Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
90ZF1EDs9h.exe

Overview

General Information

Sample name:90ZF1EDs9h.exe
renamed because original name is a hash value
Original sample name:9437d6cf2745f8683c3aa908e01b03cf.exe
Analysis ID:1461305
MD5:9437d6cf2745f8683c3aa908e01b03cf
SHA1:4b954d00882c8249d11b61440976b2993ae4738a
SHA256:d3d0eeab1a06460ed303b065248db53d47bfd5c253324b0d2f9efcc2dc700a47
Tags:32exetrojan
Infos:

Detection

RisePro Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected RisePro Stealer
AI detected suspicious sample
Connects to many ports of the same IP (likely port scanning)
Found stalling execution ending in API Sleep call
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
Potentially malicious time measurement code found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Uses schtasks.exe or at.exe to add and modify task schedules
Checks for debuggers (devices)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains an invalid checksum
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 90ZF1EDs9h.exe (PID: 7300 cmdline: "C:\Users\user\Desktop\90ZF1EDs9h.exe" MD5: 9437D6CF2745F8683C3AA908E01B03CF)
    • schtasks.exe (PID: 7452 cmdline: schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7460 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 7500 cmdline: schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7508 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • MPGPH131.exe (PID: 7552 cmdline: C:\ProgramData\MPGPH131\MPGPH131.exe MD5: 9437D6CF2745F8683C3AA908E01B03CF)
  • MPGPH131.exe (PID: 7560 cmdline: C:\ProgramData\MPGPH131\MPGPH131.exe MD5: 9437D6CF2745F8683C3AA908E01B03CF)
  • RageMP131.exe (PID: 7872 cmdline: "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe" MD5: 9437D6CF2745F8683C3AA908E01B03CF)
  • RageMP131.exe (PID: 7132 cmdline: "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe" MD5: 9437D6CF2745F8683C3AA908E01B03CF)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: 90ZF1EDs9h.exe PID: 7300JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
    Process Memory Space: MPGPH131.exe PID: 7552JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
      Process Memory Space: MPGPH131.exe PID: 7560JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
        Process Memory Space: RageMP131.exe PID: 7872JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
          Process Memory Space: RageMP131.exe PID: 7132JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security

            System Summary

            barindex
            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\90ZF1EDs9h.exe, ProcessId: 7300, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RageMP131
            Timestamp:06/23/24-18:37:04.646362
            SID:2046269
            Source Port:49732
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/23/24-18:37:07.646023
            SID:2046269
            Source Port:49731
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/23/24-18:37:06.583631
            SID:2046269
            Source Port:49747
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/23/24-18:34:58.970157
            SID:2049060
            Source Port:49731
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/23/24-18:35:36.288691
            SID:2046267
            Source Port:58709
            Destination Port:49747
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/23/24-18:37:05.458696
            SID:2046269
            Source Port:49735
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/23/24-18:35:02.465607
            SID:2046266
            Source Port:58709
            Destination Port:49732
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/23/24-18:35:21.729696
            SID:2046266
            Source Port:58709
            Destination Port:49747
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/23/24-18:34:59.553336
            SID:2046266
            Source Port:58709
            Destination Port:49731
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/23/24-18:35:03.603959
            SID:2046266
            Source Port:58709
            Destination Port:49733
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/23/24-18:37:04.786800
            SID:2046269
            Source Port:49733
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/23/24-18:35:13.471006
            SID:2046266
            Source Port:58709
            Destination Port:49735
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/23/24-18:35:12.390867
            SID:2046267
            Source Port:58709
            Destination Port:49731
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/23/24-18:35:13.312009
            SID:2046267
            Source Port:58709
            Destination Port:49732
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/23/24-18:35:14.392680
            SID:2046267
            Source Port:58709
            Destination Port:49733
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/23/24-18:35:28.664022
            SID:2046267
            Source Port:58709
            Destination Port:49735
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeReversingLabs: Detection: 50%
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeVirustotal: Detection: 53%Perma Link
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeReversingLabs: Detection: 50%
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeVirustotal: Detection: 53%Perma Link
            Source: 90ZF1EDs9h.exeVirustotal: Detection: 53%Perma Link
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeJoe Sandbox ML: detected
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeJoe Sandbox ML: detected
            Source: 90ZF1EDs9h.exeJoe Sandbox ML: detected
            Source: 90ZF1EDs9h.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.4:49734 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.26.5.15:443 -> 192.168.2.4:49736 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.4:49738 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.26.5.15:443 -> 192.168.2.4:49740 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.4:49741 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.26.5.15:443 -> 192.168.2.4:49744 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.4:49748 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.26.5.15:443 -> 192.168.2.4:49749 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.4:49750 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.26.5.15:443 -> 192.168.2.4:49751 version: TLS 1.2

            Networking

            barindex
            Source: TrafficSnort IDS: 2049060 ET TROJAN RisePro TCP Heartbeat Packet 192.168.2.4:49731 -> 77.91.77.66:58709
            Source: TrafficSnort IDS: 2046266 ET TROJAN [ANY.RUN] RisePro TCP (Token) 77.91.77.66:58709 -> 192.168.2.4:49731
            Source: TrafficSnort IDS: 2046266 ET TROJAN [ANY.RUN] RisePro TCP (Token) 77.91.77.66:58709 -> 192.168.2.4:49732
            Source: TrafficSnort IDS: 2046269 ET TROJAN [ANY.RUN] RisePro TCP (Activity) 192.168.2.4:49731 -> 77.91.77.66:58709
            Source: TrafficSnort IDS: 2046266 ET TROJAN [ANY.RUN] RisePro TCP (Token) 77.91.77.66:58709 -> 192.168.2.4:49733
            Source: TrafficSnort IDS: 2046269 ET TROJAN [ANY.RUN] RisePro TCP (Activity) 192.168.2.4:49732 -> 77.91.77.66:58709
            Source: TrafficSnort IDS: 2046269 ET TROJAN [ANY.RUN] RisePro TCP (Activity) 192.168.2.4:49733 -> 77.91.77.66:58709
            Source: TrafficSnort IDS: 2046267 ET TROJAN [ANY.RUN] RisePro TCP (External IP) 77.91.77.66:58709 -> 192.168.2.4:49731
            Source: TrafficSnort IDS: 2046267 ET TROJAN [ANY.RUN] RisePro TCP (External IP) 77.91.77.66:58709 -> 192.168.2.4:49732
            Source: TrafficSnort IDS: 2046266 ET TROJAN [ANY.RUN] RisePro TCP (Token) 77.91.77.66:58709 -> 192.168.2.4:49735
            Source: TrafficSnort IDS: 2046267 ET TROJAN [ANY.RUN] RisePro TCP (External IP) 77.91.77.66:58709 -> 192.168.2.4:49733
            Source: TrafficSnort IDS: 2046269 ET TROJAN [ANY.RUN] RisePro TCP (Activity) 192.168.2.4:49735 -> 77.91.77.66:58709
            Source: TrafficSnort IDS: 2046266 ET TROJAN [ANY.RUN] RisePro TCP (Token) 77.91.77.66:58709 -> 192.168.2.4:49747
            Source: TrafficSnort IDS: 2046269 ET TROJAN [ANY.RUN] RisePro TCP (Activity) 192.168.2.4:49747 -> 77.91.77.66:58709
            Source: TrafficSnort IDS: 2046267 ET TROJAN [ANY.RUN] RisePro TCP (External IP) 77.91.77.66:58709 -> 192.168.2.4:49735
            Source: TrafficSnort IDS: 2046267 ET TROJAN [ANY.RUN] RisePro TCP (External IP) 77.91.77.66:58709 -> 192.168.2.4:49747
            Source: global trafficTCP traffic: 77.91.77.66 ports 0,5,7,8,58709,9
            Source: global trafficTCP traffic: 192.168.2.4:49731 -> 77.91.77.66:58709
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: ipinfo.ioConnection: Keep-Alive
            Source: Joe Sandbox ViewIP Address: 34.117.186.192 34.117.186.192
            Source: Joe Sandbox ViewIP Address: 34.117.186.192 34.117.186.192
            Source: Joe Sandbox ViewIP Address: 104.26.5.15 104.26.5.15
            Source: Joe Sandbox ViewIP Address: 77.91.77.66 77.91.77.66
            Source: Joe Sandbox ViewASN Name: FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRU FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRU
            Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
            Source: unknownDNS query: name: ipinfo.io
            Source: unknownDNS query: name: ipinfo.io
            Source: global trafficHTTP traffic detected: GET /widget/demo/8.46.123.33 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: ipinfo.io
            Source: global trafficHTTP traffic detected: GET /demo/home.php?s=8.46.123.33 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: db-ip.com
            Source: global trafficHTTP traffic detected: GET /widget/demo/8.46.123.33 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: ipinfo.io
            Source: global trafficHTTP traffic detected: GET /demo/home.php?s=8.46.123.33 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: db-ip.com
            Source: global trafficHTTP traffic detected: GET /widget/demo/8.46.123.33 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: ipinfo.io
            Source: global trafficHTTP traffic detected: GET /demo/home.php?s=8.46.123.33 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: db-ip.com
            Source: global trafficHTTP traffic detected: GET /widget/demo/8.46.123.33 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: ipinfo.io
            Source: global trafficHTTP traffic detected: GET /demo/home.php?s=8.46.123.33 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: db-ip.com
            Source: global trafficHTTP traffic detected: GET /widget/demo/8.46.123.33 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: ipinfo.io
            Source: global trafficHTTP traffic detected: GET /demo/home.php?s=8.46.123.33 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: db-ip.com
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeCode function: 0_2_00049280 recv,WSASend,0_2_00049280
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: ipinfo.ioConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /widget/demo/8.46.123.33 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: ipinfo.io
            Source: global trafficHTTP traffic detected: GET /demo/home.php?s=8.46.123.33 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: db-ip.com
            Source: global trafficHTTP traffic detected: GET /widget/demo/8.46.123.33 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: ipinfo.io
            Source: global trafficHTTP traffic detected: GET /demo/home.php?s=8.46.123.33 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: db-ip.com
            Source: global trafficHTTP traffic detected: GET /widget/demo/8.46.123.33 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: ipinfo.io
            Source: global trafficHTTP traffic detected: GET /demo/home.php?s=8.46.123.33 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: db-ip.com
            Source: global trafficHTTP traffic detected: GET /widget/demo/8.46.123.33 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: ipinfo.io
            Source: global trafficHTTP traffic detected: GET /demo/home.php?s=8.46.123.33 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: db-ip.com
            Source: global trafficHTTP traffic detected: GET /widget/demo/8.46.123.33 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: ipinfo.io
            Source: global trafficHTTP traffic detected: GET /demo/home.php?s=8.46.123.33 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: db-ip.com
            Source: global trafficDNS traffic detected: DNS query: ipinfo.io
            Source: global trafficDNS traffic detected: DNS query: db-ip.com
            Source: 90ZF1EDs9h.exe, 00000000.00000003.1654226982.0000000004960000.00000004.00001000.00020000.00000000.sdmp, 90ZF1EDs9h.exe, 00000000.00000002.2960516340.0000000000041000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000005.00000003.1681138634.0000000004AA0000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.2960518096.0000000000191000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000006.00000002.2960323258.0000000000191000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000006.00000003.1681761352.00000000049E0000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000003.1788309686.0000000004D00000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.2960594163.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 00000009.00000003.1867802367.0000000004B70000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000009.00000002.2960668282.00000000003E1000.00000040.00000001.01000000.00000006.sdmpString found in binary or memory: http://www.winimage.com/zLibDll
            Source: 90ZF1EDs9h.exe, 00000000.00000002.2964592286.0000000000BD9000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.2967167251.0000000000D84000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000003.2302053976.0000000000D83000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000003.2319159509.0000000000E53000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.2965067378.0000000000E54000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.2965177153.0000000000F13000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000009.00000002.2964515667.0000000000DF2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/
            Source: RageMP131.exe, 00000009.00000002.2964515667.0000000000DF2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/demo/home.php?s=8.46.123.33
            Source: MPGPH131.exe, 00000005.00000002.2965341053.0000000000D64000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000003.2302116387.0000000000D64000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/demo/home.php?s=8.46.123.33$
            Source: MPGPH131.exe, 00000005.00000002.2967167251.0000000000D84000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000003.2302053976.0000000000D83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/demo/home.php?s=8.46.123.33S
            Source: RageMP131.exe, 00000009.00000002.2964515667.0000000000DF2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/l/.
            Source: 90ZF1EDs9h.exe, 00000000.00000002.2964592286.0000000000BB5000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.2965341053.0000000000D64000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000003.2302116387.0000000000D64000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.2965177153.0000000000F06000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000009.00000002.2964515667.0000000000D7D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com:443/demo/home.php?s=8.46.123.33
            Source: MPGPH131.exe, 00000006.00000002.2965067378.0000000000DAB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com:443/demo/home.php?s=8.46.123.33J
            Source: RageMP131.exe, RageMP131.exe, 00000009.00000002.2964515667.0000000000D9D000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000009.00000002.2964515667.0000000000DE0000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000009.00000002.2964515667.0000000000DF2000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000009.00000002.2964515667.0000000000DDA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/
            Source: 90ZF1EDs9h.exe, 00000000.00000002.2964592286.0000000000BA5000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.2965341053.0000000000D58000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000003.2302116387.0000000000D58000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.2965067378.0000000000E0F000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000003.2319200721.0000000000E17000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.2965177153.0000000000EF9000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000009.00000002.2964515667.0000000000DE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/Mozilla/5.0
            Source: 90ZF1EDs9h.exe, 00000000.00000002.2964592286.0000000000B37000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/W&
            Source: MPGPH131.exe, 00000006.00000002.2965067378.0000000000E01000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/alj
            Source: 90ZF1EDs9h.exe, 00000000.00000003.1654226982.0000000004960000.00000004.00001000.00020000.00000000.sdmp, 90ZF1EDs9h.exe, 00000000.00000002.2960516340.0000000000041000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000005.00000003.1681138634.0000000004AA0000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.2960518096.0000000000191000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000006.00000002.2960323258.0000000000191000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000006.00000003.1681761352.00000000049E0000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000003.1788309686.0000000004D00000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.2960594163.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 00000009.00000003.1867802367.0000000004B70000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000009.00000002.2960668282.00000000003E1000.00000040.00000001.01000000.00000006.sdmpString found in binary or memory: https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
            Source: MPGPH131.exe, 00000006.00000002.2965067378.0000000000DCC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/s
            Source: RageMP131.exe, 00000009.00000002.2964515667.0000000000D9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/tuO
            Source: 90ZF1EDs9h.exe, 00000000.00000002.2964592286.0000000000B86000.00000004.00000020.00020000.00000000.sdmp, 90ZF1EDs9h.exe, 00000000.00000002.2964592286.0000000000B0E000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.2965341053.0000000000D3F000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.2965067378.0000000000DAB000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.2965067378.0000000000DBD000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.2965177153.0000000000E6E000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.2965177153.0000000000EAA000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000009.00000002.2964515667.0000000000DC1000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000009.00000002.2964515667.0000000000DAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/widget/demo/8.46.123.33
            Source: RageMP131.exe, 00000007.00000002.2965177153.0000000000EAA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/widget/demo/8.46.123.33#H
            Source: MPGPH131.exe, 00000006.00000002.2965067378.0000000000DBD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/widget/demo/8.46.123.33H
            Source: MPGPH131.exe, 00000005.00000002.2965341053.0000000000CCD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/widget/demo/8.46.123.33q
            Source: 90ZF1EDs9h.exe, 00000000.00000002.2964592286.0000000000B86000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/widget/demo/8.46.123.33~
            Source: 90ZF1EDs9h.exe, 00000000.00000002.2964592286.0000000000B9A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.2965341053.0000000000D58000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000003.2302116387.0000000000D58000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.2965067378.0000000000E0F000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.2965177153.0000000000EF9000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000009.00000002.2964515667.0000000000D7D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io:443/widget/demo/8.46.123.33
            Source: 90ZF1EDs9h.exe, 00000000.00000002.2964592286.0000000000B0E000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.2965341053.0000000000CCD000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.2965067378.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.2965177153.0000000000E6E000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000009.00000002.2964515667.0000000000D5B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORT
            Source: MPGPH131.exe, 00000006.00000002.2965067378.0000000000D8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORT8?
            Source: 90ZF1EDs9h.exe, 00000000.00000002.2964592286.0000000000B0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORTz
            Source: MPGPH131.exe, 00000006.00000002.2965067378.0000000000E0F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/risepro
            Source: MPGPH131.exe, 00000005.00000002.2967167251.0000000000D84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/riseproD
            Source: 90ZF1EDs9h.exe, 00000000.00000002.2964592286.0000000000BD9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/riseproF
            Source: RageMP131.exe, 00000009.00000002.2964515667.0000000000DF2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/risepro_bot
            Source: RageMP131.exe, 00000009.00000002.2964515667.0000000000DF2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/risepro_botA$
            Source: RageMP131.exe, 00000009.00000002.2964515667.0000000000DF2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/risepro_botGc
            Source: 90ZF1EDs9h.exe, 00000000.00000002.2964592286.0000000000BD9000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.2965177153.0000000000F13000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/risepro_botSS
            Source: RageMP131.exe, 00000007.00000002.2965177153.0000000000F13000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000009.00000002.2964515667.0000000000DF2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/risepro_botisepro_bot
            Source: MPGPH131.exe, 00000006.00000002.2965067378.0000000000E0F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/risepro_botj/
            Source: RageMP131.exe, 00000007.00000002.2965177153.0000000000F13000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/risepro_botp
            Source: 90ZF1EDs9h.exe, 00000000.00000002.2975858179.0000000007720000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.v
            Source: RageMP131.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
            Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
            Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
            Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
            Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
            Source: unknownHTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.4:49734 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.26.5.15:443 -> 192.168.2.4:49736 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.4:49738 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.26.5.15:443 -> 192.168.2.4:49740 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.4:49741 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.26.5.15:443 -> 192.168.2.4:49744 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.4:49748 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.26.5.15:443 -> 192.168.2.4:49749 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.4:49750 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.26.5.15:443 -> 192.168.2.4:49751 version: TLS 1.2

            System Summary

            barindex
            Source: 90ZF1EDs9h.exeStatic PE information: section name:
            Source: 90ZF1EDs9h.exeStatic PE information: section name: .idata
            Source: 90ZF1EDs9h.exeStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name: .idata
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name: .idata
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeCode function: 0_2_0007A9280_2_0007A928
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeCode function: 0_2_0007C9600_2_0007C960
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeCode function: 0_2_000771A00_2_000771A0
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeCode function: 0_2_0008DA860_2_0008DA86
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeCode function: 0_2_0008036F0_2_0008036F
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeCode function: 0_2_00098BB00_2_00098BB0
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeCode function: 0_2_0012FC400_2_0012FC40
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeCode function: 0_2_0006F5800_2_0006F580
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeCode function: 0_2_000947BF0_2_000947BF
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeCode function: 0_2_00132FD00_2_00132FD0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_001CA9285_2_001CA928
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_001CC9605_2_001CC960
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_001C71A05_2_001C71A0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_001DDA865_2_001DDA86
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_001D036F5_2_001D036F
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_001E8BB05_2_001E8BB0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_0027FC405_2_0027FC40
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_001BF5805_2_001BF580
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_001E47BF5_2_001E47BF
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_00282FD05_2_00282FD0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_001CA9286_2_001CA928
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_001CC9606_2_001CC960
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_001C71A06_2_001C71A0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_001DDA866_2_001DDA86
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_001D036F6_2_001D036F
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_001E8BB06_2_001E8BB0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_0027FC406_2_0027FC40
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_001BF5806_2_001BF580
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_001E47BF6_2_001E47BF
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00282FD06_2_00282FD0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 7_2_0041C9607_2_0041C960
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 7_2_0041A9287_2_0041A928
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 7_2_004171A07_2_004171A0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 7_2_0042DA867_2_0042DA86
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 7_2_0042036F7_2_0042036F
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 7_2_00438BB07_2_00438BB0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 7_2_004CFC407_2_004CFC40
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 7_2_0040F5807_2_0040F580
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 7_2_004326107_2_00432610
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 7_2_004D2FD07_2_004D2FD0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 7_2_004347BF7_2_004347BF
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 9_2_0041C9609_2_0041C960
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 9_2_0041A9289_2_0041A928
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 9_2_004171A09_2_004171A0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 9_2_0042DA869_2_0042DA86
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 9_2_0042036F9_2_0042036F
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 9_2_00438BB09_2_00438BB0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 9_2_004CFC409_2_004CFC40
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 9_2_0040F5809_2_0040F580
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 9_2_004326109_2_00432610
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 9_2_004D2FD09_2_004D2FD0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 9_2_004347BF9_2_004347BF
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: String function: 00414380 appears 48 times
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: String function: 001C4380 appears 48 times
            Source: 90ZF1EDs9h.exe, 00000000.00000000.1647503267.00000000001CA000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamedotnet.exe6 vs 90ZF1EDs9h.exe
            Source: 90ZF1EDs9h.exeBinary or memory string: OriginalFilenamedotnet.exe6 vs 90ZF1EDs9h.exe
            Source: 90ZF1EDs9h.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 90ZF1EDs9h.exeStatic PE information: Section: ZLIB complexity 0.998056854470803
            Source: 90ZF1EDs9h.exeStatic PE information: Section: pobzuwwq ZLIB complexity 0.9947049260853293
            Source: RageMP131.exe.0.drStatic PE information: Section: ZLIB complexity 0.998056854470803
            Source: RageMP131.exe.0.drStatic PE information: Section: pobzuwwq ZLIB complexity 0.9947049260853293
            Source: MPGPH131.exe.0.drStatic PE information: Section: ZLIB complexity 0.998056854470803
            Source: MPGPH131.exe.0.drStatic PE information: Section: pobzuwwq ZLIB complexity 0.9947049260853293
            Source: classification engineClassification label: mal100.troj.evad.winEXE@11/5@2/3
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeFile created: C:\Users\user\AppData\Local\RageMP131Jump to behavior
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7460:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7508:120:WilError_03
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeFile created: C:\Users\user\AppData\Local\Temp\rage131MP.tmpJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: 90ZF1EDs9h.exe, 00000000.00000003.1654226982.0000000004960000.00000004.00001000.00020000.00000000.sdmp, 90ZF1EDs9h.exe, 00000000.00000002.2960516340.0000000000041000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000005.00000003.1681138634.0000000004AA0000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.2960518096.0000000000191000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000006.00000002.2960323258.0000000000191000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000006.00000003.1681761352.00000000049E0000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000003.1788309686.0000000004D00000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.2960594163.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 00000009.00000003.1867802367.0000000004B70000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000009.00000002.2960668282.00000000003E1000.00000040.00000001.01000000.00000006.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
            Source: 90ZF1EDs9h.exe, 00000000.00000003.1654226982.0000000004960000.00000004.00001000.00020000.00000000.sdmp, 90ZF1EDs9h.exe, 00000000.00000002.2960516340.0000000000041000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000005.00000003.1681138634.0000000004AA0000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.2960518096.0000000000191000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000006.00000002.2960323258.0000000000191000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000006.00000003.1681761352.00000000049E0000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000003.1788309686.0000000004D00000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.2960594163.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 00000009.00000003.1867802367.0000000004B70000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000009.00000002.2960668282.00000000003E1000.00000040.00000001.01000000.00000006.sdmpBinary or memory string: UPDATE %Q.%s SET sql = sqlite_rename_table(sql, %Q), tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
            Source: 90ZF1EDs9h.exeVirustotal: Detection: 53%
            Source: 90ZF1EDs9h.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: 90ZF1EDs9h.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
            Source: MPGPH131.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: MPGPH131.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
            Source: MPGPH131.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: MPGPH131.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
            Source: RageMP131.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: RageMP131.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
            Source: RageMP131.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: RageMP131.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeFile read: C:\Users\user\Desktop\90ZF1EDs9h.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\90ZF1EDs9h.exe "C:\Users\user\Desktop\90ZF1EDs9h.exe"
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\ProgramData\MPGPH131\MPGPH131.exe C:\ProgramData\MPGPH131\MPGPH131.exe
            Source: unknownProcess created: C:\ProgramData\MPGPH131\MPGPH131.exe C:\ProgramData\MPGPH131\MPGPH131.exe
            Source: unknownProcess created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
            Source: unknownProcess created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHESTJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHESTJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeSection loaded: d3d10warp.dllJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeSection loaded: dxcore.dllJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeSection loaded: webio.dllJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winmm.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: d3d10warp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: dxcore.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: webio.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: schannel.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winmm.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: d3d10warp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: dxcore.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: webio.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: schannel.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: d3d10warp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: dxcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: webio.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: d3d10warp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: dxcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: webio.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: gpapi.dllJump to behavior
            Source: 90ZF1EDs9h.exeStatic file information: File size 2432512 > 1048576
            Source: 90ZF1EDs9h.exeStatic PE information: Raw size of pobzuwwq is bigger than: 0x100000 < 0x1a1800

