ab717f03d3c912496b66fb944616d360f792c6fe5d042a247d22025e7d5b78f
                                                  • Opcode Fuzzy Hash: b88fb1ed2ebfd2a655c4879da0ce9de7ec8f2c0603ef1b71525654192dd42d6d
                                                  • Instruction Fuzzy Hash: 36B16BB1D002089FDB14CFA4CC95BAEBBB5FF18300F10426DE905BB291D774A984DBA5
                                                  APIs
                                                    • Part of subcall function 00449E42: GetLastError.KERNEL32(00000000,?,0044F82B), ref: 00449E46
                                                    • Part of subcall function 00449E42: SetLastError.KERNEL32(00000000,00000000,00000001,00000006,000000FF), ref: 00449EE8
                                                  • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 004535D7
                                                  • IsValidCodePage.KERNEL32(?), ref: 00453615
                                                  • IsValidLocale.KERNEL32(?,00000001), ref: 00453628
                                                  • GetLocaleInfoW.KERNEL32(?,00001001,?,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 00453670
                                                  • GetLocaleInfoW.KERNEL32(?,00001002,?,00000040), ref: 0045368B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                  • String ID: *V
                                                  • API String ID: 415426439-2897881622
                                                  • Opcode ID: bb3ee8500ca9cacc625c50b97d6e48ff5c53ad3e39c4a6c01d9da358df15b7ae
                                                  • Instruction ID: 4a54d826d8e8e5dc964d84ffa3ac1e49b68ae0fe58eca9cd8e7cd24ca5604c7d
                                                  • Opcode Fuzzy Hash: bb3ee8500ca9cacc625c50b97d6e48ff5c53ad3e39c4a6c01d9da358df15b7ae
                                                  • Instruction Fuzzy Hash: 4E517471A00209AFDB20DFA5CC41ABF77B8AF05743F14446AED01E7252EB74DA48DB65
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: __floor_pentium4
                                                  • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                  • API String ID: 4168288129-2761157908
                                                  • Opcode ID: 43a42e638d961d261596a491a02aa4b2327403fcfc943c4a8adc8c2915f1bcde
                                                  • Instruction ID: 95be6499ce7b8f5c3e7b75284ec9f8f0661dd908efafa341dd21629552806af8
                                                  • Opcode Fuzzy Hash: 43a42e638d961d261596a491a02aa4b2327403fcfc943c4a8adc8c2915f1bcde
                                                  • Instruction Fuzzy Hash: 3AD23D71E086288FDB65CE28CD507EAB7B5EB84306F1441EBD80DE7241D778AE898F45
                                                  APIs
                                                    • Part of subcall function 00449E42: GetLastError.KERNEL32(00000000,?,0044F82B), ref: 00449E46
                                                    • Part of subcall function 00449E42: SetLastError.KERNEL32(00000000,00000000,00000001,00000006,000000FF), ref: 00449EE8
                                                  • GetACP.KERNEL32(?,?,?,?,?,?,00447300,?,?,?,?,?,-00000050,?,?,?), ref: 00452C19
                                                  • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00447300,?,?,?,?,?,-00000050,?,?), ref: 00452C50
                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,?,00000000,?), ref: 00452DB3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$CodeInfoLocalePageValid
                                                  • String ID: *V$utf8
                                                  • API String ID: 607553120-210452255
                                                  • Opcode ID: 95727e6ef7b94787d777f99e21165c393144e5509e4be2ad3f52f8295ffa9360
                                                  • Instruction ID: 742b11dcb7ff0b0bfa38c284345f0d68b4d7ce619a9ba0daefdf44cafbbca61f
                                                  • Opcode Fuzzy Hash: 95727e6ef7b94787d777f99e21165c393144e5509e4be2ad3f52f8295ffa9360
                                                  • Instruction Fuzzy Hash: F071FA32600602A6D725AF75CD45B6B73A8EF16705F10042FFD05D7283EBF8E94C9699
                                                  APIs
                                                  • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002,00000000,?,?,?,00453605,?,?), ref: 0045338C
                                                  • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002,00000000,?,?,?,00453605,?,?), ref: 004533B5
                                                  • GetACP.KERNEL32(?,?,00453605,?,?), ref: 004533CA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: InfoLocale
                                                  • String ID: ACP$OCP
                                                  • API String ID: 2299586839-711371036
                                                  • Opcode ID: b900ca414d4c4be95a8c6f041d08249478f894891a183a2f82a4edaf5765dc51
                                                  • Instruction ID: 0023b8279c9b3e3643c8ce07df61025d6c2b7e12d2ffc4f7461f6cfcb2a1a3ae
                                                  • Opcode Fuzzy Hash: b900ca414d4c4be95a8c6f041d08249478f894891a183a2f82a4edaf5765dc51
                                                  • Instruction Fuzzy Hash: 8021C432600100A7DB308F54C900A9BB3A6AF50FD3B568466EC06D7312EF36EF49D358
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 333d4b6d5425d6f9d03797ee82114c3711da98524c03317fffdb5ec62fb2b380
                                                  • Instruction ID: 01dad5c531b3804b6668612822d9feb5b6f7af541a2af8c3bc89036eeee974e8
                                                  • Opcode Fuzzy Hash: 333d4b6d5425d6f9d03797ee82114c3711da98524c03317fffdb5ec62fb2b380
                                                  • Instruction Fuzzy Hash: DA023A71E002199BDF14CFA9D9C06AEFBB1FF48314F24926AE919B7380D735A9418B94
                                                  APIs
                                                  • GetSystemTimePreciseAsFileTime.KERNEL32(?,00433077,?,?,?,?,004C7E2F), ref: 00433655
                                                  • GetSystemTimeAsFileTime.KERNEL32(?,E9FAE29F,00000000,?,00551382,000000FF,?,00433077,?,?,?,?,004C7E2F), ref: 00433659
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: Time$FileSystem$Precise
                                                  • String ID: `-@
                                                  • API String ID: 743729956-3781167437
                                                  • Opcode ID: a70e229828252f114f3dcb939b169fb3f53d7191ad82fa45b454faadf805d98c
                                                  • Instruction ID: 3e04e591088ee8cc2650925c1d28f2227fba881fd4e87dc1a7d03300bd93dc66
                                                  • Opcode Fuzzy Hash: a70e229828252f114f3dcb939b169fb3f53d7191ad82fa45b454faadf805d98c
                                                  • Instruction Fuzzy Hash: 73F0A032904A54EFCB118F44DC11B59BBA8F708B21F004626EC12A3790DB34A9049F94
                                                  APIs
                                                    • Part of subcall function 00449E42: GetLastError.KERNEL32(00000000,?,0044F82B), ref: 00449E46
                                                    • Part of subcall function 00449E42: SetLastError.KERNEL32(00000000,00000000,00000001,00000006,000000FF), ref: 00449EE8
                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452FCB
                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00453015
                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004530DB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: InfoLocale$ErrorLast
                                                  • String ID:
                                                  • API String ID: 661929714-0
                                                  • Opcode ID: f5cfd2435bfc6126f1a27ca0e302e8257e218aad689c2380b82d9cb027d6b9a4
                                                  • Instruction ID: 48740d242bba4bd8a9c349c0ec2c6d2d1cd0f344531baebb5e7d544be35332ed
                                                  • Opcode Fuzzy Hash: f5cfd2435bfc6126f1a27ca0e302e8257e218aad689c2380b82d9cb027d6b9a4
                                                  • Instruction Fuzzy Hash: 4661C2315006079FEB249F25CC82BABB7A8EF04787F10417AED05C6686EB7CDA49CB54
                                                  APIs
                                                  • IsDebuggerPresent.KERNEL32 ref: 00438B5C
                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00438B66
                                                  • UnhandledExceptionFilter.KERNEL32(?), ref: 00438B73
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                  • String ID:
                                                  • API String ID: 3906539128-0
                                                  • Opcode ID: 190c57a89f893cc3a60c21e64f5d89c3dc83bf777de16abb744d2c180980a4ce
                                                  • Instruction ID: 8ec399b23226fa191ec5ef1820ea8a0bb8d05e2da4fe9e987d2f7c16b8c22cf0
                                                  • Opcode Fuzzy Hash: 190c57a89f893cc3a60c21e64f5d89c3dc83bf777de16abb744d2c180980a4ce
                                                  • Instruction Fuzzy Hash: 8331D4759013189BCB21DF65D8897CDBBB8BF08310F5051EAF81CA7251EB749B858F48
                                                  APIs
                                                  • FindClose.KERNEL32(000000FF,?,0041D027,?,?,?,00424721), ref: 00431FA8
                                                  • FindFirstFileExW.KERNEL32(000000FF,00000001,?,00000000,00000000,00000000,?,?,?,0041D027,?,?,?,00424721), ref: 00431FD7
                                                  • GetLastError.KERNEL32(?,0041D027,?,?,?,00424721), ref: 00431FE9
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: Find$CloseErrorFileFirstLast
                                                  • String ID:
                                                  • API String ID: 4020440971-0
                                                  • Opcode ID: b16ae3ed5c4ea8c825a7741cabbb9deee3b3ed014939fe7a26025e30d09a83a3
                                                  • Instruction ID: 374c7283d1fee54890fd1da0f93e4c1b7d6ed331c4205a5270736a92a01d96fc
                                                  • Opcode Fuzzy Hash: b16ae3ed5c4ea8c825a7741cabbb9deee3b3ed014939fe7a26025e30d09a83a3
                                                  • Instruction Fuzzy Hash: D9F08232000208BFDB206FB5DC08DBA7BADEB18371F108626FD68C16B0D731D9A596B5
                                                  APIs
                                                  • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,?,?,?,?,00447E76,?,20001004,?,00000002,?,?,00447468), ref: 0044B768
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: InfoLocale
                                                  • String ID: `-@
                                                  • API String ID: 2299586839-3781167437
                                                  • Opcode ID: 49b4b54da173fcca6da5c5c7afb6aecc463d0371a21e889a3031e465fe0a4c2b
                                                  • Instruction ID: 6cde8863e94abc83afdff9d02dc43b85bf30edba8fd47250f688fa8aae92868b
                                                  • Opcode Fuzzy Hash: 49b4b54da173fcca6da5c5c7afb6aecc463d0371a21e889a3031e465fe0a4c2b
                                                  • Instruction Fuzzy Hash: 65E04F36500218BBEF223F61EC05EAE7F26EF447A2F008416FD0565271CB75C921BAE9
                                                  APIs
                                                  • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,0044DA81,?,?,?,?,?,?,00000000), ref: 0044DCB3
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: ExceptionRaise
                                                  • String ID:
                                                  • API String ID: 3997070919-0
                                                  • Opcode ID: c4b844f4748ab43110d9ddc2113bf4f3516c88aed4eb779ad480f52b638fb61b
                                                  • Instruction ID: a9cfdaf791ee03315f30e706cc2315f363a0b4456a4e08294abae47f684f0219
                                                  • Opcode Fuzzy Hash: c4b844f4748ab43110d9ddc2113bf4f3516c88aed4eb779ad480f52b638fb61b
                                                  • Instruction Fuzzy Hash: ECB15171910608DFE715CF28C48AB557BE0FF45364F25865AE899CF3A1C339E992CB44
                                                  APIs
                                                    • Part of subcall function 00449E42: GetLastError.KERNEL32(00000000,?,0044F82B), ref: 00449E46
                                                    • Part of subcall function 00449E42: SetLastError.KERNEL32(00000000,00000000,00000001,00000006,000000FF), ref: 00449EE8
                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0045321E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$InfoLocale
                                                  • String ID:
                                                  • API String ID: 3736152602-0
                                                  • Opcode ID: ce8f16c0568beb61190bd24bea5fc54c05911f28a5d336557b2a67b9f4554f6f
                                                  • Instruction ID: c68ba993faf54d01c6f16d81f3f5077507b086e8cfab0080940638b83f1b5490
                                                  • Opcode Fuzzy Hash: ce8f16c0568beb61190bd24bea5fc54c05911f28a5d336557b2a67b9f4554f6f
                                                  • Instruction Fuzzy Hash: 8D219872514606ABDB189E25DC42A7BB3A8EF04756F1000BFFD01D6242EB7CDE489758
                                                  APIs
                                                    • Part of subcall function 00449E42: GetLastError.KERNEL32(00000000,?,0044F82B), ref: 00449E46
                                                    • Part of subcall function 00449E42: SetLastError.KERNEL32(00000000,00000000,00000001,00000006,000000FF), ref: 00449EE8
                                                  • EnumSystemLocalesW.KERNEL32(00452F77,00000001,00000000,?,?,?,004535AB,?), ref: 00452EC3
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$EnumLocalesSystem
                                                  • String ID:
                                                  • API String ID: 2417226690-0
                                                  • Opcode ID: ed3a15461aa07a0672f4d58e186f542e4a9ded439744096cd7c499f36c17fdd7
                                                  • Instruction ID: 0b970845e1a8773270f0425e193d970e9e25a52c90aa89fa5165c8154eb0a54b
                                                  • Opcode Fuzzy Hash: ed3a15461aa07a0672f4d58e186f542e4a9ded439744096cd7c499f36c17fdd7
                                                  • Instruction Fuzzy Hash: 8B11593B2007014FDB189F39D99267BB7A1FF84319B14442EED8687B41D3B5B806DB44
                                                  APIs
                                                    • Part of subcall function 00449E42: GetLastError.KERNEL32(00000000,?,0044F82B), ref: 00449E46
                                                    • Part of subcall function 00449E42: SetLastError.KERNEL32(00000000,00000000,00000001,00000006,000000FF), ref: 00449EE8
                                                  • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00453193,00000000,00000000,?), ref: 00453425
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$InfoLocale
                                                  • String ID:
                                                  • API String ID: 3736152602-0
                                                  • Opcode ID: 9fb8eb4d6cfb5dc9ab71851ad247751131481363ade4371d576ad0b9e7960359
                                                  • Instruction ID: 7310505bafe8fff12ee8f5912ce4e44c5146d6de948bcf0b33cac505e4352342
                                                  • Opcode Fuzzy Hash: 9fb8eb4d6cfb5dc9ab71851ad247751131481363ade4371d576ad0b9e7960359
                                                  • Instruction Fuzzy Hash: 72014E336002127BDB195E25CC45BBB7764DB41797F14442AEC06A3281DA78FE45D994
                                                  APIs
                                                    • Part of subcall function 00449E42: GetLastError.KERNEL32(00000000,?,0044F82B), ref: 00449E46
                                                    • Part of subcall function 00449E42: SetLastError.KERNEL32(00000000,00000000,00000001,00000006,000000FF), ref: 00449EE8
                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,?,00000000,?), ref: 00452DB3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$InfoLocale
                                                  • String ID: *V$utf8
                                                  • API String ID: 3736152602-210452255
                                                  • Opcode ID: 59e00f747d9bc6cf307ab543fe27e9585fa5185e009a5a777542dc83f29e6ce8
                                                  • Instruction ID: aeef1e48df53c0e1e1989da3d76282249285fc4edbaa792ed956cb55b8cc0ce8
                                                  • Opcode Fuzzy Hash: 59e00f747d9bc6cf307ab543fe27e9585fa5185e009a5a777542dc83f29e6ce8
                                                  • Instruction Fuzzy Hash: E3F0C832610205ABD714AF35DC4AEBB73A8DB59316F10017FF902D7282EA7CAD099768
                                                  APIs
                                                    • Part of subcall function 00449E42: GetLastError.KERNEL32(00000000,?,0044F82B), ref: 00449E46
                                                    • Part of subcall function 00449E42: SetLastError.KERNEL32(00000000,00000000,00000001,00000006,000000FF), ref: 00449EE8
                                                  • EnumSystemLocalesW.KERNEL32(004531CA,00000001,?,?,?,?,00453573,?,?,?,?), ref: 00452F36
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$EnumLocalesSystem
                                                  • String ID:
                                                  • API String ID: 2417226690-0
                                                  • Opcode ID: a7aabdafeecc33135d5ef59119c1dd02303f614df75aa08249f401847eac2aa8
                                                  • Instruction ID: 46f5077cb0f7882f4a3a694ed1b059b17750918d15d6876221f24d4c3ab0ea03
                                                  • Opcode Fuzzy Hash: a7aabdafeecc33135d5ef59119c1dd02303f614df75aa08249f401847eac2aa8
                                                  • Instruction Fuzzy Hash: 38F022372003045FDB249F35AC81A7B7BA1FB82769B15842FFE068B692C2B59C02A654
                                                  APIs
                                                    • Part of subcall function 0044424B: RtlEnterCriticalSection.NTDLL(-00588967), ref: 0044425A
                                                  • EnumSystemLocalesW.KERNEL32(0044B1A4,00000001,0057A298,0000000C,0044B5D9,?,?,?,?), ref: 0044B1E9
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: CriticalEnterEnumLocalesSectionSystem
                                                  • String ID:
                                                  • API String ID: 1272433827-0
                                                  • Opcode ID: c95449866fe5fa4667aabee73304f47e4942a34859e8fff04667a9b00fb14092
                                                  • Instruction ID: e80e171ad64c81d089edaf6c836f83e2cf4dda05f2f2c126e8d7e53f9a4c0b50
                                                  • Opcode Fuzzy Hash: c95449866fe5fa4667aabee73304f47e4942a34859e8fff04667a9b00fb14092
                                                  • Instruction Fuzzy Hash: F3F04F76A00200DFE700DF99E806B9C7BF0FB59B25F10819BF810E7290DBB999049F45
                                                  APIs
                                                    • Part of subcall function 00449E42: GetLastError.KERNEL32(00000000,?,0044F82B), ref: 00449E46
                                                    • Part of subcall function 00449E42: SetLastError.KERNEL32(00000000,00000000,00000001,00000006,000000FF), ref: 00449EE8
                                                  • EnumSystemLocalesW.KERNEL32(00452D5F,00000001,?,?,?,004535CD,?,?,?,?), ref: 00452E3D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$EnumLocalesSystem
                                                  • String ID:
                                                  • API String ID: 2417226690-0
                                                  • Opcode ID: 5ffb0c9d813d6eba6d8fd2e10c847f2c312efa30acac4b18343fb8da06ef6d7e
                                                  • Instruction ID: fee7300587f55c0c421301d99721cdf1a1ff6f595eefe83fa7d5e966eb6188b0
                                                  • Opcode Fuzzy Hash: 5ffb0c9d813d6eba6d8fd2e10c847f2c312efa30acac4b18343fb8da06ef6d7e
                                                  • Instruction Fuzzy Hash: 8FF0553A30020557CB04AF35D80666BBFA0EFC2711B06405BEE09CB392C2B99846DB94
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4b4a0174d0d62f2b1227807bd6e07e9c018e82f5f56551d9681256b3b92353b2
                                                  • Instruction ID: 68aa0d5ee95f80c7a91d8174e86b503e14c67071ff11744bcabbed3cfa87bcc2
                                                  • Opcode Fuzzy Hash: 4b4a0174d0d62f2b1227807bd6e07e9c018e82f5f56551d9681256b3b92353b2
                                                  • Instruction Fuzzy Hash: F96270B0D002599FDB14CF59C5846BEBBB1BF84308F2481AEDA14AB346C779DA46CF94
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 80b9970b4e61b3a89387c81d03852b8640c12f30169ca405eadcc1892538b820
                                                  • Instruction ID: 0e8ddfc969875e3dd00111f91a6503ca4c3a70c52638cfea05a5ef0fdf848abd
                                                  • Opcode Fuzzy Hash: 80b9970b4e61b3a89387c81d03852b8640c12f30169ca405eadcc1892538b820
                                                  • Instruction Fuzzy Hash: 1EE10276F1022A9FDB05CFA8D4816ADFBF1AF88320B5942AAD814B7340D774A945CB94
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a41b321b0bedac8989d8c8297ce8e3211a7e70ffbcb0090baa5e3f65be106bda
                                                  • Instruction ID: 86fdf0966577921a64d033a0687854855d7760d31b02c963075edfb0c817f6d8
                                                  • Opcode Fuzzy Hash: a41b321b0bedac8989d8c8297ce8e3211a7e70ffbcb0090baa5e3f65be106bda
                                                  • Instruction Fuzzy Hash: 45C1DA709006069FEB24CF68C484A6BBBB1EF45304F14461FDB969B791C338ED66CB5A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast
                                                  • String ID:
                                                  • API String ID: 1452528299-0
                                                  • Opcode ID: 337bf9b0213a408d992dbd779b211f999c4c3a8d278f465cc99103b402b18e84
                                                  • Instruction ID: 7c06e8313ae742015ce167e0291709e23a9c2e608a4b019449313ff3a09dc83f
                                                  • Opcode Fuzzy Hash: 337bf9b0213a408d992dbd779b211f999c4c3a8d278f465cc99103b402b18e84
                                                  • Instruction Fuzzy Hash: 21B129315007019BDB38EB65CD82AB7B3A8EF45309F14452FED43C6642EBB9E989C718
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 31304fda07eb44754811e6465f7945cd712cae6a90f07cbe7a52602e90953672
                                                  • Instruction ID: f297913e25a3591813c030fa515b242fba5e7fe6b87ce0d9dc90972f2508a2cf
                                                  • Opcode Fuzzy Hash: 31304fda07eb44754811e6465f7945cd712cae6a90f07cbe7a52602e90953672
                                                  • Instruction Fuzzy Hash: 0281FDB4A002469FDB118F69D8817BEFBF4AB2A315F04016EDC55A7383CB38990DD7A4
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5d9e1b96ebeb8905ce8cf41e2ed65b6f129fd888b54bee42289f6865976a0455
                                                  • Instruction ID: 9260139a4ef8e20400bb9b6c572cac56afe306f3fbbdb3538d7680a8b6287584
                                                  • Opcode Fuzzy Hash: 5d9e1b96ebeb8905ce8cf41e2ed65b6f129fd888b54bee42289f6865976a0455
                                                  • Instruction Fuzzy Hash: 506195356345684FE708CF1EECD04363B52A39E30538542AAEA81C7395C576FA2EE7E0
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 46680d0314554fd398ed7fd020ff60bee8df1d437ae882661bd78aeb1168d151
                                                  • Instruction ID: 0bb0d4fe57c201db2c152aeff89cf209e4ab217caaafa113e802d716cdce1c0b
                                                  • Opcode Fuzzy Hash: 46680d0314554fd398ed7fd020ff60bee8df1d437ae882661bd78aeb1168d151
                                                  • Instruction Fuzzy Hash: 5B517D72D00219AFDF04CF99C940AEFBBB6FF88314F198459E955AB301D7389A50CB95
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                  • Instruction ID: 4ba24db855cab2182e42f47a77fd888252c09f86d43135b4b8e5651c7dd79236
                                                  • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                  • Instruction Fuzzy Hash: B21131F724D08143EA74863DC8B46BBA795EBCD320F2D63BBE0C14BB58D52AD5459908
                                                  APIs
                                                  • RtlDecodePointer.NTDLL(?), ref: 004579FC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: DecodePointer
                                                  • String ID: `-@$acos$asin$exp$log$log10$pow$sqrt
                                                  • API String ID: 3527080286-3628989360
                                                  • Opcode ID: 4c17630f5161de399ffce6b570c60365a2c89c55b52a7f760b39540bf94f5387
                                                  • Instruction ID: bbf143f63b3841ec77cfacb8c6df481a799db6acf17f433172942b25d65e7ef2
                                                  • Opcode Fuzzy Hash: 4c17630f5161de399ffce6b570c60365a2c89c55b52a7f760b39540bf94f5387
                                                  • Instruction Fuzzy Hash: 1651B370808A0ACBCF109F58F84C1BEBFB1FB05309F154166D851A7266C7799A2DCB4D
                                                  APIs
                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0041A09D
                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0041A0BF
                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0041A0E7
                                                  • __Getctype.LIBCPMT ref: 0041A1C5
                                                  • std::_Facet_Register.LIBCPMT ref: 0041A1F9
                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0041A223
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetctypeRegister
                                                  • String ID: PD@$PG@$E@
                                                  • API String ID: 1102183713-4120405683
                                                  • Opcode ID: 495f4126c8959cda1dad90c343e93fba20469dde2e2043d742b69906c970156d
                                                  • Instruction ID: b372b58ab1bb25eec4b44a09b7f8f3aef2cc67a410616163416d5e42c3dffe19
                                                  • Opcode Fuzzy Hash: 495f4126c8959cda1dad90c343e93fba20469dde2e2043d742b69906c970156d
                                                  • Instruction Fuzzy Hash: 6E51BAB0D01245DFCB11CF98C9457AEBBF0FB14714F14825ED855AB391DB78AA88CB92
                                                  APIs
                                                  • _ValidateLocalCookies.LIBCMT ref: 00437307
                                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 0043730F
                                                  • _ValidateLocalCookies.LIBCMT ref: 00437398
                                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 004373C3
                                                  • _ValidateLocalCookies.LIBCMT ref: 00437418
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                  • String ID: `-@$csm
                                                  • API String ID: 1170836740-3738301566
                                                  • Opcode ID: a837c65dc98bc53f7a591b5dada66322cfdf011b0ab20b220170fbbfaeea83fd
                                                  • Instruction ID: bde692452db8eba3752ab90a3e7788ac0719a0bf92b2230e47b89eff8dfd02fd
                                                  • Opcode Fuzzy Hash: a837c65dc98bc53f7a591b5dada66322cfdf011b0ab20b220170fbbfaeea83fd
                                                  • Instruction Fuzzy Hash: B041F8709042099FCF20DF59C885A9FBBA4BF08328F14905BFC54AB392D739E905DB95
                                                  APIs
                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0041C45A
                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0041C47C
                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0041C4A4
                                                  • std::_Facet_Register.LIBCPMT ref: 0041C59A
                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0041C5C4
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                                  • String ID: E@$PD@
                                                  • API String ID: 459529453-4103272508
                                                  • Opcode ID: fb94b052f71f665722219136562a8730e5ed9d67761b2a33bc821d4977d05291
                                                  • Instruction ID: e4bc83ced0ac359faa997fd18d4eeb760fe14de2594101695cc0fd15b6690fbc
                                                  • Opcode Fuzzy Hash: fb94b052f71f665722219136562a8730e5ed9d67761b2a33bc821d4977d05291
                                                  • Instruction Fuzzy Hash: C351EFB0900255EFDB11CF58C991BAEBBF0FB10314F24415EE846AB381D7B9AA45CB95
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: _strrchr
                                                  • String ID:
                                                  • API String ID: 3213747228-0
                                                  • Opcode ID: 785c90e8ff89e0f1a3d98e37725974d6f6ea20f06d45e48120c47f1ca5a82ffe
                                                  • Instruction ID: d7b9d7273cbfac5d15a556f8c8651b9033d93685d5a38535419dded3191b9e75
                                                  • Opcode Fuzzy Hash: 785c90e8ff89e0f1a3d98e37725974d6f6ea20f06d45e48120c47f1ca5a82ffe
                                                  • Instruction Fuzzy Hash: D5B14672D006559FEB158F24CC81BEBBBA5EF59310F2441ABE904AB382D778D901C7E9
                                                  APIs
                                                  • FreeLibrary.KERNEL32(00000000,?,0044B48D,?,?,00000000,00000001,?,?,0044B6B7,00000022,FlsSetValue,00561B88,00561B90,00000001), ref: 0044B43F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: FreeLibrary
                                                  • String ID: api-ms-$ext-ms-
                                                  • API String ID: 3664257935-537541572
                                                  • Opcode ID: 033630484f002e070c94113c7b6ef7f262f68e90d70309fdd043a749aa00ed93
                                                  • Instruction ID: e3d7dbf8d3e43151f67a2d3675c4fcd7809fc0c9af6198dcb17880ded4e1cd5b
                                                  • Opcode Fuzzy Hash: 033630484f002e070c94113c7b6ef7f262f68e90d70309fdd043a749aa00ed93
                                                  • Instruction Fuzzy Hash: A2212B36A01220A7E7319F619C45A6B7768EB51761F140112FC06A7392D734ED05D6D9
                                                  APIs
                                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,E9FAE29F,?,?,00000000,00551365,000000FF,?,0044360F,?,?,004435E3,00000016), ref: 00443668
                                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044367A
                                                  • FreeLibrary.KERNEL32(00000000,?,00000000,00551365,000000FF,?,0044360F,?,?,004435E3,00000016), ref: 0044369C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                  • String ID: CorExitProcess$`-@$mscoree.dll
                                                  • API String ID: 4061214504-3731901874
                                                  • Opcode ID: 66c557226bdf84cfe892202a4e2d9d598a1facfa92736b92f61228ad13b2a6bb
                                                  • Instruction ID: 11f561727bfec435161e86ab51d2faaed74d5e09c0b89d0474703e999051cdf2
                                                  • Opcode Fuzzy Hash: 66c557226bdf84cfe892202a4e2d9d598a1facfa92736b92f61228ad13b2a6bb
                                                  • Instruction Fuzzy Hash: 5601A232A44715AFDB219F44DC19BAFBBB8FB14B52F014526E812E27E0DB749A04CA94
                                                  APIs
                                                  • __EH_prolog3.LIBCMT ref: 00432730
                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0043273B
                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 004327A9
                                                    • Part of subcall function 0043288C: std::locale::_Locimp::_Locimp.LIBCPMT ref: 004328A4
                                                  • std::locale::_Setgloballocale.LIBCPMT ref: 00432756
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                                                  • String ID: `-@
                                                  • API String ID: 677527491-3781167437
                                                  • Opcode ID: 8a5613631ec3d916f95b396eb7cc43f12c5d676d84142dd5ef1a29976cc47206
                                                  • Instruction ID: 335728d06f8999c9367bb6f0cb93ad347570f0e44e9dcbef2930aaa8ccdcd417
                                                  • Opcode Fuzzy Hash: 8a5613631ec3d916f95b396eb7cc43f12c5d676d84142dd5ef1a29976cc47206
                                                  • Instruction Fuzzy Hash: 9D01FC35A006109BC70AFB20CC5157D7BB0FF98790F44250EE81163391CFB8AE06DB89
                                                  APIs
                                                  • GetCurrentThreadId.KERNEL32 ref: 00432BDC
                                                  • RtlAcquireSRWLockExclusive.NTDLL(00000008), ref: 00432BFB
                                                  • RtlAcquireSRWLockExclusive.NTDLL(00000008), ref: 00432C29
                                                  • RtlTryAcquireSRWLockExclusive.NTDLL(00000008), ref: 00432C84
                                                  • RtlTryAcquireSRWLockExclusive.NTDLL(00000008), ref: 00432C9B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: AcquireExclusiveLock$CurrentThread
                                                  • String ID:
                                                  • API String ID: 66001078-0
                                                  • Opcode ID: 8f089e7040faa662b45679f060ee1b8a0f0adfff173fd46cb89089840a213128
                                                  • Instruction ID: ee0d2db44a198d3d02c1eb3b1b0ff5a364ec90963e300245c4d31640e9e12550
                                                  • Opcode Fuzzy Hash: 8f089e7040faa662b45679f060ee1b8a0f0adfff173fd46cb89089840a213128
                                                  • Instruction Fuzzy Hash: B2415931900A0ADFCB20DF65CA8096EB3B4FF0C311F20692BD446D7650D7B8E986DB69
                                                  APIs
                                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 0040750C
                                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00407522
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: ___std_exception_destroy
                                                  • String ID: )@$[json.exception.
                                                  • API String ID: 4194217158-3378332251
                                                  • Opcode ID: 74f1ced649a80f54c74698f2e3f1ef80366f2fbaef409b1663f26043a5eac72a
                                                  • Instruction ID: d1fd1ad00dbeab1566b73d8112c34bc80c76f551163e59ed82d928a5322bc1a2
                                                  • Opcode Fuzzy Hash: 74f1ced649a80f54c74698f2e3f1ef80366f2fbaef409b1663f26043a5eac72a
                                                  • Instruction Fuzzy Hash: 8C51CFB1C046489BD710DFA8C905B9EBBB4FF15318F14426EE850A73C2E7B86A44C7A5
                                                  APIs
                                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 0040499F
                                                    • Part of subcall function 004351FB: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,74D723A0,?,00431D09,?,005799D8,74D723A0,?,74D723A0,-00589880), ref: 0043525B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: ExceptionIos_base_dtorRaisestd::ios_base::_
                                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                  • API String ID: 1903096808-1866435925
                                                  • Opcode ID: 5e8fcf04681b5496c91e096f1d273a5343178b8940b0c322b64de4dd1df32f3c
                                                  • Instruction ID: 99c94d1e80f512c720ba00148ae48faeb0acee82eabb402b7e5943aa58dcc262
                                                  • Opcode Fuzzy Hash: 5e8fcf04681b5496c91e096f1d273a5343178b8940b0c322b64de4dd1df32f3c
                                                  • Instruction Fuzzy Hash: AC119CF2844644ABCB10DF688C03BAB37C8E744715F04463EFE58972C1EB399800C79A
                                                  APIs
                                                  • GetConsoleOutputCP.KERNEL32(E9FAE29F,00000000,00000000,?), ref: 00448F02
                                                    • Part of subcall function 0044EC55: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0044A862,?,00000000,-00000008), ref: 0044ECB6
                                                  • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00449154
                                                  • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 0044919A
                                                  • GetLastError.KERNEL32 ref: 0044923D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                  • String ID:
                                                  • API String ID: 2112829910-0
                                                  • Opcode ID: d46c0870a8277536d77cd1fa32924c999241811f2f15ebdbc3735bbe4b8907ba
                                                  • Instruction ID: b6f9ea87837ca93654473fd2bae4ec290e60b55bc3ade45d2d9d29a5185f0d60
                                                  • Opcode Fuzzy Hash: d46c0870a8277536d77cd1fa32924c999241811f2f15ebdbc3735bbe4b8907ba
                                                  • Instruction Fuzzy Hash: 70D1BC75D00249AFDF14CFA8C880AAEBBB5FF09304F28456AE856EB351D734AD45CB54
                                                  APIs
                                                  • WriteConsoleW.KERNEL32(?,?,?,00000000,?,?,00453DCE,?,00000001,?,?,?,00449291,?,00000000,00000000), ref: 00456D49
                                                  • GetLastError.KERNEL32(?,00453DCE,?,00000001,?,?,?,00449291,?,00000000,00000000,?,?,?,0044986B,?), ref: 00456D55
                                                    • Part of subcall function 00456D1B: CloseHandle.KERNEL32(FFFFFFFE,00456D65,?,00453DCE,?,00000001,?,?,?,00449291,?,00000000,00000000,?,?), ref: 00456D2B
                                                  • ___initconout.LIBCMT ref: 00456D65
                                                    • Part of subcall function 00456CDD: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00456D0C,00453DBB,?,?,00449291,?,00000000,00000000,?), ref: 00456CF0
                                                  • WriteConsoleW.KERNEL32(?,?,?,00000000,?,00453DCE,?,00000001,?,?,?,00449291,?,00000000,00000000,?), ref: 00456D7A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                  • String ID:
                                                  • API String ID: 2744216297-0
                                                  • Opcode ID: 6d252f6c85546040703605b5d122fbb434f3c9b6b34be8e7cd3f73b3df330617
                                                  • Instruction ID: b582005f90f2c4d159ccd48a3422ceca8e6e351b7b3b67145bbef734a6de3f3c
                                                  • Opcode Fuzzy Hash: 6d252f6c85546040703605b5d122fbb434f3c9b6b34be8e7cd3f73b3df330617
                                                  • Instruction Fuzzy Hash: F4F01C37500518BBCF221FD1DC18A8A3F76EB583A2B814415FE0D96231D6328928EB94
                                                  APIs
                                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00403819
                                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 004038F0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: ___std_exception_copy___std_exception_destroy
                                                  • String ID: )@
                                                  • API String ID: 2970364248-4120265097
                                                  • Opcode ID: d74468ffd67e1f67a533358448dba50ed35dce3ee86280088cdc18d36a5f914b
                                                  • Instruction ID: 269ef50febfdc4b1c22cf7239a576f40f0b19685bcb009e1facc48eb6157c32a
                                                  • Opcode Fuzzy Hash: d74468ffd67e1f67a533358448dba50ed35dce3ee86280088cdc18d36a5f914b
                                                  • Instruction Fuzzy Hash: DD6169B1C00248DBDB10DF98C945B9EFFB5FF19324F14825EE814AB282D7B95A44CBA5
                                                  APIs
                                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 0040499F
                                                    • Part of subcall function 004351FB: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,74D723A0,?,00431D09,?,005799D8,74D723A0,?,74D723A0,-00589880), ref: 0043525B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: ExceptionIos_base_dtorRaisestd::ios_base::_
                                                  • String ID: ios_base::badbit set$ios_base::failbit set
                                                  • API String ID: 1903096808-1240500531
                                                  • Opcode ID: 8193a8ffeaccef37eb783ff7fe0bdc902a64c2974526b8af49cedd0c2b6b92ef
                                                  • Instruction ID: 59789774a96eacd1a5b8f49c51d8e497543063f0a2ed12b155596828dbf76f3a
                                                  • Opcode Fuzzy Hash: 8193a8ffeaccef37eb783ff7fe0bdc902a64c2974526b8af49cedd0c2b6b92ef
                                                  • Instruction Fuzzy Hash: E84124B2C00244ABCB04DF68C845BAEBBB8FB49710F14826EF554A73C1D7795A00CBA5
                                                  APIs
                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00404061
                                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 004040C4
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                                  • String ID: bad locale name
                                                  • API String ID: 3988782225-1405518554
                                                  • Opcode ID: 0039d2d2ea2786ef81fe116e8b864d57793cf36a19fa060d6cb0c255b1586cee
                                                  • Instruction ID: 65c2995a4cce64452fc0e082f9126f7f9302ed92d60cad1113ce5137d9e79936
                                                  • Opcode Fuzzy Hash: 0039d2d2ea2786ef81fe116e8b864d57793cf36a19fa060d6cb0c255b1586cee
                                                  • Instruction Fuzzy Hash: DB112670805B84EED321CF69C50474BBFF0AF25714F10868DD09597781D3B9A604CB95
                                                  APIs
                                                  • ___std_exception_copy.LIBVCRUNTIME ref: 004165C9
                                                  • ___std_exception_copy.LIBVCRUNTIME ref: 004165FC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: ___std_exception_copy
                                                  • String ID: )@
                                                  • API String ID: 2659868963-4120265097
                                                  • Opcode ID: ec459901e9a8c12f2536e06f4ce64afd8286d8aca2aa337d2d7da09c98386d96
                                                  • Instruction ID: 79ebb971947c26e29da123751e765caa72f3f100f47198c89106861aa63fe252
                                                  • Opcode Fuzzy Hash: ec459901e9a8c12f2536e06f4ce64afd8286d8aca2aa337d2d7da09c98386d96
                                                  • Instruction Fuzzy Hash: F0112EB6910649EBCB11CF99C980B86FBF8FF09724F10876AE82497641E774A5448BA0
                                                  APIs
                                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00407A5C
                                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00407A72
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: ___std_exception_destroy
                                                  • String ID: )@
                                                  • API String ID: 4194217158-4120265097
                                                  • Opcode ID: 9ee8fa866bcea9d2c14fc14309fcadf8facde4318e0e6bb098ed358a1a235593
                                                  • Instruction ID: 96290d15a7b89a27e7413382239de33ac52fdad5c525fa7f0e86a9c1871ea130
                                                  • Opcode Fuzzy Hash: 9ee8fa866bcea9d2c14fc14309fcadf8facde4318e0e6bb098ed358a1a235593
                                                  • Instruction Fuzzy Hash: 68F012B1805744DFC711DF98C90178DFFF8FB05728F50466AE855A3780E7B5660487A5
                                                  APIs
                                                  • InitializeCriticalSectionAndSpinCount.KERNEL32(00000016,00000001,004389D2,00000001,00000016,00438BE1,?,?,?,?,?,00000000), ref: 0044B834
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3053233972.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3053185131.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053441050.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053500918.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053550862.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053601538.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000074F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000751000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000753000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000760000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000766000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.0000000000782000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.000000000078A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007AE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007B3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3053643608.00000000007BB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3055032532.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_YnsEArPlqx.jbxd
                                                  Similarity
                                                  • API ID: CountCriticalInitializeSectionSpin
                                                  • String ID: InitializeCriticalSectionEx$`-@
                                                  • API String ID: 2593887523-3269949891
                                                  • Opcode ID: 1f2253b5c78e33ee57fe7f30907939316c5faef6f9275bf3e632fad4f43c2f0e
                                                  • Instruction ID: 5bcc12c1b0658f8dc7434a33690804c70bb56e7eadbb0958c8ec10a8e9d05d13
                                                  • Opcode Fuzzy Hash: 1f2253b5c78e33ee57fe7f30907939316c5faef6f9275bf3e632fad4f43c2f0e
                                                  • Instruction Fuzzy Hash: BDE09236581318BBCB212F92DC06DAE7F25EB24BA2F048022FD1956161C7768821BBD9

                                                  Execution Graph

                                                  Execution Coverage:5.9%
                                                  Dynamic/Decrypted Code Coverage:100%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:1941
                                                  Total number of Limit Nodes:35
                                                  execution_graph 14097 4c7b00 14098 4c7ecc 14097->14098 14116 4c7b3e std::ios_base::_Ios_base_dtor __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 14097->14116 14099 4c7b87 setsockopt recv WSAGetLastError 14099->14098 14099->14116 14101 4c7eb7 Sleep 14101->14098 14101->14116 14102 4c7e15 recv 14104 4c7eaf Sleep 14102->14104 14104->14101 14106 4c7c2d recv 14107 4c7c4e recv 14106->14107 14106->14116 14107->14116 14109 4c7ee1 14111 438c70 std::_Throw_Cpp_error 40 API calls 14109->14111 14114 4c7ee6 14111->14114 14112 4c7cd6 setsockopt recv 14112->14116 14113 418dc0 42 API calls 14113->14112 14116->14099 14116->14101 14116->14102 14116->14104 14116->14109 14116->14112 14116->14113 14117 4c8590 WSAStartup 14116->14117 14130 418dc0 14116->14130 14139 4163b0 14116->14139 14144 4c7ef0 14116->14144 14216 433069 14116->14216 14219 409280 14116->14219 14118 4c8696 14117->14118 14119 4c85c8 14117->14119 14118->14116 14119->14118 14120 4c85fe getaddrinfo 14119->14120 14121 4c8646 14120->14121 14122 4c8690 WSACleanup 14120->14122 14123 4c86a4 FreeAddrInfoW 14121->14123 14125 4c8654 socket 14121->14125 14122->14118 14123->14122 14124 4c86b0 14123->14124 14124->14116 14125->14122 14126 4c866a connect 14125->14126 14127 4c867c closesocket 14126->14127 14128 4c86a0 14126->14128 14127->14125 14129 4c8686 FreeAddrInfoW 14127->14129 14128->14123 14129->14122 14132 418e11 14130->14132 14133 418de2 std::locale::_Setgloballocale 14130->14133 14131 418ef8 14132->14131 14235 4032d0 14132->14235 14133->14106 14135 418e66 std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 14136 418ecb std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 14135->14136 14249 402fe0 14135->14249 14136->14106 14138 418eb8 14138->14106 14141 4163d8 14139->14141 14140 4163e7 14140->14116 14141->14140 14142 4032d0 std::_Throw_Cpp_error 42 API calls 14141->14142 14143 41642a std::locale::_Locimp::_Locimp 14142->14143 14143->14116 14145 4c7f6c 14144->14145 14146 4c7f3e 14144->14146 14147 4c7f8e 14145->14147 14148 4c7f74 14145->14148 14149 402cf0 std::_Throw_Cpp_error 42 API calls 14146->14149 14151 4c7f96 14147->14151 14152 4c7fb0 14147->14152 14311 416290 14148->14311 14153 4c7f50 14149->14153 14154 416290 42 API calls 14151->14154 14155 4c7fb8 14152->14155 14156 4c7fd5 14152->14156 14157 409280 45 API calls 14153->14157 14175 4c7f64 14154->14175 14160 416290 42 API calls 14155->14160 14155->14175 14158 4c7fdd 14156->14158 14159 4c7ffb 14156->14159 14157->14175 14315 4412b7 14158->14315 14164 4c801b 14159->14164 14165 4c82c0 14159->14165 14159->14175 14160->14175 14162 402df0 std::_Throw_Cpp_error 42 API calls 14163 4c84f1 14162->14163 14163->14116 14254 405400 14164->14254 14167 4c82c8 14165->14167 14168 4c831b 14165->14168 14302 41b430 14167->14302 14170 4c8376 14168->14170 14171 4c8323 14168->14171 14173 4c837e 14170->14173 14174 4c83d1 14170->14174 14172 41b430 55 API calls 14171->14172 14172->14175 14176 41b430 55 API calls 14173->14176 14178 4c842c 14174->14178 14179 4c83d9 14174->14179 14175->14162 14176->14175 14177 4c82a5 14360 432baa 14177->14360 14180 4c8484 14178->14180 14181 4c8434 14178->14181 14184 41b430 55 API calls 14179->14184 14180->14175 14363 458b00 14180->14363 14185 41b430 55 API calls 14181->14185 14184->14175 14185->14175 14187 4c849a 14368 4162c0 14187->14368 14191 402df0 std::_Throw_Cpp_error 42 API calls 14191->14175 14192 402df0 42 API calls std::_Throw_Cpp_error 14194 4c8040 14192->14194 14193 4c810b 14271 402d30 14193->14271 14194->14177 14194->14192 14194->14193 14264 402cf0 14194->14264 14268 41ace0 14194->14268 14198 4c8140 14288 402df0 14198->14288 14200 4c814f 14201 4c81b2 GetCurrentProcess 14200->14201 14205 4c81e5 14200->14205 14202 4163b0 std::_Throw_Cpp_error 42 API calls 14201->14202 14203 4c81ce 14202->14203 14321 4cf280 VirtualAllocEx WriteProcessMemory 14203->14321 14299 439820 14205->14299 14206 4c81dd 14208 4c8279 14206->14208 14354 415230 14208->14354 14213 402df0 std::_Throw_Cpp_error 42 API calls 14213->14177 16080 43361d 14216->16080 14220 4163b0 std::_Throw_Cpp_error 42 API calls 14219->14220 14222 4092d4 14220->14222 14221 402df0 std::_Throw_Cpp_error 42 API calls 14223 409482 14221->14223 14222->14221 14224 418dc0 42 API calls 14223->14224 14226 409523 std::locale::_Locimp::_Locimp 14223->14226 14224->14226 14225 4095f0 GetModuleHandleA GetProcAddress WSASend 14225->14226 14227 4096e2 std::ios_base::_Ios_base_dtor 14225->14227 14226->14225 14226->14227 14228 40975d std::ios_base::_Ios_base_dtor 14227->14228 14229 438c70 std::_Throw_Cpp_error 40 API calls 14227->14229 14228->14116 14230 40979c 14229->14230 14231 402df0 std::_Throw_Cpp_error 42 API calls 14230->14231 14232 4097d7 14231->14232 14233 402df0 std::_Throw_Cpp_error 42 API calls 14232->14233 14234 4097f0 14233->14234 14234->14116 14236 4032e2 14235->14236 14237 403306 14235->14237 14239 4032e9 14236->14239 14240 40331f 14236->14240 14238 403318 14237->14238 14241 433672 std::_Facet_Register 42 API calls 14237->14241 14238->14135 14243 433672 std::_Facet_Register 42 API calls 14239->14243 14242 402b50 Concurrency::cancel_current_task 42 API calls 14240->14242 14244 403310 14241->14244 14245 4032ef 14242->14245 14243->14245 14244->14135 14246 438c70 std::_Throw_Cpp_error 40 API calls 14245->14246 14247 4032f8 14245->14247 14248 403329 14246->14248 14247->14135 14250 403007 14249->14250 14251 403017 std::ios_base::_Ios_base_dtor 14249->14251 14250->14251 14252 438c70 std::_Throw_Cpp_error 40 API calls 14250->14252 14251->14138 14253 403036 14252->14253 14372 432b99 14254->14372 14257 405410 14259 405419 14257->14259 14260 432534 std::_Throw_Cpp_error 78 API calls 14257->14260 14259->14194 14261 405430 14260->14261 14383 43953c 14261->14383 14265 402d13 14264->14265 14265->14265 14266 403040 std::_Throw_Cpp_error 42 API calls 14265->14266 14267 402d25 14266->14267 14267->14194 14269 41ad10 14268->14269 14269->14269 14849 41fbf0 14269->14849 14272 403040 std::_Throw_Cpp_error 42 API calls 14271->14272 14273 402d55 14272->14273 14274 4d62c0 14273->14274 14275 4d6358 14274->14275 14287 4d6361 std::locale::_Setgloballocale 14274->14287 14858 41e4b0 14275->14858 14278 4d654f 14281 4d6553 14278->14281 14962 416130 14278->14962 14282 4d6580 std::ios_base::_Ios_base_dtor 14281->14282 14283 438c70 std::_Throw_Cpp_error 40 API calls 14281->14283 14282->14198 14284 4d65ce 14283->14284 14285 433069 __Xtime_get_ticks 2 API calls 14284->14285 14286 4d65d6 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 14285->14286 14286->14198 14287->14278 14287->14281 14881 4f4760 14287->14881 14892 424160 14287->14892 14289 402e13 14288->14289 14290 402e2e std::ios_base::_Ios_base_dtor 14288->14290 14289->14290 14291 438c70 std::_Throw_Cpp_error 40 API calls 14289->14291 14290->14200 14292 402e5f 14291->14292 14293 402e88 14292->14293 14294 4032d0 std::_Throw_Cpp_error 42 API calls 14292->14294 14293->14200 14296 402eee std::locale::_Locimp::_Locimp 14294->14296 14295 402f3c std::locale::_Locimp::_Locimp 14295->14200 14296->14295 14297 402fe0 std::_Throw_Cpp_error 40 API calls 14296->14297 14298 402f2b 14297->14298 14298->14200 15026 43975e 14299->15026 15077 417ef0 14302->15077 14304 41b48d 15096 422100 14304->15096 14308 41b503 15166 41d490 14308->15166 14310 41b512 14310->14175 14312 4162b1 14311->14312 14313 41629d 14311->14313 14312->14175 14314 416130 42 API calls 14313->14314 14314->14312 14316 4412ca ___std_exception_copy 14315->14316 15619 43d6a5 14316->15619 14318 4412e4 14319 43899c ___std_exception_copy 40 API calls 14318->14319 14320 4412f1 14319->14320 14320->14175 14322 4cf31d 14321->14322 14323 4cf35a VirtualAllocEx 14321->14323 14324 4cf323 WriteProcessMemory 14322->14324 14325 4cf3cf std::locale::_Setgloballocale 14323->14325 14324->14324 14326 4cf357 14324->14326 15775 41ab20 14325->15775 14326->14323 14329 418f00 std::_Throw_Cpp_error 42 API calls 14330 4cf47f 14329->14330 14331 402df0 std::_Throw_Cpp_error 42 API calls 14330->14331 14332 4cf4c9 14331->14332 15780 403440 14332->15780 14335 4cf56d 14336 4cf58b std::ios_base::_Ios_base_dtor 14335->14336 14338 4cf5c9 14335->14338 14337 402df0 std::_Throw_Cpp_error 42 API calls 14336->14337 14339 4cf5b6 14337->14339 14340 438c70 std::_Throw_Cpp_error 40 API calls 14338->14340 14339->14206 14341 4cf5ce 14340->14341 14341->14206 14342 441628 14343 44163b ___std_exception_copy 14342->14343 15784 44140a 14343->15784 14345 441650 14346 43899c ___std_exception_copy 40 API calls 14345->14346 14347 44165d 14346->14347 14348 43d0a8 14347->14348 14349 43d0bb ___std_exception_copy 14348->14349 15957 43cf83 14349->15957 14351 43d0c7 14352 43899c ___std_exception_copy 40 API calls 14351->14352 14353 43d0d3 14352->14353 14353->14208 14355 415286 14354->14355 14356 41524c 14354->14356 14357 402df0 std::_Throw_Cpp_error 42 API calls 14355->14357 14356->14355 14359 402df0 std::_Throw_Cpp_error 42 API calls 14356->14359 14358 415294 14357->14358 14358->14213 14359->14356 14361 432bb6 RtlReleaseSRWLockExclusive 14360->14361 14362 432bc4 14360->14362 14361->14362 14362->14175 16049 458bb0 14363->16049 14365 458b31 std::locale::_Locimp::_Locimp 14366 403040 std::_Throw_Cpp_error 42 API calls 14365->14366 14367 458b7c 14366->14367 14367->14187 14369 4162ce 14368->14369 14371 4162d3 14368->14371 14370 402df0 std::_Throw_Cpp_error 42 API calls 14369->14370 14370->14371 14371->14191 14389 432bc8 GetCurrentThreadId 14372->14389 14375 432534 14376 43254a std::_Throw_Cpp_error 14375->14376 14407 4324e7 14376->14407 14384 43954f ___std_exception_copy 14383->14384 14823 4393db 14384->14823 14386 43955e 14387 43899c ___std_exception_copy 40 API calls 14386->14387 14388 405450 14387->14388 14388->14194 14390 432bf2 14389->14390 14391 432c11 14389->14391 14392 432bf7 RtlAcquireSRWLockExclusive 14390->14392 14400 432c07 14390->14400 14393 432c31 14391->14393 14394 432c1a 14391->14394 14392->14400 14396 432c90 14393->14396 14402 432c49 14393->14402 14395 432c25 RtlAcquireSRWLockExclusive 14394->14395 14394->14400 14395->14400 14397 432c97 RtlTryAcquireSRWLockExclusive 14396->14397 14396->14400 14397->14400 14398 433d77 _ValidateLocalCookies 5 API calls 14399 405409 14398->14399 14399->14257 14399->14375 14400->14398 14402->14400 14403 432c80 RtlTryAcquireSRWLockExclusive 14402->14403 14404 43302b 14402->14404 14403->14400 14403->14402 14405 433069 __Xtime_get_ticks 2 API calls 14404->14405 14406 433036 __aulldiv __aullrem 14405->14406 14406->14402 14408 4324f3 __EH_prolog3_GS 14407->14408 14409 402cf0 std::_Throw_Cpp_error 42 API calls 14408->14409 14410 432507 14409->14410 14430 4036e0 14410->14430 14412 43251c 14413 402df0 std::_Throw_Cpp_error 42 API calls 14412->14413 14414 432524 14413->14414 14446 433f6d 14414->14446 14431 4163b0 std::_Throw_Cpp_error 42 API calls 14430->14431 14432 403731 14431->14432 14433 40375a 14432->14433 14449 418f00 14432->14449 14435 418f00 std::_Throw_Cpp_error 42 API calls 14433->14435 14436 40378a 14435->14436 14437 402df0 std::_Throw_Cpp_error 42 API calls 14436->14437 14438 4037a4 14437->14438 14439 434b15 ___std_exception_copy 41 API calls 14438->14439 14441 40381e 14439->14441 14440 40385f std::ios_base::_Ios_base_dtor 14440->14412 14441->14440 14442 438c70 std::_Throw_Cpp_error 40 API calls 14441->14442 14443 4038b0 14442->14443 14458 434b78 14443->14458 14445 4038f5 std::ios_base::_Ios_base_dtor 14445->14412 14447 433d77 _ValidateLocalCookies 5 API calls 14446->14447 14448 433f77 14447->14448 14448->14448 14450 418f4f 14449->14450 14451 418f22 std::locale::_Locimp::_Locimp 14449->14451 14452 4032d0 std::_Throw_Cpp_error 42 API calls 14450->14452 14453 41902f std::ios_base::_Ios_base_dtor 14450->14453 14451->14433 14454 418fa4 std::locale::_Locimp::_Locimp 14452->14454 14453->14433 14455 419002 std::locale::_Locimp::_Locimp 14454->14455 14456 402fe0 std::_Throw_Cpp_error 40 API calls 14454->14456 14455->14433 14457 418fef 14456->14457 14457->14433 14459 434b85 14458->14459 14460 434b8c 14458->14460 14461 441c96 ___std_exception_destroy 14 API calls 14459->14461 14460->14445 14461->14460 14824 4393e7 std::locale::_Setgloballocale 14823->14824 14825 4393f0 14824->14825 14826 439414 14824->14826 14828 438be3 ___std_exception_copy 40 API calls 14825->14828 14837 441250 RtlEnterCriticalSection 14826->14837 14836 439409 14828->14836 14829 43941d 14830 439432 14829->14830 14838 44a1e9 14829->14838 14832 4394cf 14830->14832 14833 43949e 14830->14833 14845 439507 14832->14845 14834 438be3 ___std_exception_copy 40 API calls 14833->14834 14834->14836 14836->14386 14837->14829 14839 44a1f5 14838->14839 14840 44a20a 14838->14840 14841 4416ff __floor_pentium4 14 API calls 14839->14841 14840->14830 14842 44a1fa 14841->14842 14843 438c60 ___std_exception_copy 40 API calls 14842->14843 14844 44a205 14843->14844 14844->14830 14848 441264 RtlLeaveCriticalSection 14845->14848 14847 43950d 14847->14836 14848->14847 14850 41fc12 std::locale::_Locimp::_Locimp 14849->14850 14852 41fc8d 14849->14852 14851 41fd5e 14852->14851 14853 4032d0 std::_Throw_Cpp_error 42 API calls 14852->14853 14854 41fce1 std::locale::_Locimp::_Locimp 14853->14854 14855 41fd3a std::locale::_Locimp::_Locimp 14854->14855 14856 402fe0 std::_Throw_Cpp_error 40 API calls 14854->14856 14857 41fd27 14856->14857 14859 41e4c2 14858->14859 14860 41e528 14858->14860 14862 41e4f9 14859->14862 14863 41e4ca 14859->14863 14861 403330 42 API calls 14860->14861 14864 41e52d 14861->14864 14866 41e516 14862->14866 14869 433672 std::_Facet_Register 42 API calls 14862->14869 14863->14864 14865 41e4d1 14863->14865 14867 402b50 Concurrency::cancel_current_task 42 API calls 14864->14867 14868 433672 std::_Facet_Register 42 API calls 14865->14868 14866->14287 14870 41e4d7 14867->14870 14868->14870 14871 41e503 14869->14871 14872 438c70 std::_Throw_Cpp_error 40 API calls 14870->14872 14873 41e4e0 14870->14873 14871->14287 14874 41e537 14872->14874 14873->14287 14973 416ad0 14874->14973 14876 41e574 14877 404900 std::_Throw_Cpp_error 42 API calls 14876->14877 14879 41e5fb 14877->14879 14878 41e613 14878->14287 14879->14878 14977 419b60 14879->14977 14882 4f4767 14881->14882 14883 4f476c 14881->14883 14882->14287 14884 4423ec ___std_exception_copy 15 API calls 14883->14884 14890 4f47af 14883->14890 14884->14890 14885 4f47c2 14885->14287 14886 4f4877 14886->14287 14887 441c96 ___std_exception_destroy 14 API calls 14888 4f4867 14887->14888 14888->14287 14889 4f4821 14889->14886 14889->14887 14890->14885 14890->14889 14891 441c96 ___std_exception_destroy 14 API calls 14890->14891 14891->14889 14893 424195 14892->14893 14894 424288 14892->14894 14896 4241b1 14893->14896 14897 424202 14893->14897 14898 4241f2 14893->14898 14895 403330 42 API calls 14894->14895 14899 42428d 14895->14899 14901 433672 std::_Facet_Register 42 API calls 14896->14901 14903 433672 std::_Facet_Register 42 API calls 14897->14903 14909 4241cf std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 14897->14909 14898->14896 14898->14899 14900 402b50 Concurrency::cancel_current_task 42 API calls 14899->14900 14902 424292 14900->14902 14904 4241c4 14901->14904 14905 438c70 std::_Throw_Cpp_error 40 API calls 14902->14905 14903->14909 14904->14902 14904->14909 14906 424297 14905->14906 14907 4242fa 14906->14907 14908 4243e9 14906->14908 14992 426ff0 14907->14992 14910 403330 42 API calls 14908->14910 14915 4277d0 40 API calls 14909->14915 14911 4243ee 14910->14911 14913 42445a 14911->14913 14914 424549 14911->14914 14918 426ff0 42 API calls 14913->14918 14917 403330 42 API calls 14914->14917 14916 42425e 14915->14916 14916->14287 14925 42454e 14917->14925 14920 424496 14918->14920 14919 42470b 14922 403330 42 API calls 14919->14922 14924 4163b0 std::_Throw_Cpp_error 42 API calls 14920->14924 14921 424706 14926 402b50 Concurrency::cancel_current_task 42 API calls 14921->14926 14927 4246af 14922->14927 14923 424336 15000 427830 14923->15000 14939 4244c4 14924->14939 14925->14919 14925->14921 14928 424615 14925->14928 14929 4245ee 14925->14929 14926->14919 14930 438c70 std::_Throw_Cpp_error 40 API calls 14927->14930 14953 4246d1 std::ios_base::_Ios_base_dtor 14927->14953 14936 433672 std::_Facet_Register 42 API calls 14928->14936 14941 4245ff 14928->14941 14929->14921 14931 4245f9 14929->14931 14932 424715 14930->14932 14933 433672 std::_Facet_Register 42 API calls 14931->14933 15017 41d010 14932->15017 14933->14941 14936->14941 14937 4243b0 14937->14287 14942 427830 42 API calls 14939->14942 14941->14927 14941->14953 15007 431f9c 14941->15007 14944 424510 14942->14944 14943 42472f 14945 4351fb std::_Throw_Cpp_error RaiseException 14943->14945 14944->14287 14946 424738 14945->14946 14947 424798 14946->14947 14948 42475b 14946->14948 14949 42477f 14946->14949 14950 402b50 Concurrency::cancel_current_task 42 API calls 14947->14950 14948->14947 14951 424762 14948->14951 14952 424791 14949->14952 14956 433672 std::_Facet_Register 42 API calls 14949->14956 14954 424768 14950->14954 14955 433672 std::_Facet_Register 42 API calls 14951->14955 14952->14287 14953->14287 14958 438c70 std::_Throw_Cpp_error 40 API calls 14954->14958 14961 424771 14954->14961 14955->14954 14959 424789 14956->14959 14960 4247a2 14958->14960 14959->14287 14961->14287 14963 416143 std::locale::_Locimp::_Locimp 14962->14963 14964 416174 14962->14964 14963->14281 14965 416200 14964->14965 14966 416180 14964->14966 14968 418f00 std::_Throw_Cpp_error 42 API calls 14965->14968 14967 4032d0 std::_Throw_Cpp_error 42 API calls 14966->14967 14971 4161bf std::locale::_Locimp::_Locimp 14967->14971 14969 416232 14968->14969 14969->14281 14970 4161ed 14970->14281 14971->14970 14972 402fe0 std::_Throw_Cpp_error 40 API calls 14971->14972 14972->14970 14974 416b02 14973->14974 14975 416b1d 14974->14975 14981 4150e0 14974->14981 14975->14876 14978 419bbb 14977->14978 14979 419b96 14977->14979 14978->14878 14979->14978 14989 4188a0 14979->14989 14982 4151b5 14981->14982 14983 415117 14981->14983 14982->14975 14984 416ad0 42 API calls 14983->14984 14985 415120 14984->14985 14986 41519d 14985->14986 14987 404900 std::_Throw_Cpp_error 42 API calls 14985->14987 14986->14982 14988 419b60 42 API calls 14986->14988 14987->14986 14988->14982 14990 404900 std::_Throw_Cpp_error 42 API calls 14989->14990 14991 4188bf 14990->14991 14991->14978 14993 426ff9 14992->14993 14994 42703c 14992->14994 14993->14994 14995 427013 14993->14995 14997 433672 std::_Facet_Register 42 API calls 14993->14997 14994->14994 14996 42701c 14995->14996 14998 433672 std::_Facet_Register 42 API calls 14995->14998 14996->14923 14997->14995 14999 427035 14998->14999 14999->14923 15003 427882 std::ios_base::_Ios_base_dtor 15000->15003 15004 42783d 15000->15004 15001 427853 15001->15003 15005 438c70 std::_Throw_Cpp_error 40 API calls 15001->15005 15002 402df0 std::_Throw_Cpp_error 42 API calls 15002->15004 15003->14937 15004->15001 15004->15002 15006 4278b6 15005->15006 15008 431fb2 15007->15008 15009 431fa5 FindClose 15007->15009 15008->14941 15009->15008 15010 431fb6 15009->15010 15011 4441c6 __Getctype 40 API calls 15010->15011 15012 431fbb 15011->15012 15013 431f9c 40 API calls 15012->15013 15014 431fca FindFirstFileExW 15013->15014 15015 431fe9 GetLastError 15014->15015 15016 431fe5 15014->15016 15015->15016 15016->14941 15018 41d01a 15017->15018 15019 41d02e 15017->15019 15018->15019 15020 431f9c 43 API calls 15018->15020 15021 419910 15019->15021 15020->15018 15022 419928 15021->15022 15023 419938 std::ios_base::_Ios_base_dtor 15021->15023 15022->15023 15024 438c70 std::_Throw_Cpp_error 40 API calls 15022->15024 15023->14943 15025 41994d 15024->15025 15029 43976a std::locale::_Setgloballocale 15026->15029 15027 439771 15028 4416ff __floor_pentium4 14 API calls 15027->15028 15030 439776 15028->15030 15029->15027 15031 439791 15029->15031 15032 438c60 ___std_exception_copy 40 API calls 15030->15032 15033 4397a3 15031->15033 15034 439796 15031->15034 15036 439781 15032->15036 15043 44a8ef 15033->15043 15037 4416ff __floor_pentium4 14 API calls 15034->15037 15036->14208 15036->14342 15037->15036 15039 4397b3 15041 4416ff __floor_pentium4 14 API calls 15039->15041 15040 4397c0 15051 4397fe 15040->15051 15041->15036 15044 44a8fb std::locale::_Setgloballocale 15043->15044 15055 44424b RtlEnterCriticalSection 15044->15055 15046 44a909 15056 44a993 15046->15056 15052 439802 15051->15052 15076 441264 RtlLeaveCriticalSection 15052->15076 15054 439813 15054->15036 15055->15046 15063 44a9b6 15056->15063 15057 44aa0e 15058 44a65a __Getctype 14 API calls 15057->15058 15059 44aa17 15058->15059 15061 44b01a ___std_exception_destroy 14 API calls 15059->15061 15062 44aa20 15061->15062 15064 44b7f4 std::locale::_Setgloballocale 6 API calls 15062->15064 15068 44a916 15062->15068 15063->15057 15063->15063 15063->15068 15072 441250 RtlEnterCriticalSection 15063->15072 15073 441264 RtlLeaveCriticalSection 15063->15073 15065 44aa3f 15064->15065 15074 441250 RtlEnterCriticalSection 15065->15074 15069 44a94f 15068->15069 15075 444293 RtlLeaveCriticalSection 15069->15075 15071 4397ac 15071->15039 15071->15040 15072->15063 15073->15063 15074->15068 15075->15071 15076->15054 15078 417f1d 15077->15078 15084 418034 15077->15084 15079 417f83 15078->15079 15080 417f24 15078->15080 15081 417f2b 15078->15081 15082 417fcb 15078->15082 15083 417f7c 15078->15083 15089 433672 std::_Facet_Register 42 API calls 15079->15089 15169 41c3a0 15080->15169 15086 433672 std::_Facet_Register 42 API calls 15081->15086 15082->14304 15174 41cf80 15083->15174 15087 402cf0 std::_Throw_Cpp_error 42 API calls 15084->15087 15090 417f29 15084->15090 15086->15090 15091 41804f 15087->15091 15089->15090 15090->14304 15179 407f90 15091->15179 15093 418062 15094 4351fb std::_Throw_Cpp_error RaiseException 15093->15094 15095 418073 15094->15095 15098 42215f 15096->15098 15251 44133b 15098->15251 15101 41b4f0 15102 41db10 15101->15102 15103 41db56 15102->15103 15104 41de3d 15102->15104 15285 41ebb0 15103->15285 15106 41fd70 42 API calls 15104->15106 15108 41de87 15106->15108 15107 41dba4 15110 41fd70 42 API calls 15107->15110 15109 41eda0 55 API calls 15108->15109 15163 41df5e std::ios_base::_Ios_base_dtor 15108->15163 15111 41dee2 15109->15111 15112 41dbc1 15110->15112 15115 4075c0 42 API calls 15111->15115 15165 41dcc3 std::ios_base::_Ios_base_dtor 15112->15165 15291 41eda0 15112->15291 15113 417ef0 42 API calls 15118 41dfc7 15113->15118 15114 41de38 std::ios_base::_Ios_base_dtor 15114->14308 15119 41df06 15115->15119 15116 41dd82 15126 417ef0 42 API calls 15116->15126 15135 41dd9f 15116->15135 15117 41dcec 15122 417ef0 42 API calls 15117->15122 15118->15114 15123 438c70 std::_Throw_Cpp_error 40 API calls 15118->15123 15124 41f440 55 API calls 15119->15124 15121 41dc1c 15344 4075c0 15121->15344 15141 41dd01 15122->15141 15127 41e06f 15123->15127 15128 41df1f 15124->15128 15126->15135 15405 4190b0 15127->15405 15131 41e093 15128->15131 15132 402df0 std::_Throw_Cpp_error 42 API calls 15128->15132 15134 4190b0 41 API calls 15131->15134 15138 41df40 15132->15138 15140 41e0a1 15134->15140 15142 4135b0 40 API calls 15135->15142 15137 4351fb std::_Throw_Cpp_error RaiseException 15143 41e08e 15137->15143 15144 407a20 14 API calls 15138->15144 15139 41dc56 15139->15127 15145 41dc6b 15139->15145 15146 4351fb std::_Throw_Cpp_error RaiseException 15140->15146 15400 4135b0 15141->15400 15159 41dd6c 15142->15159 15147 438c70 std::_Throw_Cpp_error 40 API calls 15143->15147 15148 41df4f 15144->15148 15149 402df0 std::_Throw_Cpp_error 42 API calls 15145->15149 15150 41e0b2 15146->15150 15147->15131 15151 402df0 std::_Throw_Cpp_error 42 API calls 15148->15151 15152 41dc77 15149->15152 15153 438c70 std::_Throw_Cpp_error 40 API calls 15150->15153 15151->15163 15395 407a20 15152->15395 15158 41e0b7 15153->15158 15155 4135b0 40 API calls 15156 41de26 15155->15156 15160 4135b0 40 API calls 15156->15160 15159->15155 15160->15114 15162 402df0 std::_Throw_Cpp_error 42 API calls 15164 41dc95 15162->15164 15163->15113 15163->15118 15163->15150 15164->15143 15164->15165 15165->15116 15165->15117 15167 402df0 std::_Throw_Cpp_error 42 API calls 15166->15167 15168 41d4cb 15167->15168 15168->14310 15170 433672 std::_Facet_Register 42 API calls 15169->15170 15171 41c3c3 15170->15171 15172 433672 std::_Facet_Register 42 API calls 15171->15172 15173 41c3ec 15172->15173 15173->15090 15175 433672 std::_Facet_Register 42 API calls 15174->15175 15176 41cfb7 15175->15176 15177 403040 std::_Throw_Cpp_error 42 API calls 15176->15177 15178 41cfee 15177->15178 15178->15090 15194 407350 15179->15194 15181 408029 15219 41ad80 15181->15219 15184 402df0 std::_Throw_Cpp_error 42 API calls 15185 40804c 15184->15185 15186 408076 std::ios_base::_Ios_base_dtor 15185->15186 15188 4080df 15185->15188 15223 4072b0 15186->15223 15190 438c70 std::_Throw_Cpp_error 40 API calls 15188->15190 15193 4080e4 15190->15193 15191 402df0 std::_Throw_Cpp_error 42 API calls 15192 4080cb 15191->15192 15192->15093 15193->15093 15226 404d70 15194->15226 15203 418f00 std::_Throw_Cpp_error 42 API calls 15204 4073e6 15203->15204 15205 402df0 std::_Throw_Cpp_error 42 API calls 15204->15205 15206 40744c 15205->15206 15207 407476 std::ios_base::_Ios_base_dtor 15206->15207 15209 4074bf 15206->15209 15208 402df0 std::_Throw_Cpp_error 42 API calls 15207->15208 15210 40749e 15208->15210 15212 438c70 std::_Throw_Cpp_error 40 API calls 15209->15212 15211 402df0 std::_Throw_Cpp_error 42 API calls 15210->15211 15214 4074aa 15211->15214 15213 4074c4 15212->15213 15215 434b78 ___std_exception_destroy 14 API calls 15213->15215 15214->15181 15216 407511 15215->15216 15217 434b78 ___std_exception_destroy 14 API calls 15216->15217 15218 407527 std::ios_base::_Ios_base_dtor 15217->15218 15218->15181 15220 41adb4 15219->15220 15221 418f00 std::_Throw_Cpp_error 42 API calls 15220->15221 15222 40803d 15221->15222 15222->15184 15224 434b15 ___std_exception_copy 41 API calls 15223->15224 15225 40731a 15224->15225 15225->15191 15228 404da6 15226->15228 15227 404dd8 15230 41ac50 15227->15230 15228->15227 15229 403040 std::_Throw_Cpp_error 42 API calls 15228->15229 15229->15227 15232 41ac81 15230->15232 15231 