            Data Obfuscation

            barindex
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeUnpacked PE file: 0.2.90ZF1EDs9h.exe.40000.0.unpack :EW;.rsrc:W;.idata :W; :EW;pobzuwwq:EW;bxltxemr:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;pobzuwwq:EW;bxltxemr:EW;.taggant:EW;
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeUnpacked PE file: 5.2.MPGPH131.exe.190000.0.unpack :EW;.rsrc:W;.idata :W; :EW;pobzuwwq:EW;bxltxemr:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;pobzuwwq:EW;bxltxemr:EW;.taggant:EW;
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeUnpacked PE file: 6.2.MPGPH131.exe.190000.0.unpack :EW;.rsrc:W;.idata :W; :EW;pobzuwwq:EW;bxltxemr:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;pobzuwwq:EW;bxltxemr:EW;.taggant:EW;
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeUnpacked PE file: 7.2.RageMP131.exe.3e0000.0.unpack :EW;.rsrc:W;.idata :W; :EW;pobzuwwq:EW;bxltxemr:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;pobzuwwq:EW;bxltxemr:EW;.taggant:EW;
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeUnpacked PE file: 9.2.RageMP131.exe.3e0000.0.unpack :EW;.rsrc:W;.idata :W; :EW;pobzuwwq:EW;bxltxemr:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;pobzuwwq:EW;bxltxemr:EW;.taggant:EW;
            Source: initial sampleStatic PE information: section where entry point is pointing to: .taggant
            Source: RageMP131.exe.0.drStatic PE information: real checksum: 0x25d952 should be: 0x253833
            Source: MPGPH131.exe.0.drStatic PE information: real checksum: 0x25d952 should be: 0x253833
            Source: 90ZF1EDs9h.exeStatic PE information: real checksum: 0x25d952 should be: 0x253833
            Source: 90ZF1EDs9h.exeStatic PE information: section name:
            Source: 90ZF1EDs9h.exeStatic PE information: section name: .idata
            Source: 90ZF1EDs9h.exeStatic PE information: section name:
            Source: 90ZF1EDs9h.exeStatic PE information: section name: pobzuwwq
            Source: 90ZF1EDs9h.exeStatic PE information: section name: bxltxemr
            Source: 90ZF1EDs9h.exeStatic PE information: section name: .taggant
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name: .idata
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name: pobzuwwq
            Source: RageMP131.exe.0.drStatic PE information: section name: bxltxemr
            Source: RageMP131.exe.0.drStatic PE information: section name: .taggant
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name: .idata
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name: pobzuwwq
            Source: MPGPH131.exe.0.drStatic PE information: section name: bxltxemr
            Source: MPGPH131.exe.0.drStatic PE information: section name: .taggant
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeCode function: 0_2_00073F59 push ecx; ret 0_2_00073F6C
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_001C3F59 push ecx; ret 5_2_001C3F6C
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_001C3F59 push ecx; ret 6_2_001C3F6C
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 7_2_00413F59 push ecx; ret 7_2_00413F6C
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 7_2_04F808D0 push cs; iretd 7_2_04F808DA
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 9_2_00413F59 push ecx; ret 9_2_00413F6C
            Source: 90ZF1EDs9h.exeStatic PE information: section name: entropy: 7.980016205845924
            Source: 90ZF1EDs9h.exeStatic PE information: section name: pobzuwwq entropy: 7.953477305499687
            Source: RageMP131.exe.0.drStatic PE information: section name: entropy: 7.980016205845924
            Source: RageMP131.exe.0.drStatic PE information: section name: pobzuwwq entropy: 7.953477305499687
            Source: MPGPH131.exe.0.drStatic PE information: section name: entropy: 7.980016205845924
            Source: MPGPH131.exe.0.drStatic PE information: section name: pobzuwwq entropy: 7.953477305499687
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeFile created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeJump to dropped file
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeFile created: C:\ProgramData\MPGPH131\MPGPH131.exeJump to dropped file
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeFile created: C:\ProgramData\MPGPH131\MPGPH131.exeJump to dropped file