41acd3 15232->15231 15242 41e8a0 15232->15242 15234 4073af 15235 41abb0 15234->15235 15236 41abe1 15235->15236 15236->15236 15237 418f00 std::_Throw_Cpp_error 42 API calls 15236->15237 15238 4073c2 15237->15238 15239 41ae20 15238->15239 15246 41e710 15239->15246 15241 4073d1 15241->15203 15243 41e8f8 std::locale::_Locimp::_Locimp 15242->15243 15244 41e8ce 15242->15244 15243->15234 15245 4032d0 std::_Throw_Cpp_error 42 API calls 15244->15245 15245->15243 15247 41e753 15246->15247 15248 4032d0 std::_Throw_Cpp_error 42 API calls 15247->15248 15249 41e758 std::locale::_Locimp::_Locimp 15247->15249 15250 41e843 std::locale::_Locimp::_Locimp 15248->15250 15249->15241 15250->15241 15252 449e42 __Getctype 40 API calls 15251->15252 15253 441346 15252->15253 15254 44a12d __Getctype 40 API calls 15253->15254 15255 42225f 15254->15255 15256 41fd70 15255->15256 15259 41fd84 15256->15259 15262 41fde4 15256->15262 15258 41ff6c 15258->15101 15260 429e20 42 API calls 15259->15260 15263 41fdc2 15259->15263 15260->15263 15266 41fe74 15262->15266 15274 4201e0 15262->15274 15263->15262 15264 41fe58 15263->15264 15265 429e20 42 API calls 15263->15265 15264->15266 15270 421430 15264->15270 15265->15264 15266->15101 15268 429e20 42 API calls 15269 41fecc 15268->15269 15269->15258 15269->15268 15278 4208f0 15269->15278 15271 421443 15270->15271 15272 421471 15271->15272 15273 429e20 42 API calls 15271->15273 15272->15262 15273->15272 15275 4201f0 15274->15275 15276 429e20 42 API calls 15275->15276 15277 420260 15275->15277 15276->15275 15277->15269 15279 421430 42 API calls 15278->15279 15282 4208fc 15279->15282 15280 42090a 15280->15269 15281 429e20 42 API calls 15284 420995 15281->15284 15282->15280 15283 429e20 42 API calls 15282->15283 15282->15284 15283->15282 15284->15280 15284->15281 15286 41ec6d 15285->15286 15287 417ef0 42 API calls 15286->15287 15288 41ec8d 15287->15288 15408 4216c0 15288->15408 15290 41ecdf 15290->15107 15292 41ee46 15291->15292 15293 41ef4d 15291->15293 15294 41f425 15292->15294 15297 41e8a0 42 API calls 15292->15297 15295 418f00 std::_Throw_Cpp_error 42 API calls 15293->15295 15301 438c70 std::_Throw_Cpp_error 40 API calls 15294->15301 15296 41ef5b 15295->15296 15298 41ef6a 15296->15298 15306 41f191 15296->15306 15299 41ee79 15297->15299 15300 41f440 55 API calls 15298->15300 15302 418f00 std::_Throw_Cpp_error 42 API calls 15299->15302 15303 41ef79 15300->15303 15304 41f42f 15301->15304 15305 41ee93 15302->15305 15312 403040 std::_Throw_Cpp_error 42 API calls 15303->15312 15307 438c70 std::_Throw_Cpp_error 40 API calls 15304->15307 15308 418f00 std::_Throw_Cpp_error 42 API calls 15305->15308 15306->15306 15313 403040 std::_Throw_Cpp_error 42 API calls 15306->15313 15309 41f434 15307->15309 15311 41eee3 15308->15311 15310 438c70 std::_Throw_Cpp_error 40 API calls 15309->15310 15343 41f375 std::ios_base::_Ios_base_dtor 15310->15343 15311->15294 15314 41ef1f std::ios_base::_Ios_base_dtor 15311->15314 15315 41efba 15312->15315 15316 41f1c9 15313->15316 15317 402df0 std::_Throw_Cpp_error 42 API calls 15314->15317 15320 418f00 std::_Throw_Cpp_error 42 API calls 15315->15320 15318 41fbf0 42 API calls 15316->15318 15317->15293 15321 41f1e0 15318->15321 15319 438c70 std::_Throw_Cpp_error 40 API calls 15322 41f43e 15319->15322 15323 41efcd 15320->15323 15324 418f00 std::_Throw_Cpp_error 42 API calls 15321->15324 15325 41e710 42 API calls 15323->15325 15330 41f22f std::ios_base::_Ios_base_dtor 15324->15330 15326 41f019 15325->15326 15327 418f00 std::_Throw_Cpp_error 42 API calls 15326->15327 15328 41f032 15327->15328 15329 418f00 std::_Throw_Cpp_error 42 API calls 15328->15329 15333 41f081 std::ios_base::_Ios_base_dtor 15329->15333 15330->15309 15334 41f18c std::ios_base::_Ios_base_dtor 15330->15334 15331 41f3f2 std::ios_base::_Ios_base_dtor 15331->15121 15332 402df0 std::_Throw_Cpp_error 42 API calls 15337 41f0e3 std::ios_base::_Ios_base_dtor 15332->15337 15333->15304 15333->15332 15334->15331 15336 403040 std::_Throw_Cpp_error 42 API calls 15334->15336 15335 41f161 std::ios_base::_Ios_base_dtor 15338 402df0 std::_Throw_Cpp_error 42 API calls 15335->15338 15339 41f30c 15336->15339 15337->15304 15337->15335 15338->15334 15340 41fbf0 42 API calls 15339->15340 15341 41f323 15340->15341 15342 418f00 std::_Throw_Cpp_error 42 API calls 15341->15342 15342->15343 15343->15319 15343->15331 15491 404e30 15344->15491 15347 404e30 42 API calls 15348 40762b 15347->15348 15349 41ace0 42 API calls 15348->15349 15350 407640 15349->15350 15351 41abb0 42 API calls 15350->15351 15352 407656 15351->15352 15353 41e710 42 API calls 15352->15353 15355 40766d std::ios_base::_Ios_base_dtor 15353->15355 15354 40770a std::ios_base::_Ios_base_dtor 15356 402df0 std::_Throw_Cpp_error 42 API calls 15354->15356 15355->15354 15357 407a09 15355->15357 15359 40773b 15356->15359 15358 438c70 std::_Throw_Cpp_error 40 API calls 15357->15358 15360 407a0e 15358->15360 15361 402df0 std::_Throw_Cpp_error 42 API calls 15359->15361 15362 438c70 std::_Throw_Cpp_error 40 API calls 15360->15362 15363 40774a 15361->15363 15364 407a13 15362->15364 15365 407350 42 API calls 15363->15365 15366 4077a4 15365->15366 15367 418f00 std::_Throw_Cpp_error 42 API calls 15366->15367 15368 4077b9 15367->15368 15369 41e710 42 API calls 15368->15369 15370 40780c 15369->15370 15371 418f00 std::_Throw_Cpp_error 42 API calls 15370->15371 15372 407828 15371->15372 15373 41ad80 42 API calls 15372->15373 15375 407879 std::ios_base::_Ios_base_dtor 15373->15375 15374 402df0 std::_Throw_Cpp_error 42 API calls 15377 4078e8 std::ios_base::_Ios_base_dtor 15374->15377 15375->15360 15375->15374 15376 402df0 std::_Throw_Cpp_error 42 API calls 15378 407947 15376->15378 15377->15360 15377->15376 15378->15360 15379 407975 std::ios_base::_Ios_base_dtor 15378->15379 15380 402df0 std::_Throw_Cpp_error 42 API calls 15379->15380 15381 4079a6 15380->15381 15382 4072b0 41 API calls 15381->15382 15383 4079ca 15382->15383 15384 402df0 std::_Throw_Cpp_error 42 API calls 15383->15384 15385 4079f3 15384->15385 15386 41f440 15385->15386 15387 41f630 15386->15387 15393 41f4c9 std::ios_base::_Ios_base_dtor std::locale::_Locimp::_Locimp 15386->15393 15387->15139 15389 41f647 15392 438c70 std::_Throw_Cpp_error 40 API calls 15389->15392 15390 4032d0 std::_Throw_Cpp_error 42 API calls 15390->15393 15391 418f00 std::_Throw_Cpp_error 42 API calls 15391->15393 15394 41f651 15392->15394 15393->15387 15393->15389 15393->15390 15393->15391 15495 4034a0 15393->15495 15394->15139 15394->15394 15396 434b78 ___std_exception_destroy 14 API calls 15395->15396 15397 407a61 15396->15397 15398 434b78 ___std_exception_destroy 14 API calls 15397->15398 15399 407a77 15398->15399 15399->15162 15401 4135d1 15400->15401 15402 4135f1 std::ios_base::_Ios_base_dtor 15400->15402 15401->15402 15403 438c70 std::_Throw_Cpp_error 40 API calls 15401->15403 15402->15159 15404 413625 15403->15404 15404->15159 15614 416590 15405->15614 15411 4217d0 15408->15411 15410 4216da std::locale::_Setgloballocale 15410->15290 15412 421809 15411->15412 15418 421838 15411->15418 15413 421923 15412->15413 15414 42181b 15412->15414 15428 421990 15413->15428 15414->15418 15419 429f90 15414->15419 15418->15410 15420 42a0a3 15419->15420 15421 429fc2 15419->15421 15422 403330 42 API calls 15420->15422 15440 42d190 15421->15440 15426 42a000 std::locale::_Locimp::_Locimp 15422->15426 15424 438c70 std::_Throw_Cpp_error 40 API calls 15425 42a0ad 15424->15425 15426->15424 15427 42a05f std::ios_base::_Ios_base_dtor 15426->15427 15427->15418 15429 431cea 42 API calls 15428->15429 15431 42199a 15429->15431 15430 421928 15431->15430 15432 402cf0 std::_Throw_Cpp_error 42 API calls 15431->15432 15433 421a03 15432->15433 15434 41ace0 42 API calls 15433->15434 15435 421a18 15434->15435 15448 407cf0 15435->15448 15437 421a2d 15438 4351fb std::_Throw_Cpp_error RaiseException 15437->15438 15439 421a3e 15438->15439 15441 42d1d9 15440->15441 15442 42d199 15440->15442 15441->15441 15442->15441 15443 42d1b0 15442->15443 15446 433672 std::_Facet_Register 42 API calls 15442->15446 15444 42d1b9 15443->15444 15445 433672 std::_Facet_Register 42 API calls 15443->15445 15444->15426 15447 42d1d2 15445->15447 15446->15443 15447->15426 15449 407350 42 API calls 15448->15449 15450 407d80 15449->15450 15451 41ad80 42 API calls 15450->15451 15452 407d94 15451->15452 15453 402df0 std::_Throw_Cpp_error 42 API calls 15452->15453 15454 407da3 15453->15454 15455 407dcd std::ios_base::_Ios_base_dtor 15454->15455 15457 407e33 15454->15457 15456 4072b0 41 API calls 15455->15456 15458 407dfd 15456->15458 15460 438c70 std::_Throw_Cpp_error 40 API calls 15457->15460 15459 402df0 std::_Throw_Cpp_error 42 API calls 15458->15459 15461 407e1e 15459->15461 15462 407e38 15460->15462 15461->15437 15463 407350 42 API calls 15462->15463 15464 407ece 15463->15464 15465 41ad80 42 API calls 15464->15465 15466 407ee2 15465->15466 15467 402df0 std::_Throw_Cpp_error 42 API calls 15466->15467 15468 407ef1 15467->15468 15469 407f1b std::ios_base::_Ios_base_dtor 15468->15469 15471 407f81 15468->15471 15470 4072b0 41 API calls 15469->15470 15472 407f4b 15470->15472 15474 438c70 std::_Throw_Cpp_error 40 API calls 15471->15474 15473 402df0 std::_Throw_Cpp_error 42 API calls 15472->15473 15475 407f6c 15473->15475 15476 407f86 15474->15476 15475->15437 15477 407350 42 API calls 15476->15477 15478 408029 15477->15478 15479 41ad80 42 API calls 15478->15479 15480 40803d 15479->15480 15481 402df0 std::_Throw_Cpp_error 42 API calls 15480->15481 15482 40804c 15481->15482 15483 408076 std::ios_base::_Ios_base_dtor 15482->15483 15485 4080df 15482->15485 15484 4072b0 41 API calls 15483->15484 15486 4080aa 15484->15486 15487 438c70 std::_Throw_Cpp_error 40 API calls 15485->15487 15488 402df0 std::_Throw_Cpp_error 42 API calls 15486->15488 15490 4080e4 15487->15490 15489 4080cb 15488->15489 15489->15437 15490->15437 15492 404e66 15491->15492 15492->15492 15493 404ea8 15492->15493 15494 403040 std::_Throw_Cpp_error 42 API calls 15492->15494 15493->15347 15494->15493 15498 403380 15495->15498 15499 403399 15498->15499 15502 440dd7 15499->15502 15503 440deb ___std_exception_copy 15502->15503 15508 43e565 15503->15508 15506 43899c ___std_exception_copy 40 API calls 15507 4033a7 15506->15507 15507->15393 15509 43e591 15508->15509 15510 43e5b4 15508->15510 15511 438be3 ___std_exception_copy 40 API calls 15509->15511 15510->15509 15514 43e5bc 15510->15514 15512 43e5a9 15511->15512 15513 433d77 _ValidateLocalCookies 5 API calls 15512->15513 15515 43e6d7 15513->15515 15519 43faa7 15514->15519 15515->15506 15537 440b0d 15519->15537 15522 43facc 15524 438be3 ___std_exception_copy 40 API calls 15522->15524 15523 43e63d 15534 43f28d 15523->15534 15524->15523 15529 43faf4 std::_Locinfo::_Locinfo_ctor 15529->15523 15530 43fbd0 15529->15530 15541 43e1d0 15529->15541 15548 43f49b 15529->15548 15551 43fed4 15529->15551 15585 44036f 15529->15585 15531 438be3 ___std_exception_copy 40 API calls 15530->15531 15532 43fbea 15531->15532 15533 438be3 ___std_exception_copy 40 API calls 15532->15533 15533->15523 15535 44b01a ___std_exception_destroy 14 API calls 15534->15535 15536 43f29d 15535->15536 15536->15512 15538 43fac1 15537->15538 15539 440b18 15537->15539 15538->15522 15538->15523 15538->15529 15540 438be3 ___std_exception_copy 40 API calls 15539->15540 15540->15538 15542 438a47 ___std_exception_copy 40 API calls 15541->15542 15543 43e1e0 15542->15543 15544 44a15a std::_Locinfo::_Locinfo_ctor 40 API calls 15543->15544 15545 43e1fd 15544->15545 15546 44a1b8 std::_Locinfo::_Locinfo_ctor 50 API calls 15545->15546 15547 43e20a 15546->15547 15547->15529 15549 43e842 40 API calls 15548->15549 15550 43f4d6 15549->15550 15550->15529 15552 43fef2 15551->15552 15553 43fedb 15551->15553 15556 438be3 ___std_exception_copy 40 API calls 15552->15556 15569 43ff31 15552->15569 15554 4403f4 15553->15554 15555 440394 15553->15555 15553->15569 15557 44042d 15554->15557 15558 4403f9 15554->15558 15559 44041a 15555->15559 15560 44039a 15555->15560 15561 43ff26 15556->15561 15562 440432 15557->15562 15563 44044a 15557->15563 15564 440426 15558->15564 15565 4403fb 15558->15565 15567 43ebfc 41 API calls 15559->15567 15572 4403eb 15560->15572 15573 44039f 15560->15573 15561->15529 15562->15559 15562->15572 15584 4403c5 15562->15584 15570 440a4d 41 API calls 15563->15570 15568 440a30 41 API calls 15564->15568 15566 4403ae 15565->15566 15575 44040a 15565->15575 15571 440785 52 API calls 15566->15571 15583 440453 15566->15583 15567->15584 15568->15584 15569->15529 15570->15584 15571->15584 15574 43ed89 41 API calls 15572->15574 15572->15583 15573->15566 15576 4403d8 15573->15576 15573->15584 15574->15584 15575->15559 15577 44040e 15575->15577 15578 440916 51 API calls 15576->15578 15576->15583 15580 4409ab 40 API calls 15577->15580 15577->15583 15578->15584 15579 433d77 _ValidateLocalCookies 5 API calls 15581 4406cc 15579->15581 15580->15584 15581->15529 15582 44c5ba 51 API calls 15582->15584 15583->15579 15584->15582 15584->15583 15586 4403f4 15585->15586 15587 440394 15585->15587 15588 44042d 15586->15588 15589 4403f9 15586->15589 15590 44041a 15587->15590 15591 44039a 15587->15591 15592 440432 15588->15592 15593 44044a 15588->15593 15594 440426 15589->15594 15595 4403fb 15589->15595 15599 43ebfc 41 API calls 15590->15599 15601 4403eb 15591->15601 15602 44039f 15591->15602 15592->15590 15592->15601 15612 4403c5 15592->15612 15598 440a4d 41 API calls 15593->15598 15596 440a30 41 API calls 15594->15596 15597 4403ae 15595->15597 15604 44040a 15595->15604 15596->15612 15600 440785 52 API calls 15597->15600 15613 440453 15597->15613 15598->15612 15599->15612 15600->15612 15603 43ed89 41 API calls 15601->15603 15601->15613 15602->15597 15605 4403d8 15602->15605 15602->15612 15603->15612 15604->15590 15606 44040e 15604->15606 15607 440916 51 API calls 15605->15607 15605->15613 15609 4409ab 40 API calls 15606->15609 15606->15613 15607->15612 15608 433d77 _ValidateLocalCookies 5 API calls 15610 4406cc 15608->15610 15609->15612 15610->15529 15611 44c5ba 51 API calls 15611->15612 15612->15611 15612->15613 15613->15608 15615 434b15 ___std_exception_copy 41 API calls 15614->15615 15616 4165ce 15615->15616 15617 434b15 ___std_exception_copy 41 API calls 15616->15617 15618 416601 15617->15618 15618->15137 15633 43ce79 15619->15633 15621 43d6ff 15624 43e1d0 std::_Locinfo::_Locinfo_ctor 50 API calls 15621->15624 15627 43d723 15621->15627 15622 43d6b7 15622->15621 15623 43d6cc 15622->15623 15632 43d6e7 std::_Locinfo::_Locinfo_ctor 15622->15632 15625 438be3 ___std_exception_copy 40 API calls 15623->15625 15624->15627 15625->15632 15629 43d747 15627->15629 15640 43ce94 15627->15640 15628 43d7cf 15630 43ce22 40 API calls 15628->15630 15629->15628 15647 43ce22 15629->15647 15630->15632 15632->14318 15634 43ce91 15633->15634 15635 43ce7e 15633->15635 15634->15622 15636 4416ff __floor_pentium4 14 API calls 15635->15636 15637 43ce83 15636->15637 15638 438c60 ___std_exception_copy 40 API calls 15637->15638 15639 43ce8e 15638->15639 15639->15622 15641 43cea0 15640->15641 15642 43ceb6 15640->15642 15643 44454e __Getctype 40 API calls 15641->15643 15646 43cec6 15642->15646 15653 449a39 15642->15653 15645 43ceab std::_Locinfo::_Locinfo_ctor 15643->15645 15645->15627 15646->15627 15648 43ce33 15647->15648 15649 43ce47 15647->15649 15648->15649 15650 4416ff __floor_pentium4 14 API calls 15648->15650 15649->15628 15651 43ce3c 15650->15651 15652 438c60 ___std_exception_copy 40 API calls 15651->15652 15652->15649 15660 4395ae 15653->15660 15657 433d77 _ValidateLocalCookies 5 API calls 15658 449b02 15657->15658 15658->15646 15659 449a66 15659->15657 15661 4395cc 15660->15661 15667 4395c5 15660->15667 15662 449e42 __Getctype 40 API calls 15661->15662 15661->15667 15663 4395ed 15662->15663 15664 44a12d __Getctype 40 API calls 15663->15664 15665 439603 15664->15665 15683 44a18b 15665->15683 15667->15659 15668 44f44d 15667->15668 15669 4395ae std::_Locinfo::_Locinfo_ctor 49 API calls 15668->15669 15670 44f46d 15669->15670 15759 44b17a 15670->15759 15672 44f529 15674 433d77 _ValidateLocalCookies 5 API calls 15672->15674 15673 44f521 15769 433275 15673->15769 15677 44f54c 15674->15677 15675 44f49a 15675->15672 15675->15673 15679 44f4bf std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 15675->15679 15762 44b094 15675->15762 15677->15659 15679->15673 15680 44b17a std::_Locinfo::_Locinfo_ctor MultiByteToWideChar 15679->15680 15681 44f508 15680->15681 15681->15673 15682 44f50f GetStringTypeW 15681->15682 15682->15673 15684 44a1b3 15683->15684 15685 44a19e 15683->15685 15684->15667 15685->15684 15687 4506bd 15685->15687 15688 449e42 __Getctype 40 API calls 15687->15688 15689 4506c2 15688->15689 15692 4505d5 15689->15692 15691 4506cd 15691->15684 15693 4505e1 std::locale::_Setgloballocale 15692->15693 15699 4505fb 15693->15699 15707 44424b RtlEnterCriticalSection 15693->15707 15695 45060b 15703 44b01a ___std_exception_destroy 14 API calls 15695->15703 15705 450637 15695->15705 15696 450602 15696->15691 15698 4441c6 __Getctype 40 API calls 15700 450674 15698->15700 15699->15696 15699->15698 15701 4506b0 15700->15701 15711 449efd 15700->15711 15701->15691 15703->15705 15708 450654 15705->15708 15707->15695 15709 444293 std::_Lockit::~_Lockit RtlLeaveCriticalSection 15708->15709 15710 45065b 15709->15710 15710->15699 15712 449f08 15711->15712 15715 449f0e 15711->15715 15713 44b65c __Getctype 6 API calls 15712->15713 15713->15715 15714 44b69b __Getctype 6 API calls 15716 449f28 15714->15716 15715->15714 15717 449f14 15715->15717 15716->15717 15720 44a65a __Getctype 14 API calls 15716->15720 15718 4441c6 __Getctype 40 API calls 15717->15718 15719 449f19 15717->15719 15721 449f92 15718->15721 15736 450480 15719->15736 15722 449f38 15720->15722 15723 449f55 15722->15723 15724 449f40 15722->15724 15726 44b69b __Getctype 6 API calls 15723->15726 15725 44b69b __Getctype 6 API calls 15724->15725 15727 449f4c 15725->15727 15728 449f61 15726->15728 15731 44b01a ___std_exception_destroy 14 API calls 15727->15731 15729 449f74 15728->15729 15730 449f65 15728->15730 15733 449c70 __Getctype 14 API calls 15729->15733 15732 44b69b __Getctype 6 API calls 15730->15732 15731->15717 15732->15727 15734 449f7f 15733->15734 15735 44b01a ___std_exception_destroy 14 API calls 15734->15735 15735->15719 15737 4505d5 std::_Locinfo::_Locinfo_ctor 50 API calls 15736->15737 15738 4504aa 15737->15738 15739 450207 std::_Locinfo::_Locinfo_ctor 50 API calls 15738->15739 15740 4504b2 15739->15740 15741 44b094 std::_Locinfo::_Locinfo_ctor 15 API calls 15740->15741 15747 4504c3 15740->15747 15742 4504d4 15741->15742 15743 4504dc 15742->15743 15744 4504ea 15742->15744 15745 44b01a ___std_exception_destroy 14 API calls 15743->15745 15746 4506d0 std::_Locinfo::_Locinfo_ctor 50 API calls 15744->15746 15745->15747 15748 450517 15746->15748 15747->15701 15749 450522 15748->15749 15753 45053d std::_Locinfo::_Locinfo_ctor 15748->15753 15750 4416ff __floor_pentium4 14 API calls 15749->15750 15752 450527 15750->15752 15751 450569 15754 4505b2 15751->15754 15757 4500f9 std::_Locinfo::_Locinfo_ctor 40 API calls 15751->15757 15755 44b01a ___std_exception_destroy 14 API calls 15752->15755 15753->15751 15756 44b01a ___std_exception_destroy 14 API calls 15753->15756 15758 44b01a ___std_exception_destroy 14 API calls 15754->15758 15755->15747 15756->15751 15757->15754 15758->15747 15773 44b0e2 15759->15773 15763 44b0d2 15762->15763 15767 44b0a2 __Getctype 15762->15767 15765 4416ff __floor_pentium4 14 API calls 15763->15765 15764 44b0bd RtlAllocateHeap 15766 44b0d0 15764->15766 15764->15767 15765->15766 15766->15679 15767->15763 15767->15764 15768 445a89 std::_Facet_Register 2 API calls 15767->15768 15768->15767 15770 43327f 15769->15770 15772 433290 15769->15772 15771 441c96 ___std_exception_destroy 14 API calls 15770->15771 15770->15772 15771->15772 15772->15672 15774 44b0f3 MultiByteToWideChar 15773->15774 15774->15675 15776 41ab55 15775->15776 15777 41e8a0 42 API calls 15776->15777 15778 41aba3 15776->15778 15779 41ab83 15777->15779 15779->14329 15781 403459 15780->15781 15782 440dd7 53 API calls 15781->15782 15783 403467 WriteProcessMemory WriteProcessMemory CreateRemoteThread WaitForSingleObject 15782->15783 15783->14335 15783->14336 15785 441440 15784->15785 15786 441418 15784->15786 15785->14345 15786->15785 15787 441425 15786->15787 15788 441447 15786->15788 15789 438be3 ___std_exception_copy 40 API calls 15787->15789 15792 441363 15788->15792 15789->15785 15793 44136f std::locale::_Setgloballocale 15792->15793 15800 441250 RtlEnterCriticalSection 15793->15800 15795 44137d 15801 4413be 15795->15801 15800->15795 15811 44c8aa 15801->15811 15808 4413b2 15956 441264 RtlLeaveCriticalSection 15808->15956 15810 44139b 15810->14345 15831 44c86c 15811->15831 15813 4413d6 15818 441481 15813->15818 15814 44c8bb 15814->15813 15815 44b094 std::_Locinfo::_Locinfo_ctor 15 API calls 15814->15815 15816 44c914 15815->15816 15817 44b01a ___std_exception_destroy 14 API calls 15816->15817 15817->15813 15821 441493 15818->15821 15822 4413f4 15818->15822 15819 4414a1 15820 438be3 ___std_exception_copy 40 API calls 15819->15820 15820->15822 15821->15819 15821->15822 15825 4414d7 std::locale::_Locimp::_Locimp 15821->15825 15827 44c955 15822->15827 15824 44a1e9 40 API calls 15824->15825 15825->15822 15825->15824 15847 439a91 15825->15847 15853 449678 15825->15853 15828 44c960 15827->15828 15829 44138a 15827->15829 15828->15829 15830 439a91 73 API calls 15828->15830 15829->15808 15830->15829 15833 44c878 15831->15833 15832 44c8a2 15832->15814 15833->15832 15834 44a1e9 40 API calls 15833->15834 15835 44c893 15834->15835 15838 453be3 15835->15838 15837 44c899 15837->15814 15839 453bf0 15838->15839 15840 453bfd 15838->15840 15841 4416ff __floor_pentium4 14 API calls 15839->15841 15843 453c09 15840->15843 15844 4416ff __floor_pentium4 14 API calls 15840->15844 15842 453bf5 15841->15842 15842->15837 15843->15837 15845 453c2a 15844->15845 15846 438c60 ___std_exception_copy 40 API calls 15845->15846 15846->15842 15848 439ad1 15847->15848 15849 439aaa 15847->15849 15848->15825 15849->15848 15850 44a1e9 40 API calls 15849->15850 15851 439ac6 15850->15851 15852 449678 73 API calls 15851->15852 15852->15848 15854 449684 std::locale::_Setgloballocale 15853->15854 15855 4496c5 15854->15855 15857 44970b 15854->15857 15863 44968c 15854->15863 15856 438be3 ___std_exception_copy 40 API calls 15855->15856 15856->15863 15864 44e6c4 RtlEnterCriticalSection 15857->15864 15859 449711 15860 44972f 15859->15860 15865 449789 15859->15865 15893 449781 15860->15893 15863->15825 15864->15859 15866 4497b1 15865->15866 15892 4497d4 15865->15892 15867 4497b5 15866->15867 15869 449810 15866->15869 15868 438be3 ___std_exception_copy 40 API calls 15867->15868 15868->15892 15870 44982e 15869->15870 15903 44263d 15869->15903 15896 4492ce 15870->15896 15874 449846 15878 449875 15874->15878 15883 44984e 15874->15883 15875 44988d 15876 4498f6 WriteFile 15875->15876 15877 4498a1 15875->15877 15879 449918 GetLastError 15876->15879 15876->15892 15881 4498e2 15877->15881 15882 4498a9 15877->15882 15911 448e9f GetConsoleOutputCP 15878->15911 15879->15892 15939 44934b 15881->15939 15886 4498ce 15882->15886 15887 4498ae 15882->15887 15883->15892 15906 449266 15883->15906 15931 44950f 15886->15931 15889 4498b7 15887->15889 15887->15892 15888 449888 15888->15892 15924 449426 15889->15924 15892->15860 15955 44e779 RtlLeaveCriticalSection 15893->15955 15895 449787 15895->15863 15897 453be3 40 API calls 15896->15897 15899 4492e0 15897->15899 15898 449344 15898->15874 15898->15875 15899->15898 15900 44930e 15899->15900 15901 43e1d0 std::_Locinfo::_Locinfo_ctor 50 API calls 15899->15901 15900->15898 15902 449328 GetConsoleMode 15900->15902 15901->15900 15902->15898 15946 44251c 15903->15946 15905 442656 15905->15870 15907 4492bd 15906->15907 15910 449288 15906->15910 15907->15892 15908 453db0 CreateFileW CloseHandle WriteConsoleW GetLastError WriteConsoleW 15908->15910 15909 4492bf GetLastError 15909->15907 15910->15907 15910->15908 15910->15909 15912 448f11 15911->15912 15920 448f18 std::locale::_Locimp::_Locimp 15911->15920 15913 43e1d0 std::_Locinfo::_Locinfo_ctor 50 API calls 15912->15913 15913->15920 15914 433d77 _ValidateLocalCookies 5 API calls 15915 44925f 15914->15915 15915->15888 15916 44c724 50 API calls 15916->15920 15917 4491ce 15917->15914 15919 449147 WriteFile 15919->15920 15921 44923d GetLastError 15919->15921 15920->15916 15920->15917 15920->15919 15922 453ca8 5 API calls std::_Locinfo::_Locinfo_ctor 15920->15922 15923 449185 WriteFile 15920->15923 15952 44ec55 15920->15952 15921->15917 15922->15920 15923->15920 15923->15921 15929 449435 15924->15929 15925 4494f4 15926 433d77 _ValidateLocalCookies 5 API calls 15925->15926 15928 44950d 15926->15928 15927 4494aa WriteFile 15927->15929 15930 4494f6 GetLastError 15927->15930 15928->15892 15929->15925 15929->15927 15930->15925 15933 44951e 15931->15933 15932 433d77 _ValidateLocalCookies 5 API calls 15934 44963f 15932->15934 15935 44ec55 std::_Locinfo::_Locinfo_ctor WideCharToMultiByte 15933->15935 15936 449628 GetLastError 15933->15936 15937 4495dd WriteFile 15933->15937 15938 449626 15933->15938 15934->15888 15935->15933 15936->15938 15937->15933 15937->15936 15938->15932 15944 44935a 15939->15944 15940 44940b 15941 433d77 _ValidateLocalCookies 5 API calls 15940->15941 15942 449424 15941->15942 15942->15888 15943 4493ca WriteFile 15943->15944 15945 44940d GetLastError 15943->15945 15944->15940 15944->15943 15945->15940 15947 44e940 40 API calls 15946->15947 15948 44252e 15947->15948 15949 44254a SetFilePointerEx 15948->15949 15951 442536 15948->15951 15950 442562 GetLastError 15949->15950 15949->15951 15950->15951 15951->15905 15953 44ec68 std::_Locinfo::_Locinfo_ctor 15952->15953 15954 44eca6 WideCharToMultiByte 15953->15954 15954->15920 15955->15895 15956->15810 15958 43cf8f std::locale::_Setgloballocale 15957->15958 15959 43cf99 15958->15959 15960 43cfbc 15958->15960 15961 438be3 ___std_exception_copy 40 API calls 15959->15961 15967 43cfb4 15960->15967 15968 441250 RtlEnterCriticalSection 15960->15968 15961->15967 15963 43cfda 15969 43d01a 15963->15969 15965 43cfe7 15983 43d012 15965->15983 15967->14351 15968->15963 15970 43d027 15969->15970 15971 43d04a 15969->15971 15972 438be3 ___std_exception_copy 40 API calls 15970->15972 15973 439a91 73 API calls 15971->15973 15982 43d042 15971->15982 15972->15982 15974 43d062 15973->15974 15986 44b054 15974->15986 15977 44a1e9 40 API calls 15978 43d076 15977->15978 15990 448d2c 15978->15990 15981 44b01a ___std_exception_destroy 14 API calls 15981->15982 15982->15965 16048 441264 RtlLeaveCriticalSection 15983->16048 15985 43d018 15985->15967 15987 43d06a 15986->15987 15988 44b06b 15986->15988 15987->15977 15988->15987 15989 44b01a ___std_exception_destroy 14 API calls 15988->15989 15989->15987 15991 448d55 15990->15991 15996 43d07d 15990->15996 15992 448da4 15991->15992 15994 448d7c 15991->15994 15993 438be3 ___std_exception_copy 40 API calls 15992->15993 15993->15996 15997 448c9b 15994->15997 15996->15981 15996->15982 15998 448ca7 std::locale::_Setgloballocale 15997->15998 16005 44e6c4 RtlEnterCriticalSection 15998->16005 16000 448cb5 16001 448ce6 16000->16001 16006 448dff 16000->16006 16019 448d20 16001->16019 16005->16000 16022 44e940 16006->16022 16008 448e15 16035 44e8af 16008->16035 16009 448e0f 16009->16008 16011 448e47 16009->16011 16012 44e940 40 API calls 16009->16012 16011->16008 16013 44e940 40 API calls 16011->16013 16014 448e3e 16012->16014 16015 448e53 FindCloseChangeNotification 16013->16015 16017 44e940 40 API calls 16014->16017 16015->16008 16016 448e5f GetLastError 16015->16016 16016->16008 16017->16011 16018 448e6d 16018->16001 16047 44e779 RtlLeaveCriticalSection 16019->16047 16021 448d09 16021->15996 16023 44e94d 16022->16023 16025 44e962 16022->16025 16044 4416ec 16023->16044 16026 4416ec 14 API calls 16025->16026 16028 44e987 16025->16028 16029 44e992 16026->16029 16028->16009 16031 4416ff __floor_pentium4 14 API calls 16029->16031 16030 4416ff __floor_pentium4 14 API calls 16032 44e95a 16030->16032 16033 44e99a 16031->16033 16032->16009 16034 438c60 ___std_exception_copy 40 API calls 16033->16034 16034->16032 16036 44e925 16035->16036 16037 44e8be 16035->16037 16038 4416ff __floor_pentium4 14 API calls 16036->16038 16037->16036 16043 44e8e8 16037->16043 16039 44e92a 16038->16039 16040 4416ec 14 API calls 16039->16040 16041 44e915 16040->16041 16041->16018 16042 44e90f SetStdHandle 16042->16041 16043->16041 16043->16042 16045 449f93 std::locale::_Setgloballocale 14 API calls 16044->16045 16046 4416f1 16045->16046 16046->16030 16047->16021 16048->15985 16050 458e17 16049->16050 16053 458c08 16049->16053 16050->14365 16052 458d38 std::locale::_Setgloballocale 16052->16050 16054 403130 42 API calls 16052->16054 16053->16052 16056 4387b0 16053->16056 16065 403130 16053->16065 16054->16052 16057 4387e3 16056->16057 16058 4387c7 16056->16058 16059 449e42 __Getctype 40 API calls 16057->16059 16058->16053 16060 4387e8 16059->16060 16061 44a12d __Getctype 40 API calls 16060->16061 16062 4387f8 16061->16062 16062->16058 16063 449a39 50 API calls 16062->16063 16064 43882a 16063->16064 16064->16053 16066 4032b3 16065->16066 16067 40316f 16065->16067 16068 403330 42 API calls 16066->16068 16069 403189 16067->16069 16071 4031d7 16067->16071 16072 4031c7 16067->16072 16070 4032b8 16068->16070 16074 433672 std::_Facet_Register 42 API calls 16069->16074 16073 402b50 Concurrency::cancel_current_task 42 API calls 16070->16073 16075 433672 std::_Facet_Register 42 API calls 16071->16075 16078 40319c std::locale::_Locimp::_Locimp 16071->16078 16072->16069 16072->16070 16073->16078 16074->16078 16075->16078 16076 438c70 std::_Throw_Cpp_error 40 API calls 16077 4032c2 16076->16077 16078->16076 16079 40326b std::ios_base::_Ios_base_dtor 16078->16079 16079->16053 16081 433659 GetSystemTimeAsFileTime 16080->16081 16082 43364d GetSystemTimePreciseAsFileTime 16080->16082 16083 433077 16081->16083 16082->16083 16083->14116 13660 420ad0 13665 4214a0 13660->13665 13662 420b2a 13663 420ae0 13663->13662 13670 429e20 13663->13670 13666 4214cb 13665->13666 13667 4214ee 13666->13667 13668 429e20 42 API calls 13666->13668 13667->13663 13669 42150b 13668->13669 13669->13663 13671 429e62 13670->13671 13672 429f76 13670->13672 13674 429e7c 13671->13674 13676 429eca 13671->13676 13677 429eba 13671->13677 13704 403330 13672->13704 13688 433672 13674->13688 13675 429f7b 13707 402b50 13675->13707 13680 433672 std::_Facet_Register 42 API calls 13676->13680 13685 429e9a std::locale::_Locimp::_Locimp 13676->13685 13677->13674 13677->13675 13680->13685 13681 429f80 13713 438c70 13681->13713 13682 429e8f 13682->13681 13682->13685 13699 4277d0 13685->13699 13687 429f47 13687->13662 13692 433677 13688->13692 13690 433691 13690->13682 13692->13690 13694 402b50 Concurrency::cancel_current_task 13692->13694 13718 4423ec 13692->13718 13736 445a89 13692->13736 13693 43369d 13693->13693 13694->13693 13725 4351fb 13694->13725 13696 402b6c 13728 434b15 13696->13728 13700 4277dc 13699->13700 13701 4277f9 std::ios_base::_Ios_base_dtor 13699->13701 13700->13701 13702 438c70 std::_Throw_Cpp_error 40 API calls 13700->13702 13701->13687 13703 427824 13702->13703 14068 431cea 13704->14068 13708 402b5e Concurrency::cancel_current_task 13707->13708 13709 4351fb std::_Throw_Cpp_error RaiseException 13708->13709 13710 402b6c 13709->13710 13711 434b15 ___std_exception_copy 41 API calls 13710->13711 13712 402bac 13711->13712 13712->13681 13714 438bac ___std_exception_copy 40 API calls 13713->13714 13715 438c7f 13714->13715 13716 438c8d __Getctype 11 API calls 13715->13716 13717 438c8c 13716->13717 13724 44b094 __Getctype 13718->13724 13719 44b0d2 13739 4416ff 13719->13739 13720 44b0bd RtlAllocateHeap 13722 44b0d0 13720->13722 13720->13724 13722->13692 13723 445a89 std::_Facet_Register 2 API calls 13723->13724 13724->13719 13724->13720 13724->13723 13726 435242 RaiseException 13725->13726 13727 435215 13725->13727 13726->13696 13727->13726 13729 434b22 13728->13729 13734 402bac 13728->13734 13730 4423ec ___std_exception_copy 15 API calls 13729->13730 13729->13734 13731 434b3f 13730->13731 13735 434b4f 13731->13735 13909 4499a5 13731->13909 13734->13682 13918 441c96 13735->13918 14057 445ab5 13736->14057 13742 449f93 GetLastError 13739->13742 13741 441704 13741->13722 13743 449faf 13742->13743 13744 449fa9 13742->13744 13748 449fb3 SetLastError 13743->13748 13770 44b69b 13743->13770 13765 44b65c 13744->13765 13748->13741 13752 449fe8 13755 44b69b __Getctype 6 API calls 13752->13755 13753 449ff9 13754 44b69b __Getctype 6 API calls 13753->13754 13756 44a005 13754->13756 13762 449ff6 13755->13762 13757 44a020 13756->13757 13758 44a009 13756->13758 13788 449c70 13757->13788 13759 44b69b __Getctype 6 API calls 13758->13759 13759->13762 13782 44b01a 13762->13782 13764 44b01a ___std_exception_destroy 12 API calls 13764->13748 13793 44b449 13765->13793 13767 44b678 13768 44b693 TlsGetValue 13767->13768 13769 44b681 13767->13769 13769->13743 13771 44b449 std::locale::_Setgloballocale 5 API calls 13770->13771 13772 44b6b7 13771->13772 13773 44b6d5 TlsSetValue 13772->13773 13774 449fcb 13772->13774 13774->13748 13775 44a65a 13774->13775 13780 44a667 __Getctype 13775->13780 13776 44a6a7 13778 4416ff __floor_pentium4 13 API calls 13776->13778 13777 44a692 RtlAllocateHeap 13779 449fe0 13777->13779 13777->13780 13778->13779 13779->13752 13779->13753 13780->13776 13780->13777 13781 445a89 std::_Facet_Register 2 API calls 13780->13781 13781->13780 13783 44b025 RtlFreeHeap 13782->13783 13784 44b04f 13782->13784 13783->13784 13785 44b03a GetLastError 13783->13785 13784->13748 13786 44b047 ___std_exception_destroy 13785->13786 13787 4416ff __floor_pentium4 12 API calls 13786->13787 13787->13784 13807 449b04 13788->13807 13794 44b475 std::locale::_Setgloballocale 13793->13794 13795 44b479 13793->13795 13794->13767 13795->13794 13799 44b37e 13795->13799 13798 44b493 GetProcAddress 13798->13794 13800 44b38f std::locale::_Setgloballocale 13799->13800 13801 44b425 13800->13801 13802 44b3ad LoadLibraryExW 13800->13802 13806 44b3fb LoadLibraryExW 13800->13806 13801->13794 13801->13798 13803 44b42c 13802->13803 13804 44b3c8 GetLastError 13802->13804 13803->13801 13805 44b43e FreeLibrary 13803->13805 13804->13800 13805->13801 13806->13800 13806->13803 13808 449b10 std::locale::_Setgloballocale 13807->13808 13821 44424b RtlEnterCriticalSection 13808->13821 13810 449b1a 13822 449b4a 13810->13822 13813 449c16 13814 449c22 std::locale::_Setgloballocale 13813->13814 13826 44424b RtlEnterCriticalSection 13814->13826 13816 449c2c 13827 449df7 13816->13827 13818 449c44 13831 449c64 13818->13831 13821->13810 13825 444293 RtlLeaveCriticalSection 13822->13825 13824 449b38 13824->13813 13825->13824 13826->13816 13828 449e06 __Getctype 13827->13828 13829 449e2d __Getctype 13827->13829 13828->13829 13834 452146 13828->13834 13829->13818 13908 444293 RtlLeaveCriticalSection 13831->13908 13833 449c52 13833->13764 13836 4521c6 13834->13836 13837 45215c 13834->13837 13838 44b01a ___std_exception_destroy 14 API calls 13836->13838 13861 452214 13836->13861 13837->13836 13842 44b01a ___std_exception_destroy 14 API calls 13837->13842 13843 45218f 13837->13843 13839 4521e8 13838->13839 13840 44b01a ___std_exception_destroy 14 API calls 13839->13840 13844 4521fb 13840->13844 13841 44b01a ___std_exception_destroy 14 API calls 13845 4521bb 13841->13845 13847 452184 13842->13847 13848 44b01a ___std_exception_destroy 14 API calls 13843->13848 13860 4521b1 13843->13860 13849 44b01a ___std_exception_destroy 14 API calls 13844->13849 13850 44b01a ___std_exception_destroy 14 API calls 13845->13850 13846 452282 13851 44b01a ___std_exception_destroy 14 API calls 13846->13851 13862 45144a 13847->13862 13853 4521a6 13848->13853 13854 452209 13849->13854 13850->13836 13857 452288 13851->13857 13890 4518a9 13853->13890 13859 44b01a ___std_exception_destroy 14 API calls 13854->13859 13855 452222 13855->13846 13856 44b01a 14 API calls ___std_exception_destroy 13855->13856 13856->13855 13857->13829 13859->13861 13860->13841 13902 4522b7 13861->13902 13863 45145b 13862->13863 13889 451544 13862->13889 13864 45146c 13863->13864 13865 44b01a ___std_exception_destroy 14 API calls 13863->13865 13866 44b01a ___std_exception_destroy 14 API calls 13864->13866 13870 45147e 13864->13870 13865->13864 13866->13870 13867 44b01a ___std_exception_destroy 14 API calls 13869 451490 13867->13869 13868 4514a2 13872 4514b4 13868->13872 13873 44b01a ___std_exception_destroy 14 API calls 13868->13873 13869->13868 13871 44b01a ___std_exception_destroy 14 API calls 13869->13871 13870->13867 13870->13869 13871->13868 13874 4514c6 13872->13874 13876 44b01a ___std_exception_destroy 14 API calls 13872->13876 13873->13872 13875 4514d8 13874->13875 13877 44b01a ___std_exception_destroy 14 API calls 13874->13877 13878 4514ea 13875->13878 13879 44b01a ___std_exception_destroy 14 API calls 13875->13879 13876->13874 13877->13875 13880 4514fc 13878->13880 13881 44b01a ___std_exception_destroy 14 API calls 13878->13881 13879->13878 13882 45150e 13880->13882 13884 44b01a ___std_exception_destroy 14 API calls 13880->13884 13881->13880 13883 451520 13882->13883 13885 44b01a ___std_exception_destroy 14 API calls 13882->13885 13886 451532 13883->13886 13887 44b01a ___std_exception_destroy 14 API calls 13883->13887 13884->13882 13885->13883 13888 44b01a ___std_exception_destroy 14 API calls 13886->13888 13886->13889 13887->13886 13888->13889 13889->13843 13891 4518b6 13890->13891 13901 45190e 13890->13901 13892 4518c6 13891->13892 13893 44b01a ___std_exception_destroy 14 API calls 13891->13893 13894 44b01a ___std_exception_destroy 14 API calls 13892->13894 13895 4518d8 13892->13895 13893->13892 13894->13895 13896 44b01a ___std_exception_destroy 14 API calls 13895->13896 13897 4518ea 13895->13897 13896->13897 13898 4518fc 13897->13898 13899 44b01a ___std_exception_destroy 14 API calls 13897->13899 13900 44b01a ___std_exception_destroy 14 API calls 13898->13900 13898->13901 13899->13898 13900->13901 13901->13860 13903 4522e3 13902->13903 13904 4522c4 13902->13904 13903->13855 13904->13903 13905 451dd0 __Getctype 14 API calls 13904->13905 13906 4522dd 13905->13906 13907 44b01a ___std_exception_destroy 14 API calls 13906->13907 13907->13903 13908->13833 13910 4499b3 13909->13910 13912 4499c1 13909->13912 13910->13912 13916 4499d9 13910->13916 13911 4416ff __floor_pentium4 14 API calls 13913 4499c9 13911->13913 13912->13911 13921 438c60 13913->13921 13915 4499d3 13915->13735 13916->13915 13917 4416ff __floor_pentium4 14 API calls 13916->13917 13917->13913 13919 44b01a ___std_exception_destroy 14 API calls 13918->13919 13920 441cae 13919->13920 13920->13734 13924 438bac 13921->13924 13925 438bbe ___std_exception_copy 13924->13925 13930 438be3 13925->13930 13927 438bd6 13941 43899c 13927->13941 13931 438bf3 13930->13931 13932 438bfa 13930->13932 13947 438a01 GetLastError 13931->13947 13937 438c08 13932->13937 13951 4389d8 13932->13951 13935 438c2f 13935->13937 13954 438c8d IsProcessorFeaturePresent 13935->13954 13937->13927 13938 438c5f 13939 438bac ___std_exception_copy 40 API calls 13938->13939 13940 438c6c 13939->13940 13940->13927 13942 4389a8 13941->13942 13943 4389bf 13942->13943 13993 438a47 13942->13993 13945 4389d2 13943->13945 13946 438a47 ___std_exception_copy 40 API calls 13943->13946 13945->13915 13946->13945 13948 438a1a 13947->13948 13958 44a044 13948->13958 13952 4389e3 GetLastError SetLastError 13951->13952 13953 4389fc 13951->13953 13952->13935 13953->13935 13955 438c99 13954->13955 13980 438a64 13955->13980 13959 44a057 13958->13959 13963 44a05d 13958->13963 13961 44b65c __Getctype 6 API calls 13959->13961 13960 44b69b __Getctype 6 API calls 13962 44a077 13960->13962 13961->13963 13964 438a32 SetLastError 13962->13964 13965 44a65a __Getctype 14 API calls 13962->13965 13963->13960 13963->13964 13964->13932 13966 44a087 13965->13966 13967 44a0a4 13966->13967 13968 44a08f 13966->13968 13970 44b69b __Getctype 6 API calls 13967->13970 13969 44b69b __Getctype 6 API calls 13968->13969 13972 44a09b 13969->13972 13971 44a0b0 13970->13971 13973 44a0b4 13971->13973 13974 44a0c3 13971->13974 13977 44b01a ___std_exception_destroy 14 API calls 13972->13977 13975 44b69b __Getctype 6 API calls 13973->13975 13976 449c70 __Getctype 14 API calls 13974->13976 13975->13972 13978 44a0ce 13976->13978 13977->13964 13979 44b01a ___std_exception_destroy 14 API calls 13978->13979 13979->13964 13981 438a80 std::locale::_Setgloballocale 13980->13981 13982 438aac IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 13981->13982 13983 438b7d std::locale::_Setgloballocale 13982->13983 13986 433d77 13983->13986 13985 438b9b GetCurrentProcess TerminateProcess 13985->13938 13987 433d80 IsProcessorFeaturePresent 13986->13987 13988 433d7f 13986->13988 13990 43455a 13987->13990 13988->13985 13991 43451d ___raise_securityfailure SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 13990->13991 13992 43463d 13991->13992 13992->13985 13994 438a51 13993->13994 13995 438a5a 13993->13995 13996 438a01 ___std_exception_copy 16 API calls 13994->13996 13995->13943 13997 438a56 13996->13997 13997->13995 14000 4441c6 13997->14000 14015 44f620 14000->14015 14003 4441d6 14004 4441e0 IsProcessorFeaturePresent 14003->14004 14005 4441ff 14003->14005 14007 4441ec 14004->14007 14045 4436e2 14005->14045 14009 438a64 std::locale::_Setgloballocale 8 API calls 14007->14009 14009->14005 14011 444209 14012 44423e 14011->14012 14013 438a63 14011->14013 14048 44b7f4 14011->14048 14053 444262 14012->14053 14016 44f54e std::locale::_Setgloballocale RtlEnterCriticalSection RtlLeaveCriticalSection 14015->14016 14017 4441cb 14016->14017 14017->14003 14018 44f665 14017->14018 14019 44f671 std::locale::_Setgloballocale 14018->14019 14020 449f93 std::locale::_Setgloballocale 14 API calls 14019->14020 14021 44f6c1 14019->14021 14023 44f6d3 std::locale::_Setgloballocale 14019->14023 14027 44f6a2 std::locale::_Setgloballocale 14019->14027 14020->14027 14022 4416ff __floor_pentium4 14 API calls 14021->14022 14025 44f6c6 14022->14025 14024 44f709 std::locale::_Setgloballocale 14023->14024 14026 44424b std::_Lockit::_Lockit RtlEnterCriticalSection 14023->14026 14030 44f746 14024->14030 14031 44f843 14024->14031 14041 44f774 14024->14041 14028 438c60 ___std_exception_copy 40 API calls 14025->14028 14026->14024 14027->14021 14027->14023 14044 44f6ab 14027->14044 14028->14044 14029 44f7ef std::locale::_Setgloballocale RtlLeaveCriticalSection 14033 44f7bb 14029->14033 14037 449e42 __Getctype 40 API calls 14030->14037 14030->14041 14032 44f84e 14031->14032 14034 444293 std::_Lockit::~_Lockit RtlLeaveCriticalSection 14031->14034 14035 4436e2 std::locale::_Setgloballocale 20 API calls 14032->14035 14038 449e42 __Getctype 40 API calls 14033->14038 14042 44f7c9 14033->14042 14033->14044 14034->14032 14036 44f856 14035->14036 14039 44f769 14037->14039 14038->14042 14040 449e42 __Getctype 40 API calls 14039->14040 14040->14041 14041->14029 14043 449e42 __Getctype 40 API calls 14042->14043 14042->14044 14043->14044 14044->14003 14046 443552 std::locale::_Setgloballocale 20 API calls 14045->14046 14047 4436f3 14046->14047 14047->14011 14049 44b449 std::locale::_Setgloballocale 5 API calls 14048->14049 14050 44b810 14049->14050 14051 44b82e InitializeCriticalSectionAndSpinCount 14050->14051 14052 44b819 14050->14052 14051->14052 14052->14011 14054 44428e 14053->14054 14055 44426f 14053->14055 14054->14013 14056 444279 RtlDeleteCriticalSection 14055->14056 14056->14054 14056->14056 14058 445ac1 std::locale::_Setgloballocale 14057->14058 14063 44424b RtlEnterCriticalSection 14058->14063 14060 445acc std::locale::_Setgloballocale 14064 445b03 14060->14064 14063->14060 14067 444293 RtlLeaveCriticalSection 14064->14067 14066 445a94 14066->13692 14067->14066 14081 431a9f 14068->14081 14071 4351fb std::_Throw_Cpp_error RaiseException 14072 431d09 14071->14072 14084 431af4 14072->14084 14075 4351fb std::_Throw_Cpp_error RaiseException 14076 431d29 14075->14076 14087 431b37 14076->14087 14079 4351fb std::_Throw_Cpp_error RaiseException 14080 431d49 14079->14080 14091 4034e0 14081->14091 14085 4034e0 std::invalid_argument::invalid_argument 41 API calls 14084->14085 14086 431b06 14085->14086 14086->14075 14088 431b4b std::regex_error::regex_error 14087->14088 14089 4034e0 std::invalid_argument::invalid_argument 41 API calls 14088->14089 14090 431b54 14089->14090 14090->14079 14092 434b15 ___std_exception_copy 41 API calls 14091->14092 14093 403522 14092->14093 14093->14071 14094 441c96 14095 44b01a ___std_exception_destroy 14 API calls 14094->14095 14096 441cae 14095->14096 16678 4247b0 16679 4248ed 16678->16679 16680 4247ed 16678->16680 16681 403330 42 API calls 16679->16681 16685 424a30 42 API calls 16680->16685 16682 4248f2 16681->16682 16683 424a23 16682->16683 16684 42493d 16682->16684 16686 403330 42 API calls 16683->16686 16688 424a30 42 API calls 16684->16688 16691 424827 16685->16691 16687 424a28 16686->16687 16689 424977 16688->16689 16697 413d50 16689->16697 16692 41e1e0 40 API calls 16691->16692 16693 4248b4 16692->16693 16694 42499f 16695 41e1e0 40 API calls 16694->16695 16696 4249ea 16695->16696 16698 413df7 std::locale::_Locimp::_Locimp 16697->16698 16699 413d8f 16697->16699 16698->16694 16699->16698 16700 413d96 16699->16700 16701 413e69 16699->16701 16702 413f7d 16699->16702 16703 413f1e 16699->16703 16706 433672 std::_Facet_Register 42 API calls 16700->16706 16705 433672 std::_Facet_Register 42 API calls 16701->16705 16707 433672 std::_Facet_Register 42 API calls 16702->16707 16769 417e80 16703->16769 16708 413e73 16705->16708 16709 413da0 16706->16709 16710 413f8a 16707->16710 16708->16698 16730 42bf30 16708->16730 16711 433672 std::_Facet_Register 42 API calls 16709->16711 16710->16698 16714 413fd3 16710->16714 16715 41408e 16710->16715 16713 413dd2 16711->16713 16757 42f460 16713->16757 16718 414004 16714->16718 16719 413fdb 16714->16719 16717 403330 42 API calls 16715->16717 16722 414093 16717->16722 16720 433672 std::_Facet_Register 42 API calls 16718->16720 16719->16722 16723 413fe6 16719->16723 16720->16698 16721 413eb1 16721->16698 16726 413d50 104 API calls 16721->16726 16724 402b50 Concurrency::cancel_current_task 42 API calls 16722->16724 16725 433672 std::_Facet_Register 42 API calls 16723->16725 16727 413fec 16724->16727 16725->16727 16726->16721 16727->16698 16728 438c70 std::_Throw_Cpp_error 40 API calls 16727->16728 16729 41409d 16728->16729 16731 42bf42 16730->16731 16732 42bfab 16730->16732 16733 42bf7c 16731->16733 16734 42bf4d 16731->16734 16735 403330 42 API calls 16732->16735 16738 42bf99 16733->16738 16740 433672 std::_Facet_Register 42 API calls 16733->16740 16736 42bfb0 16734->16736 16737 42bf54 16734->16737 16735->16736 16741 402b50 Concurrency::cancel_current_task 42 API calls 16736->16741 16739 433672 std::_Facet_Register 42 API calls 16737->16739 16738->16721 16742 42bf5a 16739->16742 16743 42bf86 16740->16743 16741->16742 16744 438c70 std::_Throw_Cpp_error 40 API calls 16742->16744 16745 42bf63 16742->16745 16743->16721 16746 42bfba 16744->16746 16745->16721 16747 42c077 16746->16747 16748 42c00c 16746->16748 16751 42c013 std::locale::_Locimp::_Locimp 16746->16751 16750 403330 42 API calls 16747->16750 16774 41fab0 16748->16774 16752 42c07c 16750->16752 16751->16721 16753 433672 std::_Facet_Register 42 API calls 16752->16753 16754 42c0ae 16753->16754 16755 403040 std::_Throw_Cpp_error 42 API calls 16754->16755 16756 42c0f2 16755->16756 16756->16721 16758 42f498 16757->16758 16759 42f53f 16757->16759 16760 433672 std::_Facet_Register 42 API calls 16758->16760 16759->16698 16761 42f4ba 16760->16761 16762 4163b0 std::_Throw_Cpp_error 42 API calls 16761->16762 16763 42f4d0 16762->16763 16764 413d50 104 API calls 16763->16764 16765 42f4e0 16764->16765 16766 42f460 104 API calls 16765->16766 16767 42f531 16766->16767 16768 42f460 104 API calls 16767->16768 16768->16759 16770 433672 std::_Facet_Register 42 API calls 16769->16770 16771 417ea6 16770->16771 16772 4163b0 std::_Throw_Cpp_error 42 API calls 16771->16772 16773 417ec5 16772->16773 16773->16698 16775 41fac2 16774->16775 16776 41fb2b 16774->16776 16778 41facd 16775->16778 16779 41fafc 16775->16779 16777 402b50 Concurrency::cancel_current_task 42 API calls 16776->16777 16781 41fada 16777->16781 16778->16776 16782 41fad4 16778->16782 16780 41fb19 16779->16780 16784 433672 std::_Facet_Register 42 API calls 16779->16784 16780->16751 16785 438c70 std::_Throw_Cpp_error 40 API calls 16781->16785 16787 41fae3 16781->16787 16783 433672 std::_Facet_Register 42 API calls 16782->16783 16783->16781 16786 41fb06 16784->16786 16788 41fb35 16785->16788 16786->16751 16787->16751 16790 41fb5b std::locale::_Setgloballocale 16788->16790 16792 429c70 16788->16792 16790->16751 16791 41fb7f 16791->16751 16793 429dc4 16792->16793 16798 429ca2 16792->16798 16794 403330 42 API calls 16793->16794 16802 429d04 std::locale::_Locimp::_Locimp 16794->16802 16795 429dbf 16796 402b50 Concurrency::cancel_current_task 42 API calls 16795->16796 16796->16793 16797 438c70 std::_Throw_Cpp_error 40 API calls 16799 429dce 16797->16799 16798->16795 16800 429cf3 16798->16800 16801 429d1d 16798->16801 16811 419950 16799->16811 16800->16795 16804 429cfe 16800->16804 16801->16802 16806 433672 std::_Facet_Register 42 API calls 16801->16806 16802->16797 16810 429d8f std::ios_base::_Ios_base_dtor 16802->16810 16805 433672 std::_Facet_Register 42 API calls 16804->16805 16805->16802 16806->16802 16807 429dd9 16808 4351fb std::_Throw_Cpp_error RaiseException 16807->16808 16809 429de2 16808->16809 16810->16791 16812 419968 16811->16812 16813 419978 std::ios_base::_Ios_base_dtor 16811->16813 16812->16813 16814 438c70 std::_Throw_Cpp_error 40 API calls 16812->16814 16813->16807 16815 41998d 16814->16815 16816 419a4f 16815->16816 16823 432b74 16815->16823 16816->16807 16822 419a04 16822->16807 16824 432af7 16823->16824 16826 4199cc 16824->16826 16852 439815 16824->16852 16826->16816 16831 4183b0 16826->16831 16830 43d0a8 78 API calls 16830->16826 16832 41843c 16831->16832 16833 418463 16831->16833 16904 44120a 16832->16904 16835 41c430 16833->16835 16836 432470 std::_Lockit::_Lockit 7 API calls 16835->16836 16837 41c45f 16836->16837 16838 432470 std::_Lockit::_Lockit 7 API calls 16837->16838 16842 41c4a9 std::_Throw_Cpp_error 16837->16842 16839 41c481 16838->16839 16844 4324c8 std::_Lockit::~_Lockit 2 API calls 16839->16844 16840 41c4f8 16841 4324c8 std::_Lockit::~_Lockit 2 API calls 16840->16841 16843 41c5c9 16841->16843 16842->16840 16845 433672 std::_Facet_Register 42 API calls 16842->16845 16843->16822 16844->16842 16846 41c506 16845->16846 16847 404040 std::_Throw_Cpp_error 75 API calls 16846->16847 16848 41c536 16847->16848 16849 404100 std::_Throw_Cpp_error 73 API calls 16848->16849 16850 41c592 16849->16850 16851 4326f7 std::_Facet_Register 42 API calls 16850->16851 16851->16840 16854 43975e std::locale::_Setgloballocale 16852->16854 16853 439771 16855 4416ff __floor_pentium4 14 API calls 16853->16855 16854->16853 16857 439791 16854->16857 16856 439776 16855->16856 16858 438c60 ___std_exception_copy 40 API calls 16856->16858 16859 4397a3 16857->16859 16860 439796 16857->16860 16868 432b43 16858->16868 16861 44a8ef 17 API calls 16859->16861 16862 4416ff __floor_pentium4 14 API calls 16860->16862 16863 4397ac 16861->16863 16862->16868 16864 4397b3 16863->16864 16865 4397c0 16863->16865 16866 4416ff __floor_pentium4 14 API calls 16864->16866 16867 4397fe RtlLeaveCriticalSection 16865->16867 16866->16868 16867->16868 16868->16826 16869 43d5f6 16868->16869 16870 43d609 ___std_exception_copy 16869->16870 16875 43d34d 16870->16875 16873 43899c ___std_exception_copy 40 API calls 16874 432b5e 16873->16874 16874->16826 16874->16830 16877 43d359 std::locale::_Setgloballocale 16875->16877 16876 43d35f 16878 438be3 ___std_exception_copy 40 API calls 16876->16878 16877->16876 16879 43d3a2 16877->16879 16885 43d37a 16878->16885 16886 441250 RtlEnterCriticalSection 16879->16886 16881 43d3ae 16887 43d4d0 16881->16887 16883 43d3c4 16896 43d3ed 16883->16896 16885->16873 16886->16881 16888 43d4e3 16887->16888 16889 43d4f6 16887->16889 16888->16883 16899 43d3f7 16889->16899 16891 43d5a7 16891->16883 16892 43d519 16892->16891 16893 439a91 73 API calls 16892->16893 16894 43d547 16893->16894 16895 44263d 42 API calls 16894->16895 16895->16891 16903 441264 RtlLeaveCriticalSection 16896->16903 16898 43d3f5 16898->16885 16900 43d408 16899->16900 16902 43d460 16899->16902 16901 4425fd 42 API calls 16900->16901 16900->16902 16901->16902 16902->16892 16903->16898 16905 441216 16904->16905 16907 44122b 16904->16907 16906 4416ff __floor_pentium4 14 API calls 16905->16906 16908 44121b 16906->16908 16907->16833 16909 438c60 ___std_exception_copy 40 API calls 16908->16909 16910 441226 16909->16910 16910->16833