            Boot Survival

            barindex
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeWindow searched: window name: RegmonClassJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeWindow searched: window name: FilemonclassJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: RegmonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonclassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: RegmonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonclassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: RegmonClassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: FilemonclassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: RegmonClassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: FilemonclassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RageMP131Jump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RageMP131Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeStalling execution: Execution stalls by calling Sleepgraph_0-16297
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeStalling execution: Execution stalls by calling Sleepgraph_5-18440
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeStalling execution: Execution stalls by calling Sleep
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 1D0B72 second address: 1D0B78 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 1D0B78 second address: 1D0B7D instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 338A6D second address: 338AB9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7374772AB6h 0x00000007 jo 00007F7374772AA6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push ebx 0x00000010 jmp 00007F7374772AB1h 0x00000015 pop ebx 0x00000016 push eax 0x00000017 push edx 0x00000018 push ecx 0x00000019 pop ecx 0x0000001a jmp 00007F7374772AB5h 0x0000001f rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3499FB second address: 3499FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 34C045 second address: 1D0B72 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F7374772AA8h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c xor dword ptr [esp], 2ED4FAD4h 0x00000013 or cl, FFFFFFF2h 0x00000016 push dword ptr [ebp+122D12B5h] 0x0000001c add dword ptr [ebp+122D2BC2h], edi 0x00000022 mov edi, dword ptr [ebp+122D3794h] 0x00000028 call dword ptr [ebp+122D1BF2h] 0x0000002e pushad 0x0000002f jnp 00007F7374772ABDh 0x00000035 jmp 00007F7374772AB7h 0x0000003a xor eax, eax 0x0000003c cmc 0x0000003d mov edx, dword ptr [esp+28h] 0x00000041 jmp 00007F7374772AB3h 0x00000046 mov dword ptr [ebp+122D38D4h], eax 0x0000004c mov dword ptr [ebp+122D19F2h], ecx 0x00000052 mov esi, 0000003Ch 0x00000057 add dword ptr [ebp+122D19F2h], eax 0x0000005d add esi, dword ptr [esp+24h] 0x00000061 pushad 0x00000062 mov dword ptr [ebp+122D19F2h], esi 0x00000068 jg 00007F7374772AACh 0x0000006e popad 0x0000006f lodsw 0x00000071 jmp 00007F7374772AAAh 0x00000076 add eax, dword ptr [esp+24h] 0x0000007a jne 00007F7374772AB8h 0x00000080 mov ebx, dword ptr [esp+24h] 0x00000084 cld 0x00000085 nop 0x00000086 push eax 0x00000087 push edx 0x00000088 push eax 0x00000089 push edx 0x0000008a jmp 00007F7374772AB2h 0x0000008f rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 34C1BC second address: 34C1E2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 jmp 00007F737512BAEAh 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F737512BAF1h 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 34C1E2 second address: 34C1EC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jc 00007F7374772AA6h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 34C1EC second address: 34C226 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F737512BAF1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b nop 0x0000000c mov edx, 6DE091C7h 0x00000011 push 00000000h 0x00000013 jl 00007F737512BAECh 0x00000019 mov dword ptr [ebp+122D1824h], eax 0x0000001f push 8D57C73Ch 0x00000024 push eax 0x00000025 push edx 0x00000026 push edi 0x00000027 js 00007F737512BAE6h 0x0000002d pop edi 0x0000002e rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 34C226 second address: 34C22C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 34C22C second address: 34C230 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 34C230 second address: 34C234 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 34C234 second address: 34C2A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 add dword ptr [esp], 72A83944h 0x0000000f jmp 00007F737512BAF6h 0x00000014 push 00000003h 0x00000016 mov dword ptr [ebp+122D18F7h], edx 0x0000001c push 00000000h 0x0000001e push 00000000h 0x00000020 push ecx 0x00000021 call 00007F737512BAE8h 0x00000026 pop ecx 0x00000027 mov dword ptr [esp+04h], ecx 0x0000002b add dword ptr [esp+04h], 00000017h 0x00000033 inc ecx 0x00000034 push ecx 0x00000035 ret 0x00000036 pop ecx 0x00000037 ret 0x00000038 call 00007F737512BAEBh 0x0000003d sub dword ptr [ebp+122D2BB5h], edx 0x00000043 pop esi 0x00000044 push 00000003h 0x00000046 mov ecx, edx 0x00000048 call 00007F737512BAE9h 0x0000004d push eax 0x0000004e push eax 0x0000004f push edx 0x00000050 push eax 0x00000051 push edx 0x00000052 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 34C2A6 second address: 34C2AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 34C2AA second address: 34C2C7 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F737512BAE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d jp 00007F737512BAECh 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 popad 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 34C2C7 second address: 34C2CB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 34C2CB second address: 34C2E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov eax, dword ptr [esp+04h] 0x0000000b pushad 0x0000000c pushad 0x0000000d jbe 00007F737512BAE6h 0x00000013 jp 00007F737512BAE6h 0x00000019 popad 0x0000001a push edi 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 34C2E8 second address: 34C2F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 popad 0x00000006 mov eax, dword ptr [eax] 0x00000008 push eax 0x00000009 push edx 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d pop edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 34C2F6 second address: 34C3B9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F737512BAF9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp+04h], eax 0x0000000d jmp 00007F737512BAF8h 0x00000012 pop eax 0x00000013 push 00000000h 0x00000015 push ecx 0x00000016 call 00007F737512BAE8h 0x0000001b pop ecx 0x0000001c mov dword ptr [esp+04h], ecx 0x00000020 add dword ptr [esp+04h], 00000014h 0x00000028 inc ecx 0x00000029 push ecx 0x0000002a ret 0x0000002b pop ecx 0x0000002c ret 0x0000002d call 00007F737512BAF6h 0x00000032 pushad 0x00000033 jnc 00007F737512BAE6h 0x00000039 pushad 0x0000003a popad 0x0000003b popad 0x0000003c pop edi 0x0000003d mov esi, 611F30B0h 0x00000042 lea ebx, dword ptr [ebp+1244EF7Ch] 0x00000048 push 00000000h 0x0000004a push eax 0x0000004b call 00007F737512BAE8h 0x00000050 pop eax 0x00000051 mov dword ptr [esp+04h], eax 0x00000055 add dword ptr [esp+04h], 00000016h 0x0000005d inc eax 0x0000005e push eax 0x0000005f ret 0x00000060 pop eax 0x00000061 ret 0x00000062 pushad 0x00000063 mov ecx, dword ptr [ebp+122D3828h] 0x00000069 mov ebx, dword ptr [ebp+122D3067h] 0x0000006f popad 0x00000070 sub dword ptr [ebp+122D1BB1h], ecx 0x00000076 xchg eax, ebx 0x00000077 jnl 00007F737512BAF2h 0x0000007d je 00007F737512BAECh 0x00000083 push eax 0x00000084 push edx 0x00000085 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 34C3B9 second address: 34C3CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F7374772AAAh 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 34C3CB second address: 34C3CF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 34C3CF second address: 34C3D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 34C3D9 second address: 34C3DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 36AC68 second address: 36AC94 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007F7374772AA6h 0x0000000a jmp 00007F7374772AADh 0x0000000f push edx 0x00000010 pop edx 0x00000011 popad 0x00000012 jmp 00007F7374772AAAh 0x00000017 jl 00007F7374772AB2h 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 36B336 second address: 36B33C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 36B33C second address: 36B345 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 36B9BD second address: 36B9C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 36B9C2 second address: 36B9D8 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F7374772AACh 0x00000008 push eax 0x00000009 push edx 0x0000000a jg 00007F7374772AA6h 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 36BB3C second address: 36BB76 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 jmp 00007F737512BAF1h 0x0000000a pop edx 0x0000000b push eax 0x0000000c push edx 0x0000000d jng 00007F737512BB01h 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 36C581 second address: 36C58B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pushad 0x00000006 push edx 0x00000007 pop edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 36C58B second address: 36C59B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007F737512BAE6h 0x0000000a push esi 0x0000000b pop esi 0x0000000c popad 0x0000000d push esi 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 372EF1 second address: 372EF6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 333AEC second address: 333AFD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F737512BAEDh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 333AFD second address: 333B11 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7374772AB0h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 373C96 second address: 373CB4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F737512BAEFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jbe 00007F737512BAE8h 0x00000012 push edi 0x00000013 pop edi 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 374416 second address: 37441C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 37441C second address: 374422 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 37908C second address: 37909C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jne 00007F7374772AA6h 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 378771 second address: 378776 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 378776 second address: 37877C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 37877C second address: 378780 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 378BDD second address: 378BE7 instructions: 0x00000000 rdtsc 0x00000002 js 00007F7374772AA6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 378ED4 second address: 378EDD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 378EDD second address: 378EE1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 378EE1 second address: 378EE5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 378EE5 second address: 378F04 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007F7374772AA6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F7374772AB1h 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 378F04 second address: 378F2C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F737512BAF8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jc 00007F737512BAE6h 0x00000013 push eax 0x00000014 pop eax 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 37AEE6 second address: 37AEFD instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jc 00007F7374772AA6h 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 jnc 00007F7374772AA6h 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 37AEFD second address: 37AF07 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F737512BAE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 37AF91 second address: 37AF9B instructions: 0x00000000 rdtsc 0x00000002 jl 00007F7374772AA6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 37AF9B second address: 37AFA0 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 37B0C4 second address: 37B0C8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 37B6C2 second address: 37B6C8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 37B6C8 second address: 37B6E8 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F7374772AA8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c jmp 00007F7374772AAFh 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 37C114 second address: 37C11D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 37C19E second address: 37C1B2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7374772AB0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 37C1B2 second address: 37C20A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007F737512BAEBh 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d nop 0x0000000e push 00000000h 0x00000010 push ebx 0x00000011 call 00007F737512BAE8h 0x00000016 pop ebx 0x00000017 mov dword ptr [esp+04h], ebx 0x0000001b add dword ptr [esp+04h], 0000001Bh 0x00000023 inc ebx 0x00000024 push ebx 0x00000025 ret 0x00000026 pop ebx 0x00000027 ret 0x00000028 xor dword ptr [ebp+122D18F7h], esi 0x0000002e jmp 00007F737512BAECh 0x00000033 or di, 3297h 0x00000038 push eax 0x00000039 jp 00007F737512BAEEh 0x0000003f push ebx 0x00000040 push eax 0x00000041 push edx 0x00000042 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 37C6A2 second address: 37C6A8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 37C6A8 second address: 37C6AC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 37D0A1 second address: 37D0A5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 37D0A5 second address: 37D0AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 37CF1B second address: 37CF21 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 37D0AB second address: 37D0C5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F737512BAEFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push esi 0x0000000d push edi 0x0000000e pop edi 0x0000000f pop esi 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 37D0C5 second address: 37D157 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7374772AABh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a push 00000000h 0x0000000c push ecx 0x0000000d call 00007F7374772AA8h 0x00000012 pop ecx 0x00000013 mov dword ptr [esp+04h], ecx 0x00000017 add dword ptr [esp+04h], 0000001Dh 0x0000001f inc ecx 0x00000020 push ecx 0x00000021 ret 0x00000022 pop ecx 0x00000023 ret 0x00000024 movsx edi, bx 0x00000027 push 00000000h 0x00000029 push 00000000h 0x0000002b push ebp 0x0000002c call 00007F7374772AA8h 0x00000031 pop ebp 0x00000032 mov dword ptr [esp+04h], ebp 0x00000036 add dword ptr [esp+04h], 00000016h 0x0000003e inc ebp 0x0000003f push ebp 0x00000040 ret 0x00000041 pop ebp 0x00000042 ret 0x00000043 xor edi, dword ptr [ebp+122D3830h] 0x00000049 push 00000000h 0x0000004b jmp 00007F7374772AB0h 0x00000050 xchg eax, ebx 0x00000051 jl 00007F7374772AB7h 0x00000057 push eax 0x00000058 jnl 00007F7374772AAEh 0x0000005e push esi 0x0000005f push eax 0x00000060 push edx 0x00000061 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 37ED09 second address: 37ED27 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 pushad 0x00000007 jmp 00007F737512BAF3h 0x0000000c push eax 0x0000000d push edx 0x0000000e push edi 0x0000000f pop edi 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 37EAA6 second address: 37EAAA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 37ED27 second address: 37EDC5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F737512BAEFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a nop 0x0000000b push 00000000h 0x0000000d push edi 0x0000000e call 00007F737512BAE8h 0x00000013 pop edi 0x00000014 mov dword ptr [esp+04h], edi 0x00000018 add dword ptr [esp+04h], 00000018h 0x00000020 inc edi 0x00000021 push edi 0x00000022 ret 0x00000023 pop edi 0x00000024 ret 0x00000025 push esi 0x00000026 add dword ptr [ebp+122D2BC7h], ecx 0x0000002c pop esi 0x0000002d mov dword ptr [ebp+122D2B0Fh], esi 0x00000033 push 00000000h 0x00000035 jnp 00007F737512BAECh 0x0000003b mov dword ptr [ebp+122D2F8Bh], edx 0x00000041 push 00000000h 0x00000043 push 00000000h 0x00000045 push esi 0x00000046 call 00007F737512BAE8h 0x0000004b pop esi 0x0000004c mov dword ptr [esp+04h], esi 0x00000050 add dword ptr [esp+04h], 0000001Dh 0x00000058 inc esi 0x00000059 push esi 0x0000005a ret 0x0000005b pop esi 0x0000005c ret 0x0000005d mov edi, 1D3373FBh 0x00000062 xchg eax, ebx 0x00000063 jmp 00007F737512BAF3h 0x00000068 push eax 0x00000069 push eax 0x0000006a push edx 0x0000006b jmp 00007F737512BAEAh 0x00000070 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 37EAAA second address: 37EAAE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 37EAAE second address: 37EAB4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 37F82F second address: 37F833 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 37EAB4 second address: 37EABE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jg 00007F737512BAE6h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 37F5CE second address: 37F5D2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 37F833 second address: 37F877 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov dword ptr [esp], eax 0x0000000a adc di, 9C7Ch 0x0000000f push 00000000h 0x00000011 push 00000000h 0x00000013 push esi 0x00000014 call 00007F737512BAE8h 0x00000019 pop esi 0x0000001a mov dword ptr [esp+04h], esi 0x0000001e add dword ptr [esp+04h], 00000014h 0x00000026 inc esi 0x00000027 push esi 0x00000028 ret 0x00000029 pop esi 0x0000002a ret 0x0000002b mov si, 2D54h 0x0000002f push 00000000h 0x00000031 xor edi, 5BA521C3h 0x00000037 push eax 0x00000038 push eax 0x00000039 push edx 0x0000003a push eax 0x0000003b push edx 0x0000003c jns 00007F737512BAE6h 0x00000042 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 37F877 second address: 37F87D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3802C8 second address: 3802CC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 38005D second address: 380065 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3802CC second address: 380314 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 mov dword ptr [esp], eax 0x0000000a push 00000000h 0x0000000c push edx 0x0000000d call 00007F737512BAE8h 0x00000012 pop edx 0x00000013 mov dword ptr [esp+04h], edx 0x00000017 add dword ptr [esp+04h], 00000015h 0x0000001f inc edx 0x00000020 push edx 0x00000021 ret 0x00000022 pop edx 0x00000023 ret 0x00000024 mov esi, dword ptr [ebp+1247D45Bh] 0x0000002a push 00000000h 0x0000002c mov si, dx 0x0000002f push 00000000h 0x00000031 mov di, dx 0x00000034 mov esi, dword ptr [ebp+122D38F4h] 0x0000003a push eax 0x0000003b jc 00007F737512BAF0h 0x00000041 push eax 0x00000042 push edx 0x00000043 pushad 0x00000044 popad 0x00000045 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3817F0 second address: 38183E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 jnl 00007F7374772AB9h 0x0000000e nop 0x0000000f movsx edi, bx 0x00000012 push 00000000h 0x00000014 mov edi, dword ptr [ebp+122D392Ch] 0x0000001a push 00000000h 0x0000001c xchg eax, ebx 0x0000001d jmp 00007F7374772AB8h 0x00000022 push eax 0x00000023 pushad 0x00000024 push eax 0x00000025 push edx 0x00000026 pushad 0x00000027 popad 0x00000028 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 380B3F second address: 380B48 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 380B48 second address: 380B4C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3820FF second address: 382103 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 38927A second address: 389282 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 389282 second address: 389292 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007F737512BAE6h 0x0000000a popad 0x0000000b popad 0x0000000c push eax 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 38753D second address: 387542 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 389861 second address: 389866 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 38A850 second address: 38A86A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 jp 00007F7374772AA8h 0x0000000d push ecx 0x0000000e pop ecx 0x0000000f popad 0x00000010 push eax 0x00000011 pushad 0x00000012 je 00007F7374772AACh 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3899D4 second address: 389A87 instructions: 0x00000000 rdtsc 0x00000002 js 00007F737512BAE8h 0x00000008 push edx 0x00000009 pop edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edi 0x0000000e jmp 00007F737512BAEEh 0x00000013 pop edi 0x00000014 nop 0x00000015 jmp 00007F737512BAF4h 0x0000001a push dword ptr fs:[00000000h] 0x00000021 jmp 00007F737512BAF5h 0x00000026 mov dword ptr fs:[00000000h], esp 0x0000002d jmp 00007F737512BAF6h 0x00000032 mov eax, dword ptr [ebp+122D0C2Dh] 0x00000038 js 00007F737512BAE7h 0x0000003e cmc 0x0000003f push FFFFFFFFh 0x00000041 push 00000000h 0x00000043 push edi 0x00000044 call 00007F737512BAE8h 0x00000049 pop edi 0x0000004a mov dword ptr [esp+04h], edi 0x0000004e add dword ptr [esp+04h], 0000001Ch 0x00000056 inc edi 0x00000057 push edi 0x00000058 ret 0x00000059 pop edi 0x0000005a ret 0x0000005b nop 0x0000005c push eax 0x0000005d push edx 0x0000005e jmp 00007F737512BAF2h 0x00000063 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 38A86A second address: 38A8C4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F7374772AB4h 0x00000009 popad 0x0000000a nop 0x0000000b mov dword ptr [ebp+1244A37Ch], ecx 0x00000011 push 00000000h 0x00000013 push ebx 0x00000014 mov ebx, 58271747h 0x00000019 pop edi 0x0000001a push 00000000h 0x0000001c push 00000000h 0x0000001e push edi 0x0000001f call 00007F7374772AA8h 0x00000024 pop edi 0x00000025 mov dword ptr [esp+04h], edi 0x00000029 add dword ptr [esp+04h], 0000001Bh 0x00000031 inc edi 0x00000032 push edi 0x00000033 ret 0x00000034 pop edi 0x00000035 ret 0x00000036 push eax 0x00000037 js 00007F7374772AB0h 0x0000003d pushad 0x0000003e pushad 0x0000003f popad 0x00000040 push eax 0x00000041 push edx 0x00000042 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 389A87 second address: 389AAD instructions: 0x00000000 rdtsc 0x00000002 jne 00007F737512BAF8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c jng 00007F737512BAECh 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 38C834 second address: 38C83B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 38BA1C second address: 38BA35 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F737512BAF4h 0x00000009 popad 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 38C83B second address: 38C862 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7374772AB0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F7374772AAEh 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 38BA35 second address: 38BAD1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F737512BAF0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a cld 0x0000000b push dword ptr fs:[00000000h] 0x00000012 push 00000000h 0x00000014 push ebx 0x00000015 call 00007F737512BAE8h 0x0000001a pop ebx 0x0000001b mov dword ptr [esp+04h], ebx 0x0000001f add dword ptr [esp+04h], 0000001Bh 0x00000027 inc ebx 0x00000028 push ebx 0x00000029 ret 0x0000002a pop ebx 0x0000002b ret 0x0000002c call 00007F737512BAECh 0x00000031 mov di, 403Ch 0x00000035 pop ebx 0x00000036 mov ebx, dword ptr [ebp+122D3864h] 0x0000003c mov dword ptr fs:[00000000h], esp 0x00000043 push 00000000h 0x00000045 push ebx 0x00000046 call 00007F737512BAE8h 0x0000004b pop ebx 0x0000004c mov dword ptr [esp+04h], ebx 0x00000050 add dword ptr [esp+04h], 00000015h 0x00000058 inc ebx 0x00000059 push ebx 0x0000005a ret 0x0000005b pop ebx 0x0000005c ret 0x0000005d mov eax, dword ptr [ebp+122D031Dh] 0x00000063 mov di, B200h 0x00000067 push FFFFFFFFh 0x00000069 pushad 0x0000006a movzx edx, bx 0x0000006d mov edx, dword ptr [ebp+122D1C68h] 0x00000073 popad 0x00000074 push eax 0x00000075 jc 00007F737512BAEEh 0x0000007b push edi 0x0000007c push eax 0x0000007d push edx 0x0000007e rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 38C862 second address: 38C868 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 391CEC second address: 391CF0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 390F33 second address: 390FA7 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F7374772AA8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d mov ebx, dword ptr [ebp+122D2935h] 0x00000013 push dword ptr fs:[00000000h] 0x0000001a mov di, E382h 0x0000001e mov dword ptr fs:[00000000h], esp 0x00000025 push 00000000h 0x00000027 push ebp 0x00000028 call 00007F7374772AA8h 0x0000002d pop ebp 0x0000002e mov dword ptr [esp+04h], ebp 0x00000032 add dword ptr [esp+04h], 00000015h 0x0000003a inc ebp 0x0000003b push ebp 0x0000003c ret 0x0000003d pop ebp 0x0000003e ret 0x0000003f mov ebx, dword ptr [ebp+1244B59Dh] 0x00000045 mov eax, dword ptr [ebp+122D0DD5h] 0x0000004b push FFFFFFFFh 0x0000004d jmp 00007F7374772AB7h 0x00000052 nop 0x00000053 jo 00007F7374772AB0h 0x00000059 push eax 0x0000005a push edx 0x0000005b pushad 0x0000005c popad 0x0000005d rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 393C52 second address: 393C75 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F737512BAF8h 0x00000008 ja 00007F737512BAE6h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3304C9 second address: 3304CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3304CD second address: 3304D5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3942EB second address: 3942F1 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3942F1 second address: 394368 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F737512BAEEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a mov ebx, dword ptr [ebp+122D1882h] 0x00000010 push 00000000h 0x00000012 mov bl, E7h 0x00000014 push 00000000h 0x00000016 push 00000000h 0x00000018 push ebp 0x00000019 call 00007F737512BAE8h 0x0000001e pop ebp 0x0000001f mov dword ptr [esp+04h], ebp 0x00000023 add dword ptr [esp+04h], 0000001Ah 0x0000002b inc ebp 0x0000002c push ebp 0x0000002d ret 0x0000002e pop ebp 0x0000002f ret 0x00000030 call 00007F737512BAF2h 0x00000035 mov dword ptr [ebp+122D2AF9h], esi 0x0000003b pop ebx 0x0000003c push eax 0x0000003d jng 00007F737512BB02h 0x00000043 push eax 0x00000044 push edx 0x00000045 jmp 00007F737512BAF4h 0x0000004a rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 391EED second address: 391EF7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 ja 00007F7374772AA6h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 39632F second address: 396333 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 396333 second address: 396339 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 396339 second address: 396353 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F737512BAF5h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 39826B second address: 398270 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 398270 second address: 3982E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b jmp 00007F737512BAEEh 0x00000010 jne 00007F737512BAF6h 0x00000016 popad 0x00000017 nop 0x00000018 mov di, 61E9h 0x0000001c push 00000000h 0x0000001e push 00000000h 0x00000020 push ecx 0x00000021 call 00007F737512BAE8h 0x00000026 pop ecx 0x00000027 mov dword ptr [esp+04h], ecx 0x0000002b add dword ptr [esp+04h], 0000001Dh 0x00000033 inc ecx 0x00000034 push ecx 0x00000035 ret 0x00000036 pop ecx 0x00000037 ret 0x00000038 mov dword ptr [ebp+1244D8C8h], esi 0x0000003e push 00000000h 0x00000040 mov ebx, dword ptr [ebp+122D37A8h] 0x00000046 xchg eax, esi 0x00000047 pushad 0x00000048 push esi 0x00000049 ja 00007F737512BAE6h 0x0000004f pop esi 0x00000050 push eax 0x00000051 push edx 0x00000052 push eax 0x00000053 push edx 0x00000054 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3982E8 second address: 3982EC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3991FC second address: 39921A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F737512BAF9h 0x00000009 popad 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3954CB second address: 3954D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 39A248 second address: 39A24D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 39C30E second address: 39C313 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 39C313 second address: 39C320 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnc 00007F737512BAE6h 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3A39E0 second address: 3A39E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3A39E6 second address: 3A39EA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3A3575 second address: 3A357F instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F7374772AA6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3A357F second address: 3A3585 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 39A388 second address: 39A38C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3A6EE1 second address: 1D0B72 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F737512BAF6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp+04h], eax 0x0000000d pushad 0x0000000e jg 00007F737512BAE8h 0x00000014 jmp 00007F737512BAECh 0x00000019 popad 0x0000001a pop eax 0x0000001b jmp 00007F737512BAF3h 0x00000020 push dword ptr [ebp+122D12B5h] 0x00000026 jmp 00007F737512BAEEh 0x0000002b call dword ptr [ebp+122D1BF2h] 0x00000031 pushad 0x00000032 jnp 00007F737512BAFDh 0x00000038 jmp 00007F737512BAF7h 0x0000003d xor eax, eax 0x0000003f cmc 0x00000040 mov edx, dword ptr [esp+28h] 0x00000044 jmp 00007F737512BAF3h 0x00000049 mov dword ptr [ebp+122D38D4h], eax 0x0000004f mov dword ptr [ebp+122D19F2h], ecx 0x00000055 mov esi, 0000003Ch 0x0000005a add dword ptr [ebp+122D19F2h], eax 0x00000060 add esi, dword ptr [esp+24h] 0x00000064 pushad 0x00000065 mov dword ptr [ebp+122D19F2h], esi 0x0000006b jg 00007F737512BAECh 0x00000071 popad 0x00000072 lodsw 0x00000074 jmp 00007F737512BAEAh 0x00000079 add eax, dword ptr [esp+24h] 0x0000007d jne 00007F737512BAF8h 0x00000083 mov ebx, dword ptr [esp+24h] 0x00000087 cld 0x00000088 nop 0x00000089 push eax 0x0000008a push edx 0x0000008b push eax 0x0000008c push edx 0x0000008d jmp 00007F737512BAF2h 0x00000092 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 399428 second address: 399493 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 mov dword ptr [esp], eax 0x0000000a pushad 0x0000000b movzx esi, bx 0x0000000e mov edx, dword ptr [ebp+122D19F7h] 0x00000014 popad 0x00000015 push dword ptr fs:[00000000h] 0x0000001c push 00000000h 0x0000001e push ebx 0x0000001f call 00007F7374772AA8h 0x00000024 pop ebx 0x00000025 mov dword ptr [esp+04h], ebx 0x00000029 add dword ptr [esp+04h], 00000018h 0x00000031 inc ebx 0x00000032 push ebx 0x00000033 ret 0x00000034 pop ebx 0x00000035 ret 0x00000036 mov bx, di 0x00000039 mov dword ptr fs:[00000000h], esp 0x00000040 mov edi, dword ptr [ebp+122D39D8h] 0x00000046 sbb edi, 2EDA0B3Eh 0x0000004c mov eax, dword ptr [ebp+122D0159h] 0x00000052 mov bx, B334h 0x00000056 push FFFFFFFFh 0x00000058 mov dword ptr [ebp+122D2FBDh], edx 0x0000005e push eax 0x0000005f push eax 0x00000060 push edx 0x00000061 push eax 0x00000062 push edx 0x00000063 push ebx 0x00000064 pop ebx 0x00000065 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 399493 second address: 3994AC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F737512BAF5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3994AC second address: 3994C5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F7374772AB5h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 398476 second address: 39849C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a jng 00007F737512BAE6h 0x00000010 jmp 00007F737512BAF5h 0x00000015 popad 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3AE22D second address: 3AE233 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3AE233 second address: 3AE237 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3AEA99 second address: 3AEA9D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3AEBB5 second address: 3AEBB9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3AEBB9 second address: 3AEC38 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7374772AB9h 0x00000007 jmp 00007F7374772AB8h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e jmp 00007F7374772AADh 0x00000013 push ebx 0x00000014 pushad 0x00000015 jmp 00007F7374772AB9h 0x0000001a jmp 00007F7374772AB7h 0x0000001f jg 00007F7374772AA6h 0x00000025 popad 0x00000026 push eax 0x00000027 push edx 0x00000028 push eax 0x00000029 pop eax 0x0000002a rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3B5FD9 second address: 3B6010 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F737512BAF9h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e jne 00007F737512BAE8h 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007F737512BAEBh 0x0000001b rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3B6010 second address: 3B601A instructions: 0x00000000 rdtsc 0x00000002 jno 00007F7374772AA6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3B5446 second address: 3B544A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3B5776 second address: 3B577B instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3B577B second address: 3B5792 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 js 00007F737512BAEAh 0x0000000b pushad 0x0000000c popad 0x0000000d push edx 0x0000000e pop edx 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 push edx 0x00000013 push esi 0x00000014 push edx 0x00000015 pop edx 0x00000016 pop esi 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3B58C5 second address: 3B58C9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3B58C9 second address: 3B58F3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007F737512BAE6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007F737512BAEDh 0x00000011 jmp 00007F737512BAEDh 0x00000016 push eax 0x00000017 push edx 0x00000018 pushad 0x00000019 popad 0x0000001a rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3BA614 second address: 3BA62C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F7374772AAFh 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3844FD second address: 1D0B72 instructions: 0x00000000 rdtsc 0x00000002 je 00007F737512BAE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c jmp 00007F737512BAECh 0x00000011 nop 0x00000012 mov ecx, eax 0x00000014 push dword ptr [ebp+122D12B5h] 0x0000001a mov ecx, dword ptr [ebp+122D2BE6h] 0x00000020 call dword ptr [ebp+122D1BF2h] 0x00000026 pushad 0x00000027 jnp 00007F737512BAFDh 0x0000002d xor eax, eax 0x0000002f cmc 0x00000030 mov edx, dword ptr [esp+28h] 0x00000034 jmp 00007F737512BAF3h 0x00000039 mov dword ptr [ebp+122D38D4h], eax 0x0000003f mov dword ptr [ebp+122D19F2h], ecx 0x00000045 mov esi, 0000003Ch 0x0000004a add dword ptr [ebp+122D19F2h], eax 0x00000050 add esi, dword ptr [esp+24h] 0x00000054 pushad 0x00000055 mov dword ptr [ebp+122D19F2h], esi 0x0000005b jg 00007F737512BAECh 0x00000061 popad 0x00000062 lodsw 0x00000064 jmp 00007F737512BAEAh 0x00000069 add eax, dword ptr [esp+24h] 0x0000006d jne 00007F737512BAF8h 0x00000073 mov ebx, dword ptr [esp+24h] 0x00000077 cld 0x00000078 nop 0x00000079 push eax 0x0000007a push edx 0x0000007b push eax 0x0000007c push edx 0x0000007d jmp 00007F737512BAF2h 0x00000082 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 384651 second address: 3846C3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7374772AAFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007F7374772AAFh 0x0000000e popad 0x0000000f add dword ptr [esp], 2B031606h 0x00000016 push 00000000h 0x00000018 push ebp 0x00000019 call 00007F7374772AA8h 0x0000001e pop ebp 0x0000001f mov dword ptr [esp+04h], ebp 0x00000023 add dword ptr [esp+04h], 0000001Ch 0x0000002b inc ebp 0x0000002c push ebp 0x0000002d ret 0x0000002e pop ebp 0x0000002f ret 0x00000030 mov edi, dword ptr [ebp+122D1C05h] 0x00000036 push F37C85ECh 0x0000003b push esi 0x0000003c push eax 0x0000003d push edx 0x0000003e jmp 00007F7374772AB6h 0x00000043 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3847B7 second address: 3847D0 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F737512BAE8h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F737512BAEAh 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3847D0 second address: 3847DA instructions: 0x00000000 rdtsc 0x00000002 jne 00007F7374772AACh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 384900 second address: 384906 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 384906 second address: 38490C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 38490C second address: 384910 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 384E6F second address: 384E75 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 384FED second address: 384FF1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 385125 second address: 38513A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F7374772AAEh 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 38513A second address: 385189 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F737512BAF5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b jmp 00007F737512BAF8h 0x00000010 mov eax, dword ptr [esp+04h] 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007F737512BAF6h 0x0000001b rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 385208 second address: 385212 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 385212 second address: 385216 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 385216 second address: 38528F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov dword ptr [esp], eax 0x0000000a add ecx, 0F3C936Ah 0x00000010 lea eax, dword ptr [ebp+12486E6Ch] 0x00000016 push 00000000h 0x00000018 push edx 0x00000019 call 00007F7374772AA8h 0x0000001e pop edx 0x0000001f mov dword ptr [esp+04h], edx 0x00000023 add dword ptr [esp+04h], 0000001Bh 0x0000002b inc edx 0x0000002c push edx 0x0000002d ret 0x0000002e pop edx 0x0000002f ret 0x00000030 mov dword ptr [ebp+122D2BC7h], ebx 0x00000036 push eax 0x00000037 jmp 00007F7374772AAEh 0x0000003c mov dword ptr [esp], eax 0x0000003f mov edx, dword ptr [ebp+122D1AF9h] 0x00000045 mov dx, BD87h 0x00000049 lea eax, dword ptr [ebp+12486E28h] 0x0000004f mov di, ax 0x00000052 nop 0x00000053 pushad 0x00000054 push eax 0x00000055 pushad 0x00000056 popad 0x00000057 pop eax 0x00000058 jg 00007F7374772AA8h 0x0000005e popad 0x0000005f push eax 0x00000060 pushad 0x00000061 push eax 0x00000062 push edx 0x00000063 push esi 0x00000064 pop esi 0x00000065 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 38528F second address: 3852A1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F737512BAEAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push esi 0x0000000c pop esi 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3B9D4F second address: 3B9D55 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3BA1C9 second address: 3BA1CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3BA1CD second address: 3BA1E9 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 jmp 00007F7374772AB3h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3BA1E9 second address: 3BA209 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F737512BAEDh 0x00000009 pop eax 0x0000000a pushad 0x0000000b jmp 00007F737512BAEBh 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3BD2AC second address: 3BD2B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jne 00007F7374772AA6h 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3BD2B8 second address: 3BD2BC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 33C016 second address: 33C052 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 push esi 0x00000008 pop esi 0x00000009 push eax 0x0000000a pop eax 0x0000000b pop edi 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F7374772AB0h 0x00000014 pushad 0x00000015 jnp 00007F7374772AA6h 0x0000001b jmp 00007F7374772AAFh 0x00000020 jnp 00007F7374772AA6h 0x00000026 popad 0x00000027 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3C16AB second address: 3C16B0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3C16B0 second address: 3C16BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3C1A84 second address: 3C1AA9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pushad 0x00000006 jnp 00007F737512BAEEh 0x0000000c jne 00007F737512BAE6h 0x00000012 pushad 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 popad 0x00000018 jmp 00007F737512BAEDh 0x0000001d rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3C1AA9 second address: 3C1AD0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 je 00007F7374772AAEh 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F7374772AB1h 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3C1F8E second address: 3C1FA8 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F737512BAE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a ja 00007F737512BAF0h 0x00000010 jmp 00007F737512BAEAh 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3C24CB second address: 3C24D1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3C24D1 second address: 3C24DC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3C24DC second address: 3C24ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 jp 00007F7374772AACh 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3C24ED second address: 3C24F2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3C24F2 second address: 3C24F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3C24F8 second address: 3C24FE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3C24FE second address: 3C2504 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3C264F second address: 3C2655 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3C2655 second address: 3C2659 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3C139D second address: 3C13AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F737512BAECh 0x00000009 popad 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3C63C1 second address: 3C63C5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3C63C5 second address: 3C63CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3C63CB second address: 3C63E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F7374772AB0h 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3C63E1 second address: 3C6401 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F737512BAF8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3C6401 second address: 3C6407 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3C6407 second address: 3C642C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007F737512BAE6h 0x0000000a jbe 00007F737512BAE6h 0x00000010 popad 0x00000011 jmp 00007F737512BAEDh 0x00000016 pushad 0x00000017 push ecx 0x00000018 pop ecx 0x00000019 pushad 0x0000001a popad 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3CB6EC second address: 3CB6FB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jp 00007F7374772AA6h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3CAFFA second address: 3CB009 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edx 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 jl 00007F737512BAE6h 0x0000000e pop edx 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3CB009 second address: 3CB026 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F7374772AB9h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3CB16E second address: 3CB172 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3CB421 second address: 3CB42A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3CF3D8 second address: 3CF3DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3CED40 second address: 3CED60 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F7374772AA6h 0x00000008 jmp 00007F7374772AB1h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pop edx 0x00000010 pushad 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3CEE8D second address: 3CEE92 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3CEE92 second address: 3CEEAC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jng 00007F7374772AA6h 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jl 00007F7374772AC1h 0x00000012 je 00007F7374772AACh 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3CF0FF second address: 3CF103 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3CF103 second address: 3CF10B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3CF10B second address: 3CF13A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F737512BAF8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F737512BAF1h 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3D3F7C second address: 3D3F80 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3D3222 second address: 3D3234 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jnp 00007F737512BAEAh 0x0000000b pushad 0x0000000c popad 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3D3234 second address: 3D3242 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 push ecx 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b push eax 0x0000000c pop eax 0x0000000d pop ecx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3D3242 second address: 3D3257 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jmp 00007F737512BAF0h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3D33BC second address: 3D33EE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7374772AB2h 0x00000007 jmp 00007F7374772AB9h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3D33EE second address: 3D33F4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3D33F4 second address: 3D33FA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3D36CD second address: 3D36D3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3D36D3 second address: 3D36E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jp 00007F7374772AA8h 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3D36E1 second address: 3D36E8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3D36E8 second address: 3D36EE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3D381F second address: 3D3827 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pushad 0x00000006 popad 0x00000007 pop edi 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3D3827 second address: 3D3846 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jno 00007F7374772AA6h 0x00000009 push ebx 0x0000000a pop ebx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push ecx 0x0000000e pop ecx 0x0000000f jmp 00007F7374772AAEh 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3D3846 second address: 3D3860 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 jl 00007F737512BB1Bh 0x0000000d pushad 0x0000000e pushad 0x0000000f popad 0x00000010 jg 00007F737512BAE6h 0x00000016 push eax 0x00000017 pop eax 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3D3860 second address: 3D3877 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jmp 00007F7374772AAFh 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3D98C4 second address: 3D98E0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 jmp 00007F737512BAF6h 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3D98E0 second address: 3D98FD instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 jmp 00007F7374772AB1h 0x0000000e push ebx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3D98FD second address: 3D9906 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3D9906 second address: 3D990A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3D81C3 second address: 3D81C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3D81C8 second address: 3D81CE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3D81CE second address: 3D81D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3D81D2 second address: 3D81F0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jnc 00007F7374772AACh 0x0000000e jnc 00007F7374772AA6h 0x00000014 pop edx 0x00000015 pop eax 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a push ecx 0x0000001b pop ecx 0x0000001c push ecx 0x0000001d pop ecx 0x0000001e rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3D81F0 second address: 3D81F4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3D81F4 second address: 3D81FC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3D863E second address: 3D8648 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jl 00007F737512BAE6h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3D8648 second address: 3D865A instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F7374772AA6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jbe 00007F7374772AA6h 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 384CDD second address: 384CE2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3DAECF second address: 3DAED5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3E0397 second address: 3E039D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3E120F second address: 3E1213 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3E1213 second address: 3E1217 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3E1531 second address: 3E154F instructions: 0x00000000 rdtsc 0x00000002 ja 00007F7374772AA6h 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c ja 00007F7374772AACh 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 popad 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3E154F second address: 3E1553 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3E1553 second address: 3E1565 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F7374772AA6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jl 00007F7374772AA6h 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3E1DE4 second address: 3E1DEB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop ebx 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3E1DEB second address: 3E1DF9 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F7374772AA8h 0x00000008 push eax 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3E1DF9 second address: 3E1DFF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3E2091 second address: 3E20BB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F7374772AB0h 0x00000008 push edi 0x00000009 pop edi 0x0000000a jnp 00007F7374772AA6h 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 jnp 00007F7374772AA6h 0x00000019 jl 00007F7374772AA6h 0x0000001f rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3E6123 second address: 3E6142 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F737512BAF6h 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d pop eax 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3E640A second address: 3E6418 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c pop eax 0x0000000d popad 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3E6568 second address: 3E656C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3E656C second address: 3E6589 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7374772AADh 0x00000007 push eax 0x00000008 push edx 0x00000009 je 00007F7374772AA6h 0x0000000f jng 00007F7374772AA6h 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3E6849 second address: 3E6861 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 jmp 00007F737512BAF3h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3E6861 second address: 3E68B1 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F7374772AA8h 0x00000008 jmp 00007F7374772AB1h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 push edi 0x00000011 jmp 00007F7374772AACh 0x00000016 pop edi 0x00000017 jnl 00007F7374772AA8h 0x0000001d pushad 0x0000001e popad 0x0000001f push eax 0x00000020 jmp 00007F7374772AB9h 0x00000025 push eax 0x00000026 push edx 0x00000027 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3E69DC second address: 3E6A0F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edi 0x00000006 pushad 0x00000007 popad 0x00000008 pop edi 0x00000009 jmp 00007F737512BAEDh 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F737512BAECh 0x00000015 jmp 00007F737512BAEFh 0x0000001a rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3E6A0F second address: 3E6A13 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3E6CD6 second address: 3E6CDC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3E6CDC second address: 3E6CF5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F7374772AB2h 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3EB7C1 second address: 3EB7C6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3EB7C6 second address: 3EB7F6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7374772AB2h 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F7374772AB4h 0x0000000e jns 00007F7374772AA6h 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3F4DC3 second address: 3F4DC9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3F4DC9 second address: 3F4DDE instructions: 0x00000000 rdtsc 0x00000002 ja 00007F7374772AA6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jnl 00007F7374772AA6h 0x00000011 pushad 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3F4DDE second address: 3F4DE9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 pushad 0x00000007 push edx 0x00000008 pop edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3F4DE9 second address: 3F4DF1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3F4DF1 second address: 3F4E02 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007F737512BAE6h 0x0000000a pop ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3F4E02 second address: 3F4E1E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7374772AB8h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3F32B7 second address: 3F32BB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3F32BB second address: 3F32BF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3F32BF second address: 3F32C5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3F35CC second address: 3F35E1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 jmp 00007F7374772AAEh 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3F35E1 second address: 3F35F3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jc 00007F737512BAE6h 0x0000000c push edi 0x0000000d pop edi 0x0000000e pushad 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3F3784 second address: 3F37A1 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F7374772AA6h 0x00000008 jmp 00007F7374772AB0h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3F390C second address: 3F3910 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3F3ACA second address: 3F3AF1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7374772AB8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push edx 0x0000000b push ebx 0x0000000c pop ebx 0x0000000d push edi 0x0000000e pop edi 0x0000000f pop edx 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3F3E04 second address: 3F3E08 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3F3E08 second address: 3F3E0C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3F4C3A second address: 3F4C44 instructions: 0x00000000 rdtsc 0x00000002 js 00007F737512BAE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3F4C44 second address: 3F4C49 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3FA78E second address: 3FA797 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3FA797 second address: 3FA7B4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F7374772AB9h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3FA7B4 second address: 3FA7CA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F737512BAEEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3FA7CA second address: 3FA7CE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3FA32B second address: 3FA351 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007F737512BAE6h 0x0000000a popad 0x0000000b push edx 0x0000000c push edx 0x0000000d pop edx 0x0000000e je 00007F737512BAE6h 0x00000014 pop edx 0x00000015 pushad 0x00000016 pushad 0x00000017 popad 0x00000018 jmp 00007F737512BAECh 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3FA351 second address: 3FA357 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3FA488 second address: 3FA492 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3FA492 second address: 3FA496 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3FA496 second address: 3FA49E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3FA49E second address: 3FA4A4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3FA4A4 second address: 3FA4C8 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F737512BAE6h 0x00000008 push eax 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d jmp 00007F737512BAEFh 0x00000012 pop eax 0x00000013 pop edx 0x00000014 