                                                  Control-flow Graph

                                                  APIs
                                                  • setsockopt.WS2_32(00000338,0000FFFF,00001006,?,00000008), ref: 004C7BA6
                                                  • recv.WS2_32(?,00000004,00000002), ref: 004C7BC1
                                                  • WSAGetLastError.WS2_32 ref: 004C7BC5
                                                  • recv.WS2_32(00000000,0000000C,00000002,00000000), ref: 004C7C43
                                                  • recv.WS2_32(00000000,0000000C,00000008), ref: 004C7C64
                                                  • setsockopt.WS2_32(0000FFFF,00001006,?,00000008,?), ref: 004C7D00
                                                  • recv.WS2_32(00000000,?,00000008), ref: 004C7D1B
                                                    • Part of subcall function 004C8590: WSAStartup.WS2_32 ref: 004C85BA
                                                    • Part of subcall function 004C8590: getaddrinfo.WS2_32(?,?,?,00589328), ref: 004C863C
                                                    • Part of subcall function 004C8590: socket.WS2_32(?,?,?), ref: 004C865D
                                                    • Part of subcall function 004C8590: connect.WS2_32(00000000,00559BFC,?), ref: 004C8671
                                                    • Part of subcall function 004C8590: closesocket.WS2_32(00000000), ref: 004C867D
                                                    • Part of subcall function 004C8590: FreeAddrInfoW.WS2_32(?), ref: 004C868A
                                                    • Part of subcall function 004C8590: WSACleanup.WS2_32 ref: 004C8690
                                                  • recv.WS2_32(?,00000004,00000008), ref: 004C7E23
                                                  • __Xtime_get_ticks.LIBCPMT ref: 004C7E2A
                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004C7E38
                                                  • Sleep.KERNELBASE(00000001,00000000,?,00002710,00000000), ref: 004C7EB1
                                                  • Sleep.KERNELBASE(00000064,?,00002710,00000000), ref: 004C7EB9
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.3053323681.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000006.00000002.3053289630.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053548356.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053619862.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053666684.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053714192.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3055172793.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: recv$Sleepsetsockopt$AddrCleanupErrorFreeInfoLastStartupUnothrow_t@std@@@Xtime_get_ticks__ehfuncinfo$??2@closesocketconnectgetaddrinfosocket
                                                  • String ID:
                                                  • API String ID: 3089209366-0
                                                  • Opcode ID: 8d3946fe3169219faa6fe5bee61fed8aa12524093e2a17fd3f9cf1df00312f66
                                                  • Instruction ID: b3d54dcccad81d83ab75f13ba9899d4b50e1d8608cabcccfb3508871926cac68
                                                  • Opcode Fuzzy Hash: 8d3946fe3169219faa6fe5bee61fed8aa12524093e2a17fd3f9cf1df00312f66
                                                  • Instruction Fuzzy Hash: 9EB1AC71D043089BEB10DBA8CC49BAEBBB1BB54314F24025EE815BB2D2D7785D88DF95

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 56 4c8590-4c85c2 WSAStartup 57 4c85c8-4c85f2 call 4ea420 * 2 56->57 58 4c8696-4c869f 56->58 63 4c85fe-4c8644 getaddrinfo 57->63 64 4c85f4-4c85f8 57->64 65 4c8646-4c864c 63->65 66 4c8690 WSACleanup 63->66 64->58 64->63 67 4c864e 65->67 68 4c86a4-4c86ae FreeAddrInfoW 65->68 66->58 70 4c8654-4c8668 socket 67->70 68->66 69 4c86b0-4c86b8 68->69 70->66 71 4c866a-4c867a connect 70->71 72 4c867c-4c8684 closesocket 71->72 73 4c86a0 71->73 72->70 74 4c8686-4c868a FreeAddrInfoW 72->74 73->68 74->66
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.3053323681.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000006.00000002.3053289630.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053548356.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053619862.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053666684.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053714192.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3055172793.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: AddrFreeInfo$CleanupStartupclosesocketconnectgetaddrinfosocket
                                                  • String ID:
                                                  • API String ID: 448659506-0
                                                  • Opcode ID: 52d29ec15fbf37ccd53ab56e21f2e3f1d11727fcf2b6a4206c2cbc59116a4c78
                                                  • Instruction ID: ffa07009e3086412046aa5b15573dbd5c691e56a3beb11943292ef2f0f62f1de
                                                  • Opcode Fuzzy Hash: 52d29ec15fbf37ccd53ab56e21f2e3f1d11727fcf2b6a4206c2cbc59116a4c78
                                                  • Instruction Fuzzy Hash: 9531C1726043009BD7208F25DC48B2BB7E5FB94729F114B1EF9A4922E0D7759C089AA7

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 75 409280-4092dd call 4163b0 78 409413-409521 call 402df0 call 4ea420 75->78 79 4092e3-4092e9 75->79 95 409523-409535 78->95 96 409537-40953f call 418dc0 78->96 80 4092f0-409313 79->80 82 409324-409331 80->82 83 409315-40931f 80->83 86 409342-40934f 82->86 87 409333-40933d 82->87 85 409403-409406 83->85 89 409409-40940d 85->89 90 409360-40936d 86->90 91 409351-40935b 86->91 87->85 89->78 89->80 93 40937e-40938b 90->93 94 40936f-409379 90->94 91->85 99 409399-4093a6 93->99 100 40938d-409397 93->100 94->85 97 409544-409597 call 4ea420 * 2 95->97 96->97 112 409599-4095c8 call 4ea420 call 435270 97->112 113 4095cb-4095e1 call 4ea420 97->113 101 4093b4-4093c1 99->101 102 4093a8-4093b2 99->102 100->85 104 4093c3-4093cd 101->104 105 4093cf-4093dc 101->105 102->85 104->85 107 4093ea-4093f4 105->107 108 4093de-4093e8 105->108 107->89 111 4093f6-4093ff 107->111 108->85 111->85 112->113 119 4096e2 113->119 120 4095e7-4095ed 113->120 122 4096e6-4096f0 119->122 121 4095f0-4096ce GetModuleHandleA GetProcAddress WSASend 120->121 124 4096d4-4096dc 121->124 125 40975f-409763 121->125 126 4096f2-4096fe 122->126 127 40971e-40973d 122->127 124->119 124->121 125->122 128 409700-40970e 126->128 129 409714-40971b call 4338f3 126->129 130 40976f-409796 127->130 131 40973f-40974b 127->131 128->129 132 409797-4097fe call 438c70 call 402df0 * 2 128->132 129->127 134 409765-40976c call 4338f3 131->134 135 40974d-40975b 131->135 134->130 135->132 138 40975d 135->138 138->134
                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(Ws2_32.dll,?,?,?,?,0054D15C,00000000,74D723A0,-00589880), ref: 004096A6
                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 004096B4
                                                  • WSASend.WS2_32(?,?,00000001,00000000,00000000,00000000,00000000,?,?,?,?,0054D15C,00000000,74D723A0,-00589880), ref: 004096C9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.3053323681.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000006.00000002.3053289630.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053548356.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053619862.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053666684.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053714192.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3055172793.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: AddressHandleModuleProcSend
                                                  • String ID: Ws2_32.dll
                                                  • API String ID: 2819740048-3093949381
                                                  • Opcode ID: 0c5b624b17a65c434d4aee340a1faa291cdcfc0b514f52879977d9ab4ae146b8
                                                  • Instruction ID: 188670ed5cfc709ed037a390f66f33add7af100e18449b0941b00ad524943a05
                                                  • Opcode Fuzzy Hash: 0c5b624b17a65c434d4aee340a1faa291cdcfc0b514f52879977d9ab4ae146b8
                                                  • Instruction Fuzzy Hash: 7C02CE70D04298DEDF25CFA4C8907ADBBB0EF59304F24429EE4456B2C6D7781D86CB96

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 146 4c7ef0-4c7f3c 147 4c7f6c-4c7f72 146->147 148 4c7f3e-4c7f67 call 402cf0 call 409280 146->148 149 4c7f8e-4c7f94 147->149 150 4c7f74-4c7f89 call 416290 147->150 161 4c84db-4c8504 call 402df0 148->161 153 4c7f96-4c7fab call 416290 149->153 154 4c7fb0-4c7fb6 149->154 150->161 153->161 158 4c7fb8-4c7fbc 154->158 159 4c7fd5-4c7fdb 154->159 158->161 163 4c7fc2-4c7fd0 call 416290 158->163 164 4c7fdd-4c7ff6 call 4412b7 159->164 165 4c7ffb-4c8001 159->165 163->161 164->161 167 4c800f-4c8015 165->167 168 4c8003-4c800a 165->168 173 4c801b-4c8040 call 405400 167->173 174 4c82c0-4c82c6 167->174 168->161 187 4c8042-4c805d 173->187 178 4c82c8-4c82f5 call 41b430 174->178 179 4c831b-4c8321 174->179 188 4c82fa-4c8316 call 413cb0 178->188 182 4c8376-4c837c 179->182 183 4c8323-4c8371 call 41b430 call 413cb0 179->183 185 4c837e-4c83cc call 41b430 call 413cb0 182->185 186 4c83d1-4c83d7 182->186 183->161 185->161 193 4c842c-4c8432 186->193 194 4c83d9-4c8427 call 41b430 call 413cb0 186->194 191 4c82a5-4c82b2 call 432baa 187->191 192 4c8063-4c8105 call 402cf0 call 4132d0 call 41ace0 call 416030 call 402df0 * 2 187->192 188->161 191->161 233 4c810b-4c81b0 call 402d30 call 4d62c0 call 402df0 call 4132d0 call 415ff0 192->233 234 4c82b7-4c82bb 192->234 196 4c8484-4c848a 193->196 197 4c8434-4c8482 call 41b430 call 413cb0 193->197 194->161 196->161 207 4c848c-4c84bf call 458b00 call 4162c0 call 402df0 196->207 197->161 207->161 245 4c81e5-4c823c call 4132d0 233->245 246 4c81b2-4c81e0 GetCurrentProcess call 4163b0 call 4cf280 233->246 234->187 252 4c823e 245->252 253 4c8240-4c8242 call 439820 245->253 256 4c827c-4c82a0 call 415230 call 402df0 246->256 252->253 257 4c8247-4c824e 253->257 256->191 257->256 259 4c8250-4c8279 call 441628 call 43d0a8 257->259 259->256
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.3053323681.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000006.00000002.3053289630.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053548356.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053619862.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053666684.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053714192.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3055172793.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 8.46.123.33$`"
                                                  • API String ID: 0-2723457641
                                                  • Opcode ID: 62be95e75bfc9955406362dd2ba270c5b44af2c2caadd96de6633b75f5f62eae
                                                  • Instruction ID: 65307ecbef6fb9e01e3d4ad067897c34c173f6a72c2a6aa1ef5fcaa49911cde8
                                                  • Opcode Fuzzy Hash: 62be95e75bfc9955406362dd2ba270c5b44af2c2caadd96de6633b75f5f62eae
                                                  • Instruction Fuzzy Hash: 0E02A070D04248DFDB14DF68C945BDDBBB0AB14308F14419ED8057B386EBB95E88DB9A

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 266 449789-4497ab 267 4497b1-4497b3 266->267 268 44999e 266->268 270 4497b5-4497d4 call 438be3 267->270 271 4497df-449802 267->271 269 4499a0-4499a4 268->269 277 4497d7-4497da 270->277 273 449804-449806 271->273 274 449808-44980e 271->274 273->274 276 449810-449821 273->276 274->270 274->276 278 449834-449844 call 4492ce 276->278 279 449823-449831 call 44263d 276->279 277->269 284 449846-44984c 278->284 285 44988d-44989f 278->285 279->278 288 449875-44988b call 448e9f 284->288 289 44984e-449851 284->289 286 4498f6-449916 WriteFile 285->286 287 4498a1-4498a7 285->287 290 449921 286->290 291 449918-44991e GetLastError 286->291 293 4498e2-4498f4 call 44934b 287->293 294 4498a9-4498ac 287->294 306 44986e-449870 288->306 295 449853-449856 289->295 296 44985c-44986b call 449266 289->296 301 449924-44992f 290->301 291->290 313 4498c9-4498cc 293->313 302 4498ce-4498e0 call 44950f 294->302 303 4498ae-4498b1 294->303 295->296 297 449936-449939 295->297 296->306 309 44993c-44993e 297->309 307 449931-449934 301->307 308 449999-44999c 301->308 302->313 303->309 310 4498b7-4498c4 call 449426 303->310 306->301 307->297 308->269 314 449940-449945 309->314 315 44996c-449978 309->315 310->313 313->306 319 449947-449959 314->319 320 44995e-449967 call 4416c8 314->320 317 449982-449994 315->317 318 44997a-449980 315->318 317->277 318->268 318->317 319->277 320->277
                                                  APIs
                                                    • Part of subcall function 00448E9F: GetConsoleOutputCP.KERNEL32(E81620C6,00000000,00000000,?), ref: 00448F02
                                                  • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0044990E
                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?), ref: 00449918
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.3053323681.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000006.00000002.3053289630.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053548356.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053619862.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053666684.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053714192.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3055172793.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: ConsoleErrorFileLastOutputWrite
                                                  • String ID:
                                                  • API String ID: 2915228174-0
                                                  • Opcode ID: 2beaef352ff8862ad6b8b16251cd0bd229135013537871e9a6efb1225fc67aec
                                                  • Instruction ID: 4c198159cf300fc4e9085a349e24ad4d45033eb13303bb4f9288eddf9455663d
                                                  • Opcode Fuzzy Hash: 2beaef352ff8862ad6b8b16251cd0bd229135013537871e9a6efb1225fc67aec
                                                  • Instruction Fuzzy Hash: 9961C5B1C14119BFEF11DFA8C844AAFBBB9AF49304F14014AE800A7316D739DD05EB65

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 323 448dff-448e13 call 44e940 326 448e15-448e17 323->326 327 448e19-448e21 323->327 328 448e67-448e87 call 44e8af 326->328 329 448e23-448e2a 327->329 330 448e2c-448e2f 327->330 338 448e99 328->338 339 448e89-448e97 call 4416c8 328->339 329->330 332 448e37-448e4b call 44e940 * 2 329->332 333 448e31-448e35 330->333 334 448e4d-448e5d call 44e940 FindCloseChangeNotification 330->334 332->326 332->334 333->332 333->334 334->326 342 448e5f-448e65 GetLastError 334->342 344 448e9b-448e9e 338->344 339->344 342->328
                                                  APIs
                                                  • FindCloseChangeNotification.KERNELBASE(00000000,00000000,?,?,00448CE6,00000000,?,0057A178,0000000C,00448DA2,?,?,?), ref: 00448E55
                                                  • GetLastError.KERNEL32(?,00448CE6,00000000,?,0057A178,0000000C,00448DA2,?,?,?), ref: 00448E5F
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.3053323681.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000006.00000002.3053289630.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053548356.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053619862.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053666684.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053714192.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3055172793.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: ChangeCloseErrorFindLastNotification
                                                  • String ID:
                                                  • API String ID: 1687624791-0
                                                  • Opcode ID: 1fe827fdfe079599b9b1dab25e2b646f0beb01ea40d46a72429d261cc15a62e7
                                                  • Instruction ID: bfed174018f4c3fae0b74bea86efe9ace0911028d3bee9629bfc5162a0057b67
                                                  • Opcode Fuzzy Hash: 1fe827fdfe079599b9b1dab25e2b646f0beb01ea40d46a72429d261cc15a62e7
                                                  • Instruction Fuzzy Hash: 6E1125336042102AF6252236A84677F67499B82738F39061FF918CB2D2DF689C81825D

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 348 44251c-442534 call 44e940 351 442536-44253d 348->351 352 44254a-442560 SetFilePointerEx 348->352 353 442544-442548 351->353 354 442575-44257f 352->354 355 442562-442573 GetLastError call 4416c8 352->355 356 44259b-44259e 353->356 354->353 358 442581-442596 354->358 355->353 358->356
                                                  APIs
                                                  • SetFilePointerEx.KERNELBASE(00000000,?,?,?,?,?,00000000,?,?,?,00442626,?,?,?,?,?), ref: 00442558
                                                  • GetLastError.KERNEL32(?,?,?,?,00442626,?,?,?,?,?,00000000,?,00000000), ref: 00442565
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.3053323681.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000006.00000002.3053289630.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053548356.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053619862.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053666684.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053714192.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3055172793.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: ErrorFileLastPointer
                                                  • String ID:
                                                  • API String ID: 2976181284-0
                                                  • Opcode ID: 0df1753fdbe4f7a704092f8361e7cfb0c7cc0fcadc70f8748e4d2d33b1623b65
                                                  • Instruction ID: bcffdd1dd92d970d4fbe8e398a8ab980657c5c2bf717c74f1f656664416c076e
                                                  • Opcode Fuzzy Hash: 0df1753fdbe4f7a704092f8361e7cfb0c7cc0fcadc70f8748e4d2d33b1623b65
                                                  • Instruction Fuzzy Hash: 9B012632610615BFDF158F69DC1699E3B29EB84334F240209F8019B2E1E6B5ED429BA4

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 360 44b01a-44b023 361 44b025-44b038 RtlFreeHeap 360->361 362 44b052-44b053 360->362 361->362 363 44b03a-44b051 GetLastError call 441662 call 4416ff 361->363 363->362
                                                  APIs
                                                  • RtlFreeHeap.NTDLL(00000000,00000000,?,00451B48,?,00000000,?,?,00451DE9,?,00000007,?,?,004522DD,?,?), ref: 0044B030
                                                  • GetLastError.KERNEL32(?,?,00451B48,?,00000000,?,?,00451DE9,?,00000007,?,?,004522DD,?,?), ref: 0044B03B
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.3053323681.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000006.00000002.3053289630.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053548356.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053619862.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053666684.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053714192.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3055172793.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: ErrorFreeHeapLast
                                                  • String ID:
                                                  • API String ID: 485612231-0
                                                  • Opcode ID: 1c4e9b2b04b0a897153f19679bc75b8cfe8e1d75e6b310813c54f5389fc1414e
                                                  • Instruction ID: f233056e1464041c82b2d36bf1c88bdb576215b3e64377b8de55bab97aefa9e3
                                                  • Opcode Fuzzy Hash: 1c4e9b2b04b0a897153f19679bc75b8cfe8e1d75e6b310813c54f5389fc1414e
                                                  • Instruction Fuzzy Hash: 66E08C32100204ABEB212FA5AC0CB9A3B69EF00756F15802AF608971B0DB38C894D798

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 525 429e20-429e5c 526 429e62-429e7a 525->526 527 429f76 call 403330 525->527 529 429ea8-429eb8 526->529 530 429e7c-429e84 526->530 531 429f7b call 402b50 527->531 533 429eca-429ecc 529->533 534 429eba-429ec2 529->534 532 429e89-429e8a call 433672 530->532 541 429f80-429f85 call 438c70 531->541 543 429e8f-429e94 532->543 535 429ee4-429ee6 533->535 536 429ece-429ee2 call 433672 533->536 534->531 539 429ec8 534->539 542 429ee9 535->542 546 429eec-429f05 536->546 539->532 542->546 543->541 547 429e9a-429ea6 543->547 549 429f07-429f0c 546->549 550 429f0e-429f2b call 435270 546->550 547->542 551 429f2c-429f5c call 435270 call 4277d0 549->551 550->551
                                                  APIs
                                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00429F7B
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.3053323681.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000006.00000002.3053289630.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053548356.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053619862.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053666684.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053714192.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3055172793.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: Concurrency::cancel_current_task
                                                  • String ID:
                                                  • API String ID: 118556049-0
                                                  • Opcode ID: 89231c32f34513f3653cdb43c5981eaf783eb102a5dde278478019f5030ff27f
                                                  • Instruction ID: efe4cd6a287aa12a83b409d23e88dd93d6c4865ddef84cf0d949cd52fc0f7608
                                                  • Opcode Fuzzy Hash: 89231c32f34513f3653cdb43c5981eaf783eb102a5dde278478019f5030ff27f
                                                  • Instruction Fuzzy Hash: AA410271E001259FCB14DF68C9419AEBBB9EB89310F64422EE815E7381D738DE01CBE4

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 558 4032d0-4032e0 559 4032e2-4032e7 558->559 560 403306-403308 558->560 563 4032e9-4032ea call 433672 559->563 564 40331f call 402b50 559->564 561 403318-40331e 560->561 562 40330a-40330b call 433672 560->562 568 403310-403317 562->568 570 4032ef-4032f6 563->570 569 403324-403329 call 438c70 564->569 570->569 572 4032f8-403305 570->572
                                                  APIs
                                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0040331F
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.3053323681.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000006.00000002.3053289630.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053548356.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053619862.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053666684.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053714192.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3055172793.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: Concurrency::cancel_current_task
                                                  • String ID:
                                                  • API String ID: 118556049-0
                                                  • Opcode ID: 0fd589d96c9d07b1efa01aec19e4ff46bb0766daf2056f60d33bc81ca57302d3
                                                  • Instruction ID: ac639495c118a2832fc09027b5ebf4fad0cef292c7be368858978faeea3118d5
                                                  • Opcode Fuzzy Hash: 0fd589d96c9d07b1efa01aec19e4ff46bb0766daf2056f60d33bc81ca57302d3
                                                  • Instruction Fuzzy Hash: 63F024321001009BCB246F61D4565EAB7ECDF28366B50083FFC8DD7292EB3EDA408788

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 574 44a65a-44a665 575 44a667-44a671 574->575 576 44a673-44a679 574->576 575->576 577 44a6a7-44a6b2 call 4416ff 575->577 578 44a692-44a6a3 RtlAllocateHeap 576->578 579 44a67b-44a67c 576->579 583 44a6b4-44a6b6 577->583 581 44a6a5 578->581 582 44a67e-44a685 call 448280 578->582 579->578 581->583 582->577 587 44a687-44a690 call 445a89 582->587 587->577 587->578
                                                  APIs
                                                  • RtlAllocateHeap.NTDLL(00000008,?,00000001), ref: 0044A69B
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.3053323681.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000006.00000002.3053289630.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053548356.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053619862.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053666684.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053714192.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3055172793.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: AllocateHeap
                                                  • String ID:
                                                  • API String ID: 1279760036-0
                                                  • Opcode ID: 89032516e5b3e6299283371760f336f91a06b383302663fb1c071aa923d3998c
                                                  • Instruction ID: 9689b7dccde3e7d2c1426315cc49502dff6dd5535dcc2f3da2dc3831567fdc71
                                                  • Opcode Fuzzy Hash: 89032516e5b3e6299283371760f336f91a06b383302663fb1c071aa923d3998c
                                                  • Instruction Fuzzy Hash: 4CF0E0311905246BFB216A66DC05B5B375CAF41760F1E8117EC84EB190CA3CDC3146EE

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 590 44b094-44b0a0 591 44b0d2-44b0dd call 4416ff 590->591 592 44b0a2-44b0a4 590->592 600 44b0df-44b0e1 591->600 593 44b0a6-44b0a7 592->593 594 44b0bd-44b0ce RtlAllocateHeap 592->594 593->594 596 44b0d0 594->596 597 44b0a9-44b0b0 call 448280 594->597 596->600 597->591 602 44b0b2-44b0bb call 445a89 597->602 602->591 602->594
                                                  APIs
                                                  • RtlAllocateHeap.NTDLL(00000000,00000001,?), ref: 0044B0C6
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.3053323681.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000006.00000002.3053289630.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053548356.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053619862.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053666684.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053714192.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3055172793.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: AllocateHeap
                                                  • String ID:
                                                  • API String ID: 1279760036-0
                                                  • Opcode ID: c639ae0624eff34eb8e57d07392fb4ffc7a0b3e65f726cef66c68c9318aea675
                                                  • Instruction ID: 07eaf642519ac51a5bd3283dd2addbb445c80e248ae9cef49388ffb333b33e8c
                                                  • Opcode Fuzzy Hash: c639ae0624eff34eb8e57d07392fb4ffc7a0b3e65f726cef66c68c9318aea675
                                                  • Instruction Fuzzy Hash: 99E022322006206BFF313AA69C14B5B764CEF413A3F190227EC25A62D1DB3CCC0092EE
                                                  APIs
                                                  • VirtualAllocEx.KERNEL32(00000000,00000000,?,00003000,00000040), ref: 004CF2F1
                                                  • WriteProcessMemory.KERNEL32(00000000,00000000,?,?,00000000), ref: 004CF30D
                                                  • WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 004CF342
                                                  • VirtualAllocEx.KERNEL32(?,00000000,00001000,00003000,00000040), ref: 004CF36B
                                                  • WriteProcessMemory.KERNEL32(?,00000000,?,00000218,00000000), ref: 004CF50F
                                                  • WriteProcessMemory.KERNEL32(?,00000218,004CF5E0,-00000010,00000000), ref: 004CF531
                                                  • CreateRemoteThread.KERNEL32(?,00000000,00000000,00000218,00000000,00000000,00000000), ref: 004CF544
                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004CF54D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.3053323681.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000006.00000002.3053289630.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053548356.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053619862.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053666684.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053714192.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3055172793.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: MemoryProcessWrite$AllocVirtual$CreateObjectRemoteSingleThreadWait
                                                  • String ID: %s|%s$131
                                                  • API String ID: 2137838514-1629954864
                                                  • Opcode ID: 56832ecef500e677efd1bb06992289c8d25f2aec25ece3c31dc7adbce4683aa5
                                                  • Instruction ID: 2ab717f03d3c912496b66fb944616d360f792c6fe5d042a247d22025e7d5b78f
                                                  • Opcode Fuzzy Hash: 56832ecef500e677efd1bb06992289c8d25f2aec25ece3c31dc7adbce4683aa5
                                                  • Instruction Fuzzy Hash: 36B16BB1D002089FDB14CFA4CC95BAEBBB5FF18300F10426DE905BB291D774A984DBA5
                                                  APIs
                                                    • Part of subcall function 00449E42: GetLastError.KERNEL32(00000000,?,0044F82B), ref: 00449E46
                                                    • Part of subcall function 00449E42: SetLastError.KERNEL32(00000000,00000000,00000001,00000006,000000FF), ref: 00449EE8
                                                  • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 004535D7
                                                  • IsValidCodePage.KERNEL32(?), ref: 00453615
                                                  • IsValidLocale.KERNEL32(?,00000001), ref: 00453628
                                                  • GetLocaleInfoW.KERNEL32(?,00001001,?,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 00453670
                                                  • GetLocaleInfoW.KERNEL32(?,00001002,?,00000040), ref: 0045368B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.3053323681.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000006.00000002.3053289630.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053548356.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053619862.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053666684.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053714192.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3055172793.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                  • String ID: *V
                                                  • API String ID: 415426439-2897881622
                                                  • Opcode ID: bb3ee8500ca9cacc625c50b97d6e48ff5c53ad3e39c4a6c01d9da358df15b7ae
                                                  • Instruction ID: 4a54d826d8e8e5dc964d84ffa3ac1e49b68ae0fe58eca9cd8e7cd24ca5604c7d
                                                  • Opcode Fuzzy Hash: bb3ee8500ca9cacc625c50b97d6e48ff5c53ad3e39c4a6c01d9da358df15b7ae
                                                  • Instruction Fuzzy Hash: 4E517471A00209AFDB20DFA5CC41ABF77B8AF05743F14446AED01E7252EB74DA48DB65
                                                  APIs
                                                    • Part of subcall function 00449E42: GetLastError.KERNEL32(00000000,?,0044F82B), ref: 00449E46
                                                    • Part of subcall function 00449E42: SetLastError.KERNEL32(00000000,00000000,00000001,00000006,000000FF), ref: 00449EE8
                                                  • GetACP.KERNEL32(?,?,?,?,?,?,00447300,?,?,?,?,?,-00000050,?,?,?), ref: 00452C19
                                                  • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00447300,?,?,?,?,?,-00000050,?,?), ref: 00452C50
                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,?,00000000,?), ref: 00452DB3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.3053323681.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000006.00000002.3053289630.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053548356.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053619862.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053666684.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053714192.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3055172793.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$CodeInfoLocalePageValid
                                                  • String ID: *V$utf8
                                                  • API String ID: 607553120-210452255
                                                  • Opcode ID: 95727e6ef7b94787d777f99e21165c393144e5509e4be2ad3f52f8295ffa9360
                                                  • Instruction ID: 742b11dcb7ff0b0bfa38c284345f0d68b4d7ce619a9ba0daefdf44cafbbca61f
                                                  • Opcode Fuzzy Hash: 95727e6ef7b94787d777f99e21165c393144e5509e4be2ad3f52f8295ffa9360
                                                  • Instruction Fuzzy Hash: F071FA32600602A6D725AF75CD45B6B73A8EF16705F10042FFD05D7283EBF8E94C9699
                                                  APIs
                                                  • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002,00000000,?,?,?,00453605,?,?), ref: 0045338C
                                                  • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002,00000000,?,?,?,00453605,?,?), ref: 004533B5
                                                  • GetACP.KERNEL32(?,?,00453605,?,?), ref: 004533CA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.3053323681.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000006.00000002.3053289630.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053548356.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053619862.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053666684.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053714192.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3055172793.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: InfoLocale
                                                  • String ID: ACP$OCP
                                                  • API String ID: 2299586839-711371036
                                                  • Opcode ID: b900ca414d4c4be95a8c6f041d08249478f894891a183a2f82a4edaf5765dc51
                                                  • Instruction ID: 0023b8279c9b3e3643c8ce07df61025d6c2b7e12d2ffc4f7461f6cfcb2a1a3ae
                                                  • Opcode Fuzzy Hash: b900ca414d4c4be95a8c6f041d08249478f894891a183a2f82a4edaf5765dc51
                                                  • Instruction Fuzzy Hash: 8021C432600100A7DB308F54C900A9BB3A6AF50FD3B568466EC06D7312EF36EF49D358
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.3053323681.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000006.00000002.3053289630.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053548356.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053619862.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053666684.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053714192.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3055172793.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 333d4b6d5425d6f9d03797ee82114c3711da98524c03317fffdb5ec62fb2b380
                                                  • Instruction ID: 01dad5c531b3804b6668612822d9feb5b6f7af541a2af8c3bc89036eeee974e8
                                                  • Opcode Fuzzy Hash: 333d4b6d5425d6f9d03797ee82114c3711da98524c03317fffdb5ec62fb2b380
                                                  • Instruction Fuzzy Hash: DA023A71E002199BDF14CFA9D9C06AEFBB1FF48314F24926AE919B7380D735A9418B94
                                                  APIs
                                                  • RtlDecodePointer.NTDLL(?), ref: 004579FC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.3053323681.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000006.00000002.3053289630.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053548356.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053619862.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053666684.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053714192.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3055172793.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: DecodePointer
                                                  • String ID: `-@$acos$asin$exp$log$log10$pow$sqrt
                                                  • API String ID: 3527080286-3628989360
                                                  • Opcode ID: 4c17630f5161de399ffce6b570c60365a2c89c55b52a7f760b39540bf94f5387
                                                  • Instruction ID: bbf143f63b3841ec77cfacb8c6df481a799db6acf17f433172942b25d65e7ef2
                                                  • Opcode Fuzzy Hash: 4c17630f5161de399ffce6b570c60365a2c89c55b52a7f760b39540bf94f5387
                                                  • Instruction Fuzzy Hash: 1651B370808A0ACBCF109F58F84C1BEBFB1FB05309F154166D851A7266C7799A2DCB4D
                                                  APIs
                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0041A09D
                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0041A0BF
                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0041A0E7
                                                  • __Getctype.LIBCPMT ref: 0041A1C5
                                                  • std::_Facet_Register.LIBCPMT ref: 0041A1F9
                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0041A223
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.3053323681.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000006.00000002.3053289630.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053548356.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053619862.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053666684.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053714192.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3055172793.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetctypeRegister
                                                  • String ID: PD@$PG@$E@
                                                  • API String ID: 1102183713-4120405683
                                                  • Opcode ID: 495f4126c8959cda1dad90c343e93fba20469dde2e2043d742b69906c970156d
                                                  • Instruction ID: b372b58ab1bb25eec4b44a09b7f8f3aef2cc67a410616163416d5e42c3dffe19
                                                  • Opcode Fuzzy Hash: 495f4126c8959cda1dad90c343e93fba20469dde2e2043d742b69906c970156d
                                                  • Instruction Fuzzy Hash: 6E51BAB0D01245DFCB11CF98C9457AEBBF0FB14714F14825ED855AB391DB78AA88CB92
                                                  APIs
                                                  • _ValidateLocalCookies.LIBCMT ref: 00437307
                                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 0043730F
                                                  • _ValidateLocalCookies.LIBCMT ref: 00437398
                                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 004373C3
                                                  • _ValidateLocalCookies.LIBCMT ref: 00437418
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.3053323681.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000006.00000002.3053289630.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053548356.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053619862.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053666684.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053714192.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3055172793.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                  • String ID: `-@$csm
                                                  • API String ID: 1170836740-3738301566
                                                  • Opcode ID: a837c65dc98bc53f7a591b5dada66322cfdf011b0ab20b220170fbbfaeea83fd
                                                  • Instruction ID: bde692452db8eba3752ab90a3e7788ac0719a0bf92b2230e47b89eff8dfd02fd
                                                  • Opcode Fuzzy Hash: a837c65dc98bc53f7a591b5dada66322cfdf011b0ab20b220170fbbfaeea83fd
                                                  • Instruction Fuzzy Hash: B041F8709042099FCF20DF59C885A9FBBA4BF08328F14905BFC54AB392D739E905DB95
                                                  APIs
                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0041C45A
                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0041C47C
                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0041C4A4
                                                  • std::_Facet_Register.LIBCPMT ref: 0041C59A
                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0041C5C4
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.3053323681.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000006.00000002.3053289630.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053548356.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053619862.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053666684.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053714192.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3055172793.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                                  • String ID: E@$PD@
                                                  • API String ID: 459529453-4103272508
                                                  • Opcode ID: fb94b052f71f665722219136562a8730e5ed9d67761b2a33bc821d4977d05291
                                                  • Instruction ID: e4bc83ced0ac359faa997fd18d4eeb760fe14de2594101695cc0fd15b6690fbc
                                                  • Opcode Fuzzy Hash: fb94b052f71f665722219136562a8730e5ed9d67761b2a33bc821d4977d05291
                                                  • Instruction Fuzzy Hash: C351EFB0900255EFDB11CF58C991BAEBBF0FB10314F24415EE846AB381D7B9AA45CB95
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.3053323681.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000006.00000002.3053289630.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053548356.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053619862.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053666684.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053714192.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3055172793.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: _strrchr
                                                  • String ID:
                                                  • API String ID: 3213747228-0
                                                  • Opcode ID: 785c90e8ff89e0f1a3d98e37725974d6f6ea20f06d45e48120c47f1ca5a82ffe
                                                  • Instruction ID: d7b9d7273cbfac5d15a556f8c8651b9033d93685d5a38535419dded3191b9e75
                                                  • Opcode Fuzzy Hash: 785c90e8ff89e0f1a3d98e37725974d6f6ea20f06d45e48120c47f1ca5a82ffe
                                                  • Instruction Fuzzy Hash: D5B14672D006559FEB158F24CC81BEBBBA5EF59310F2441ABE904AB382D778D901C7E9
                                                  APIs
                                                  • FreeLibrary.KERNEL32(00000000,?,0044B48D,?,?,00000000,00000001,?,?,0044B6B7,00000022,FlsSetValue,00561B88,00561B90,00000001), ref: 0044B43F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.3053323681.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000006.00000002.3053289630.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053548356.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053619862.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053666684.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053714192.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3055172793.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: FreeLibrary
                                                  • String ID: api-ms-$ext-ms-
                                                  • API String ID: 3664257935-537541572
                                                  • Opcode ID: 033630484f002e070c94113c7b6ef7f262f68e90d70309fdd043a749aa00ed93
                                                  • Instruction ID: e3d7dbf8d3e43151f67a2d3675c4fcd7809fc0c9af6198dcb17880ded4e1cd5b
                                                  • Opcode Fuzzy Hash: 033630484f002e070c94113c7b6ef7f262f68e90d70309fdd043a749aa00ed93
                                                  • Instruction Fuzzy Hash: A2212B36A01220A7E7319F619C45A6B7768EB51761F140112FC06A7392D734ED05D6D9
                                                  APIs
                                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,E81620C6,?,?,00000000,00551365,000000FF,?,0044360F,?,?,004435E3,00000016), ref: 00443668
                                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044367A
                                                  • FreeLibrary.KERNEL32(00000000,?,00000000,00551365,000000FF,?,0044360F,?,?,004435E3,00000016), ref: 0044369C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.3053323681.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000006.00000002.3053289630.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053548356.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053619862.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053666684.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053714192.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3055172793.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                  • String ID: CorExitProcess$`-@$mscoree.dll
                                                  • API String ID: 4061214504-3731901874
                                                  • Opcode ID: 66c557226bdf84cfe892202a4e2d9d598a1facfa92736b92f61228ad13b2a6bb
                                                  • Instruction ID: 11f561727bfec435161e86ab51d2faaed74d5e09c0b89d0474703e999051cdf2
                                                  • Opcode Fuzzy Hash: 66c557226bdf84cfe892202a4e2d9d598a1facfa92736b92f61228ad13b2a6bb
                                                  • Instruction Fuzzy Hash: 5601A232A44715AFDB219F44DC19BAFBBB8FB14B52F014526E812E27E0DB749A04CA94
                                                  APIs
                                                  • __EH_prolog3.LIBCMT ref: 00432730
                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0043273B
                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 004327A9
                                                    • Part of subcall function 0043288C: std::locale::_Locimp::_Locimp.LIBCPMT ref: 004328A4
                                                  • std::locale::_Setgloballocale.LIBCPMT ref: 00432756
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.3053323681.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000006.00000002.3053289630.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053548356.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053619862.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053666684.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053714192.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3055172793.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                                                  • String ID: `-@
                                                  • API String ID: 677527491-3781167437
                                                  • Opcode ID: 8a5613631ec3d916f95b396eb7cc43f12c5d676d84142dd5ef1a29976cc47206
                                                  • Instruction ID: 335728d06f8999c9367bb6f0cb93ad347570f0e44e9dcbef2930aaa8ccdcd417
                                                  • Opcode Fuzzy Hash: 8a5613631ec3d916f95b396eb7cc43f12c5d676d84142dd5ef1a29976cc47206
                                                  • Instruction Fuzzy Hash: 9D01FC35A006109BC70AFB20CC5157D7BB0FF98790F44250EE81163391CFB8AE06DB89
                                                  APIs
                                                  • GetCurrentThreadId.KERNEL32 ref: 00432BDC
                                                  • RtlAcquireSRWLockExclusive.NTDLL(00000008), ref: 00432BFB
                                                  • RtlAcquireSRWLockExclusive.NTDLL(00000008), ref: 00432C29
                                                  • RtlTryAcquireSRWLockExclusive.NTDLL(00000008), ref: 00432C84
                                                  • RtlTryAcquireSRWLockExclusive.NTDLL(00000008), ref: 00432C9B
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.3053323681.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000006.00000002.3053289630.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053548356.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053619862.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053666684.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053714192.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3055172793.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: AcquireExclusiveLock$CurrentThread
                                                  • String ID:
                                                  • API String ID: 66001078-0
                                                  • Opcode ID: 8f089e7040faa662b45679f060ee1b8a0f0adfff173fd46cb89089840a213128
                                                  • Instruction ID: ee0d2db44a198d3d02c1eb3b1b0ff5a364ec90963e300245c4d31640e9e12550
                                                  • Opcode Fuzzy Hash: 8f089e7040faa662b45679f060ee1b8a0f0adfff173fd46cb89089840a213128
                                                  • Instruction Fuzzy Hash: B2415931900A0ADFCB20DF65CA8096EB3B4FF0C311F20692BD446D7650D7B8E986DB69
                                                  APIs
                                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 0040750C
                                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00407522
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.3053323681.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000006.00000002.3053289630.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053548356.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053619862.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053666684.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053714192.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3055172793.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: ___std_exception_destroy
                                                  • String ID: )@$[json.exception.
                                                  • API String ID: 4194217158-3378332251
                                                  • Opcode ID: 4652241d20ade2deec45ea96ce2d830c3218ea46f2c4051146d7c77cfc23a2b6
                                                  • Instruction ID: d1fd1ad00dbeab1566b73d8112c34bc80c76f551163e59ed82d928a5322bc1a2
                                                  • Opcode Fuzzy Hash: 4652241d20ade2deec45ea96ce2d830c3218ea46f2c4051146d7c77cfc23a2b6
                                                  • Instruction Fuzzy Hash: 8C51CFB1C046489BD710DFA8C905B9EBBB4FF15318F14426EE850A73C2E7B86A44C7A5
                                                  APIs
                                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 0040499F
                                                    • Part of subcall function 004351FB: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,74D723A0,?,00431D09,?,005799D8,74D723A0,?,74D723A0,-00589880), ref: 0043525B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.3053323681.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000006.00000002.3053289630.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053548356.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053619862.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053666684.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053714192.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3055172793.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: ExceptionIos_base_dtorRaisestd::ios_base::_
                                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                  • API String ID: 1903096808-1866435925
                                                  • Opcode ID: 5e8fcf04681b5496c91e096f1d273a5343178b8940b0c322b64de4dd1df32f3c
                                                  • Instruction ID: 99c94d1e80f512c720ba00148ae48faeb0acee82eabb402b7e5943aa58dcc262
                                                  • Opcode Fuzzy Hash: 5e8fcf04681b5496c91e096f1d273a5343178b8940b0c322b64de4dd1df32f3c
                                                  • Instruction Fuzzy Hash: AC119CF2844644ABCB10DF688C03BAB37C8E744715F04463EFE58972C1EB399800C79A
                                                  APIs
                                                  • GetConsoleOutputCP.KERNEL32(E81620C6,00000000,00000000,?), ref: 00448F02
                                                    • Part of subcall function 0044EC55: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0044A862,?,00000000,-00000008), ref: 0044ECB6
                                                  • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00449154
                                                  • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 0044919A
                                                  • GetLastError.KERNEL32 ref: 0044923D
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.3053323681.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000006.00000002.3053289630.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053548356.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053619862.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053666684.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053714192.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3055172793.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                  • String ID:
                                                  • API String ID: 2112829910-0
                                                  • Opcode ID: d46c0870a8277536d77cd1fa32924c999241811f2f15ebdbc3735bbe4b8907ba
                                                  • Instruction ID: b6f9ea87837ca93654473fd2bae4ec290e60b55bc3ade45d2d9d29a5185f0d60
                                                  • Opcode Fuzzy Hash: d46c0870a8277536d77cd1fa32924c999241811f2f15ebdbc3735bbe4b8907ba
                                                  • Instruction Fuzzy Hash: 70D1BC75D00249AFDF14CFA8C880AAEBBB5FF09304F28456AE856EB351D734AD45CB54
                                                  APIs
                                                  • WriteConsoleW.KERNEL32(?,?,?,00000000,?,?,00453DCE,?,00000001,?,?,?,00449291,?,00000000,00000000), ref: 00456D49
                                                  • GetLastError.KERNEL32(?,00453DCE,?,00000001,?,?,?,00449291,?,00000000,00000000,?,?,?,0044986B,?), ref: 00456D55
                                                    • Part of subcall function 00456D1B: CloseHandle.KERNEL32(FFFFFFFE,00456D65,?,00453DCE,?,00000001,?,?,?,00449291,?,00000000,00000000,?,?), ref: 00456D2B
                                                  • ___initconout.LIBCMT ref: 00456D65
                                                    • Part of subcall function 00456CDD: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00456D0C,00453DBB,?,?,00449291,?,00000000,00000000,?), ref: 00456CF0
                                                  • WriteConsoleW.KERNEL32(?,?,?,00000000,?,00453DCE,?,00000001,?,?,?,00449291,?,00000000,00000000,?), ref: 00456D7A
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.3053323681.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000006.00000002.3053289630.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053548356.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053619862.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053666684.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053714192.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3055172793.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                  • String ID:
                                                  • API String ID: 2744216297-0
                                                  • Opcode ID: 6d252f6c85546040703605b5d122fbb434f3c9b6b34be8e7cd3f73b3df330617
                                                  • Instruction ID: b582005f90f2c4d159ccd48a3422ceca8e6e351b7b3b67145bbef734a6de3f3c
                                                  • Opcode Fuzzy Hash: 6d252f6c85546040703605b5d122fbb434f3c9b6b34be8e7cd3f73b3df330617
                                                  • Instruction Fuzzy Hash: F4F01C37500518BBCF221FD1DC18A8A3F76EB583A2B814415FE0D96231D6328928EB94
                                                  APIs
                                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00403819
                                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 004038F0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.3053323681.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000006.00000002.3053289630.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053548356.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053619862.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053666684.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053714192.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3055172793.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: ___std_exception_copy___std_exception_destroy
                                                  • String ID: )@
                                                  • API String ID: 2970364248-4120265097
                                                  • Opcode ID: bc0d8998ef7677fe248552ffb990bdda24e50fd16254b161269e6276ba7dcb2c
                                                  • Instruction ID: 269ef50febfdc4b1c22cf7239a576f40f0b19685bcb009e1facc48eb6157c32a
                                                  • Opcode Fuzzy Hash: bc0d8998ef7677fe248552ffb990bdda24e50fd16254b161269e6276ba7dcb2c
                                                  • Instruction Fuzzy Hash: DD6169B1C00248DBDB10DF98C945B9EFFB5FF19324F14825EE814AB282D7B95A44CBA5
                                                  APIs
                                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 0040499F
                                                    • Part of subcall function 004351FB: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,74D723A0,?,00431D09,?,005799D8,74D723A0,?,74D723A0,-00589880), ref: 0043525B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.3053323681.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000006.00000002.3053289630.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053548356.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053619862.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053666684.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053714192.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3055172793.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: ExceptionIos_base_dtorRaisestd::ios_base::_
                                                  • String ID: ios_base::badbit set$ios_base::failbit set
                                                  • API String ID: 1903096808-1240500531
                                                  • Opcode ID: c1627b7a904a1720a38adf2e22fc85e0473b9d2390fa8136052c714cdea77bf3
                                                  • Instruction ID: 59789774a96eacd1a5b8f49c51d8e497543063f0a2ed12b155596828dbf76f3a
                                                  • Opcode Fuzzy Hash: c1627b7a904a1720a38adf2e22fc85e0473b9d2390fa8136052c714cdea77bf3
                                                  • Instruction Fuzzy Hash: E84124B2C00244ABCB04DF68C845BAEBBB8FB49710F14826EF554A73C1D7795A00CBA5
                                                  APIs
                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00404061
                                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 004040C4
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.3053323681.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000006.00000002.3053289630.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053548356.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053619862.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053666684.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053714192.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3055172793.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                                  • String ID: bad locale name
                                                  • API String ID: 3988782225-1405518554
                                                  • Opcode ID: 0039d2d2ea2786ef81fe116e8b864d57793cf36a19fa060d6cb0c255b1586cee
                                                  • Instruction ID: 65c2995a4cce64452fc0e082f9126f7f9302ed92d60cad1113ce5137d9e79936
                                                  • Opcode Fuzzy Hash: 0039d2d2ea2786ef81fe116e8b864d57793cf36a19fa060d6cb0c255b1586cee
                                                  • Instruction Fuzzy Hash: DB112670805B84EED321CF69C50474BBFF0AF25714F10868DD09597781D3B9A604CB95
                                                  APIs
                                                  • ___std_exception_copy.LIBVCRUNTIME ref: 004165C9
                                                  • ___std_exception_copy.LIBVCRUNTIME ref: 004165FC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.3053323681.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000006.00000002.3053289630.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053548356.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053619862.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053666684.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053714192.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3055172793.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: ___std_exception_copy
                                                  • String ID: )@
                                                  • API String ID: 2659868963-4120265097
                                                  • Opcode ID: ec459901e9a8c12f2536e06f4ce64afd8286d8aca2aa337d2d7da09c98386d96
                                                  • Instruction ID: 79ebb971947c26e29da123751e765caa72f3f100f47198c89106861aa63fe252
                                                  • Opcode Fuzzy Hash: ec459901e9a8c12f2536e06f4ce64afd8286d8aca2aa337d2d7da09c98386d96
                                                  • Instruction Fuzzy Hash: F0112EB6910649EBCB11CF99C980B86FBF8FF09724F10876AE82497641E774A5448BA0
                                                  APIs
                                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00407A5C
                                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00407A72
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.3053323681.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000006.00000002.3053289630.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053548356.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053619862.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053666684.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053714192.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3055172793.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: ___std_exception_destroy
                                                  • String ID: )@
                                                  • API String ID: 4194217158-4120265097
                                                  • Opcode ID: 9ee8fa866bcea9d2c14fc14309fcadf8facde4318e0e6bb098ed358a1a235593
                                                  • Instruction ID: 96290d15a7b89a27e7413382239de33ac52fdad5c525fa7f0e86a9c1871ea130
                                                  • Opcode Fuzzy Hash: 9ee8fa866bcea9d2c14fc14309fcadf8facde4318e0e6bb098ed358a1a235593
                                                  • Instruction Fuzzy Hash: 68F012B1805744DFC711DF98C90178DFFF8FB05728F50466AE855A3780E7B5660487A5
                                                  APIs
                                                  • GetSystemTimePreciseAsFileTime.KERNEL32(?,00433077,?,?,?,?,004C7E2F), ref: 00433655
                                                  • GetSystemTimeAsFileTime.KERNEL32(?,E81620C6,00000000,?,00551382,000000FF,?,00433077,?,?,?,?,004C7E2F), ref: 00433659
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.3053323681.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000006.00000002.3053289630.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053548356.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053619862.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053666684.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053714192.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3055172793.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: Time$FileSystem$Precise
                                                  • String ID: `-@
                                                  • API String ID: 743729956-3781167437
                                                  • Opcode ID: a70e229828252f114f3dcb939b169fb3f53d7191ad82fa45b454faadf805d98c
                                                  • Instruction ID: 3e04e591088ee8cc2650925c1d28f2227fba881fd4e87dc1a7d03300bd93dc66
                                                  • Opcode Fuzzy Hash: a70e229828252f114f3dcb939b169fb3f53d7191ad82fa45b454faadf805d98c
                                                  • Instruction Fuzzy Hash: 73F0A032904A54EFCB118F44DC11B59BBA8F708B21F004626EC12A3790DB34A9049F94
                                                  APIs
                                                  • InitializeCriticalSectionAndSpinCount.KERNEL32(00000016,00000001,004389D2,00000001,00000016,00438BE1,?,?,?,?,?,00000000), ref: 0044B834
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000006.00000002.3053323681.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000006.00000002.3053289630.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053548356.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053619862.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053666684.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053714192.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3053748111.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000006.00000002.3055172793.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: CountCriticalInitializeSectionSpin
                                                  • String ID: InitializeCriticalSectionEx$`-@
                                                  • API String ID: 2593887523-3269949891
                                                  • Opcode ID: 1f2253b5c78e33ee57fe7f30907939316c5faef6f9275bf3e632fad4f43c2f0e
                                                  • Instruction ID: 5bcc12c1b0658f8dc7434a33690804c70bb56e7eadbb0958c8ec10a8e9d05d13
                                                  • Opcode Fuzzy Hash: 1f2253b5c78e33ee57fe7f30907939316c5faef6f9275bf3e632fad4f43c2f0e
                                                  • Instruction Fuzzy Hash: BDE09236581318BBCB212F92DC06DAE7F25EB24BA2F048022FD1956161C7768821BBD9