pop eax 0x00000015 push eax 0x00000016 push edx 0x00000017 push ecx 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 3FA4C8 second address: 3FA4DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007F7374772AA6h 0x0000000a pop ecx 0x0000000b pushad 0x0000000c push eax 0x0000000d pop eax 0x0000000e js 00007F7374772AA6h 0x00000014 popad 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4081EA second address: 4081F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4081F2 second address: 4081F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4081F6 second address: 408210 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F737512BAF4h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 40BEFD second address: 40BF08 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 40BF08 second address: 40BF0C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 40BF0C second address: 40BF27 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 pushad 0x00000008 popad 0x00000009 push esi 0x0000000a pop esi 0x0000000b pop eax 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f jne 00007F7374772AA8h 0x00000015 push eax 0x00000016 push edx 0x00000017 push ecx 0x00000018 pop ecx 0x00000019 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 40BF27 second address: 40BF40 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F737512BAF3h 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4135C2 second address: 4135C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 41341D second address: 413423 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 413423 second address: 413429 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 413429 second address: 41342D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 41C660 second address: 41C664 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 42164C second address: 421672 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F737512BAF0h 0x00000009 jmp 00007F737512BAF1h 0x0000000e popad 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 421672 second address: 42167E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnp 00007F7374772AA6h 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 42167E second address: 42169C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F737512BAEAh 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c jmp 00007F737512BAEBh 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 42169C second address: 4216A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4217CA second address: 4217CE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 421EF9 second address: 421EFF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 422A8F second address: 422A95 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 427508 second address: 42750E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 43D3D0 second address: 43D3D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 43D3D9 second address: 43D3DE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 44AEC5 second address: 44AEC9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 44C6E5 second address: 44C6EB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 44C6EB second address: 44C6EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 44E509 second address: 44E515 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 jc 00007F7374772AA6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 477ED0 second address: 477ED4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 477ED4 second address: 477EE7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7374772AAAh 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 478184 second address: 478196 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F737512BAE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c ja 00007F737512BAE6h 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 478304 second address: 47830A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 47830A second address: 47830F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 47830F second address: 478315 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 478315 second address: 47831B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 47831B second address: 478358 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7374772AACh 0x00000007 jne 00007F7374772AA6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pop edx 0x00000010 pop eax 0x00000011 je 00007F7374772AC9h 0x00000017 jmp 00007F7374772AB7h 0x0000001c jc 00007F7374772AACh 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 478465 second address: 47846F instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 478B53 second address: 478B57 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 47D00D second address: 47D011 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 47D011 second address: 47D017 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 47D017 second address: 47D021 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F737512BAECh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 47D62D second address: 47D631 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 47D631 second address: 47D63B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 47D63B second address: 47D63F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 47EFA9 second address: 47EFAF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 47EFAF second address: 47EFB3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 47EAC0 second address: 47EAC6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 47EAC6 second address: 47EACE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B406E4 second address: 4B40748 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F737512BAEBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007F737512BAF6h 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 call 00007F737512BAECh 0x00000018 pop esi 0x00000019 pushfd 0x0000001a jmp 00007F737512BAEBh 0x0000001f xor esi, 73258A6Eh 0x00000025 jmp 00007F737512BAF9h 0x0000002a popfd 0x0000002b popad 0x0000002c rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B40748 second address: 4B407A5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F7374772AB7h 0x00000009 or si, D07Eh 0x0000000e jmp 00007F7374772AB9h 0x00000013 popfd 0x00000014 mov bx, cx 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a xchg eax, ebp 0x0000001b jmp 00007F7374772AAAh 0x00000020 mov ebp, esp 0x00000022 pushad 0x00000023 mov bh, ah 0x00000025 mov si, di 0x00000028 popad 0x00000029 pop ebp 0x0000002a push eax 0x0000002b push edx 0x0000002c pushad 0x0000002d push eax 0x0000002e pop edi 0x0000002f push eax 0x00000030 pop edi 0x00000031 popad 0x00000032 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B10128 second address: 4B10173 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop ecx 0x00000005 pushfd 0x00000006 jmp 00007F737512BAEDh 0x0000000b adc ecx, 54075586h 0x00000011 jmp 00007F737512BAF1h 0x00000016 popfd 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a xchg eax, ebp 0x0000001b push eax 0x0000001c push edx 0x0000001d push eax 0x0000001e push edx 0x0000001f jmp 00007F737512BAF8h 0x00000024 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B10173 second address: 4B10177 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B10177 second address: 4B1017D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B1017D second address: 4B101BC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F7374772AACh 0x00000009 xor cl, FFFFFF88h 0x0000000c jmp 00007F7374772AABh 0x00000011 popfd 0x00000012 movzx eax, dx 0x00000015 popad 0x00000016 pop edx 0x00000017 pop eax 0x00000018 push eax 0x00000019 jmp 00007F7374772AB2h 0x0000001e xchg eax, ebp 0x0000001f push eax 0x00000020 push edx 0x00000021 push eax 0x00000022 push edx 0x00000023 pushad 0x00000024 popad 0x00000025 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B101BC second address: 4B101C0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B101C0 second address: 4B101C6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B101C6 second address: 4B10252 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F737512BAF4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b pushad 0x0000000c call 00007F737512BAEEh 0x00000011 pushfd 0x00000012 jmp 00007F737512BAF2h 0x00000017 and cl, FFFFFFA8h 0x0000001a jmp 00007F737512BAEBh 0x0000001f popfd 0x00000020 pop ecx 0x00000021 pushfd 0x00000022 jmp 00007F737512BAF9h 0x00000027 adc ah, FFFFFFC6h 0x0000002a jmp 00007F737512BAF1h 0x0000002f popfd 0x00000030 popad 0x00000031 pop ebp 0x00000032 push eax 0x00000033 push edx 0x00000034 jmp 00007F737512BAEDh 0x00000039 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B800AF second address: 4B800B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B00D57 second address: 4B00D6B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F737512BAF0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B00D6B second address: 4B00E1C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7374772AABh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b jmp 00007F7374772AB6h 0x00000010 push dword ptr [ebp+04h] 0x00000013 jmp 00007F7374772AB0h 0x00000018 push dword ptr [ebp+0Ch] 0x0000001b pushad 0x0000001c pushad 0x0000001d jmp 00007F7374772AACh 0x00000022 pushfd 0x00000023 jmp 00007F7374772AB2h 0x00000028 add al, 00000008h 0x0000002b jmp 00007F7374772AABh 0x00000030 popfd 0x00000031 popad 0x00000032 pushfd 0x00000033 jmp 00007F7374772AB8h 0x00000038 and ah, 00000068h 0x0000003b jmp 00007F7374772AABh 0x00000040 popfd 0x00000041 popad 0x00000042 push dword ptr [ebp+08h] 0x00000045 push eax 0x00000046 push edx 0x00000047 jmp 00007F7374772AB5h 0x0000004c rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B00E1C second address: 4B00E2C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F737512BAECh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B00E2C second address: 4B00E30 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B00E69 second address: 4B00E6F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B00E6F second address: 4B00E73 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B00E73 second address: 4B00E77 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B70CA7 second address: 4B70CAB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B70CAB second address: 4B70CB1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B70CB1 second address: 4B70CCE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F7374772AB9h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B70CCE second address: 4B70CD2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B70CD2 second address: 4B70CE2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B70CE2 second address: 4B70CE6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B70CE6 second address: 4B70CEC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B70CEC second address: 4B70CF2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B70CF2 second address: 4B70CF6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B70CF6 second address: 4B70D13 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F737512BAF2h 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B70D13 second address: 4B70D19 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B70D19 second address: 4B70D1D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B50B4E second address: 4B50B53 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B50B53 second address: 4B50B59 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B50B59 second address: 4B50B5D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B50B5D second address: 4B50B87 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F737512BAECh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c jmp 00007F737512BAF0h 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 popad 0x00000018 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B50B87 second address: 4B50B8D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B50B8D second address: 4B50B93 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B50B93 second address: 4B50B97 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B50B97 second address: 4B50BB3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F737512BAEFh 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B50BB3 second address: 4B50BB7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B50BB7 second address: 4B50BBD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B50BBD second address: 4B50BCC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F7374772AABh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B50BCC second address: 4B50BD0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B50BD0 second address: 4B50BDF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d push edi 0x0000000e pop esi 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B50BDF second address: 4B50C06 instructions: 0x00000000 rdtsc 0x00000002 mov dl, BAh 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push ecx 0x00000008 pop edx 0x00000009 movzx esi, dx 0x0000000c popad 0x0000000d popad 0x0000000e pop ebp 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F737512BAF6h 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B50C06 second address: 4B50C18 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F7374772AAEh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B50C18 second address: 4B50C1C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4BA00EB second address: 4BA0110 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7374772AB1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F7374772AADh 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B80CC1 second address: 4B80CC7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B80CC7 second address: 4B80CCB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B80CCB second address: 4B80CCF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B80CCF second address: 4B80CE7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a mov ecx, 340D98D3h 0x0000000f push eax 0x00000010 mov bl, C8h 0x00000012 pop ecx 0x00000013 popad 0x00000014 xchg eax, ebp 0x00000015 pushad 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B80CE7 second address: 4B80D29 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F737512BAF2h 0x00000008 add ax, FF88h 0x0000000d jmp 00007F737512BAEBh 0x00000012 popfd 0x00000013 pop edx 0x00000014 pop eax 0x00000015 popad 0x00000016 mov ebp, esp 0x00000018 push eax 0x00000019 push edx 0x0000001a jmp 00007F737512BAF5h 0x0000001f rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B80D29 second address: 4B80D2F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B80D2F second address: 4B80D33 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B10815 second address: 4B10828 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7374772AAFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B10828 second address: 4B1082E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B1082E second address: 4B10832 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B10832 second address: 4B10850 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007F737512BAEEh 0x0000000e xchg eax, ebp 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B10850 second address: 4B10854 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B10854 second address: 4B1085A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B1085A second address: 4B10869 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F7374772AABh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B10869 second address: 4B10879 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B10879 second address: 4B1087D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B1087D second address: 4B10881 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B10881 second address: 4B10887 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B70D47 second address: 4B70DB6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007F737512BAF7h 0x00000008 pop esi 0x00000009 pushfd 0x0000000a jmp 00007F737512BAF9h 0x0000000f adc al, 00000006h 0x00000012 jmp 00007F737512BAF1h 0x00000017 popfd 0x00000018 popad 0x00000019 pop edx 0x0000001a pop eax 0x0000001b xchg eax, ebp 0x0000001c jmp 00007F737512BAEEh 0x00000021 push eax 0x00000022 jmp 00007F737512BAEBh 0x00000027 xchg eax, ebp 0x00000028 push eax 0x00000029 push edx 0x0000002a push eax 0x0000002b push edx 0x0000002c pushad 0x0000002d popad 0x0000002e rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B70DB6 second address: 4B70DBA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B70DBA second address: 4B70DC0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B80466 second address: 4B804A8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov esi, edx 0x00000005 mov ah, bh 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a xchg eax, ebp 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e pushfd 0x0000000f jmp 00007F7374772AAFh 0x00000014 xor si, 84BEh 0x00000019 jmp 00007F7374772AB9h 0x0000001e popfd 0x0000001f mov ax, EA07h 0x00000023 popad 0x00000024 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B804A8 second address: 4B804B9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ecx, ebx 0x00000005 mov bl, DAh 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B804B9 second address: 4B804BF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B804BF second address: 4B804C9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edi, 7AED81A6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B804C9 second address: 4B80524 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 xchg eax, ebp 0x00000008 pushad 0x00000009 mov edi, 47B7CD2Ch 0x0000000e mov dl, 90h 0x00000010 popad 0x00000011 mov ebp, esp 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 call 00007F7374772AB9h 0x0000001b pop ecx 0x0000001c pushfd 0x0000001d jmp 00007F7374772AB1h 0x00000022 sub ecx, 02504466h 0x00000028 jmp 00007F7374772AB1h 0x0000002d popfd 0x0000002e popad 0x0000002f rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B80524 second address: 4B80550 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ax, bx 0x00000006 push edi 0x00000007 pop esi 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov eax, dword ptr [ebp+08h] 0x0000000e jmp 00007F737512BAF5h 0x00000013 and dword ptr [eax], 00000000h 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B80550 second address: 4B80554 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B80554 second address: 4B80567 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F737512BAEFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B80567 second address: 4B805D5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F7374772AAFh 0x00000009 or al, FFFFFFAEh 0x0000000c jmp 00007F7374772AB9h 0x00000011 popfd 0x00000012 pushfd 0x00000013 jmp 00007F7374772AB0h 0x00000018 sbb al, 00000028h 0x0000001b jmp 00007F7374772AABh 0x00000020 popfd 0x00000021 popad 0x00000022 pop edx 0x00000023 pop eax 0x00000024 and dword ptr [eax+04h], 00000000h 0x00000028 push eax 0x00000029 push edx 0x0000002a jmp 00007F7374772AB5h 0x0000002f rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B805D5 second address: 4B805DF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ebx, 01227DD2h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B50A6F second address: 4B50AA1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushfd 0x00000006 jmp 00007F7374772AB5h 0x0000000b jmp 00007F7374772AABh 0x00000010 popfd 0x00000011 popad 0x00000012 pop edx 0x00000013 pop eax 0x00000014 mov ebp, esp 0x00000016 push eax 0x00000017 push edx 0x00000018 pushad 0x00000019 mov dh, 77h 0x0000001b popad 0x0000001c rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B50AA1 second address: 4B50B02 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F737512BAF6h 0x00000009 sbb eax, 029C8068h 0x0000000f jmp 00007F737512BAEBh 0x00000014 popfd 0x00000015 jmp 00007F737512BAF8h 0x0000001a popad 0x0000001b pop edx 0x0000001c pop eax 0x0000001d pop ebp 0x0000001e push eax 0x0000001f push edx 0x00000020 jmp 00007F737512BAF7h 0x00000025 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B80E96 second address: 4B80E9C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B80E9C second address: 4B80ECC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F737512BAEDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F737512BAF8h 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B80ECC second address: 4B80EDB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7374772AABh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B80EDB second address: 4B80EF3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F737512BAF4h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B80EF3 second address: 4B80F17 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7374772AABh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov ebp, esp 0x0000000d pushad 0x0000000e mov ecx, 600E1D8Bh 0x00000013 mov si, 0767h 0x00000017 popad 0x00000018 pop ebp 0x00000019 pushad 0x0000001a push eax 0x0000001b push edx 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B80F17 second address: 4B80F1B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B307AE second address: 4B307B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B307B2 second address: 4B3082E instructions: 0x00000000 rdtsc 0x00000002 mov ah, 25h 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F737512BAF5h 0x0000000b popad 0x0000000c xchg eax, ebp 0x0000000d pushad 0x0000000e pushfd 0x0000000f jmp 00007F737512BAF3h 0x00000014 sub eax, 053B879Eh 0x0000001a jmp 00007F737512BAF9h 0x0000001f popfd 0x00000020 popad 0x00000021 push eax 0x00000022 push eax 0x00000023 push edx 0x00000024 pushad 0x00000025 pushfd 0x00000026 jmp 00007F737512BAEAh 0x0000002b jmp 00007F737512BAF5h 0x00000030 popfd 0x00000031 mov dx, ax 0x00000034 popad 0x00000035 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B3082E second address: 4B30850 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edi, 5D11025Eh 0x00000008 call 00007F7374772AAFh 0x0000000d pop esi 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 xchg eax, ebp 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B30850 second address: 4B30854 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B30854 second address: 4B3085A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B3085A second address: 4B30874 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F737512BAF6h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B30874 second address: 4B3089B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F7374772AB9h 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B3089B second address: 4B308A1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B308A1 second address: 4B308C0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7374772AACh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F7374772AAAh 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B308C0 second address: 4B308CF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F737512BAEBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B90A8D second address: 4B90AA8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7374772AB1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B90AA8 second address: 4B90AAD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B90AAD second address: 4B90AEE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7374772AB2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007F7374772AABh 0x0000000f xchg eax, ebp 0x00000010 jmp 00007F7374772AB6h 0x00000015 mov ebp, esp 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B90AEE second address: 4B90AF2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B90AF2 second address: 4B90B0F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7374772AB9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B90B0F second address: 4B90B15 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B90B15 second address: 4B90B19 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B90B19 second address: 4B90B2F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F737512BAEBh 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B90B2F second address: 4B90B58 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ecx, edx 0x00000005 movsx edx, cx 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], ecx 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F7374772AB9h 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B90B58 second address: 4B90B68 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F737512BAECh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B90B68 second address: 4B90C65 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7374772AABh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov eax, dword ptr [76FB65FCh] 0x00000010 pushad 0x00000011 pushfd 0x00000012 jmp 00007F7374772AB4h 0x00000017 add esi, 06235C68h 0x0000001d jmp 00007F7374772AABh 0x00000022 popfd 0x00000023 mov ecx, 7AAA125Fh 0x00000028 popad 0x00000029 test eax, eax 0x0000002b pushad 0x0000002c mov ecx, edi 0x0000002e popad 0x0000002f je 00007F73E6B1585Ah 0x00000035 jmp 00007F7374772AB9h 0x0000003a mov ecx, eax 0x0000003c jmp 00007F7374772AAEh 0x00000041 xor eax, dword ptr [ebp+08h] 0x00000044 pushad 0x00000045 pushfd 0x00000046 jmp 00007F7374772AB7h 0x0000004b jmp 00007F7374772AB3h 0x00000050 popfd 0x00000051 push ecx 0x00000052 pushfd 0x00000053 jmp 00007F7374772AAFh 0x00000058 and si, 97CEh 0x0000005d jmp 00007F7374772AB9h 0x00000062 popfd 0x00000063 pop eax 0x00000064 popad 0x00000065 and ecx, 1Fh 0x00000068 jmp 00007F7374772AB7h 0x0000006d ror eax, cl 0x0000006f push eax 0x00000070 push edx 0x00000071 push eax 0x00000072 push edx 0x00000073 pushad 0x00000074 popad 0x00000075 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B90C65 second address: 4B90C6B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B90C6B second address: 4B90C71 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B90C71 second address: 4B90C75 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B5001C second address: 4B50020 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B50020 second address: 4B50026 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B50026 second address: 4B5002B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B5002B second address: 4B5003B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov edx, ecx 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B5003B second address: 4B5003F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B5003F second address: 4B50045 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B50045 second address: 4B50091 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ecx, 508E5755h 0x00000008 mov ah, 13h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e pushad 0x0000000f movzx ecx, dx 0x00000012 pushad 0x00000013 pushfd 0x00000014 jmp 00007F7374772AB0h 0x00000019 jmp 00007F7374772AB5h 0x0000001e popfd 0x0000001f popad 0x00000020 popad 0x00000021 xchg eax, ebp 0x00000022 push eax 0x00000023 push edx 0x00000024 jmp 00007F7374772AADh 0x00000029 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B50091 second address: 4B50106 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F737512BAF7h 0x00000009 jmp 00007F737512BAF3h 0x0000000e popfd 0x0000000f jmp 00007F737512BAF8h 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 mov ebp, esp 0x00000019 jmp 00007F737512BAF0h 0x0000001e and esp, FFFFFFF8h 0x00000021 jmp 00007F737512BAF0h 0x00000026 xchg eax, ecx 0x00000027 push eax 0x00000028 push edx 0x00000029 pushad 0x0000002a push eax 0x0000002b push edx 0x0000002c rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B50106 second address: 4B5010D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop eax 0x00000006 popad 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B5010D second address: 4B50156 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bl, ch 0x00000005 mov edi, 72A27252h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e jmp 00007F737512BAF8h 0x00000013 xchg eax, ecx 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 mov dx, 5C80h 0x0000001b call 00007F737512BAF9h 0x00000020 pop ecx 0x00000021 popad 0x00000022 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B50156 second address: 4B501F3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F7374772AB8h 0x00000009 and esi, 5DC63D28h 0x0000000f jmp 00007F7374772AABh 0x00000014 popfd 0x00000015 popad 0x00000016 pop edx 0x00000017 pop eax 0x00000018 xchg eax, ebx 0x00000019 pushad 0x0000001a mov bx, cx 0x0000001d movzx ecx, dx 0x00000020 popad 0x00000021 push eax 0x00000022 jmp 00007F7374772AAAh 0x00000027 xchg eax, ebx 0x00000028 jmp 00007F7374772AB0h 0x0000002d mov ebx, dword ptr [ebp+10h] 0x00000030 jmp 00007F7374772AB0h 0x00000035 xchg eax, esi 0x00000036 jmp 00007F7374772AB0h 0x0000003b push eax 0x0000003c push eax 0x0000003d push edx 0x0000003e pushad 0x0000003f pushfd 0x00000040 jmp 00007F7374772AACh 0x00000045 add ah, 00000048h 0x00000048 jmp 00007F7374772AABh 0x0000004d popfd 0x0000004e push eax 0x0000004f pop edi 0x00000050 popad 0x00000051 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B501F3 second address: 4B50213 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F737512BAF5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, esi 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B50213 second address: 4B50217 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B50217 second address: 4B5021B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B5021B second address: 4B50221 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B50221 second address: 4B50227 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B50227 second address: 4B5022B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B5022B second address: 4B50286 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F737512BAECh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov esi, dword ptr [ebp+08h] 0x0000000e jmp 00007F737512BAF0h 0x00000013 xchg eax, edi 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 push ebx 0x00000018 pop ecx 0x00000019 pushfd 0x0000001a jmp 00007F737512BAF9h 0x0000001f sub al, FFFFFFD6h 0x00000022 jmp 00007F737512BAF1h 0x00000027 popfd 0x00000028 popad 0x00000029 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B50286 second address: 4B502CE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop ecx 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a mov di, ax 0x0000000d mov bl, ah 0x0000000f popad 0x00000010 xchg eax, edi 0x00000011 jmp 00007F7374772AB9h 0x00000016 test esi, esi 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c jmp 00007F7374772AB8h 0x00000021 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B502CE second address: 4B502DD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F737512BAEBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B502DD second address: 4B502E3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B502E3 second address: 4B5032E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 je 00007F73E7509E10h 0x0000000e jmp 00007F737512BAF7h 0x00000013 cmp dword ptr [esi+08h], DDEEDDEEh 0x0000001a pushad 0x0000001b movzx esi, bx 0x0000001e mov esi, edx 0x00000020 popad 0x00000021 je 00007F73E7509DFBh 0x00000027 pushad 0x00000028 push eax 0x00000029 push edx 0x0000002a jmp 00007F737512BAEFh 0x0000002f rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B5032E second address: 4B50332 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B50332 second address: 4B50385 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov edi, ecx 0x00000008 popad 0x00000009 mov edx, dword ptr [esi+44h] 0x0000000c jmp 00007F737512BAF0h 0x00000011 or edx, dword ptr [ebp+0Ch] 0x00000014 pushad 0x00000015 pushfd 0x00000016 jmp 00007F737512BAEEh 0x0000001b adc si, 6C08h 0x00000020 jmp 00007F737512BAEBh 0x00000025 popfd 0x00000026 pushad 0x00000027 mov esi, 35138295h 0x0000002c popad 0x0000002d popad 0x0000002e test edx, 61000000h 0x00000034 push eax 0x00000035 push edx 0x00000036 pushad 0x00000037 push eax 0x00000038 push edx 0x00000039 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B50385 second address: 4B5038D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov di, ax 0x00000007 popad 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B5038D second address: 4B503A5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov dx, 2914h 0x00000007 pushad 0x00000008 popad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jne 00007F73E7509DD5h 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B503A5 second address: 4B503A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B503A9 second address: 4B503BB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F737512BAEEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B503BB second address: 4B503E1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7374772AABh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test byte ptr [esi+48h], 00000001h 0x0000000d pushad 0x0000000e mov edi, ecx 0x00000010 mov dx, cx 0x00000013 popad 0x00000014 jne 00007F73E6B50D72h 0x0000001a push eax 0x0000001b push edx 0x0000001c push eax 0x0000001d push edx 0x0000001e pushad 0x0000001f popad 0x00000020 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B503E1 second address: 4B503E5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B503E5 second address: 4B503EB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B70010 second address: 4B7001F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F737512BAEBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B7001F second address: 4B70025 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B70025 second address: 4B70029 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B70029 second address: 4B7002D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B7002D second address: 4B7005C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebx 0x00000009 pushad 0x0000000a mov esi, 47620689h 0x0000000f jmp 00007F737512BAF6h 0x00000014 popad 0x00000015 mov dword ptr [esp], ebp 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B7005C second address: 4B70060 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B70060 second address: 4B70064 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B70064 second address: 4B7006A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B7006A second address: 4B700DA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov dx, 05B4h 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov ebp, esp 0x0000000c jmp 00007F737512BAF3h 0x00000011 and esp, FFFFFFF8h 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 pushfd 0x00000018 jmp 00007F737512BAEBh 0x0000001d jmp 00007F737512BAF3h 0x00000022 popfd 0x00000023 pushfd 0x00000024 jmp 00007F737512BAF8h 0x00000029 xor cx, 40F8h 0x0000002e jmp 00007F737512BAEBh 0x00000033 popfd 0x00000034 popad 0x00000035 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B700DA second address: 4B70114 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F7374772AAFh 0x00000008 call 00007F7374772AB8h 0x0000000d pop ecx 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push ecx 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 mov ah, bl 0x00000017 mov eax, 57B0F01Bh 0x0000001c popad 0x0000001d rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B70114 second address: 4B70124 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F737512BAECh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B70124 second address: 4B70168 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7374772AABh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], ebx 0x0000000e jmp 00007F7374772AB6h 0x00000013 xchg eax, esi 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007F7374772AB7h 0x0000001b rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B70168 second address: 4B7016E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B7016E second address: 4B70186 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7374772AABh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B70186 second address: 4B7018A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B7018A second address: 4B70190 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B70190 second address: 4B701F1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F737512BAEDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, esi 0x0000000a pushad 0x0000000b mov dh, ah 0x0000000d pushad 0x0000000e pushfd 0x0000000f jmp 00007F737512BAEBh 0x00000014 jmp 00007F737512BAF3h 0x00000019 popfd 0x0000001a popad 0x0000001b popad 0x0000001c mov esi, dword ptr [ebp+08h] 0x0000001f push eax 0x00000020 push edx 0x00000021 pushad 0x00000022 pushfd 0x00000023 jmp 00007F737512BAEBh 0x00000028 jmp 00007F737512BAF3h 0x0000002d popfd 0x0000002e mov ch, 2Eh 0x00000030 popad 0x00000031 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B701F1 second address: 4B70212 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ah, A6h 0x00000005 call 00007F7374772AADh 0x0000000a pop eax 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e mov ebx, 00000000h 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 pushad 0x00000018 popad 0x00000019 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B70212 second address: 4B7022B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F737512BAF5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B7022B second address: 4B70231 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B70231 second address: 4B70235 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B70235 second address: 4B702C4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7374772AB3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b test esi, esi 0x0000000d pushad 0x0000000e pushfd 0x0000000f jmp 00007F7374772AB4h 0x00000014 and ecx, 1A0FF318h 0x0000001a jmp 00007F7374772AABh 0x0000001f popfd 0x00000020 pushad 0x00000021 pushfd 0x00000022 jmp 00007F7374772AB6h 0x00000027 adc si, DD78h 0x0000002c jmp 00007F7374772AABh 0x00000031 popfd 0x00000032 popad 0x00000033 popad 0x00000034 je 00007F73E6B28B91h 0x0000003a push eax 0x0000003b push edx 0x0000003c push eax 0x0000003d push edx 0x0000003e jmp 00007F7374772AB7h 0x00000043 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B702C4 second address: 4B702E1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F737512BAF9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B702E1 second address: 4B702E7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B702E7 second address: 4B7030D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F737512BAF3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b cmp dword ptr [esi+08h], DDEEDDEEh 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 popad 0x00000018 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B7030D second address: 4B70311 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B70311 second address: 4B70317 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B70317 second address: 4B7033C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ebx, esi 0x00000005 mov di, si 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov ecx, esi 0x0000000d pushad 0x0000000e push esi 0x0000000f jmp 00007F7374772AB3h 0x00000014 pop eax 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B7033C second address: 4B70365 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 0CCA1741h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a je 00007F73E74E1B43h 0x00000010 jmp 00007F737512BAECh 0x00000015 test byte ptr [76FB6968h], 00000002h 0x0000001c push eax 0x0000001d push edx 0x0000001e push eax 0x0000001f push edx 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B70365 second address: 4B70369 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B70369 second address: 4B70386 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F737512BAF9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B70386 second address: 4B7038B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B7038B second address: 4B703E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov bl, 59h 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jne 00007F73E74E1B08h 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 pushfd 0x00000013 jmp 00007F737512BAF1h 0x00000018 or ah, 00000056h 0x0000001b jmp 00007F737512BAF1h 0x00000020 popfd 0x00000021 pushfd 0x00000022 jmp 00007F737512BAF0h 0x00000027 and eax, 1BA2F078h 0x0000002d jmp 00007F737512BAEBh 0x00000032 popfd 0x00000033 popad 0x00000034 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B703E8 second address: 4B703EE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B703EE second address: 4B703F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B703F2 second address: 4B70419 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov edx, dword ptr [ebp+0Ch] 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e mov di, ax 0x00000011 call 00007F7374772AB4h 0x00000016 pop esi 0x00000017 popad 0x00000018 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B70419 second address: 4B70439 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F737512BAF5h 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B70439 second address: 4B7043F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B7043F second address: 4B70443 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B70443 second address: 4B70462 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7374772AB3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f push ebx 0x00000010 pop ecx 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B70462 second address: 4B704DC instructions: 0x00000000 rdtsc 0x00000002 mov ebx, 67120F74h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushfd 0x0000000a jmp 00007F737512BAEDh 0x0000000f adc esi, 0BB84D36h 0x00000015 jmp 00007F737512BAF1h 0x0000001a popfd 0x0000001b popad 0x0000001c xchg eax, ebx 0x0000001d pushad 0x0000001e jmp 00007F737512BAECh 0x00000023 pushad 0x00000024 pushfd 0x00000025 jmp 00007F737512BAF0h 0x0000002a xor cl, FFFFFF88h 0x0000002d jmp 00007F737512BAEBh 0x00000032 popfd 0x00000033 mov eax, 0C89CFFFh 0x00000038 popad 0x00000039 popad 0x0000003a xchg eax, ebx 0x0000003b push eax 0x0000003c push edx 0x0000003d jmp 00007F737512BAF1h 0x00000042 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B704DC second address: 4B704F8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F7374772AB1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeRDTSC instruction interceptor: First address: 4B704F8 second address: 4B704FC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeSpecial instruction interceptor: First address: 1D0BD6 instructions caused by: Self-modifying code
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeSpecial instruction interceptor: First address: 1D0B05 instructions caused by: Self-modifying code
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeSpecial instruction interceptor: First address: 373A87 instructions caused by: Self-modifying code
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeSpecial instruction interceptor: First address: 1CE10A instructions caused by: Self-modifying code
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeSpecial instruction interceptor: First address: 39CF2B instructions caused by: Self-modifying code
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeSpecial instruction interceptor: First address: 3FCAEB instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: 320BD6 instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: 320B05 instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: 4C3A87 instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: 31E10A instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: 4ECF2B instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: 54CAEB instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: 570BD6 instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: 570B05 instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: 713A87 instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: 56E10A instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: 73CF2B instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: 79CAEB instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeCode function: 0_2_04BC0728 rdtsc 0_2_04BC0728
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeWindow / User API: threadDelayed 1247Jump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeWindow / User API: threadDelayed 1188Jump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeWindow / User API: threadDelayed 1207Jump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeWindow / User API: threadDelayed 1009Jump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeWindow / User API: threadDelayed 403Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 1265Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 1266Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 1182Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 1229Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 1302Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 1323Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 1270Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 1217Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 1275Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 1521Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 1502Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 1526Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 1371Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 1499Jump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_0-16310
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_5-18440
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exe TID: 7344Thread sleep count: 37 > 30Jump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exe TID: 7344Thread sleep time: -74037s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exe TID: 7340Thread sleep count: 1247 > 30Jump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exe TID: 7340Thread sleep time: -2495247s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exe TID: 7412Thread sleep time: -32000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exe TID: 7304Thread sleep count: 97 > 30Jump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exe TID: 7320Thread sleep count: 1188 > 30Jump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exe TID: 7320Thread sleep time: -2377188s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exe TID: 7328Thread sleep count: 1207 > 30Jump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exe TID: 7328Thread sleep time: -2415207s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exe TID: 7304Thread sleep count: 205 > 30Jump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exe TID: 7324Thread sleep count: 1009 > 30Jump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exe TID: 7324Thread sleep time: -2019009s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exe TID: 7304Thread sleep count: 52 > 30Jump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exe TID: 7324Thread sleep count: 293 > 30Jump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exe TID: 7324Thread sleep time: -586293s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exe TID: 7320Thread sleep count: 403 > 30Jump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exe TID: 7320Thread sleep time: -806403s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7612Thread sleep count: 42 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7612Thread sleep time: -84042s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7596Thread sleep count: 1265 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7596Thread sleep time: -2531265s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7556Thread sleep count: 91 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7556Thread sleep count: 227 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7588Thread sleep count: 1266 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7588Thread sleep time: -2533266s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7556Thread sleep count: 42 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7708Thread sleep count: 40 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7708Thread sleep time: -80040s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7692Thread sleep count: 1182 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7692Thread sleep time: -2365182s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7564Thread sleep count: 105 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7564Thread sleep count: 81 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7688Thread sleep count: 1229 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7688Thread sleep time: -2459229s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7564Thread sleep count: 215 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7700Thread sleep count: 1302 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7700Thread sleep time: -2605302s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7564Thread sleep count: 43 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7920Thread sleep count: 38 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7920Thread sleep time: -76038s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7904Thread sleep count: 1323 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7904Thread sleep time: -2647323s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7992Thread sleep time: -32000s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7876Thread sleep count: 56 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7876Thread sleep count: 114 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7876Thread sleep count: 153 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7896Thread sleep count: 1270 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7896Thread sleep time: -2541270s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7876Thread sleep count: 92 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7900Thread sleep count: 1217 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7900Thread sleep time: -2435217s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7892Thread sleep count: 1275 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7892Thread sleep time: -2551275s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7220Thread sleep count: 59 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7220Thread sleep time: -118059s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7196Thread sleep count: 58 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7196Thread sleep time: -116058s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 6280Thread sleep count: 70 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 6280Thread sleep count: 112 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 6440Thread sleep count: 1521 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 6440Thread sleep time: -3043521s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 4080Thread sleep count: 1502 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 4080Thread sleep time: -3005502s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 6280Thread sleep count: 113 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 4900Thread sleep count: 1526 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 4900Thread sleep time: -3053526s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 6280Thread sleep count: 82 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 4828Thread sleep count: 1371 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 4828Thread sleep time: -2743371s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 2724Thread sleep count: 1499 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 2724Thread sleep time: -2999499s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 6280Thread sleep count: 41 > 30Jump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: RageMP131.exe, RageMP131.exe, 00000009.00000002.2961012549.00000000006F4000.00000040.00000001.01000000.00000006.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__
            Source: MPGPH131.exe, 00000006.00000002.2965067378.0000000000D8A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&
            Source: 90ZF1EDs9h.exe, 00000000.00000003.1672128094.0000000000B88000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}z]
            Source: MPGPH131.exe, 00000005.00000003.1694159336.0000000000D45000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&0000
            Source: RageMP131.exe, 00000009.00000003.1891360029.0000000000DBF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: 90ZF1EDs9h.exe, 00000000.00000002.2964592286.0000000000B71000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp'
            Source: 90ZF1EDs9h.exe, 00000000.00000002.2964592286.0000000000BB5000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.2965341053.0000000000D32000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000003.2302116387.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.2965341053.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.2965067378.0000000000DDC000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.2965067378.0000000000E0F000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000003.2319200721.0000000000E17000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.2965177153.0000000000EF9000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.2965177153.0000000000ED4000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.2965177153.0000000000F13000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000009.00000002.2964515667.0000000000DB5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: MPGPH131.exe, 00000005.00000002.2965341053.0000000000CCD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&%
            Source: MPGPH131.exe, 00000006.00000002.2965067378.0000000000E0F000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000003.2319200721.0000000000E17000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000009.00000002.2964515667.0000000000DE0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWen-GBn
            Source: MPGPH131.exe, 00000006.00000003.1711821266.0000000000DF6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}v
            Source: RageMP131.exe, 00000009.00000003.1891360029.0000000000DC7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}Fc
            Source: 90ZF1EDs9h.exe, 00000000.00000002.2964592286.0000000000B9A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000003.2302116387.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.2965341053.0000000000D79000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWL
            Source: RageMP131.exe, 00000007.00000003.1811415935.0000000000EE8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: RageMP131.exe, 00000009.00000002.2964515667.0000000000D50000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&db
            Source: 90ZF1EDs9h.exe, 00000000.00000002.2960879822.0000000000354000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000005.00000002.2962287913.00000000004A4000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000006.00000002.2961218867.00000000004A4000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 00000007.00000002.2962318691.00000000006F4000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 00000009.00000002.2961012549.00000000006F4000.00000040.00000001.01000000.00000006.sdmpBinary or memory string: Restart now?\\.\Oreans.vxd%s\Oreans.vxdXprotEventHARDWARE\ACPI\DSDT\VBOX__SeShutdownPrivilegeSoftware\WinLicenseCreateEvent API Error while extraction the driverGetEnvironmentVariable API Error while extraction the driverOpenSCManager API Error while extraction the driverCreateService API Error while extraction the driverCloseServiceHandle API Error while extraction the driverOpenService API Error while extraction the driverStartService API Error while extraction the driverAPIC error: Cannot find Processors Control Blocks. Please,
            Source: RageMP131.exe, 00000007.00000003.1811415935.0000000000EE8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}o
            Source: 90ZF1EDs9h.exe, 00000000.00000003.1672128094.0000000000B88000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: k&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: RageMP131.exe, 00000007.00000002.2965177153.0000000000E60000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&;
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeSystem information queried: ModuleInformationJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeProcess information queried: ProcessInformationJump to behavior

            Anti Debugging

            barindex
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeCode function: 0_2_04BC04E4 Start: 04BC055D End: 04BC04A10_2_04BC04E4
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeCode function: 0_2_04BC0AEF Start: 04BC0AF6 End: 04BC0B000_2_04BC0AEF
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_04D102F9 Start: 04D10474 End: 04D102C85_2_04D102F9
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_04C50587 Start: 04C505B6 End: 04C505BC6_2_04C50587
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 7_2_04F803CB Start: 04F80525 End: 04F804037_2_04F803CB
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: regmonclass
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: gbdyllo
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: procmon_window_class
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: ollydbg
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: filemonclass
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: NTICE
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: SICE
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: SIWVID
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeCode function: 0_2_04BC0728 rdtsc 0_2_04BC0728
            Source: RageMP131.exe, RageMP131.exe, 00000009.00000002.2961012549.00000000006F4000.00000040.00000001.01000000.00000006.sdmpBinary or memory string: xProgram Manager
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeCode function: 0_2_0007361D GetSystemTimePreciseAsFileTime,GetSystemTimePreciseAsFileTime,0_2_0007361D
            Source: C:\Users\user\Desktop\90ZF1EDs9h.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: Process Memory Space: 90ZF1EDs9h.exe PID: 7300, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 7552, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 7560, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 7872, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 7132, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: Process Memory Space: 90ZF1EDs9h.exe PID: 7300, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 7552, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 7560, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 7872, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 7132, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
            Command and Scripting Interpreter
            1
            Scheduled Task/Job
            2
            Process Injection
            1
            Masquerading
            OS Credential Dumping1
            System Time Discovery
            Remote Services1
            Archive Collected Data
            11
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts1
            Scheduled Task/Job
            1
            Registry Run Keys / Startup Folder
            1
            Scheduled Task/Job
            24
            Virtualization/Sandbox Evasion
            LSASS Memory1
            Query Registry
            Remote Desktop ProtocolData from Removable Media1
            Non-Standard Port
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAt1
            DLL Side-Loading
            1
            Registry Run Keys / Startup Folder
            2
            Process Injection
            Security Account Manager741
            Security Software Discovery
            SMB/Windows Admin SharesData from Network Shared Drive2
            Ingress Tool Transfer
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
            DLL Side-Loading
            1
            Deobfuscate/Decode Files or Information
            NTDS24
            Virtualization/Sandbox Evasion
            Distributed Component Object ModelInput Capture2
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
            Obfuscated Files or Information
            LSA Secrets2
            Process Discovery
            SSHKeylogging13
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts12
            Software Packing
            Cached Domain Credentials1
            Application Window Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            DLL Side-Loading
            DCSync1
            System Network Configuration Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem214
            System Information Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1461305 Sample: 90ZF1EDs9h.exe Startdate: 23/06/2024 Architecture: WINDOWS Score: 100 35 ipinfo.io 2->35 37 db-ip.com 2->37 45 Snort IDS alert for network traffic 2->45 47 Multi AV Scanner detection for submitted file 2->47 49 Yara detected RisePro Stealer 2->49 51 4 other signatures 2->51 8 90ZF1EDs9h.exe 1 9 2->8         started        13 RageMP131.exe 2 2->13         started        15 MPGPH131.exe 2 2->15         started        17 2 other processes 2->17 signatures3 process4 dnsIp5 39 77.91.77.66, 49731, 49732, 49733 FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRU Russian Federation 8->39 41 ipinfo.io 34.117.186.192, 443, 49734, 49738 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 8->41 43 db-ip.com 104.26.5.15, 443, 49736, 49740 CLOUDFLARENETUS United States 8->43 27 C:\Users\user\AppData\Local\...\RageMP131.exe, PE32 8->27 dropped 29 C:\ProgramData\MPGPH131\MPGPH131.exe, PE32 8->29 dropped 31 C:\Users\...\RageMP131.exe:Zone.Identifier, ASCII 8->31 dropped 33 C:\...\MPGPH131.exe:Zone.Identifier, ASCII 8->33 dropped 53 Detected unpacking (changes PE section rights) 8->53 55 Found stalling execution ending in API Sleep call 8->55 57 Uses schtasks.exe or at.exe to add and modify task schedules 8->57 59 Tries to detect virtualization through RDTSC time measurements 8->59 19 schtasks.exe 1 8->19         started        21 schtasks.exe 1 8->21         started        61 Multi AV Scanner detection for dropped file 13->61 63 Tries to detect sandboxes and other dynamic analysis tools (window names) 13->63 65 Machine Learning detection for dropped file 13->65 67 Tries to evade debugger and weak emulator (self modifying code) 15->67 69 Hides threads from debuggers 15->69 71 Potentially malicious time measurement code found 15->71 73 Tries to detect sandboxes / dynamic malware analysis system (registry check) 17->73 75 Tries to detect process monitoring tools (Task Manager, Process Explorer etc.) 17->75 file6 signatures7 process8 process9 23 conhost.exe 19->23         started        25 conhost.exe 21->25         started       