                                                  Control-flow Graph

                                                  APIs
                                                  • setsockopt.WS2_32(0000031C,0000FFFF,00001006,?,00000008), ref: 004C7BA6
                                                  • recv.WS2_32(?,00000004,00000002), ref: 004C7BC1
                                                  • WSAGetLastError.WS2_32 ref: 004C7BC5
                                                  • recv.WS2_32(00000000,0000000C,00000002,00000000), ref: 004C7C43
                                                  • recv.WS2_32(00000000,0000000C,00000008), ref: 004C7C64
                                                  • setsockopt.WS2_32(0000FFFF,00001006,?,00000008,?), ref: 004C7D00
                                                  • recv.WS2_32(00000000,?,00000008), ref: 004C7D1B
                                                    • Part of subcall function 004C8590: WSAStartup.WS2_32 ref: 004C85BA
                                                    • Part of subcall function 004C8590: getaddrinfo.WS2_32(?,?,?,00589328), ref: 004C863C
                                                    • Part of subcall function 004C8590: socket.WS2_32(?,?,?), ref: 004C865D
                                                    • Part of subcall function 004C8590: connect.WS2_32(00000000,00559BFC,?), ref: 004C8671
                                                    • Part of subcall function 004C8590: closesocket.WS2_32(00000000), ref: 004C867D
                                                    • Part of subcall function 004C8590: FreeAddrInfoW.WS2_32(?), ref: 004C868A
                                                    • Part of subcall function 004C8590: WSACleanup.WS2_32 ref: 004C8690
                                                  • recv.WS2_32(?,00000004,00000008), ref: 004C7E23
                                                  • __Xtime_get_ticks.LIBCPMT ref: 004C7E2A
                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004C7E38
                                                  • Sleep.KERNELBASE(00000001,00000000,?,00002710,00000000), ref: 004C7EB1
                                                  • Sleep.KERNELBASE(00000064,?,00002710,00000000), ref: 004C7EB9
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3053247613.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000007.00000002.3053200294.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053457158.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053519546.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053569469.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053617711.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3054993007.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: recv$Sleepsetsockopt$AddrCleanupErrorFreeInfoLastStartupUnothrow_t@std@@@Xtime_get_ticks__ehfuncinfo$??2@closesocketconnectgetaddrinfosocket
                                                  • String ID:
                                                  • API String ID: 3089209366-0
                                                  • Opcode ID: 3d24dd6fae86035e1c91623a14a330b8fac7169f0fffea1d609c34c200ec8250
                                                  • Instruction ID: b3d54dcccad81d83ab75f13ba9899d4b50e1d8608cabcccfb3508871926cac68
                                                  • Opcode Fuzzy Hash: 3d24dd6fae86035e1c91623a14a330b8fac7169f0fffea1d609c34c200ec8250
                                                  • Instruction Fuzzy Hash: 9EB1AC71D043089BEB10DBA8CC49BAEBBB1BB54314F24025EE815BB2D2D7785D88DF95

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 56 4c8590-4c85c2 WSAStartup 57 4c85c8-4c85f2 call 4ea420 * 2 56->57 58 4c8696-4c869f 56->58 63 4c85fe-4c8644 getaddrinfo 57->63 64 4c85f4-4c85f8 57->64 65 4c8646-4c864c 63->65 66 4c8690 WSACleanup 63->66 64->58 64->63 67 4c864e 65->67 68 4c86a4-4c86ae FreeAddrInfoW 65->68 66->58 70 4c8654-4c8668 socket 67->70 68->66 69 4c86b0-4c86b8 68->69 70->66 71 4c866a-4c867a connect 70->71 72 4c867c-4c8684 closesocket 71->72 73 4c86a0 71->73 72->70 74 4c8686-4c868a FreeAddrInfoW 72->74 73->68 74->66
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3053247613.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000007.00000002.3053200294.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053457158.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053519546.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053569469.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053617711.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3054993007.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: AddrFreeInfo$CleanupStartupclosesocketconnectgetaddrinfosocket
                                                  • String ID:
                                                  • API String ID: 448659506-0
                                                  • Opcode ID: 52d29ec15fbf37ccd53ab56e21f2e3f1d11727fcf2b6a4206c2cbc59116a4c78
                                                  • Instruction ID: ffa07009e3086412046aa5b15573dbd5c691e56a3beb11943292ef2f0f62f1de
                                                  • Opcode Fuzzy Hash: 52d29ec15fbf37ccd53ab56e21f2e3f1d11727fcf2b6a4206c2cbc59116a4c78
                                                  • Instruction Fuzzy Hash: 9531C1726043009BD7208F25DC48B2BB7E5FB94729F114B1EF9A4922E0D7759C089AA7

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 75 409280-4092dd call 4163b0 78 409413-409521 call 402df0 call 4ea420 75->78 79 4092e3-4092e9 75->79 93 409523-409535 78->93 94 409537-40953f call 418dc0 78->94 80 4092f0-409313 79->80 82 409324-409331 80->82 83 409315-40931f 80->83 86 409342-40934f 82->86 87 409333-40933d 82->87 85 409403-409406 83->85 90 409409-40940d 85->90 91 409360-40936d 86->91 92 409351-40935b 86->92 87->85 90->78 90->80 95 40937e-40938b 91->95 96 40936f-409379 91->96 92->85 99 409544-409597 call 4ea420 * 2 93->99 94->99 97 409399-4093a6 95->97 98 40938d-409397 95->98 96->85 101 4093b4-4093c1 97->101 102 4093a8-4093b2 97->102 98->85 112 409599-4095c8 call 4ea420 call 435270 99->112 113 4095cb-4095e1 call 4ea420 99->113 104 4093c3-4093cd 101->104 105 4093cf-4093dc 101->105 102->85 104->85 107 4093ea-4093f4 105->107 108 4093de-4093e8 105->108 107->90 111 4093f6-4093ff 107->111 108->85 111->85 112->113 118 4096e2 113->118 119 4095e7-4095ed 113->119 122 4096e6-4096f0 118->122 121 4095f0-4096ce GetModuleHandleA GetProcAddress WSASend 119->121 124 4096d4-4096dc 121->124 125 40975f-409763 121->125 126 4096f2-4096fe 122->126 127 40971e-40973d 122->127 124->118 124->121 125->122 128 409700-40970e 126->128 129 409714-40971b call 4338f3 126->129 130 40976f-409796 127->130 131 40973f-40974b 127->131 128->129 132 409797-4097fe call 438c70 call 402df0 * 2 128->132 129->127 134 409765-40976c call 4338f3 131->134 135 40974d-40975b 131->135 134->130 135->132 139 40975d 135->139 139->134
                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(Ws2_32.dll,?,?,?,?,0054D15C,00000000,74D723A0,-00589880), ref: 004096A6
                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 004096B4
                                                  • WSASend.WS2_32(?,?,00000001,00000000,00000000,00000000,00000000,?,?,?,?,0054D15C,00000000,74D723A0,-00589880), ref: 004096C9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3053247613.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000007.00000002.3053200294.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053457158.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053519546.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053569469.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053617711.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3054993007.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: AddressHandleModuleProcSend
                                                  • String ID: Ws2_32.dll
                                                  • API String ID: 2819740048-3093949381
                                                  • Opcode ID: ddc30ba664299dc2f1fc7c2c0b072229e183ede947392a5cffdfd32cc45b5d46
                                                  • Instruction ID: 188670ed5cfc709ed037a390f66f33add7af100e18449b0941b00ad524943a05
                                                  • Opcode Fuzzy Hash: ddc30ba664299dc2f1fc7c2c0b072229e183ede947392a5cffdfd32cc45b5d46
                                                  • Instruction Fuzzy Hash: 7C02CE70D04298DEDF25CFA4C8907ADBBB0EF59304F24429EE4456B2C6D7781D86CB96

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 146 4c7ef0-4c7f3c 147 4c7f6c-4c7f72 146->147 148 4c7f3e-4c7f67 call 402cf0 call 409280 146->148 149 4c7f8e-4c7f94 147->149 150 4c7f74-4c7f89 call 416290 147->150 164 4c84db-4c84ec call 402df0 148->164 154 4c7f96-4c7fab call 416290 149->154 155 4c7fb0-4c7fb6 149->155 150->164 154->164 159 4c7fb8-4c7fbc 155->159 160 4c7fd5-4c7fdb 155->160 159->164 166 4c7fc2-4c7fd0 call 416290 159->166 161 4c7fdd-4c7ff6 call 4412b7 160->161 162 4c7ffb-4c8001 160->162 161->164 169 4c800f-4c8015 162->169 170 4c8003-4c800a 162->170 173 4c84f1-4c8504 164->173 166->164 174 4c801b-4c8040 call 405400 169->174 175 4c82c0-4c82c6 169->175 170->164 187 4c8042-4c805d 174->187 178 4c82c8-4c8316 call 41b430 call 413cb0 175->178 179 4c831b-4c8321 175->179 178->164 180 4c8376-4c837c 179->180 181 4c8323-4c8371 call 41b430 call 413cb0 179->181 185 4c837e-4c83cc call 41b430 call 413cb0 180->185 186 4c83d1-4c83d7 180->186 181->164 185->164 194 4c842c-4c8432 186->194 195 4c83d9-4c8427 call 41b430 call 413cb0 186->195 192 4c82a5-4c82b2 call 432baa 187->192 193 4c8063-4c8105 call 402cf0 call 4132d0 call 41ace0 call 416030 call 402df0 * 2 187->193 192->164 233 4c810b-4c81b0 call 402d30 call 4d62c0 call 402df0 call 4132d0 call 415ff0 193->233 234 4c82b7-4c82bb 193->234 198 4c8484-4c848a 194->198 199 4c8434-4c8482 call 41b430 call 413cb0 194->199 195->164 198->164 208 4c848c-4c84bf call 458b00 call 4162c0 call 402df0 198->208 199->164 208->164 245 4c81e5-4c823c call 4132d0 233->245 246 4c81b2-4c81e0 GetCurrentProcess call 4163b0 call 4cf280 233->246 234->187 252 4c823e 245->252 253 4c8240-4c8242 call 439820 245->253 256 4c827c-4c82a0 call 415230 call 402df0 246->256 252->253 257 4c8247-4c824e 253->257 256->192 257->256 259 4c8250-4c8279 call 441628 call 43d0a8 257->259 259->256
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3053247613.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000007.00000002.3053200294.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053457158.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053519546.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053569469.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053617711.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3054993007.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 8.46.123.33
                                                  • API String ID: 0-2289477214
                                                  • Opcode ID: 4e806a04750b243027b33f7d66f69192023bdf775b07e2eba2c1c4d53df461e3
                                                  • Instruction ID: 65307ecbef6fb9e01e3d4ad067897c34c173f6a72c2a6aa1ef5fcaa49911cde8
                                                  • Opcode Fuzzy Hash: 4e806a04750b243027b33f7d66f69192023bdf775b07e2eba2c1c4d53df461e3
                                                  • Instruction Fuzzy Hash: 0E02A070D04248DFDB14DF68C945BDDBBB0AB14308F14419ED8057B386EBB95E88DB9A

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 266 449789-4497ab 267 4497b1-4497b3 266->267 268 44999e 266->268 269 4497b5-4497d4 call 438be3 267->269 270 4497df-449802 267->270 271 4499a0-4499a4 268->271 277 4497d7-4497da 269->277 273 449804-449806 270->273 274 449808-44980e 270->274 273->274 276 449810-449821 273->276 274->269 274->276 278 449834-449844 call 4492ce 276->278 279 449823-449831 call 44263d 276->279 277->271 284 449846-44984c 278->284 285 44988d-44989f 278->285 279->278 286 449875-44988b call 448e9f 284->286 287 44984e-449851 284->287 288 4498f6-449916 WriteFile 285->288 289 4498a1-4498a7 285->289 307 44986e-449870 286->307 290 449853-449856 287->290 291 44985c-44986b call 449266 287->291 293 449921 288->293 294 449918-44991e GetLastError 288->294 295 4498e2-4498f4 call 44934b 289->295 296 4498a9-4498ac 289->296 290->291 297 449936-449939 290->297 291->307 301 449924-44992f 293->301 294->293 314 4498c9-4498cc 295->314 302 4498ce-4498e0 call 44950f 296->302 303 4498ae-4498b1 296->303 310 44993c-44993e 297->310 308 449931-449934 301->308 309 449999-44999c 301->309 302->314 303->310 311 4498b7-4498c4 call 449426 303->311 307->301 308->297 309->271 315 449940-449945 310->315 316 44996c-449978 310->316 311->314 314->307 317 449947-449959 315->317 318 44995e-449967 call 4416c8 315->318 319 449982-449994 316->319 320 44997a-449980 316->320 317->277 318->277 319->277 320->268 320->319
                                                  APIs
                                                    • Part of subcall function 00448E9F: GetConsoleOutputCP.KERNEL32(E82F9700,00000000,00000000,?), ref: 00448F02
                                                  • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0044990E
                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?), ref: 00449918
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3053247613.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000007.00000002.3053200294.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053457158.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053519546.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053569469.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053617711.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3054993007.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: ConsoleErrorFileLastOutputWrite
                                                  • String ID:
                                                  • API String ID: 2915228174-0
                                                  • Opcode ID: 2beaef352ff8862ad6b8b16251cd0bd229135013537871e9a6efb1225fc67aec
                                                  • Instruction ID: 4c198159cf300fc4e9085a349e24ad4d45033eb13303bb4f9288eddf9455663d
                                                  • Opcode Fuzzy Hash: 2beaef352ff8862ad6b8b16251cd0bd229135013537871e9a6efb1225fc67aec
                                                  • Instruction Fuzzy Hash: 9961C5B1C14119BFEF11DFA8C844AAFBBB9AF49304F14014AE800A7316D739DD05EB65

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 323 448dff-448e13 call 44e940 326 448e15-448e17 323->326 327 448e19-448e21 323->327 328 448e67-448e87 call 44e8af 326->328 329 448e23-448e2a 327->329 330 448e2c-448e2f 327->330 339 448e99 328->339 340 448e89-448e97 call 4416c8 328->340 329->330 332 448e37-448e4b call 44e940 * 2 329->332 333 448e31-448e35 330->333 334 448e4d-448e5d call 44e940 FindCloseChangeNotification 330->334 332->326 332->334 333->332 333->334 334->326 342 448e5f-448e65 GetLastError 334->342 344 448e9b-448e9e 339->344 340->344 342->328
                                                  APIs
                                                  • FindCloseChangeNotification.KERNELBASE(00000000,00000000,?,?,00448CE6,00000000,?,0057A178,0000000C,00448DA2,?,?,?), ref: 00448E55
                                                  • GetLastError.KERNEL32(?,00448CE6,00000000,?,0057A178,0000000C,00448DA2,?,?,?), ref: 00448E5F
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3053247613.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000007.00000002.3053200294.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053457158.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053519546.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053569469.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053617711.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3054993007.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: ChangeCloseErrorFindLastNotification
                                                  • String ID:
                                                  • API String ID: 1687624791-0
                                                  • Opcode ID: 1fe827fdfe079599b9b1dab25e2b646f0beb01ea40d46a72429d261cc15a62e7
                                                  • Instruction ID: bfed174018f4c3fae0b74bea86efe9ace0911028d3bee9629bfc5162a0057b67
                                                  • Opcode Fuzzy Hash: 1fe827fdfe079599b9b1dab25e2b646f0beb01ea40d46a72429d261cc15a62e7
                                                  • Instruction Fuzzy Hash: 6E1125336042102AF6252236A84677F67499B82738F39061FF918CB2D2DF689C81825D

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 348 44251c-442534 call 44e940 351 442536-44253d 348->351 352 44254a-442560 SetFilePointerEx 348->352 353 442544-442548 351->353 354 442575-44257f 352->354 355 442562-442573 GetLastError call 4416c8 352->355 356 44259b-44259e 353->356 354->353 358 442581-442596 354->358 355->353 358->356
                                                  APIs
                                                  • SetFilePointerEx.KERNELBASE(00000000,?,?,?,?,?,00000000,?,?,?,00442626,?,?,?,?,?), ref: 00442558
                                                  • GetLastError.KERNEL32(?,?,?,?,00442626,?,?,?,?,?,00000000,?,00000000), ref: 00442565
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3053247613.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000007.00000002.3053200294.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053457158.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053519546.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053569469.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053617711.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3054993007.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: ErrorFileLastPointer
                                                  • String ID:
                                                  • API String ID: 2976181284-0
                                                  • Opcode ID: 0df1753fdbe4f7a704092f8361e7cfb0c7cc0fcadc70f8748e4d2d33b1623b65
                                                  • Instruction ID: bcffdd1dd92d970d4fbe8e398a8ab980657c5c2bf717c74f1f656664416c076e
                                                  • Opcode Fuzzy Hash: 0df1753fdbe4f7a704092f8361e7cfb0c7cc0fcadc70f8748e4d2d33b1623b65
                                                  • Instruction Fuzzy Hash: 9B012632610615BFDF158F69DC1699E3B29EB84334F240209F8019B2E1E6B5ED429BA4

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 360 44b01a-44b023 361 44b025-44b038 RtlFreeHeap 360->361 362 44b052-44b053 360->362 361->362 363 44b03a-44b051 GetLastError call 441662 call 4416ff 361->363 363->362
                                                  APIs
                                                  • RtlFreeHeap.NTDLL(00000000,00000000,?,00451B48,?,00000000,?,?,00451DE9,?,00000007,?,?,004522DD,?,?), ref: 0044B030
                                                  • GetLastError.KERNEL32(?,?,00451B48,?,00000000,?,?,00451DE9,?,00000007,?,?,004522DD,?,?), ref: 0044B03B
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3053247613.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000007.00000002.3053200294.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053457158.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053519546.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053569469.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053617711.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3054993007.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: ErrorFreeHeapLast
                                                  • String ID:
                                                  • API String ID: 485612231-0
                                                  • Opcode ID: 1c4e9b2b04b0a897153f19679bc75b8cfe8e1d75e6b310813c54f5389fc1414e
                                                  • Instruction ID: f233056e1464041c82b2d36bf1c88bdb576215b3e64377b8de55bab97aefa9e3
                                                  • Opcode Fuzzy Hash: 1c4e9b2b04b0a897153f19679bc75b8cfe8e1d75e6b310813c54f5389fc1414e
                                                  • Instruction Fuzzy Hash: 66E08C32100204ABEB212FA5AC0CB9A3B69EF00756F15802AF608971B0DB38C894D798

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 368 4032d0-4032e0 369 4032e2-4032e7 368->369 370 403306-403308 368->370 373 4032e9-4032ea call 433672 369->373 374 40331f call 402b50 369->374 371 403318-40331e 370->371 372 40330a-403317 call 433672 370->372 378 4032ef-4032f6 373->378 380 403324-403329 call 438c70 374->380 378->380 381 4032f8-403305 378->381
                                                  APIs
                                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0040331F
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3053247613.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000007.00000002.3053200294.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053457158.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053519546.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053569469.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053617711.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3054993007.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: Concurrency::cancel_current_task
                                                  • String ID:
                                                  • API String ID: 118556049-0
                                                  • Opcode ID: 4c9de15bf43b7906aab7ed6efc04c82af185101d7b74466eda9590404471e6f8
                                                  • Instruction ID: ac639495c118a2832fc09027b5ebf4fad0cef292c7be368858978faeea3118d5
                                                  • Opcode Fuzzy Hash: 4c9de15bf43b7906aab7ed6efc04c82af185101d7b74466eda9590404471e6f8
                                                  • Instruction Fuzzy Hash: 63F024321001009BCB246F61D4565EAB7ECDF28366B50083FFC8DD7292EB3EDA408788