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            90ZF1EDs9h.exe53%VirustotalBrowse
            90ZF1EDs9h.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\RageMP131\RageMP131.exe100%Joe Sandbox ML
            C:\ProgramData\MPGPH131\MPGPH131.exe100%Joe Sandbox ML
            C:\ProgramData\MPGPH131\MPGPH131.exe50%ReversingLabsWin32.Trojan.RisePro
            C:\ProgramData\MPGPH131\MPGPH131.exe53%VirustotalBrowse
            C:\Users\user\AppData\Local\RageMP131\RageMP131.exe50%ReversingLabsWin32.Trojan.RisePro
            C:\Users\user\AppData\Local\RageMP131\RageMP131.exe53%VirustotalBrowse
            No Antivirus matches
            SourceDetectionScannerLabelLink
            ipinfo.io0%VirustotalBrowse
            db-ip.com0%VirustotalBrowse
            SourceDetectionScannerLabelLink
            https://ipinfo.io/0%URL Reputationsafe
            https://ipinfo.io:443/widget/demo/8.46.123.330%Avira URL Cloudsafe
            https://db-ip.com:443/demo/home.php?s=8.46.123.33J0%Avira URL Cloudsafe
            https://t.me/risepro_botSS0%Avira URL Cloudsafe
            https://db-ip.com/demo/home.php?s=8.46.123.33$0%Avira URL Cloudsafe
            https://ipinfo.io/widget/demo/8.46.123.33#H0%Avira URL Cloudsafe
            https://ipinfo.io/widget/demo/8.46.123.33H0%Avira URL Cloudsafe
            https://t.v0%Avira URL Cloudsafe
            https://db-ip.com/0%Avira URL Cloudsafe
            https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll0%Avira URL Cloudsafe
            https://ipinfo.io/alj0%Avira URL Cloudsafe
            https://db-ip.com/demo/home.php?s=8.46.123.33S0%Avira URL Cloudsafe
            https://db-ip.com/0%VirustotalBrowse
            https://t.me/risepro_botSS0%VirustotalBrowse
            https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll0%VirustotalBrowse
            https://t.me/RiseProSUPPORT0%Avira URL Cloudsafe
            https://t.me/risepro0%Avira URL Cloudsafe
            https://ipinfo.io/Mozilla/5.00%Avira URL Cloudsafe
            https://t.me/risepro_botA$0%Avira URL Cloudsafe
            https://ipinfo.io/tuO0%Avira URL Cloudsafe
            https://ipinfo.io/widget/demo/8.46.123.33~0%Avira URL Cloudsafe
            https://t.me/RiseProSUPPORT0%VirustotalBrowse
            https://t.me/risepro_botj/0%Avira URL Cloudsafe
            https://ipinfo.io/Mozilla/5.00%VirustotalBrowse
            https://t.me/risepro_bot0%Avira URL Cloudsafe
            https://t.me/risepro0%VirustotalBrowse
            https://t.me/RiseProSUPPORT8?0%Avira URL Cloudsafe
            https://t.me/risepro_botGc0%Avira URL Cloudsafe
            https://ipinfo.io/widget/demo/8.46.123.330%Avira URL Cloudsafe
            https://t.me/risepro_bot0%VirustotalBrowse
            https://www.maxmind.com/en/locate-my-ip-address0%Avira URL Cloudsafe
            https://t.me/riseproD0%Avira URL Cloudsafe
            https://ipinfo.io/s0%Avira URL Cloudsafe
            https://ipinfo.io/widget/demo/8.46.123.33q0%Avira URL Cloudsafe
            https://db-ip.com:443/demo/home.php?s=8.46.123.330%Avira URL Cloudsafe
            https://www.maxmind.com/en/locate-my-ip-address0%VirustotalBrowse
            https://t.me/risepro_botisepro_bot0%Avira URL Cloudsafe
            https://ipinfo.io/s0%VirustotalBrowse
            http://www.winimage.com/zLibDll0%Avira URL Cloudsafe
            https://t.me/riseproF0%Avira URL Cloudsafe
            https://t.me/risepro_botisepro_bot0%VirustotalBrowse
            https://t.me/riseproD0%VirustotalBrowse
            https://ipinfo.io/W&0%Avira URL Cloudsafe
            https://db-ip.com/l/.0%Avira URL Cloudsafe
            https://db-ip.com/demo/home.php?s=8.46.123.330%Avira URL Cloudsafe
            https://t.me/RiseProSUPPORTz0%Avira URL Cloudsafe
            https://t.me/risepro_botp0%Avira URL Cloudsafe
            https://t.me/risepro_botp0%VirustotalBrowse
            https://t.me/RiseProSUPPORTz1%VirustotalBrowse
            http://www.winimage.com/zLibDll1%VirustotalBrowse
            https://db-ip.com/l/.1%VirustotalBrowse
            NameIPActiveMaliciousAntivirus DetectionReputation
            ipinfo.io
            34.117.186.192
            truefalseunknown
            db-ip.com
            104.26.5.15
            truefalseunknown
            NameMaliciousAntivirus DetectionReputation
            https://ipinfo.io/false
            • URL Reputation: safe
            unknown
            https://ipinfo.io/widget/demo/8.46.123.33false
            • Avira URL Cloud: safe
            unknown
            https://db-ip.com/demo/home.php?s=8.46.123.33false
            • Avira URL Cloud: safe
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            https://db-ip.com/demo/home.php?s=8.46.123.33$MPGPH131.exe, 00000005.00000002.2965341053.0000000000D64000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000003.2302116387.0000000000D64000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://db-ip.com:443/demo/home.php?s=8.46.123.33JMPGPH131.exe, 00000006.00000002.2965067378.0000000000DAB000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://ipinfo.io:443/widget/demo/8.46.123.3390ZF1EDs9h.exe, 00000000.00000002.2964592286.0000000000B9A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.2965341053.0000000000D58000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000003.2302116387.0000000000D58000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.2965067378.0000000000E0F000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.2965177153.0000000000EF9000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000009.00000002.2964515667.0000000000D7D000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://t.me/risepro_botSS90ZF1EDs9h.exe, 00000000.00000002.2964592286.0000000000BD9000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.2965177153.0000000000F13000.00000004.00000020.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://ipinfo.io/widget/demo/8.46.123.33#HRageMP131.exe, 00000007.00000002.2965177153.0000000000EAA000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://ipinfo.io/widget/demo/8.46.123.33HMPGPH131.exe, 00000006.00000002.2965067378.0000000000DBD000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://t.v90ZF1EDs9h.exe, 00000000.00000002.2975858179.0000000007720000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://db-ip.com/90ZF1EDs9h.exe, 00000000.00000002.2964592286.0000000000BD9000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.2967167251.0000000000D84000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000003.2302053976.0000000000D83000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000003.2319159509.0000000000E53000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.2965067378.0000000000E54000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.2965177153.0000000000F13000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000009.00000002.2964515667.0000000000DF2000.00000004.00000020.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll90ZF1EDs9h.exe, 00000000.00000003.1654226982.0000000004960000.00000004.00001000.00020000.00000000.sdmp, 90ZF1EDs9h.exe, 00000000.00000002.2960516340.0000000000041000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000005.00000003.1681138634.0000000004AA0000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.2960518096.0000000000191000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000006.00000002.2960323258.0000000000191000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000006.00000003.1681761352.00000000049E0000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000003.1788309686.0000000004D00000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.2960594163.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 00000009.00000003.1867802367.0000000004B70000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000009.00000002.2960668282.00000000003E1000.00000040.00000001.01000000.00000006.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://db-ip.com/demo/home.php?s=8.46.123.33SMPGPH131.exe, 00000005.00000002.2967167251.0000000000D84000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000003.2302053976.0000000000D83000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://ipinfo.io/aljMPGPH131.exe, 00000006.00000002.2965067378.0000000000E01000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://t.me/RiseProSUPPORT90ZF1EDs9h.exe, 00000000.00000002.2964592286.0000000000B0E000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.2965341053.0000000000CCD000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.2965067378.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.2965177153.0000000000E6E000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000009.00000002.2964515667.0000000000D5B000.00000004.00000020.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://ipinfo.io/Mozilla/5.090ZF1EDs9h.exe, 00000000.00000002.2964592286.0000000000BA5000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.2965341053.0000000000D58000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000003.2302116387.0000000000D58000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.2965067378.0000000000E0F000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000003.2319200721.0000000000E17000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.2965177153.0000000000EF9000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000009.00000002.2964515667.0000000000DE0000.00000004.00000020.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://t.me/riseproMPGPH131.exe, 00000006.00000002.2965067378.0000000000E0F000.00000004.00000020.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://ipinfo.io/tuORageMP131.exe, 00000009.00000002.2964515667.0000000000D9D000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://t.me/risepro_botA$RageMP131.exe, 00000009.00000002.2964515667.0000000000DF2000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://ipinfo.io/widget/demo/8.46.123.33~90ZF1EDs9h.exe, 00000000.00000002.2964592286.0000000000B86000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://t.me/risepro_botj/MPGPH131.exe, 00000006.00000002.2965067378.0000000000E0F000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://t.me/risepro_botRageMP131.exe, 00000009.00000002.2964515667.0000000000DF2000.00000004.00000020.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://t.me/RiseProSUPPORT8?MPGPH131.exe, 00000006.00000002.2965067378.0000000000D8A000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://t.me/risepro_botGcRageMP131.exe, 00000009.00000002.2964515667.0000000000DF2000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://www.maxmind.com/en/locate-my-ip-addressRageMP131.exefalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://t.me/riseproDMPGPH131.exe, 00000005.00000002.2967167251.0000000000D84000.00000004.00000020.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://ipinfo.io/sMPGPH131.exe, 00000006.00000002.2965067378.0000000000DCC000.00000004.00000020.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://ipinfo.io/widget/demo/8.46.123.33qMPGPH131.exe, 00000005.00000002.2965341053.0000000000CCD000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://db-ip.com:443/demo/home.php?s=8.46.123.3390ZF1EDs9h.exe, 00000000.00000002.2964592286.0000000000BB5000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.2965341053.0000000000D64000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000003.2302116387.0000000000D64000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.2965177153.0000000000F06000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000009.00000002.2964515667.0000000000D7D000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://t.me/risepro_botisepro_botRageMP131.exe, 00000007.00000002.2965177153.0000000000F13000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000009.00000002.2964515667.0000000000DF2000.00000004.00000020.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.winimage.com/zLibDll90ZF1EDs9h.exe, 00000000.00000003.1654226982.0000000004960000.00000004.00001000.00020000.00000000.sdmp, 90ZF1EDs9h.exe, 00000000.00000002.2960516340.0000000000041000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000005.00000003.1681138634.0000000004AA0000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.2960518096.0000000000191000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000006.00000002.2960323258.0000000000191000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000006.00000003.1681761352.00000000049E0000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000003.1788309686.0000000004D00000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.2960594163.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 00000009.00000003.1867802367.0000000004B70000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000009.00000002.2960668282.00000000003E1000.00000040.00000001.01000000.00000006.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://t.me/riseproF90ZF1EDs9h.exe, 00000000.00000002.2964592286.0000000000BD9000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://ipinfo.io/W&90ZF1EDs9h.exe, 00000000.00000002.2964592286.0000000000B37000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://db-ip.com/l/.RageMP131.exe, 00000009.00000002.2964515667.0000000000DF2000.00000004.00000020.00020000.00000000.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://t.me/RiseProSUPPORTz90ZF1EDs9h.exe, 00000000.00000002.2964592286.0000000000B0E000.00000004.00000020.00020000.00000000.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://t.me/risepro_botpRageMP131.exe, 00000007.00000002.2965177153.0000000000F13000.00000004.00000020.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            34.117.186.192
            ipinfo.ioUnited States
            139070GOOGLE-AS-APGoogleAsiaPacificPteLtdSGfalse
            104.26.5.15
            db-ip.comUnited States
            13335CLOUDFLARENETUSfalse
            77.91.77.66
            unknownRussian Federation
            42861FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRUtrue
            Joe Sandbox version:40.0.0 Tourmaline
            Analysis ID:1461305
            Start date and time:2024-06-23 18:34:07 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 9m 56s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:13
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:90ZF1EDs9h.exe
            renamed because original name is a hash value
            Original Sample Name:9437d6cf2745f8683c3aa908e01b03cf.exe
            Detection:MAL
            Classification:mal100.troj.evad.winEXE@11/5@2/3
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:Failed
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            TimeTypeDescription
            12:35:26API Interceptor1155850x Sleep call for process: 90ZF1EDs9h.exe modified
            12:35:29API Interceptor1968147x Sleep call for process: MPGPH131.exe modified
            12:35:39API Interceptor1362557x Sleep call for process: RageMP131.exe modified
            17:34:58Task SchedulerRun new task: MPGPH131 HR path: C:\ProgramData\MPGPH131\MPGPH131.exe
            17:34:58Task SchedulerRun new task: MPGPH131 LG path: C:\ProgramData\MPGPH131\MPGPH131.exe
            17:35:00AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run RageMP131 C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
            17:35:09AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run RageMP131 C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            34.117.186.192HP-patchedUS-deobfuscated.exeGet hashmaliciousUnknownBrowse
            • ipinfo.io/
            HP-patchedUS-deobfuscated.exeGet hashmaliciousUnknownBrowse
            • ipinfo.io/
            HP-patchedUS-deobfuscated.exeGet hashmaliciousUnknownBrowse
            • ipinfo.io/
            SecuriteInfo.com.Win32.Evo-gen.24318.16217.exeGet hashmaliciousUnknownBrowse
            • ipinfo.io/json
            SecuriteInfo.com.Win32.Evo-gen.28489.31883.exeGet hashmaliciousUnknownBrowse
            • ipinfo.io/json
            Raptor.HardwareService.Setup 1.msiGet hashmaliciousUnknownBrowse
            • ipinfo.io/ip
            Conferma_Pdf_Editor.exeGet hashmaliciousPlanet StealerBrowse
            • ipinfo.io/
            Conferma_Pdf_Editor.exeGet hashmaliciousPlanet StealerBrowse
            • ipinfo.io/
            w.shGet hashmaliciousXmrigBrowse
            • /ip
            Raptor.HardwareService.Setup_2.3.6.0.msiGet hashmaliciousUnknownBrowse
            • ipinfo.io/ip
            104.26.5.15SecuriteInfo.com.Win64.Evo-gen.17494.7440.exeGet hashmaliciousUnknownBrowse
            • api.db-ip.com/v2/free/127.0.0.1
            Nemty.exeGet hashmaliciousNemtyBrowse
            • api.db-ip.com/v2/free/84.17.52.2/countryName
            227.exeGet hashmaliciousNemtyBrowse
            • api.db-ip.com/v2/free/102.129.143.40/countryName
            77.91.77.66Ke5ufWcgxp.exeGet hashmaliciousRisePro StealerBrowse
              BqqQh4Jr7L.exeGet hashmaliciousRisePro StealerBrowse
                file.exeGet hashmaliciousRisePro StealerBrowse
                  file.exeGet hashmaliciousRisePro StealerBrowse
                    plTAoSCew2.exeGet hashmaliciousRisePro StealerBrowse
                      7rA1iX60wh.exeGet hashmaliciousRisePro StealerBrowse
                        PNO3otPYOa.exeGet hashmaliciousRisePro StealerBrowse
                          YnsEArPlqx.exeGet hashmaliciousRisePro StealerBrowse
                            AlCsIOd0pd.exeGet hashmaliciousRisePro StealerBrowse
                              setup.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                ipinfo.iobFZYRLnRIz.exeGet hashmaliciousLummaC, DCRat, LummaC StealerBrowse
                                • 34.117.186.192
                                4h4b4EWVNU.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                • 34.117.186.192
                                BqqQh4Jr7L.exeGet hashmaliciousRisePro StealerBrowse
                                • 34.117.186.192
                                file.exeGet hashmaliciousRisePro StealerBrowse
                                • 34.117.186.192
                                file.exeGet hashmaliciousRisePro StealerBrowse
                                • 34.117.186.192
                                PsHQsuTG0H.dllGet hashmaliciousUnknownBrowse
                                • 34.117.186.192
                                plTAoSCew2.exeGet hashmaliciousRisePro StealerBrowse
                                • 34.117.186.192
                                7rA1iX60wh.exeGet hashmaliciousRisePro StealerBrowse
                                • 34.117.186.192
                                PsHQsuTG0H.dllGet hashmaliciousUnknownBrowse
                                • 34.117.186.192
                                PNO3otPYOa.exeGet hashmaliciousRisePro StealerBrowse
                                • 34.117.186.192
                                db-ip.comBqqQh4Jr7L.exeGet hashmaliciousRisePro StealerBrowse
                                • 104.26.4.15
                                file.exeGet hashmaliciousRisePro StealerBrowse
                                • 104.26.4.15
                                http://feedbackreview-id0284892389423.d1o0pnrgaue9g2.amplifyapp.com/index.htmlGet hashmaliciousUnknownBrowse
                                • 104.26.4.15
                                file.exeGet hashmaliciousRisePro StealerBrowse
                                • 172.67.75.166
                                plTAoSCew2.exeGet hashmaliciousRisePro StealerBrowse
                                • 104.26.5.15
                                7rA1iX60wh.exeGet hashmaliciousRisePro StealerBrowse
                                • 104.26.4.15
                                PNO3otPYOa.exeGet hashmaliciousRisePro StealerBrowse
                                • 104.26.4.15
                                YnsEArPlqx.exeGet hashmaliciousRisePro StealerBrowse
                                • 172.67.75.166
                                setup.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                                • 104.26.5.15
                                D44CPdpkNk.exeGet hashmaliciousRisePro StealerBrowse
                                • 104.26.4.15
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRUsetup.exeGet hashmaliciousAmadeyBrowse
                                • 77.91.77.81
                                mCTacyNuyM.exeGet hashmaliciousLummaC, Python Stealer, Amadey, LummaC Stealer, Monster Stealer, PureLog Stealer, RedLineBrowse
                                • 77.91.77.81
                                Ke5ufWcgxp.exeGet hashmaliciousRisePro StealerBrowse
                                • 77.91.77.66
                                yWny5Jds8b.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, RedLineBrowse
                                • 77.91.77.81
                                file.exeGet hashmaliciousLummaC, Python Stealer, Amadey, Monster Stealer, PureLog Stealer, RedLine, SmokeLoaderBrowse
                                • 77.91.77.81
                                BqqQh4Jr7L.exeGet hashmaliciousRisePro StealerBrowse
                                • 77.91.77.66
                                file.exeGet hashmaliciousRisePro StealerBrowse
                                • 77.91.77.66
                                setup.exeGet hashmaliciousLummaC, Python Stealer, Amadey, LummaC Stealer, Monster Stealer, PureLog Stealer, RedLineBrowse
                                • 77.91.77.81
                                setup.exeGet hashmaliciousAmadeyBrowse
                                • 77.91.77.81
                                It5068xROy.dllGet hashmaliciousRedLineBrowse
                                • 77.91.77.6
                                GOOGLE-AS-APGoogleAsiaPacificPteLtdSGbFZYRLnRIz.exeGet hashmaliciousLummaC, DCRat, LummaC StealerBrowse
                                • 34.117.186.192
                                http://dllavy.wixsite.com/mybt-view/Get hashmaliciousUnknownBrowse
                                • 34.117.60.144
                                4h4b4EWVNU.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                • 34.117.186.192
                                BqqQh4Jr7L.exeGet hashmaliciousRisePro StealerBrowse
                                • 34.117.186.192
                                file.exeGet hashmaliciousRisePro StealerBrowse
                                • 34.117.186.192
                                https://peringatanfb772.wixsite.com/mysiteGet hashmaliciousUnknownBrowse
                                • 34.117.60.144
                                file.exeGet hashmaliciousRisePro StealerBrowse
                                • 34.117.186.192
                                PsHQsuTG0H.dllGet hashmaliciousUnknownBrowse
                                • 34.117.186.192
                                plTAoSCew2.exeGet hashmaliciousRisePro StealerBrowse
                                • 34.117.186.192
                                7rA1iX60wh.exeGet hashmaliciousRisePro StealerBrowse
                                • 34.117.186.192
                                CLOUDFLARENETUSFieroHack.exeGet hashmaliciousLummaC, XmrigBrowse
                                • 104.21.49.90
                                setup.exeGet hashmaliciousLummaCBrowse
                                • 104.21.89.170
                                Extreme injector.exeGet hashmaliciousLummaCBrowse
                                • 104.21.49.90
                                SecuriteInfo.com.Win64.DropperX-gen.26552.421.exeGet hashmaliciousUnknownBrowse
                                • 104.26.3.16
                                SecuriteInfo.com.Win64.DropperX-gen.26552.421.exeGet hashmaliciousUnknownBrowse
                                • 104.26.3.16
                                mCTacyNuyM.exeGet hashmaliciousLummaC, Python Stealer, Amadey, LummaC Stealer, Monster Stealer, PureLog Stealer, RedLineBrowse
                                • 188.114.97.3
                                qEGv2vQa9X.elfGet hashmaliciousMiraiBrowse
                                • 1.14.29.35
                                zQ35ev2Uw0.elfGet hashmaliciousMiraiBrowse
                                • 1.14.29.22
                                3jeKnZMljk.elfGet hashmaliciousMiraiBrowse
                                • 1.4.15.178
                                iDUGkVNndq.elfGet hashmaliciousMiraiBrowse
                                • 1.13.112.146
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                a0e9f5d64349fb13191bc781f81f42e1FieroHack.exeGet hashmaliciousLummaC, XmrigBrowse
                                • 104.26.5.15
                                • 34.117.186.192
                                setup.exeGet hashmaliciousLummaCBrowse
                                • 104.26.5.15
                                • 34.117.186.192
                                Extreme injector.exeGet hashmaliciousLummaCBrowse
                                • 104.26.5.15
                                • 34.117.186.192
                                SecuriteInfo.com.Win64.DropperX-gen.26552.421.exeGet hashmaliciousUnknownBrowse
                                • 104.26.5.15
                                • 34.117.186.192
                                SecuriteInfo.com.Win64.DropperX-gen.26552.421.exeGet hashmaliciousUnknownBrowse
                                • 104.26.5.15
                                • 34.117.186.192
                                mCTacyNuyM.exeGet hashmaliciousLummaC, Python Stealer, Amadey, LummaC Stealer, Monster Stealer, PureLog Stealer, RedLineBrowse
                                • 104.26.5.15
                                • 34.117.186.192
                                yWny5Jds8b.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, RedLineBrowse
                                • 104.26.5.15
                                • 34.117.186.192
                                abc.docxGet hashmaliciousUnknownBrowse
                                • 104.26.5.15
                                • 34.117.186.192
                                bFZYRLnRIz.exeGet hashmaliciousLummaC, DCRat, LummaC StealerBrowse
                                • 104.26.5.15
                                • 34.117.186.192
                                YNsc5U2Qff.exeGet hashmaliciousLummaCBrowse
                                • 104.26.5.15
                                • 34.117.186.192
                                No context
                                Process:C:\Users\user\Desktop\90ZF1EDs9h.exe
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):2432512
                                Entropy (8bit):7.963848035462459
                                Encrypted:false
                                SSDEEP:49152:jtkCJbOK+TKeNUXXO08QNPXzhVJGcF6V5sN7sqlvI:hkaOz32XxNPXzwcF8uN7sS
                                MD5:9437D6CF2745F8683C3AA908E01B03CF
                                SHA1:4B954D00882C8249D11B61440976B2993AE4738A
                                SHA-256:D3D0EEAB1A06460ED303B065248DB53D47BFD5C253324B0D2F9EFCC2DC700A47
                                SHA-512:8F8EF99107B126D82D5545ED8108FD1ECB6C3B743134766A1C213EE0667CADD1F0F0ADD0A3F2B111D990E45CD2A10480EB2DD44276CC4956F3DBAA5EA46F2F8E
                                Malicious:true
                                Antivirus:
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: ReversingLabs, Detection: 50%
                                • Antivirus: Virustotal, Detection: 53%, Browse
                                Reputation:low
                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......j.....s...s...s.e.p.%.s.e.v...s.e.t./.s..y..*.s..yw.=.s..yp.4.s..yv.u.s.e.w.6.s.e.u./.s.e.r.5.s...r...s..zz.2.s..z../.s..../.s..zq./.s.Rich..s.................PE..L....iLf...............'.....|........^...........@..........................._.....R.%...@.................................^...r.......8.....................^...............................^..............................6..@................... . ............................@....rsrc...8...........................@....idata ............................@... ..+.........................@...pobzuwwq. ....D.....................@...bxltxemr......^.......$.............@....taggant.0....^.."....$.............@...........................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\90ZF1EDs9h.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):26
                                Entropy (8bit):3.95006375643621
                                Encrypted:false
                                SSDEEP:3:ggPYV:rPYV
                                MD5:187F488E27DB4AF347237FE461A079AD
                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                Malicious:true
                                Reputation:high, very likely benign file
                                Preview:[ZoneTransfer]....ZoneId=0
                                Process:C:\Users\user\Desktop\90ZF1EDs9h.exe
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):2432512
                                Entropy (8bit):7.963848035462459
                                Encrypted:false
                                SSDEEP:49152:jtkCJbOK+TKeNUXXO08QNPXzhVJGcF6V5sN7sqlvI:hkaOz32XxNPXzwcF8uN7sS
                                MD5:9437D6CF2745F8683C3AA908E01B03CF
                                SHA1:4B954D00882C8249D11B61440976B2993AE4738A
                                SHA-256:D3D0EEAB1A06460ED303B065248DB53D47BFD5C253324B0D2F9EFCC2DC700A47
                                SHA-512:8F8EF99107B126D82D5545ED8108FD1ECB6C3B743134766A1C213EE0667CADD1F0F0ADD0A3F2B111D990E45CD2A10480EB2DD44276CC4956F3DBAA5EA46F2F8E
                                Malicious:true
                                Antivirus:
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: ReversingLabs, Detection: 50%
                                • Antivirus: Virustotal, Detection: 53%, Browse
                                Reputation:low
                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......j.....s...s...s.e.p.%.s.e.v...s.e.t./.s..y..*.s..yw.=.s..yp.4.s..yv.u.s.e.w.6.s.e.u./.s.e.r.5.s...r...s..zz.2.s..z../.s..../.s..zq./.s.Rich..s.................PE..L....iLf...............'.....|........^...........@..........................._.....R.%...@.................................^...r.......8.....................^...............................^..............................6..@................... . ............................@....rsrc...8...........................@....idata ............................@... ..+.........................@...pobzuwwq. ....D.....................@...bxltxemr......^.......$.............@....taggant.0....^.."....$.............@...........................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\90ZF1EDs9h.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):26
                                Entropy (8bit):3.95006375643621
                                Encrypted:false
                                SSDEEP:3:ggPYV:rPYV
                                MD5:187F488E27DB4AF347237FE461A079AD
                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                Malicious:true
                                Reputation:high, very likely benign file
                                Preview:[ZoneTransfer]....ZoneId=0
                                Process:C:\Users\user\Desktop\90ZF1EDs9h.exe
                                File Type:ASCII text, with no line terminators
                                Category:modified
                                Size (bytes):13
                                Entropy (8bit):2.565448371820826
                                Encrypted:false
                                SSDEEP:3:LQ4d:X
                                MD5:7640C92C58528DD1D0FD215B3C8CC25A
                                SHA1:8AB07336FF3C7903709E417E34F15422F009A63E
                                SHA-256:1D49814F62680FAE227628DA18EBC5CAC764B1BABD2DEF8472E02B4AE0E4463D
                                SHA-512:B36EA4DDB0DEB9D7B5D4DD931DAB71270BFC880A3557F5432364222B2B18BBB434D5B81E171C8DA3AA68BDDB501BC0CA4F35163CD467E4526BB36ABF10F22DB1
                                Malicious:false
                                Reputation:low
                                Preview:1719165164968
                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Entropy (8bit):7.963848035462459
                                TrID:
                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                • Generic Win/DOS Executable (2004/3) 0.02%
                                • DOS Executable Generic (2002/1) 0.02%
                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                File name:90ZF1EDs9h.exe
                                File size:2'432'512 bytes
                                MD5:9437d6cf2745f8683c3aa908e01b03cf
                                SHA1:4b954d00882c8249d11b61440976b2993ae4738a
                                SHA256:d3d0eeab1a06460ed303b065248db53d47bfd5c253324b0d2f9efcc2dc700a47
                                SHA512:8f8ef99107b126d82d5545ed8108fd1ecb6c3b743134766a1c213ee0667cadd1f0f0add0a3f2b111d990e45cd2a10480eb2dd44276cc4956f3dbaa5ea46f2f8e
                                SSDEEP:49152:jtkCJbOK+TKeNUXXO08QNPXzhVJGcF6V5sN7sqlvI:hkaOz32XxNPXzwcF8uN7sS
                                TLSH:10B53322E936E654FC52253816FA4197E33ADA345E9A7AA17605334F8B77310FFBE004
                                File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......j.....s...s...s.e.p.%.s.e.v...s.e.t./.s..y..*.s..yw.=.s..yp.4.s..yv.u.s.e.w.6.s.e.u./.s.e.r.5.s...r...s..zz.2.s..z../.s...../.s
                                Icon Hash:8596a1a0a1a1b171
                                Entrypoint:0x9ed000
                                Entrypoint Section:.taggant
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                Time Stamp:0x664C6914 [Tue May 21 09:27:48 2024 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:6
                                OS Version Minor:0
                                File Version Major:6
                                File Version Minor:0
                                Subsystem Version Major:6
                                Subsystem Version Minor:0
                                Import Hash:2eabe9054cad5152567f0699947a2c5b
                                Instruction
                                jmp 00007F7374C81B8Ah
                                paddb mm4, qword ptr [eax+eax]
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                jmp 00007F7374C83B85h
                                add byte ptr [ecx], al
                                or al, byte ptr [eax]
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [ebx], al
                                or al, byte ptr [eax]
                                add byte ptr [esi], al
                                or al, byte ptr [eax]
                                add byte ptr [edx], al
                                or al, byte ptr [eax]
                                add byte ptr [edx+ecx], al
                                add byte ptr [eax], al
                                add dword ptr [edx], ecx
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                push es
                                add byte ptr [eax], 00000000h
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                adc byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add dword ptr [edx], ecx
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                xor byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                dec eax
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x18c05e0x72.idata
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x18a0000x1638.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x5eb6f80x10pobzuwwq
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x5eb6a80x18pobzuwwq
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x18369c0x40
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                0x10000x1890000xab4002889d39d9afe63d22158841a0070b7f2False0.998056854470803data7.980016205845924IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .rsrc0x18a0000x16380x1800fe6f3fdb9e7e97cba92d8ce4e4fcc95bFalse0.7220052083333334data6.54017046361188IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .idata 0x18c0000x10000x2000e14477ce436cc9ebd87f17a92173639False0.1640625data1.180504109820196IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                0x18d0000x2bd0000x2008d1043f3f55c05ca6d9abd5bceaadddcunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                pobzuwwq0x44a0000x1a20000x1a1800fef0d23f91621cfcdea52c9493f96f57False0.9947049260853293data7.953477305499687IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                bxltxemr0x5ec0000x10000x400cf8df7fe015740d70b8493e719059a83False0.80078125data6.2687999848900615IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .taggant0x5ed0000x30000x2200f1ae51caf03b7b6be6e749c08b032732False0.06410845588235294DOS executable (COM)0.772229905710431IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                RT_ICON0x18a4400x1060PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedRussianRussia0.8838263358778626
                                RT_GROUP_ICON0x18b4a00x14dataRussianRussia1.05
                                RT_VERSION0x18a1300x310dataRussianRussia0.45408163265306123
                                RT_MANIFEST0x18b4b80x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                                DLLImport
                                kernel32.dlllstrcpy
                                Language of compilation systemCountry where language is spokenMap
                                RussianRussia
                                EnglishUnited States
                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                06/23/24-18:37:04.646362TCP2046269ET TROJAN [ANY.RUN] RisePro TCP (Activity)4973258709192.168.2.477.91.77.66
                                06/23/24-18:37:07.646023TCP2046269ET TROJAN [ANY.RUN] RisePro TCP (Activity)4973158709192.168.2.477.91.77.66
                                06/23/24-18:37:06.583631TCP2046269ET TROJAN [ANY.RUN] RisePro TCP (Activity)4974758709192.168.2.477.91.77.66
                                06/23/24-18:34:58.970157TCP2049060ET TROJAN RisePro TCP Heartbeat Packet4973158709192.168.2.477.91.77.66
                                06/23/24-18:35:36.288691TCP2046267ET TROJAN [ANY.RUN] RisePro TCP (External IP)587094974777.91.77.66192.168.2.4
                                06/23/24-18:37:05.458696TCP2046269ET TROJAN [ANY.RUN] RisePro TCP (Activity)4973558709192.168.2.477.91.77.66
                                06/23/24-18:35:02.465607TCP2046266ET TROJAN [ANY.RUN] RisePro TCP (Token)587094973277.91.77.66192.168.2.4
                                06/23/24-18:35:21.729696TCP2046266ET TROJAN [ANY.RUN] RisePro TCP (Token)587094974777.91.77.66192.168.2.4
                                06/23/24-18:34:59.553336TCP2046266ET TROJAN [ANY.RUN] RisePro TCP (Token)587094973177.91.77.66192.168.2.4
                                06/23/24-18:35:03.603959TCP2046266ET TROJAN [ANY.RUN] RisePro TCP (Token)587094973377.91.77.66192.168.2.4
                                06/23/24-18:37:04.786800TCP2046269ET TROJAN [ANY.RUN] RisePro TCP (Activity)4973358709192.168.2.477.91.77.66
                                06/23/24-18:35:13.471006TCP2046266ET TROJAN [ANY.RUN] RisePro TCP (Token)587094973577.91.77.66192.168.2.4
                                06/23/24-18:35:12.390867TCP2046267ET TROJAN [ANY.RUN] RisePro TCP (External IP)587094973177.91.77.66192.168.2.4
                                06/23/24-18:35:13.312009TCP2046267ET TROJAN [ANY.RUN] RisePro TCP (External IP)587094973277.91.77.66192.168.2.4
                                06/23/24-18:35:14.392680TCP2046267ET TROJAN [ANY.RUN] RisePro TCP (External IP)587094973377.91.77.66192.168.2.4
                                06/23/24-18:35:28.664022TCP2046267ET TROJAN [ANY.RUN] RisePro TCP (External IP)587094973577.91.77.66192.168.2.4
                                TimestampSource PortDest PortSource IPDest IP
                                Jun 23, 2024 18:34:58.939028025 CEST4973158709192.168.2.477.91.77.66
                                Jun 23, 2024 18:34:58.944359064 CEST587094973177.91.77.66192.168.2.4
                                Jun 23, 2024 18:34:58.944461107 CEST4973158709192.168.2.477.91.77.66
                                Jun 23, 2024 18:34:58.970156908 CEST4973158709192.168.2.477.91.77.66
                                Jun 23, 2024 18:34:58.975405931 CEST587094973177.91.77.66192.168.2.4
                                Jun 23, 2024 18:34:59.553335905 CEST587094973177.91.77.66192.168.2.4
                                Jun 23, 2024 18:34:59.598020077 CEST4973158709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:01.146855116 CEST4973258709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:01.152257919 CEST587094973277.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:01.152337074 CEST4973258709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:01.172148943 CEST4973258709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:01.179097891 CEST587094973277.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:02.465606928 CEST587094973277.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:02.520031929 CEST4973258709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:02.676666021 CEST4973158709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:02.681879044 CEST587094973177.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:02.911896944 CEST4973358709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:02.918407917 CEST587094973377.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:02.918668032 CEST4973358709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:02.938585043 CEST4973358709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:02.949948072 CEST587094973377.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:03.603959084 CEST587094973377.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:03.645085096 CEST4973358709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:05.600729942 CEST4973258709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:05.607413054 CEST587094973277.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:06.723187923 CEST4973358709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:06.728193045 CEST587094973377.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:12.390866995 CEST587094973177.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:12.441975117 CEST4973158709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:12.493689060 CEST49734443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:12.493726969 CEST4434973434.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:12.493788958 CEST49734443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:12.494719028 CEST49734443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:12.494730949 CEST4434973434.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:12.871846914 CEST4973558709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:12.877345085 CEST587094973577.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:12.877439022 CEST4973558709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:12.899554968 CEST4973558709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:12.905499935 CEST587094973577.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:12.952986956 CEST4434973434.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:12.953052044 CEST49734443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:12.955729008 CEST49734443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:12.955739021 CEST4434973434.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:12.955966949 CEST4434973434.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:12.995399952 CEST49734443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:13.036539078 CEST4434973434.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:13.125442028 CEST4434973434.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:13.125550985 CEST4434973434.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:13.125593901 CEST49734443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:13.128230095 CEST49734443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:13.128248930 CEST4434973434.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:13.128259897 CEST49734443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:13.128264904 CEST4434973434.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:13.157634974 CEST49736443192.168.2.4104.26.5.15
                                Jun 23, 2024 18:35:13.157723904 CEST44349736104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:13.158070087 CEST49736443192.168.2.4104.26.5.15
                                Jun 23, 2024 18:35:13.158212900 CEST49736443192.168.2.4104.26.5.15
                                Jun 23, 2024 18:35:13.158245087 CEST44349736104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:13.312009096 CEST587094973277.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:13.363712072 CEST4973258709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:13.401850939 CEST49738443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:13.401875973 CEST4434973834.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:13.401951075 CEST49738443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:13.402900934 CEST49738443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:13.402909994 CEST4434973834.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:13.471005917 CEST587094973577.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:13.519956112 CEST4973558709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:13.641647100 CEST44349736104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:13.641832113 CEST49736443192.168.2.4104.26.5.15
                                Jun 23, 2024 18:35:13.643337011 CEST49736443192.168.2.4104.26.5.15
                                Jun 23, 2024 18:35:13.643395901 CEST44349736104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:13.643635035 CEST44349736104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:13.644740105 CEST49736443192.168.2.4104.26.5.15
                                Jun 23, 2024 18:35:13.692588091 CEST44349736104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:13.877681017 CEST44349736104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:13.877765894 CEST44349736104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:13.877938032 CEST49736443192.168.2.4104.26.5.15
                                Jun 23, 2024 18:35:13.878024101 CEST49736443192.168.2.4104.26.5.15
                                Jun 23, 2024 18:35:13.878024101 CEST49736443192.168.2.4104.26.5.15
                                Jun 23, 2024 18:35:13.878098965 CEST44349736104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:13.878130913 CEST44349736104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:13.878499985 CEST4973158709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:13.880835056 CEST4434973834.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:13.880928040 CEST49738443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:13.881979942 CEST49738443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:13.881985903 CEST4434973834.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:13.882201910 CEST4434973834.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:13.883603096 CEST587094973177.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:13.926204920 CEST49738443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:13.931946039 CEST49738443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:13.972539902 CEST4434973834.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:14.065515995 CEST4434973834.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:14.065614939 CEST4434973834.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:14.065699100 CEST49738443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:14.066260099 CEST49738443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:14.066277027 CEST4434973834.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:14.066303968 CEST49738443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:14.066308975 CEST4434973834.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:14.068361998 CEST49740443192.168.2.4104.26.5.15
                                Jun 23, 2024 18:35:14.068375111 CEST44349740104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:14.068470955 CEST49740443192.168.2.4104.26.5.15
                                Jun 23, 2024 18:35:14.068757057 CEST49740443192.168.2.4104.26.5.15
                                Jun 23, 2024 18:35:14.068767071 CEST44349740104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:14.392679930 CEST587094973377.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:14.441984892 CEST4973358709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:14.539515018 CEST44349740104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:14.539608002 CEST49740443192.168.2.4104.26.5.15
                                Jun 23, 2024 18:35:14.549438000 CEST49740443192.168.2.4104.26.5.15
                                Jun 23, 2024 18:35:14.549454927 CEST44349740104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:14.549674988 CEST44349740104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:14.550885916 CEST49740443192.168.2.4104.26.5.15
                                Jun 23, 2024 18:35:14.551362991 CEST49741443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:14.551450968 CEST4434974134.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:14.551551104 CEST49741443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:14.553174973 CEST49741443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:14.553226948 CEST4434974134.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:14.596513987 CEST44349740104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:14.735122919 CEST44349740104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:14.735215902 CEST44349740104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:14.735342979 CEST49740443192.168.2.4104.26.5.15
                                Jun 23, 2024 18:35:14.735496998 CEST49740443192.168.2.4104.26.5.15
                                Jun 23, 2024 18:35:14.735496998 CEST49740443192.168.2.4104.26.5.15
                                Jun 23, 2024 18:35:14.735511065 CEST44349740104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:14.735518932 CEST44349740104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:14.736361027 CEST4973258709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:14.741449118 CEST587094973277.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:15.027765036 CEST4434974134.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:15.027846098 CEST49741443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:15.033541918 CEST49741443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:15.033582926 CEST4434974134.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:15.033845901 CEST4434974134.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:15.082695961 CEST49741443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:15.222057104 CEST49741443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:15.264548063 CEST4434974134.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:15.357161999 CEST4434974134.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:15.357269049 CEST4434974134.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:15.357356071 CEST49741443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:15.358289003 CEST49741443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:15.358289003 CEST49741443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:15.358357906 CEST4434974134.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:15.358393908 CEST4434974134.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:15.360291958 CEST49744443192.168.2.4104.26.5.15
                                Jun 23, 2024 18:35:15.360335112 CEST44349744104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:15.360414028 CEST49744443192.168.2.4104.26.5.15
                                Jun 23, 2024 18:35:15.360716105 CEST49744443192.168.2.4104.26.5.15
                                Jun 23, 2024 18:35:15.360737085 CEST44349744104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:15.833093882 CEST44349744104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:15.833230972 CEST49744443192.168.2.4104.26.5.15
                                Jun 23, 2024 18:35:15.835309982 CEST49744443192.168.2.4104.26.5.15
                                Jun 23, 2024 18:35:15.835370064 CEST44349744104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:15.835608959 CEST44349744104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:15.842025995 CEST49744443192.168.2.4104.26.5.15
                                Jun 23, 2024 18:35:15.884572983 CEST44349744104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:16.018692017 CEST44349744104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:16.018981934 CEST44349744104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:16.019192934 CEST49744443192.168.2.4104.26.5.15
                                Jun 23, 2024 18:35:16.019192934 CEST49744443192.168.2.4104.26.5.15
                                Jun 23, 2024 18:35:16.019192934 CEST49744443192.168.2.4104.26.5.15
                                Jun 23, 2024 18:35:16.019500017 CEST4973358709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:16.024492025 CEST587094973377.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:16.316981077 CEST49744443192.168.2.4104.26.5.15
                                Jun 23, 2024 18:35:16.317047119 CEST44349744104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:16.599487066 CEST4973558709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:16.604655027 CEST587094973577.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:20.868304968 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:20.875525951 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:20.875688076 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:20.894154072 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:20.899358988 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:21.729696035 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:21.785727978 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:24.848390102 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:24.855691910 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:25.808855057 CEST587094973177.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:25.863987923 CEST4973158709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:26.038768053 CEST587094973277.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:26.082534075 CEST4973258709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:26.221426010 CEST587094973377.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:26.270159960 CEST4973358709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:28.664021969 CEST587094973577.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:28.707535028 CEST4973558709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:28.775810003 CEST49748443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:28.775901079 CEST4434974834.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:28.775986910 CEST49748443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:28.776850939 CEST49748443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:28.776876926 CEST4434974834.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:29.249680996 CEST4434974834.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:29.249789953 CEST49748443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:29.250977039 CEST49748443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:29.251008987 CEST4434974834.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:29.251353025 CEST4434974834.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:29.301275015 CEST49748443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:29.304995060 CEST49748443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:29.348584890 CEST4434974834.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:29.436757088 CEST4434974834.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:29.436899900 CEST4434974834.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:29.436965942 CEST49748443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:29.437676907 CEST49748443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:29.437721968 CEST4434974834.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:29.437751055 CEST49748443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:29.437767029 CEST4434974834.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:29.439748049 CEST49749443192.168.2.4104.26.5.15
                                Jun 23, 2024 18:35:29.439837933 CEST44349749104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:29.439920902 CEST49749443192.168.2.4104.26.5.15
                                Jun 23, 2024 18:35:29.440191031 CEST49749443192.168.2.4104.26.5.15
                                Jun 23, 2024 18:35:29.440217972 CEST44349749104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:29.921181917 CEST44349749104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:29.921413898 CEST49749443192.168.2.4104.26.5.15
                                Jun 23, 2024 18:35:29.922535896 CEST49749443192.168.2.4104.26.5.15
                                Jun 23, 2024 18:35:29.922629118 CEST44349749104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:29.922993898 CEST44349749104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:29.924138069 CEST49749443192.168.2.4104.26.5.15
                                Jun 23, 2024 18:35:29.964550018 CEST44349749104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:30.104144096 CEST44349749104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:30.104262114 CEST44349749104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:30.104345083 CEST49749443192.168.2.4104.26.5.15
                                Jun 23, 2024 18:35:30.104547024 CEST49749443192.168.2.4104.26.5.15
                                Jun 23, 2024 18:35:30.104604959 CEST44349749104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:30.104645014 CEST49749443192.168.2.4104.26.5.15
                                Jun 23, 2024 18:35:30.104661942 CEST44349749104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:30.104799032 CEST4973558709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:30.109746933 CEST587094973577.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:32.067198038 CEST4973158709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:32.072654009 CEST587094973177.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:32.827420950 CEST587094973577.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:32.879416943 CEST4973558709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:35.426471949 CEST4973258709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:35.434161901 CEST587094973277.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:35.598685026 CEST4973358709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:35.604379892 CEST587094973377.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:36.288691044 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:36.332581997 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:36.405381918 CEST49750443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:36.405467987 CEST4434975034.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:36.405548096 CEST49750443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:36.406512022 CEST49750443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:36.406552076 CEST4434975034.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:36.870301008 CEST4434975034.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:36.870533943 CEST49750443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:36.873888969 CEST49750443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:36.873945951 CEST4434975034.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:36.874315977 CEST4434975034.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:36.915782928 CEST49750443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:36.960587025 CEST4434975034.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:37.044912100 CEST4434975034.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:37.045202971 CEST4434975034.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:37.045454979 CEST49750443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:37.045454979 CEST49750443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:37.045454979 CEST49750443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:37.047142982 CEST49751443192.168.2.4104.26.5.15
                                Jun 23, 2024 18:35:37.047256947 CEST44349751104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:37.047334909 CEST49751443192.168.2.4104.26.5.15
                                Jun 23, 2024 18:35:37.047584057 CEST49751443192.168.2.4104.26.5.15
                                Jun 23, 2024 18:35:37.047621965 CEST44349751104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:37.348263025 CEST49750443192.168.2.434.117.186.192
                                Jun 23, 2024 18:35:37.348328114 CEST4434975034.117.186.192192.168.2.4
                                Jun 23, 2024 18:35:37.721832037 CEST44349751104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:37.721927881 CEST49751443192.168.2.4104.26.5.15
                                Jun 23, 2024 18:35:37.723264933 CEST49751443192.168.2.4104.26.5.15
                                Jun 23, 2024 18:35:37.723303080 CEST44349751104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:37.723639011 CEST44349751104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:37.724754095 CEST49751443192.168.2.4104.26.5.15
                                Jun 23, 2024 18:35:37.772495985 CEST44349751104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:37.900257111 CEST44349751104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:37.900552034 CEST44349751104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:37.900624990 CEST49751443192.168.2.4104.26.5.15
                                Jun 23, 2024 18:35:37.900702000 CEST49751443192.168.2.4104.26.5.15
                                Jun 23, 2024 18:35:37.900751114 CEST44349751104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:37.900799990 CEST49751443192.168.2.4104.26.5.15
                                Jun 23, 2024 18:35:37.900815964 CEST44349751104.26.5.15192.168.2.4
                                Jun 23, 2024 18:35:37.900995016 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:37.906968117 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:38.332878113 CEST4973158709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:38.338552952 CEST587094973177.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:41.457818985 CEST4973158709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:41.676461935 CEST4973158709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:41.693837881 CEST4973258709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:41.879678011 CEST4973358709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:41.988967896 CEST4973158709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:42.004471064 CEST4973258709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:42.191961050 CEST4973358709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:42.349049091 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:42.349560976 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:42.349634886 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:42.349674940 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:42.349731922 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:42.351248980 CEST587094973177.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:42.351279020 CEST587094973177.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:42.351306915 CEST587094973277.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:42.351339102 CEST587094973377.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:42.351366997 CEST587094973177.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:42.351398945 CEST587094973277.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:42.351439953 CEST587094973377.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:44.371795893 CEST587094973177.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:44.426351070 CEST4973158709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:44.442219973 CEST4973158709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:44.447124004 CEST587094973177.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:45.020314932 CEST4973358709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:45.025675058 CEST587094973377.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:45.348522902 CEST4973558709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:45.353976011 CEST587094973577.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:47.410583973 CEST587094973277.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:47.457608938 CEST4973258709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:47.489289045 CEST4973158709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:47.504838943 CEST4973258709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:47.638755083 CEST587094973177.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:47.639239073 CEST587094973277.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:48.145483971 CEST4973358709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:48.150768042 CEST587094973377.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:48.236190081 CEST587094973377.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:48.285854101 CEST4973358709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:48.285972118 CEST4973358709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:48.291534901 CEST587094973377.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:49.208529949 CEST587094973177.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:49.254482031 CEST4973158709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:49.336169958 CEST587094973277.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:49.379503012 CEST4973258709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:49.469643116 CEST587094973377.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:49.520140886 CEST4973358709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:51.614125967 CEST4973558709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:51.619298935 CEST587094973577.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:51.736634016 CEST587094973577.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:51.770386934 CEST4973558709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:51.775435925 CEST587094973577.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:52.332884073 CEST4973158709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:52.338912964 CEST587094973177.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:52.473480940 CEST4973258709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:52.480582952 CEST587094973277.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:52.582792044 CEST4973358709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:52.587893009 CEST587094973377.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:53.586498976 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:53.629563093 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:53.676635027 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:53.681626081 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:54.864085913 CEST4973558709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:54.869389057 CEST587094973577.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:55.473392963 CEST4973158709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:55.478650093 CEST587094973177.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:55.598534107 CEST4973258709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:55.606103897 CEST587094973277.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:55.708446980 CEST4973358709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:55.715094090 CEST587094973377.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:56.707835913 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:56.713270903 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:57.989167929 CEST4973558709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:57.994687080 CEST587094973577.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:58.614278078 CEST4973158709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:58.619864941 CEST587094973177.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:58.739018917 CEST4973258709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:58.744657993 CEST587094973277.91.77.66192.168.2.4
                                Jun 23, 2024 18:35:58.839248896 CEST4973358709192.168.2.477.91.77.66
                                Jun 23, 2024 18:35:58.844578028 CEST587094973377.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:00.045552015 CEST587094973177.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:00.098261118 CEST4973158709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:01.129982948 CEST4973558709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:01.135159016 CEST587094973577.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:01.636744976 CEST587094973277.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:01.848262072 CEST4973258709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:01.958117962 CEST4973358709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:01.963093042 CEST587094973377.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:02.062897921 CEST587094973377.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:02.113991976 CEST4973358709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:02.973634958 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:02.979120016 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:03.161379099 CEST4973158709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:03.249124050 CEST587094973577.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:03.249744892 CEST587094973177.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:03.317265987 CEST587094973577.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:03.317338943 CEST4973558709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:04.771620035 CEST4973258709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:04.776926994 CEST587094973277.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:05.223829031 CEST4973358709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:05.228847980 CEST587094973377.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:06.098754883 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:06.103771925 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:06.286355019 CEST4973158709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:06.291388035 CEST587094973177.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:06.364468098 CEST4973558709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:06.369788885 CEST587094973577.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:07.157258987 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:07.255112886 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:07.260281086 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:07.895575047 CEST4973258709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:07.900929928 CEST587094973277.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:08.349034071 CEST4973358709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:08.354177952 CEST587094973377.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:09.426862955 CEST4973158709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:09.431888103 CEST587094973177.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:09.489721060 CEST4973558709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:09.494760036 CEST587094973577.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:10.286386013 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:10.305349112 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:11.020863056 CEST4973258709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:11.026087999 CEST587094973277.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:11.284737110 CEST587094973577.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:11.332681894 CEST4973558709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:11.489408970 CEST4973358709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:11.500243902 CEST587094973377.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:12.097340107 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:12.145173073 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:12.568563938 CEST4973158709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:12.573581934 CEST587094973177.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:14.145618916 CEST4973258709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:14.151154041 CEST587094973277.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:14.427030087 CEST4973558709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:14.432101011 CEST587094973577.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:14.631315947 CEST4973358709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:14.636296034 CEST587094973377.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:15.239362001 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:15.244395018 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:15.692759037 CEST4973158709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:15.697943926 CEST587094973177.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:17.271881104 CEST4973258709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:17.277091980 CEST587094973277.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:17.552079916 CEST4973558709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:17.557306051 CEST587094973577.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:17.573442936 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:17.645200968 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:17.755362988 CEST4973358709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:17.760474920 CEST587094973377.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:18.297748089 CEST587094973177.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:18.489083052 CEST4973158709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:18.571548939 CEST587094973277.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:18.645210981 CEST4973258709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:18.645979881 CEST4973258709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:18.650908947 CEST587094973277.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:18.743520021 CEST587094973377.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:18.879582882 CEST4973358709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:20.507417917 CEST587094973577.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:20.511279106 CEST4973558709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:20.516568899 CEST587094973577.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:20.708579063 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:20.713711023 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:21.411884069 CEST4973158709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:21.417385101 CEST587094973177.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:21.692819118 CEST4973258709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:21.701765060 CEST587094973277.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:21.865894079 CEST4973358709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:21.874464035 CEST587094973377.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:23.630383015 CEST4973558709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:23.635519981 CEST587094973577.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:23.741945982 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:23.786973000 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:24.502542019 CEST587094973177.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:24.551980019 CEST4973158709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:24.556873083 CEST587094973177.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:24.646425962 CEST587094973277.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:24.759926081 CEST4973258709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:24.826591015 CEST587094973377.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:24.991167068 CEST4973358709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:25.935925961 CEST587094973577.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:25.981652975 CEST4973558709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:26.880310059 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:26.885363102 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:27.630398989 CEST4973158709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:27.635535002 CEST587094973177.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:27.770886898 CEST4973258709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:27.776096106 CEST587094973277.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:27.942915916 CEST4973358709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:27.949517965 CEST587094973377.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:29.069511890 CEST4973558709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:29.075340986 CEST587094973577.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:29.835297108 CEST587094973177.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:29.988996029 CEST4973158709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:29.992683887 CEST587094973277.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:30.020941019 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:30.025821924 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:30.137871027 CEST587094973377.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:30.145267963 CEST4973258709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:30.208794117 CEST4973358709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:30.219950914 CEST587094973377.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:31.341242075 CEST587094973577.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:31.535871983 CEST4973558709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:32.291187048 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:32.291239023 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:32.291273117 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:32.291299105 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:32.291559935 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:32.291613102 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:32.291677952 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:32.291708946 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:32.291749001 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:32.292047977 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:32.292077065 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:32.292109013 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:32.292119026 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:32.292176008 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:32.292217970 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:32.292265892 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:32.292444944 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:32.292496920 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:32.292543888 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:32.292748928 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:32.292795897 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:32.292989969 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:32.293019056 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:32.293061972 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:32.293138981 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:32.296154022 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:32.296202898 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:32.296260118 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:32.348357916 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:32.408762932 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:32.408880949 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:32.408962011 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:32.408977985 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:32.409091949 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:32.409125090 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:32.409135103 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:32.409157038 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:32.409207106 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:32.442780018 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:32.447626114 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:32.974072933 CEST4973158709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:32.979515076 CEST587094973177.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:33.114697933 CEST4973258709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:33.119645119 CEST587094973277.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:33.255448103 CEST4973358709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:33.261111975 CEST587094973377.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:34.458523035 CEST4973558709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:34.464775085 CEST587094973577.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:35.567934036 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:35.572979927 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:36.098906040 CEST4973158709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:36.104110956 CEST587094973177.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:36.255362034 CEST4973258709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:36.260251045 CEST587094973277.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:36.395792961 CEST4973358709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:36.400655031 CEST587094973377.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:36.625050068 CEST587094973177.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:36.676528931 CEST4973158709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:36.879581928 CEST587094973277.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:37.016875029 CEST4973258709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:37.156642914 CEST587094973377.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:37.285993099 CEST4973358709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:37.599044085 CEST4973558709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:37.604120016 CEST587094973577.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:38.710453033 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:38.715574980 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:38.920219898 CEST587094973577.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:39.145267963 CEST4973558709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:39.697488070 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:39.742943048 CEST4973158709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:39.748100042 CEST587094973177.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:39.788479090 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:40.021107912 CEST4973258709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:40.026454926 CEST587094973277.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:40.286501884 CEST4973358709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:40.528534889 CEST587094973377.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:42.052409887 CEST4973558709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:42.057467937 CEST587094973577.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:42.821286917 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:42.826402903 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:42.864723921 CEST4973158709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:42.870469093 CEST587094973177.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:43.162338018 CEST4973258709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:43.167712927 CEST587094973277.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:43.427160025 CEST4973358709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:43.432353973 CEST587094973377.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:45.192955971 CEST4973558709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:45.198065042 CEST587094973577.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:45.721152067 CEST587094973177.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:45.785928011 CEST4973158709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:45.861783981 CEST587094973277.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:45.948628902 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:45.955468893 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:46.019632101 CEST587094973377.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:46.035928011 CEST4973258709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:46.176528931 CEST4973358709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:46.687335014 CEST587094973577.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:46.848419905 CEST4973558709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:47.774614096 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:47.848429918 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:48.849133968 CEST4973158709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:48.854142904 CEST587094973177.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:48.989753008 CEST4973258709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:48.994721889 CEST587094973277.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:49.146194935 CEST4973358709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:49.151087046 CEST587094973377.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:49.802202940 CEST4973558709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:49.807547092 CEST587094973577.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:50.911817074 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:50.916995049 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:51.973957062 CEST4973158709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:51.978939056 CEST587094973177.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:52.136207104 CEST4973258709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:52.142293930 CEST587094973277.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:52.273390055 CEST4973358709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:52.278467894 CEST587094973377.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:52.927182913 CEST4973558709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:52.932044029 CEST587094973577.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:54.036406994 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:54.041385889 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:55.099309921 CEST4973158709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:55.105591059 CEST587094973177.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:55.255364895 CEST4973258709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:55.260418892 CEST587094973277.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:55.395852089 CEST4973358709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:55.400779963 CEST587094973377.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:56.052212000 CEST4973558709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:56.057085991 CEST587094973577.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:57.177198887 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:57.182192087 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:58.240009069 CEST4973158709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:58.244925976 CEST587094973177.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:58.380453110 CEST4973258709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:58.385426998 CEST587094973277.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:58.521096945 CEST4973358709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:58.526997089 CEST587094973377.91.77.66192.168.2.4
                                Jun 23, 2024 18:36:59.194861889 CEST4973558709192.168.2.477.91.77.66
                                Jun 23, 2024 18:36:59.199800968 CEST587094973577.91.77.66192.168.2.4
                                Jun 23, 2024 18:37:00.317905903 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:37:00.322900057 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:37:01.364969969 CEST4973158709192.168.2.477.91.77.66
                                Jun 23, 2024 18:37:01.370029926 CEST587094973177.91.77.66192.168.2.4
                                Jun 23, 2024 18:37:01.520993948 CEST4973258709192.168.2.477.91.77.66
                                Jun 23, 2024 18:37:01.526114941 CEST587094973277.91.77.66192.168.2.4
                                Jun 23, 2024 18:37:01.661699057 CEST4973358709192.168.2.477.91.77.66
                                Jun 23, 2024 18:37:01.666558027 CEST587094973377.91.77.66192.168.2.4
                                Jun 23, 2024 18:37:02.317768097 CEST4973558709192.168.2.477.91.77.66
                                Jun 23, 2024 18:37:02.323278904 CEST587094973577.91.77.66192.168.2.4
                                Jun 23, 2024 18:37:03.458442926 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:37:03.463998079 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:37:04.505218983 CEST4973158709192.168.2.477.91.77.66
                                Jun 23, 2024 18:37:04.510317087 CEST587094973177.91.77.66192.168.2.4
                                Jun 23, 2024 18:37:04.646362066 CEST4973258709192.168.2.477.91.77.66
                                Jun 23, 2024 18:37:04.653469086 CEST587094973277.91.77.66192.168.2.4
                                Jun 23, 2024 18:37:04.786799908 CEST4973358709192.168.2.477.91.77.66
                                Jun 23, 2024 18:37:04.791894913 CEST587094973377.91.77.66192.168.2.4
                                Jun 23, 2024 18:37:05.458695889 CEST4973558709192.168.2.477.91.77.66
                                Jun 23, 2024 18:37:05.463727951 CEST587094973577.91.77.66192.168.2.4
                                Jun 23, 2024 18:37:06.583631039 CEST4974758709192.168.2.477.91.77.66
                                Jun 23, 2024 18:37:06.588677883 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:37:07.646023035 CEST4973158709192.168.2.477.91.77.66
                                Jun 23, 2024 18:37:07.693927050 CEST587094973177.91.77.66192.168.2.4
                                Jun 23, 2024 18:37:21.831301928 CEST587094973177.91.77.66192.168.2.4
                                Jun 23, 2024 18:37:21.879781961 CEST4973158709192.168.2.477.91.77.66
                                Jun 23, 2024 18:37:21.962130070 CEST587094973277.91.77.66192.168.2.4
                                Jun 23, 2024 18:37:22.004802942 CEST4973258709192.168.2.477.91.77.66
                                Jun 23, 2024 18:37:25.489065886 CEST587094973377.91.77.66192.168.2.4
                                Jun 23, 2024 18:37:25.536147118 CEST4973358709192.168.2.477.91.77.66
                                Jun 23, 2024 18:37:38.076787949 CEST587094973577.91.77.66192.168.2.4
                                Jun 23, 2024 18:37:38.129846096 CEST4973558709192.168.2.477.91.77.66
                                Jun 23, 2024 18:37:41.195319891 CEST587094974777.91.77.66192.168.2.4
                                Jun 23, 2024 18:37:41.239217997 CEST4974758709192.168.2.477.91.77.66
                                TimestampSource PortDest PortSource IPDest IP
                                Jun 23, 2024 18:35:12.481183052 CEST4918653192.168.2.41.1.1.1
                                Jun 23, 2024 18:35:12.489104033 CEST53491861.1.1.1192.168.2.4
                                Jun 23, 2024 18:35:13.138309002 CEST6278253192.168.2.41.1.1.1
                                Jun 23, 2024 18:35:13.150125027 CEST53627821.1.1.1192.168.2.4
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                Jun 23, 2024 18:35:12.481183052 CEST192.168.2.41.1.1.10x45eStandard query (0)ipinfo.ioA (IP address)IN (0x0001)false
                                Jun 23, 2024 18:35:13.138309002 CEST192.168.2.41.1.1.10xa6f6Standard query (0)db-ip.comA (IP address)IN (0x0001)false
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                Jun 23, 2024 18:35:12.489104033 CEST1.1.1.1192.168.2.40x45eNo error (0)ipinfo.io34.117.186.192A (IP address)IN (0x0001)false
                                Jun 23, 2024 18:35:13.150125027 CEST1.1.1.1192.168.2.40xa6f6No error (0)db-ip.com104.26.5.15A (IP address)IN (0x0001)false
                                Jun 23, 2024 18:35:13.150125027 CEST1.1.1.1192.168.2.40xa6f6No error (0)db-ip.com172.67.75.166A (IP address)IN (0x0001)false
                                Jun 23, 2024 18:35:13.150125027 CEST1.1.1.1192.168.2.40xa6f6No error (0)db-ip.com104.26.4.15A (IP address)IN (0x0001)false
                                • ipinfo.io
                                • https:
                                • db-ip.com
                                Session IDSource IPSource PortDestination IPDestination Port
                                0192.168.2.44973034.117.186.192443
                                TimestampBytes transferredDirectionData
                                2024-06-23 16:34:50 UTC59OUTGET / HTTP/1.1
                                Host: ipinfo.io
                                Connection: Keep-Alive
                                2024-06-23 16:34:51 UTC513INHTTP/1.1 200 OK
                                server: nginx/1.24.0
                                date: Sun, 23 Jun 2024 16:34:50 GMT
                                content-type: application/json; charset=utf-8
                                Content-Length: 319
                                access-control-allow-origin: *
                                x-frame-options: SAMEORIGIN
                                x-xss-protection: 1; mode=block
                                x-content-type-options: nosniff
                                referrer-policy: strict-origin-when-cross-origin
                                x-envoy-upstream-service-time: 1
                                via: 1.1 google
                                strict-transport-security: max-age=2592000; includeSubDomains
                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                Connection: close
                                2024-06-23 16:34:51 UTC319INData Raw: 7b 0a 20 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 68 6f 73 74 6e 61 6d 65 22 3a 20 22 73 74 61 74 69 63 2d 63 70 65 2d 38 2d 34 36 2d 31 32 33 2d 33 33 2e 63 65 6e 74 75 72 79 6c 69 6e 6b 2e 63 6f 6d 22 2c 0a 20 20 22 63 69 74 79 22 3a 20 22 4e 65 77 20 59 6f 72 6b 20 43 69 74 79 22 2c 0a 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 53 22 2c 0a 20 20 22 6c 6f 63 22 3a 20 22 34 30 2e 37 31 34 33 2c 2d 37 34 2e 30 30 36 30 22 2c 0a 20 20 22 6f 72 67 22 3a 20 22 41 53 33 33 35 36 20 4c 65 76 65 6c 20 33 20 50 61 72 65 6e 74 2c 20 4c 4c 43 22 2c 0a 20 20 22 70 6f 73 74 61 6c 22 3a 20 22 31 30 30 30 31 22 2c 0a 20 20 22 74 69 6d 65 7a 6f 6e 65 22 3a 20 22
                                Data Ascii: { "ip": "8.46.123.33", "hostname": "static-cpe-8-46-123-33.centurylink.com", "city": "New York City", "region": "New York", "country": "US", "loc": "40.7143,-74.0060", "org": "AS3356 Level 3 Parent, LLC", "postal": "10001", "timezone": "


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                1192.168.2.44973434.117.186.1924437300C:\Users\user\Desktop\90ZF1EDs9h.exe
                                TimestampBytes transferredDirectionData
                                2024-06-23 16:35:12 UTC236OUTGET /widget/demo/8.46.123.33 HTTP/1.1
                                Connection: Keep-Alive
                                Referer: https://ipinfo.io/
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                                Host: ipinfo.io
                                2024-06-23 16:35:13 UTC514INHTTP/1.1 200 OK
                                server: nginx/1.24.0
                                date: Sun, 23 Jun 2024 16:35:13 GMT
                                content-type: application/json; charset=utf-8
                                Content-Length: 1025
                                access-control-allow-origin: *
                                x-frame-options: SAMEORIGIN
                                x-xss-protection: 1; mode=block
                                x-content-type-options: nosniff
                                referrer-policy: strict-origin-when-cross-origin
                                x-envoy-upstream-service-time: 1
                                via: 1.1 google
                                strict-transport-security: max-age=2592000; includeSubDomains
                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                Connection: close
                                2024-06-23 16:35:13 UTC876INData Raw: 7b 0a 20 20 22 69 6e 70 75 74 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 64 61 74 61 22 3a 20 7b 0a 20 20 20 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 20 20 22 68 6f 73 74 6e 61 6d 65 22 3a 20 22 73 74 61 74 69 63 2d 63 70 65 2d 38 2d 34 36 2d 31 32 33 2d 33 33 2e 63 65 6e 74 75 72 79 6c 69 6e 6b 2e 63 6f 6d 22 2c 0a 20 20 20 20 22 63 69 74 79 22 3a 20 22 4e 65 77 20 59 6f 72 6b 20 43 69 74 79 22 2c 0a 20 20 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 53 22 2c 0a 20 20 20 20 22 6c 6f 63 22 3a 20 22 34 30 2e 37 31 34 33 2c 2d 37 34 2e 30 30 36 30 22 2c 0a 20 20 20 20 22 6f 72 67 22 3a 20 22 41 53 33 33 35 36 20 4c 65 76 65 6c 20
                                Data Ascii: { "input": "8.46.123.33", "data": { "ip": "8.46.123.33", "hostname": "static-cpe-8-46-123-33.centurylink.com", "city": "New York City", "region": "New York", "country": "US", "loc": "40.7143,-74.0060", "org": "AS3356 Level
                                2024-06-23 16:35:13 UTC149INData Raw: 65 6d 61 69 6c 22 3a 20 22 61 62 75 73 65 40 61 75 70 2e 6c 75 6d 65 6e 2e 63 6f 6d 22 2c 0a 20 20 20 20 20 20 22 6e 61 6d 65 22 3a 20 22 43 65 6e 74 75 72 79 6c 69 6e 6b 20 41 62 75 73 65 20 44 65 73 6b 22 2c 0a 20 20 20 20 20 20 22 6e 65 74 77 6f 72 6b 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 30 2f 32 34 22 2c 0a 20 20 20 20 20 20 22 70 68 6f 6e 65 22 3a 20 22 2b 31 2d 38 37 37 2d 38 38 36 2d 36 35 31 35 22 0a 20 20 20 20 7d 0a 20 20 7d 0a 7d
                                Data Ascii: email": "abuse@aup.lumen.com", "name": "Centurylink Abuse Desk", "network": "8.46.123.0/24", "phone": "+1-877-886-6515" } }}