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 384 44a65a-44a665 385 44a667-44a671 384->385 386 44a673-44a679 384->386 385->386 387 44a6a7-44a6b2 call 4416ff 385->387 388 44a692-44a6a3 RtlAllocateHeap 386->388 389 44a67b-44a67c 386->389 393 44a6b4-44a6b6 387->393 390 44a6a5 388->390 391 44a67e-44a685 call 448280 388->391 389->388 390->393 391->387 397 44a687-44a690 call 445a89 391->397 397->387 397->388
                                                  APIs
                                                  • RtlAllocateHeap.NTDLL(00000008,?,00000001), ref: 0044A69B
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3053247613.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000007.00000002.3053200294.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053457158.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053519546.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053569469.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053617711.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3054993007.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: AllocateHeap
                                                  • String ID:
                                                  • API String ID: 1279760036-0
                                                  • Opcode ID: 89032516e5b3e6299283371760f336f91a06b383302663fb1c071aa923d3998c
                                                  • Instruction ID: 9689b7dccde3e7d2c1426315cc49502dff6dd5535dcc2f3da2dc3831567fdc71
                                                  • Opcode Fuzzy Hash: 89032516e5b3e6299283371760f336f91a06b383302663fb1c071aa923d3998c
                                                  • Instruction Fuzzy Hash: 4CF0E0311905246BFB216A66DC05B5B375CAF41760F1E8117EC84EB190CA3CDC3146EE

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 400 44b094-44b0a0 401 44b0d2-44b0dd call 4416ff 400->401 402 44b0a2-44b0a4 400->402 410 44b0df-44b0e1 401->410 403 44b0a6-44b0a7 402->403 404 44b0bd-44b0ce RtlAllocateHeap 402->404 403->404 406 44b0d0 404->406 407 44b0a9-44b0b0 call 448280 404->407 406->410 407->401 412 44b0b2-44b0bb call 445a89 407->412 412->401 412->404
                                                  APIs
                                                  • RtlAllocateHeap.NTDLL(00000000,00000001,?), ref: 0044B0C6
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3053247613.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000007.00000002.3053200294.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053457158.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053519546.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053569469.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053617711.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3054993007.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: AllocateHeap
                                                  • String ID:
                                                  • API String ID: 1279760036-0
                                                  • Opcode ID: c639ae0624eff34eb8e57d07392fb4ffc7a0b3e65f726cef66c68c9318aea675
                                                  • Instruction ID: 07eaf642519ac51a5bd3283dd2addbb445c80e248ae9cef49388ffb333b33e8c
                                                  • Opcode Fuzzy Hash: c639ae0624eff34eb8e57d07392fb4ffc7a0b3e65f726cef66c68c9318aea675
                                                  • Instruction Fuzzy Hash: 99E022322006206BFF313AA69C14B5B764CEF413A3F190227EC25A62D1DB3CCC0092EE
                                                  APIs
                                                  • VirtualAllocEx.KERNEL32(00000000,00000000,?,00003000,00000040), ref: 004CF2F1
                                                  • WriteProcessMemory.KERNEL32(00000000,00000000,?,?,00000000), ref: 004CF30D
                                                  • WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 004CF342
                                                  • VirtualAllocEx.KERNEL32(?,00000000,00001000,00003000,00000040), ref: 004CF36B
                                                  • WriteProcessMemory.KERNEL32(?,00000000,?,00000218,00000000), ref: 004CF50F
                                                  • WriteProcessMemory.KERNEL32(?,00000218,004CF5E0,-00000010,00000000), ref: 004CF531
                                                  • CreateRemoteThread.KERNEL32(?,00000000,00000000,00000218,00000000,00000000,00000000), ref: 004CF544
                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004CF54D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3053247613.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000007.00000002.3053200294.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053457158.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053519546.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053569469.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053617711.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3054993007.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: MemoryProcessWrite$AllocVirtual$CreateObjectRemoteSingleThreadWait
                                                  • String ID: %s|%s$131
                                                  • API String ID: 2137838514-1629954864
                                                  • Opcode ID: 24dd464d7d6b4de60cf743bb8fa1d264754b13f2225653ad842add4f79ad0571
                                                  • Instruction ID: 2ab717f03d3c912496b66fb944616d360f792c6fe5d042a247d22025e7d5b78f
                                                  • Opcode Fuzzy Hash: 24dd464d7d6b4de60cf743bb8fa1d264754b13f2225653ad842add4f79ad0571
                                                  • Instruction Fuzzy Hash: 36B16BB1D002089FDB14CFA4CC95BAEBBB5FF18300F10426DE905BB291D774A984DBA5
                                                  APIs
                                                    • Part of subcall function 00449E42: GetLastError.KERNEL32(00000000,?,0044F82B), ref: 00449E46
                                                    • Part of subcall function 00449E42: SetLastError.KERNEL32(00000000,00000000,00000001,00000006,000000FF), ref: 00449EE8
                                                  • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 004535D7
                                                  • IsValidCodePage.KERNEL32(?), ref: 00453615
                                                  • IsValidLocale.KERNEL32(?,00000001), ref: 00453628
                                                  • GetLocaleInfoW.KERNEL32(?,00001001,?,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 00453670
                                                  • GetLocaleInfoW.KERNEL32(?,00001002,?,00000040), ref: 0045368B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3053247613.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000007.00000002.3053200294.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053457158.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053519546.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053569469.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053617711.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3054993007.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                  • String ID: *V
                                                  • API String ID: 415426439-2897881622
                                                  • Opcode ID: bb3ee8500ca9cacc625c50b97d6e48ff5c53ad3e39c4a6c01d9da358df15b7ae
                                                  • Instruction ID: 4a54d826d8e8e5dc964d84ffa3ac1e49b68ae0fe58eca9cd8e7cd24ca5604c7d
                                                  • Opcode Fuzzy Hash: bb3ee8500ca9cacc625c50b97d6e48ff5c53ad3e39c4a6c01d9da358df15b7ae
                                                  • Instruction Fuzzy Hash: 4E517471A00209AFDB20DFA5CC41ABF77B8AF05743F14446AED01E7252EB74DA48DB65
                                                  APIs
                                                    • Part of subcall function 00449E42: GetLastError.KERNEL32(00000000,?,0044F82B), ref: 00449E46
                                                    • Part of subcall function 00449E42: SetLastError.KERNEL32(00000000,00000000,00000001,00000006,000000FF), ref: 00449EE8
                                                  • GetACP.KERNEL32(?,?,?,?,?,?,00447300,?,?,?,?,?,-00000050,?,?,?), ref: 00452C19
                                                  • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00447300,?,?,?,?,?,-00000050,?,?), ref: 00452C50
                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,?,00000000,?), ref: 00452DB3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3053247613.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000007.00000002.3053200294.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053457158.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053519546.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053569469.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053617711.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3054993007.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$CodeInfoLocalePageValid
                                                  • String ID: *V$utf8
                                                  • API String ID: 607553120-210452255
                                                  • Opcode ID: 95727e6ef7b94787d777f99e21165c393144e5509e4be2ad3f52f8295ffa9360
                                                  • Instruction ID: 742b11dcb7ff0b0bfa38c284345f0d68b4d7ce619a9ba0daefdf44cafbbca61f
                                                  • Opcode Fuzzy Hash: 95727e6ef7b94787d777f99e21165c393144e5509e4be2ad3f52f8295ffa9360
                                                  • Instruction Fuzzy Hash: F071FA32600602A6D725AF75CD45B6B73A8EF16705F10042FFD05D7283EBF8E94C9699
                                                  APIs
                                                  • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002,00000000,?,?,?,00453605,?,?), ref: 0045338C
                                                  • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002,00000000,?,?,?,00453605,?,?), ref: 004533B5
                                                  • GetACP.KERNEL32(?,?,00453605,?,?), ref: 004533CA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3053247613.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000007.00000002.3053200294.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053457158.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053519546.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053569469.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053617711.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3054993007.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: InfoLocale
                                                  • String ID: ACP$OCP
                                                  • API String ID: 2299586839-711371036
                                                  • Opcode ID: b900ca414d4c4be95a8c6f041d08249478f894891a183a2f82a4edaf5765dc51
                                                  • Instruction ID: 0023b8279c9b3e3643c8ce07df61025d6c2b7e12d2ffc4f7461f6cfcb2a1a3ae
                                                  • Opcode Fuzzy Hash: b900ca414d4c4be95a8c6f041d08249478f894891a183a2f82a4edaf5765dc51
                                                  • Instruction Fuzzy Hash: 8021C432600100A7DB308F54C900A9BB3A6AF50FD3B568466EC06D7312EF36EF49D358
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3053247613.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000007.00000002.3053200294.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053457158.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053519546.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053569469.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053617711.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3054993007.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 333d4b6d5425d6f9d03797ee82114c3711da98524c03317fffdb5ec62fb2b380
                                                  • Instruction ID: 01dad5c531b3804b6668612822d9feb5b6f7af541a2af8c3bc89036eeee974e8
                                                  • Opcode Fuzzy Hash: 333d4b6d5425d6f9d03797ee82114c3711da98524c03317fffdb5ec62fb2b380
                                                  • Instruction Fuzzy Hash: DA023A71E002199BDF14CFA9D9C06AEFBB1FF48314F24926AE919B7380D735A9418B94
                                                  APIs
                                                  • RtlDecodePointer.NTDLL(?), ref: 004579FC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3053247613.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000007.00000002.3053200294.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053457158.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053519546.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053569469.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053617711.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3054993007.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: DecodePointer
                                                  • String ID: `-@$acos$asin$exp$log$log10$pow$sqrt
                                                  • API String ID: 3527080286-3628989360
                                                  • Opcode ID: 4c17630f5161de399ffce6b570c60365a2c89c55b52a7f760b39540bf94f5387
                                                  • Instruction ID: bbf143f63b3841ec77cfacb8c6df481a799db6acf17f433172942b25d65e7ef2
                                                  • Opcode Fuzzy Hash: 4c17630f5161de399ffce6b570c60365a2c89c55b52a7f760b39540bf94f5387
                                                  • Instruction Fuzzy Hash: 1651B370808A0ACBCF109F58F84C1BEBFB1FB05309F154166D851A7266C7799A2DCB4D
                                                  APIs
                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0041A09D
                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0041A0BF
                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0041A0E7
                                                  • __Getctype.LIBCPMT ref: 0041A1C5
                                                  • std::_Facet_Register.LIBCPMT ref: 0041A1F9
                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0041A223
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3053247613.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000007.00000002.3053200294.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053457158.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053519546.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053569469.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053617711.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3054993007.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetctypeRegister
                                                  • String ID: PD@$PG@$E@
                                                  • API String ID: 1102183713-4120405683
                                                  • Opcode ID: cf66166f52ff7971b600a3250f2a29593a1149a421a208e93fab5363b0ce8f21
                                                  • Instruction ID: b372b58ab1bb25eec4b44a09b7f8f3aef2cc67a410616163416d5e42c3dffe19
                                                  • Opcode Fuzzy Hash: cf66166f52ff7971b600a3250f2a29593a1149a421a208e93fab5363b0ce8f21
                                                  • Instruction Fuzzy Hash: 6E51BAB0D01245DFCB11CF98C9457AEBBF0FB14714F14825ED855AB391DB78AA88CB92
                                                  APIs
                                                  • _ValidateLocalCookies.LIBCMT ref: 00437307
                                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 0043730F
                                                  • _ValidateLocalCookies.LIBCMT ref: 00437398
                                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 004373C3
                                                  • _ValidateLocalCookies.LIBCMT ref: 00437418
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3053247613.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000007.00000002.3053200294.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053457158.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053519546.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053569469.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053617711.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3054993007.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                  • String ID: `-@$csm
                                                  • API String ID: 1170836740-3738301566
                                                  • Opcode ID: a837c65dc98bc53f7a591b5dada66322cfdf011b0ab20b220170fbbfaeea83fd
                                                  • Instruction ID: bde692452db8eba3752ab90a3e7788ac0719a0bf92b2230e47b89eff8dfd02fd
                                                  • Opcode Fuzzy Hash: a837c65dc98bc53f7a591b5dada66322cfdf011b0ab20b220170fbbfaeea83fd
                                                  • Instruction Fuzzy Hash: B041F8709042099FCF20DF59C885A9FBBA4BF08328F14905BFC54AB392D739E905DB95
                                                  APIs
                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0041C45A
                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0041C47C
                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0041C4A4
                                                  • std::_Facet_Register.LIBCPMT ref: 0041C59A
                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0041C5C4
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3053247613.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000007.00000002.3053200294.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053457158.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053519546.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053569469.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053617711.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3054993007.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                                  • String ID: E@$PD@
                                                  • API String ID: 459529453-4103272508
                                                  • Opcode ID: 4956459445cc7cc7d841703dbe2ed42e033006db9883af498c412f7626095107
                                                  • Instruction ID: e4bc83ced0ac359faa997fd18d4eeb760fe14de2594101695cc0fd15b6690fbc
                                                  • Opcode Fuzzy Hash: 4956459445cc7cc7d841703dbe2ed42e033006db9883af498c412f7626095107
                                                  • Instruction Fuzzy Hash: C351EFB0900255EFDB11CF58C991BAEBBF0FB10314F24415EE846AB381D7B9AA45CB95
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3053247613.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000007.00000002.3053200294.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053457158.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053519546.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053569469.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053617711.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3054993007.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: _strrchr
                                                  • String ID:
                                                  • API String ID: 3213747228-0
                                                  • Opcode ID: 785c90e8ff89e0f1a3d98e37725974d6f6ea20f06d45e48120c47f1ca5a82ffe
                                                  • Instruction ID: d7b9d7273cbfac5d15a556f8c8651b9033d93685d5a38535419dded3191b9e75
                                                  • Opcode Fuzzy Hash: 785c90e8ff89e0f1a3d98e37725974d6f6ea20f06d45e48120c47f1ca5a82ffe
                                                  • Instruction Fuzzy Hash: D5B14672D006559FEB158F24CC81BEBBBA5EF59310F2441ABE904AB382D778D901C7E9
                                                  APIs
                                                  • FreeLibrary.KERNEL32(00000000,?,0044B48D,?,?,00000000,00000001,?,?,0044B6B7,00000022,FlsSetValue,00561B88,00561B90,00000001), ref: 0044B43F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3053247613.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000007.00000002.3053200294.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053457158.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053519546.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053569469.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053617711.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3054993007.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: FreeLibrary
                                                  • String ID: api-ms-$ext-ms-
                                                  • API String ID: 3664257935-537541572
                                                  • Opcode ID: 033630484f002e070c94113c7b6ef7f262f68e90d70309fdd043a749aa00ed93
                                                  • Instruction ID: e3d7dbf8d3e43151f67a2d3675c4fcd7809fc0c9af6198dcb17880ded4e1cd5b
                                                  • Opcode Fuzzy Hash: 033630484f002e070c94113c7b6ef7f262f68e90d70309fdd043a749aa00ed93
                                                  • Instruction Fuzzy Hash: A2212B36A01220A7E7319F619C45A6B7768EB51761F140112FC06A7392D734ED05D6D9
                                                  APIs
                                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,E82F9700,?,?,00000000,00551365,000000FF,?,0044360F,?,?,004435E3,00000016), ref: 00443668
                                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044367A
                                                  • FreeLibrary.KERNEL32(00000000,?,00000000,00551365,000000FF,?,0044360F,?,?,004435E3,00000016), ref: 0044369C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3053247613.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000007.00000002.3053200294.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053457158.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053519546.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053569469.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053617711.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3054993007.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                  • String ID: CorExitProcess$`-@$mscoree.dll
                                                  • API String ID: 4061214504-3731901874
                                                  • Opcode ID: 66c557226bdf84cfe892202a4e2d9d598a1facfa92736b92f61228ad13b2a6bb
                                                  • Instruction ID: 11f561727bfec435161e86ab51d2faaed74d5e09c0b89d0474703e999051cdf2
                                                  • Opcode Fuzzy Hash: 66c557226bdf84cfe892202a4e2d9d598a1facfa92736b92f61228ad13b2a6bb
                                                  • Instruction Fuzzy Hash: 5601A232A44715AFDB219F44DC19BAFBBB8FB14B52F014526E812E27E0DB749A04CA94
                                                  APIs
                                                  • __EH_prolog3.LIBCMT ref: 00432730
                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0043273B
                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 004327A9
                                                    • Part of subcall function 0043288C: std::locale::_Locimp::_Locimp.LIBCPMT ref: 004328A4
                                                  • std::locale::_Setgloballocale.LIBCPMT ref: 00432756
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3053247613.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000007.00000002.3053200294.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053457158.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053519546.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053569469.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053617711.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3054993007.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                                                  • String ID: `-@
                                                  • API String ID: 677527491-3781167437
                                                  • Opcode ID: 8a5613631ec3d916f95b396eb7cc43f12c5d676d84142dd5ef1a29976cc47206
                                                  • Instruction ID: 335728d06f8999c9367bb6f0cb93ad347570f0e44e9dcbef2930aaa8ccdcd417
                                                  • Opcode Fuzzy Hash: 8a5613631ec3d916f95b396eb7cc43f12c5d676d84142dd5ef1a29976cc47206
                                                  • Instruction Fuzzy Hash: 9D01FC35A006109BC70AFB20CC5157D7BB0FF98790F44250EE81163391CFB8AE06DB89
                                                  APIs
                                                  • GetCurrentThreadId.KERNEL32 ref: 00432BDC
                                                  • RtlAcquireSRWLockExclusive.NTDLL(00000008), ref: 00432BFB
                                                  • RtlAcquireSRWLockExclusive.NTDLL(00000008), ref: 00432C29
                                                  • RtlTryAcquireSRWLockExclusive.NTDLL(00000008), ref: 00432C84
                                                  • RtlTryAcquireSRWLockExclusive.NTDLL(00000008), ref: 00432C9B
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3053247613.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000007.00000002.3053200294.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053457158.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053519546.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053569469.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053617711.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3054993007.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: AcquireExclusiveLock$CurrentThread
                                                  • String ID:
                                                  • API String ID: 66001078-0
                                                  • Opcode ID: 8f089e7040faa662b45679f060ee1b8a0f0adfff173fd46cb89089840a213128
                                                  • Instruction ID: ee0d2db44a198d3d02c1eb3b1b0ff5a364ec90963e300245c4d31640e9e12550
                                                  • Opcode Fuzzy Hash: 8f089e7040faa662b45679f060ee1b8a0f0adfff173fd46cb89089840a213128
                                                  • Instruction Fuzzy Hash: B2415931900A0ADFCB20DF65CA8096EB3B4FF0C311F20692BD446D7650D7B8E986DB69
                                                  APIs
                                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 0040750C
                                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00407522
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3053247613.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000007.00000002.3053200294.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053457158.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053519546.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053569469.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053617711.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3054993007.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: ___std_exception_destroy
                                                  • String ID: )@$[json.exception.
                                                  • API String ID: 4194217158-3378332251
                                                  • Opcode ID: ed8046a3216ddeace2ba6bc1a63a61367f4591f9b00a8cd9401d811279d7cf04
                                                  • Instruction ID: d1fd1ad00dbeab1566b73d8112c34bc80c76f551163e59ed82d928a5322bc1a2
                                                  • Opcode Fuzzy Hash: ed8046a3216ddeace2ba6bc1a63a61367f4591f9b00a8cd9401d811279d7cf04
                                                  • Instruction Fuzzy Hash: 8C51CFB1C046489BD710DFA8C905B9EBBB4FF15318F14426EE850A73C2E7B86A44C7A5
                                                  APIs
                                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 0040499F
                                                    • Part of subcall function 004351FB: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,74D723A0,?,00431D09,?,005799D8,74D723A0,?,74D723A0,-00589880), ref: 0043525B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3053247613.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000007.00000002.3053200294.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053457158.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053519546.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053569469.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053617711.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3054993007.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: ExceptionIos_base_dtorRaisestd::ios_base::_
                                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                  • API String ID: 1903096808-1866435925
                                                  • Opcode ID: 5e8fcf04681b5496c91e096f1d273a5343178b8940b0c322b64de4dd1df32f3c
                                                  • Instruction ID: 99c94d1e80f512c720ba00148ae48faeb0acee82eabb402b7e5943aa58dcc262
                                                  • Opcode Fuzzy Hash: 5e8fcf04681b5496c91e096f1d273a5343178b8940b0c322b64de4dd1df32f3c
                                                  • Instruction Fuzzy Hash: AC119CF2844644ABCB10DF688C03BAB37C8E744715F04463EFE58972C1EB399800C79A
                                                  APIs
                                                  • GetConsoleOutputCP.KERNEL32(E82F9700,00000000,00000000,?), ref: 00448F02
                                                    • Part of subcall function 0044EC55: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0044A862,?,00000000,-00000008), ref: 0044ECB6
                                                  • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00449154
                                                  • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 0044919A
                                                  • GetLastError.KERNEL32 ref: 0044923D
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3053247613.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000007.00000002.3053200294.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053457158.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053519546.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053569469.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053617711.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3054993007.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                  • String ID:
                                                  • API String ID: 2112829910-0
                                                  • Opcode ID: d46c0870a8277536d77cd1fa32924c999241811f2f15ebdbc3735bbe4b8907ba
                                                  • Instruction ID: b6f9ea87837ca93654473fd2bae4ec290e60b55bc3ade45d2d9d29a5185f0d60
                                                  • Opcode Fuzzy Hash: d46c0870a8277536d77cd1fa32924c999241811f2f15ebdbc3735bbe4b8907ba
                                                  • Instruction Fuzzy Hash: 70D1BC75D00249AFDF14CFA8C880AAEBBB5FF09304F28456AE856EB351D734AD45CB54
                                                  APIs
                                                  • WriteConsoleW.KERNEL32(?,?,?,00000000,?,?,00453DCE,?,00000001,?,?,?,00449291,?,00000000,00000000), ref: 00456D49
                                                  • GetLastError.KERNEL32(?,00453DCE,?,00000001,?,?,?,00449291,?,00000000,00000000,?,?,?,0044986B,?), ref: 00456D55
                                                    • Part of subcall function 00456D1B: CloseHandle.KERNEL32(FFFFFFFE,00456D65,?,00453DCE,?,00000001,?,?,?,00449291,?,00000000,00000000,?,?), ref: 00456D2B
                                                  • ___initconout.LIBCMT ref: 00456D65
                                                    • Part of subcall function 00456CDD: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00456D0C,00453DBB,?,?,00449291,?,00000000,00000000,?), ref: 00456CF0
                                                  • WriteConsoleW.KERNEL32(?,?,?,00000000,?,00453DCE,?,00000001,?,?,?,00449291,?,00000000,00000000,?), ref: 00456D7A
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3053247613.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000007.00000002.3053200294.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053457158.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053519546.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053569469.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053617711.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3054993007.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                  • String ID:
                                                  • API String ID: 2744216297-0
                                                  • Opcode ID: 6d252f6c85546040703605b5d122fbb434f3c9b6b34be8e7cd3f73b3df330617
                                                  • Instruction ID: b582005f90f2c4d159ccd48a3422ceca8e6e351b7b3b67145bbef734a6de3f3c
                                                  • Opcode Fuzzy Hash: 6d252f6c85546040703605b5d122fbb434f3c9b6b34be8e7cd3f73b3df330617
                                                  • Instruction Fuzzy Hash: F4F01C37500518BBCF221FD1DC18A8A3F76EB583A2B814415FE0D96231D6328928EB94
                                                  APIs
                                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00403819
                                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 004038F0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3053247613.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000007.00000002.3053200294.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053457158.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053519546.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053569469.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053617711.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3054993007.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: ___std_exception_copy___std_exception_destroy
                                                  • String ID: )@
                                                  • API String ID: 2970364248-4120265097
                                                  • Opcode ID: f6f30e31f85ce950f1fa6973965a42a1d736ba8a23ea96827b1d399a811dfef4
                                                  • Instruction ID: 269ef50febfdc4b1c22cf7239a576f40f0b19685bcb009e1facc48eb6157c32a
                                                  • Opcode Fuzzy Hash: f6f30e31f85ce950f1fa6973965a42a1d736ba8a23ea96827b1d399a811dfef4
                                                  • Instruction Fuzzy Hash: DD6169B1C00248DBDB10DF98C945B9EFFB5FF19324F14825EE814AB282D7B95A44CBA5
                                                  APIs
                                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 0040499F
                                                    • Part of subcall function 004351FB: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,74D723A0,?,00431D09,?,005799D8,74D723A0,?,74D723A0,-00589880), ref: 0043525B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3053247613.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000007.00000002.3053200294.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053457158.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053519546.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053569469.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053617711.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3054993007.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: ExceptionIos_base_dtorRaisestd::ios_base::_
                                                  • String ID: ios_base::badbit set$ios_base::failbit set
                                                  • API String ID: 1903096808-1240500531
                                                  • Opcode ID: 35eb3ed04202005fd1b576b70113dfa79425ebb9137dc2370a73229c77559635
                                                  • Instruction ID: 59789774a96eacd1a5b8f49c51d8e497543063f0a2ed12b155596828dbf76f3a
                                                  • Opcode Fuzzy Hash: 35eb3ed04202005fd1b576b70113dfa79425ebb9137dc2370a73229c77559635
                                                  • Instruction Fuzzy Hash: E84124B2C00244ABCB04DF68C845BAEBBB8FB49710F14826EF554A73C1D7795A00CBA5
                                                  APIs
                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00404061
                                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 004040C4
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3053247613.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000007.00000002.3053200294.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053457158.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053519546.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053569469.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053617711.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3054993007.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                                  • String ID: bad locale name
                                                  • API String ID: 3988782225-1405518554
                                                  • Opcode ID: 0039d2d2ea2786ef81fe116e8b864d57793cf36a19fa060d6cb0c255b1586cee
                                                  • Instruction ID: 65c2995a4cce64452fc0e082f9126f7f9302ed92d60cad1113ce5137d9e79936
                                                  • Opcode Fuzzy Hash: 0039d2d2ea2786ef81fe116e8b864d57793cf36a19fa060d6cb0c255b1586cee
                                                  • Instruction Fuzzy Hash: DB112670805B84EED321CF69C50474BBFF0AF25714F10868DD09597781D3B9A604CB95
                                                  APIs
                                                  • ___std_exception_copy.LIBVCRUNTIME ref: 004165C9
                                                  • ___std_exception_copy.LIBVCRUNTIME ref: 004165FC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3053247613.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000007.00000002.3053200294.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053457158.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053519546.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053569469.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053617711.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3054993007.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: ___std_exception_copy
                                                  • String ID: )@
                                                  • API String ID: 2659868963-4120265097
                                                  • Opcode ID: ec459901e9a8c12f2536e06f4ce64afd8286d8aca2aa337d2d7da09c98386d96
                                                  • Instruction ID: 79ebb971947c26e29da123751e765caa72f3f100f47198c89106861aa63fe252
                                                  • Opcode Fuzzy Hash: ec459901e9a8c12f2536e06f4ce64afd8286d8aca2aa337d2d7da09c98386d96
                                                  • Instruction Fuzzy Hash: F0112EB6910649EBCB11CF99C980B86FBF8FF09724F10876AE82497641E774A5448BA0
                                                  APIs
                                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00407A5C
                                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00407A72
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3053247613.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000007.00000002.3053200294.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053457158.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053519546.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053569469.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053617711.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3054993007.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: ___std_exception_destroy
                                                  • String ID: )@
                                                  • API String ID: 4194217158-4120265097
                                                  • Opcode ID: 9ee8fa866bcea9d2c14fc14309fcadf8facde4318e0e6bb098ed358a1a235593
                                                  • Instruction ID: 96290d15a7b89a27e7413382239de33ac52fdad5c525fa7f0e86a9c1871ea130
                                                  • Opcode Fuzzy Hash: 9ee8fa866bcea9d2c14fc14309fcadf8facde4318e0e6bb098ed358a1a235593
                                                  • Instruction Fuzzy Hash: 68F012B1805744DFC711DF98C90178DFFF8FB05728F50466AE855A3780E7B5660487A5
                                                  APIs
                                                  • GetSystemTimePreciseAsFileTime.KERNEL32(?,00433077,?,?,?,?,004C7E2F), ref: 00433655
                                                  • GetSystemTimeAsFileTime.KERNEL32(?,E82F9700,00000000,?,00551382,000000FF,?,00433077,?,?,?,?,004C7E2F), ref: 00433659
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3053247613.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000007.00000002.3053200294.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053457158.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053519546.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053569469.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053617711.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3054993007.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: Time$FileSystem$Precise
                                                  • String ID: `-@
                                                  • API String ID: 743729956-3781167437
                                                  • Opcode ID: a70e229828252f114f3dcb939b169fb3f53d7191ad82fa45b454faadf805d98c
                                                  • Instruction ID: 3e04e591088ee8cc2650925c1d28f2227fba881fd4e87dc1a7d03300bd93dc66
                                                  • Opcode Fuzzy Hash: a70e229828252f114f3dcb939b169fb3f53d7191ad82fa45b454faadf805d98c
                                                  • Instruction Fuzzy Hash: 73F0A032904A54EFCB118F44DC11B59BBA8F708B21F004626EC12A3790DB34A9049F94
                                                  APIs
                                                  • InitializeCriticalSectionAndSpinCount.KERNEL32(00000016,00000001,004389D2,00000001,00000016,00438BE1,?,?,?,?,?,00000000), ref: 0044B834
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3053247613.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000007.00000002.3053200294.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053457158.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053519546.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053569469.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053617711.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000074F000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000751000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000753000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000760000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000766000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.0000000000782000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.000000000078A000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007AE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007B3000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3053664986.00000000007BB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000007.00000002.3054993007.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_MPGPH131.jbxd
                                                  Similarity
                                                  • API ID: CountCriticalInitializeSectionSpin
                                                  • String ID: InitializeCriticalSectionEx$`-@
                                                  • API String ID: 2593887523-3269949891
                                                  • Opcode ID: 1f2253b5c78e33ee57fe7f30907939316c5faef6f9275bf3e632fad4f43c2f0e
                                                  • Instruction ID: 5bcc12c1b0658f8dc7434a33690804c70bb56e7eadbb0958c8ec10a8e9d05d13
                                                  • Opcode Fuzzy Hash: 1f2253b5c78e33ee57fe7f30907939316c5faef6f9275bf3e632fad4f43c2f0e
                                                  • Instruction Fuzzy Hash: BDE09236581318BBCB212F92DC06DAE7F25EB24BA2F048022FD1956161C7768821BBD9