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                2192.168.2.449736104.26.5.154437300C:\Users\user\Desktop\90ZF1EDs9h.exe
                                TimestampBytes transferredDirectionData
                                2024-06-23 16:35:13 UTC260OUTGET /demo/home.php?s=8.46.123.33 HTTP/1.1
                                Connection: Keep-Alive
                                Content-Type: application/x-www-form-urlencoded
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                                Host: db-ip.com
                                2024-06-23 16:35:13 UTC653INHTTP/1.1 200 OK
                                Date: Sun, 23 Jun 2024 16:35:13 GMT
                                Content-Type: application/json
                                Transfer-Encoding: chunked
                                Connection: close
                                x-iplb-request-id: A29E3ED6:900A_93878F2E:0050_66784EC1_155994E6:4F34
                                x-iplb-instance: 59215
                                CF-Cache-Status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Xm42o233PGoiYqNPbeDEmw1KzLE46Hg9jie7rP9W63eZPHubQ9cbKRz6x%2FIVOOcs7PXeUKESlpgxYVT21M2ofrtxOdeVPaH7lFqI8MxxFo6K5K%2F2RctEckFJxA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 8985e3dacf640cb1-EWR
                                alt-svc: h3=":443"; ma=86400
                                2024-06-23 16:35:13 UTC673INData Raw: 32 39 61 0d 0a 7b 22 73 74 61 74 75 73 22 3a 22 6f 6b 22 2c 22 64 65 6d 6f 49 6e 66 6f 22 3a 7b 22 69 70 41 64 64 72 65 73 73 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 22 63 6f 6e 74 69 6e 65 6e 74 43 6f 64 65 22 3a 22 4e 41 22 2c 22 63 6f 6e 74 69 6e 65 6e 74 4e 61 6d 65 22 3a 22 4e 6f 72 74 68 20 41 6d 65 72 69 63 61 22 2c 22 63 6f 75 6e 74 72 79 43 6f 64 65 22 3a 22 55 53 22 2c 22 63 6f 75 6e 74 72 79 4e 61 6d 65 22 3a 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 22 69 73 45 75 4d 65 6d 62 65 72 22 3a 66 61 6c 73 65 2c 22 63 75 72 72 65 6e 63 79 43 6f 64 65 22 3a 22 55 53 44 22 2c 22 63 75 72 72 65 6e 63 79 4e 61 6d 65 22 3a 22 44 6f 6c 6c 61 72 22 2c 22 70 68 6f 6e 65 50 72 65 66 69 78 22 3a 22 31 22 2c 22 6c 61 6e 67 75 61 67 65 73 22 3a 5b
                                Data Ascii: 29a{"status":"ok","demoInfo":{"ipAddress":"8.46.123.33","continentCode":"NA","continentName":"North America","countryCode":"US","countryName":"United States","isEuMember":false,"currencyCode":"USD","currencyName":"Dollar","phonePrefix":"1","languages":[
                                2024-06-23 16:35:13 UTC5INData Raw: 30 0d 0a 0d 0a
                                Data Ascii: 0


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                3192.168.2.44973834.117.186.1924437552C:\ProgramData\MPGPH131\MPGPH131.exe
                                TimestampBytes transferredDirectionData
                                2024-06-23 16:35:13 UTC236OUTGET /widget/demo/8.46.123.33 HTTP/1.1
                                Connection: Keep-Alive
                                Referer: https://ipinfo.io/
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                                Host: ipinfo.io
                                2024-06-23 16:35:14 UTC514INHTTP/1.1 200 OK
                                server: nginx/1.24.0
                                date: Sun, 23 Jun 2024 16:35:14 GMT
                                content-type: application/json; charset=utf-8
                                Content-Length: 1025
                                access-control-allow-origin: *
                                x-frame-options: SAMEORIGIN
                                x-xss-protection: 1; mode=block
                                x-content-type-options: nosniff
                                referrer-policy: strict-origin-when-cross-origin
                                x-envoy-upstream-service-time: 1
                                via: 1.1 google
                                strict-transport-security: max-age=2592000; includeSubDomains
                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                Connection: close
                                2024-06-23 16:35:14 UTC876INData Raw: 7b 0a 20 20 22 69 6e 70 75 74 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 64 61 74 61 22 3a 20 7b 0a 20 20 20 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 20 20 22 68 6f 73 74 6e 61 6d 65 22 3a 20 22 73 74 61 74 69 63 2d 63 70 65 2d 38 2d 34 36 2d 31 32 33 2d 33 33 2e 63 65 6e 74 75 72 79 6c 69 6e 6b 2e 63 6f 6d 22 2c 0a 20 20 20 20 22 63 69 74 79 22 3a 20 22 4e 65 77 20 59 6f 72 6b 20 43 69 74 79 22 2c 0a 20 20 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 53 22 2c 0a 20 20 20 20 22 6c 6f 63 22 3a 20 22 34 30 2e 37 31 34 33 2c 2d 37 34 2e 30 30 36 30 22 2c 0a 20 20 20 20 22 6f 72 67 22 3a 20 22 41 53 33 33 35 36 20 4c 65 76 65 6c 20
                                Data Ascii: { "input": "8.46.123.33", "data": { "ip": "8.46.123.33", "hostname": "static-cpe-8-46-123-33.centurylink.com", "city": "New York City", "region": "New York", "country": "US", "loc": "40.7143,-74.0060", "org": "AS3356 Level
                                2024-06-23 16:35:14 UTC149INData Raw: 65 6d 61 69 6c 22 3a 20 22 61 62 75 73 65 40 61 75 70 2e 6c 75 6d 65 6e 2e 63 6f 6d 22 2c 0a 20 20 20 20 20 20 22 6e 61 6d 65 22 3a 20 22 43 65 6e 74 75 72 79 6c 69 6e 6b 20 41 62 75 73 65 20 44 65 73 6b 22 2c 0a 20 20 20 20 20 20 22 6e 65 74 77 6f 72 6b 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 30 2f 32 34 22 2c 0a 20 20 20 20 20 20 22 70 68 6f 6e 65 22 3a 20 22 2b 31 2d 38 37 37 2d 38 38 36 2d 36 35 31 35 22 0a 20 20 20 20 7d 0a 20 20 7d 0a 7d
                                Data Ascii: email": "abuse@aup.lumen.com", "name": "Centurylink Abuse Desk", "network": "8.46.123.0/24", "phone": "+1-877-886-6515" } }}


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                4192.168.2.449740104.26.5.154437552C:\ProgramData\MPGPH131\MPGPH131.exe
                                TimestampBytes transferredDirectionData
                                2024-06-23 16:35:14 UTC260OUTGET /demo/home.php?s=8.46.123.33 HTTP/1.1
                                Connection: Keep-Alive
                                Content-Type: application/x-www-form-urlencoded
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                                Host: db-ip.com
                                2024-06-23 16:35:14 UTC657INHTTP/1.1 200 OK
                                Date: Sun, 23 Jun 2024 16:35:14 GMT
                                Content-Type: application/json
                                Transfer-Encoding: chunked
                                Connection: close
                                x-iplb-request-id: A29E9E84:FE64_93878F2E:0050_66784EC2_15463888:7B63
                                x-iplb-instance: 59128
                                CF-Cache-Status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=VX%2F53%2FExKpJbt%2FDl8GcBT%2FYb0wS4c7etLwwBhhadIQ2ej9xLr5Lbe7KD85UIWd238eLIJC9R8uJ7HJGuTaAYW2l3JSV7kZT29in4mTjwUtdjdAv1gn3gR0IVQg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 8985e3e059d841e7-EWR
                                alt-svc: h3=":443"; ma=86400
                                2024-06-23 16:35:14 UTC673INData Raw: 32 39 61 0d 0a 7b 22 73 74 61 74 75 73 22 3a 22 6f 6b 22 2c 22 64 65 6d 6f 49 6e 66 6f 22 3a 7b 22 69 70 41 64 64 72 65 73 73 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 22 63 6f 6e 74 69 6e 65 6e 74 43 6f 64 65 22 3a 22 4e 41 22 2c 22 63 6f 6e 74 69 6e 65 6e 74 4e 61 6d 65 22 3a 22 4e 6f 72 74 68 20 41 6d 65 72 69 63 61 22 2c 22 63 6f 75 6e 74 72 79 43 6f 64 65 22 3a 22 55 53 22 2c 22 63 6f 75 6e 74 72 79 4e 61 6d 65 22 3a 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 22 69 73 45 75 4d 65 6d 62 65 72 22 3a 66 61 6c 73 65 2c 22 63 75 72 72 65 6e 63 79 43 6f 64 65 22 3a 22 55 53 44 22 2c 22 63 75 72 72 65 6e 63 79 4e 61 6d 65 22 3a 22 44 6f 6c 6c 61 72 22 2c 22 70 68 6f 6e 65 50 72 65 66 69 78 22 3a 22 31 22 2c 22 6c 61 6e 67 75 61 67 65 73 22 3a 5b
                                Data Ascii: 29a{"status":"ok","demoInfo":{"ipAddress":"8.46.123.33","continentCode":"NA","continentName":"North America","countryCode":"US","countryName":"United States","isEuMember":false,"currencyCode":"USD","currencyName":"Dollar","phonePrefix":"1","languages":[
                                2024-06-23 16:35:14 UTC5INData Raw: 30 0d 0a 0d 0a
                                Data Ascii: 0


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                5192.168.2.44974134.117.186.1924437560C:\ProgramData\MPGPH131\MPGPH131.exe
                                TimestampBytes transferredDirectionData
                                2024-06-23 16:35:15 UTC236OUTGET /widget/demo/8.46.123.33 HTTP/1.1
                                Connection: Keep-Alive
                                Referer: https://ipinfo.io/
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                                Host: ipinfo.io
                                2024-06-23 16:35:15 UTC514INHTTP/1.1 200 OK
                                server: nginx/1.24.0
                                date: Sun, 23 Jun 2024 16:35:15 GMT
                                content-type: application/json; charset=utf-8
                                Content-Length: 1025
                                access-control-allow-origin: *
                                x-frame-options: SAMEORIGIN
                                x-xss-protection: 1; mode=block
                                x-content-type-options: nosniff
                                referrer-policy: strict-origin-when-cross-origin
                                x-envoy-upstream-service-time: 2
                                via: 1.1 google
                                strict-transport-security: max-age=2592000; includeSubDomains
                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                Connection: close
                                2024-06-23 16:35:15 UTC876INData Raw: 7b 0a 20 20 22 69 6e 70 75 74 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 64 61 74 61 22 3a 20 7b 0a 20 20 20 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 20 20 22 68 6f 73 74 6e 61 6d 65 22 3a 20 22 73 74 61 74 69 63 2d 63 70 65 2d 38 2d 34 36 2d 31 32 33 2d 33 33 2e 63 65 6e 74 75 72 79 6c 69 6e 6b 2e 63 6f 6d 22 2c 0a 20 20 20 20 22 63 69 74 79 22 3a 20 22 4e 65 77 20 59 6f 72 6b 20 43 69 74 79 22 2c 0a 20 20 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 53 22 2c 0a 20 20 20 20 22 6c 6f 63 22 3a 20 22 34 30 2e 37 31 34 33 2c 2d 37 34 2e 30 30 36 30 22 2c 0a 20 20 20 20 22 6f 72 67 22 3a 20 22 41 53 33 33 35 36 20 4c 65 76 65 6c 20
                                Data Ascii: { "input": "8.46.123.33", "data": { "ip": "8.46.123.33", "hostname": "static-cpe-8-46-123-33.centurylink.com", "city": "New York City", "region": "New York", "country": "US", "loc": "40.7143,-74.0060", "org": "AS3356 Level
                                2024-06-23 16:35:15 UTC149INData Raw: 65 6d 61 69 6c 22 3a 20 22 61 62 75 73 65 40 61 75 70 2e 6c 75 6d 65 6e 2e 63 6f 6d 22 2c 0a 20 20 20 20 20 20 22 6e 61 6d 65 22 3a 20 22 43 65 6e 74 75 72 79 6c 69 6e 6b 20 41 62 75 73 65 20 44 65 73 6b 22 2c 0a 20 20 20 20 20 20 22 6e 65 74 77 6f 72 6b 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 30 2f 32 34 22 2c 0a 20 20 20 20 20 20 22 70 68 6f 6e 65 22 3a 20 22 2b 31 2d 38 37 37 2d 38 38 36 2d 36 35 31 35 22 0a 20 20 20 20 7d 0a 20 20 7d 0a 7d
                                Data Ascii: email": "abuse@aup.lumen.com", "name": "Centurylink Abuse Desk", "network": "8.46.123.0/24", "phone": "+1-877-886-6515" } }}


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                6192.168.2.449744104.26.5.154437560C:\ProgramData\MPGPH131\MPGPH131.exe
                                TimestampBytes transferredDirectionData
                                2024-06-23 16:35:15 UTC260OUTGET /demo/home.php?s=8.46.123.33 HTTP/1.1
                                Connection: Keep-Alive
                                Content-Type: application/x-www-form-urlencoded
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                                Host: db-ip.com
                                2024-06-23 16:35:16 UTC653INHTTP/1.1 200 OK
                                Date: Sun, 23 Jun 2024 16:35:15 GMT
                                Content-Type: application/json
                                Transfer-Encoding: chunked
                                Connection: close
                                x-iplb-request-id: A29E9F5A:FA86_93878F2E:0050_66784EC3_154638BC:7B63
                                x-iplb-instance: 59128
                                CF-Cache-Status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=wexhpaynyoTQZn8cPI8zsoIB1sE18yK86UzG4ZGtfFQzAWa3une9uGAknVec%2Bhe6pChyy%2FX9lOu2d1TWHnW3g5xqQtM4KlXRyOY518HRgu1pru9QdxBfeCe9dw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 8985e3e86cf442c8-EWR
                                alt-svc: h3=":443"; ma=86400
                                2024-06-23 16:35:16 UTC673INData Raw: 32 39 61 0d 0a 7b 22 73 74 61 74 75 73 22 3a 22 6f 6b 22 2c 22 64 65 6d 6f 49 6e 66 6f 22 3a 7b 22 69 70 41 64 64 72 65 73 73 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 22 63 6f 6e 74 69 6e 65 6e 74 43 6f 64 65 22 3a 22 4e 41 22 2c 22 63 6f 6e 74 69 6e 65 6e 74 4e 61 6d 65 22 3a 22 4e 6f 72 74 68 20 41 6d 65 72 69 63 61 22 2c 22 63 6f 75 6e 74 72 79 43 6f 64 65 22 3a 22 55 53 22 2c 22 63 6f 75 6e 74 72 79 4e 61 6d 65 22 3a 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 22 69 73 45 75 4d 65 6d 62 65 72 22 3a 66 61 6c 73 65 2c 22 63 75 72 72 65 6e 63 79 43 6f 64 65 22 3a 22 55 53 44 22 2c 22 63 75 72 72 65 6e 63 79 4e 61 6d 65 22 3a 22 44 6f 6c 6c 61 72 22 2c 22 70 68 6f 6e 65 50 72 65 66 69 78 22 3a 22 31 22 2c 22 6c 61 6e 67 75 61 67 65 73 22 3a 5b
                                Data Ascii: 29a{"status":"ok","demoInfo":{"ipAddress":"8.46.123.33","continentCode":"NA","continentName":"North America","countryCode":"US","countryName":"United States","isEuMember":false,"currencyCode":"USD","currencyName":"Dollar","phonePrefix":"1","languages":[
                                2024-06-23 16:35:16 UTC5INData Raw: 30 0d 0a 0d 0a
                                Data Ascii: 0


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                7192.168.2.44974834.117.186.1924437872C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                                TimestampBytes transferredDirectionData
                                2024-06-23 16:35:29 UTC236OUTGET /widget/demo/8.46.123.33 HTTP/1.1
                                Connection: Keep-Alive
                                Referer: https://ipinfo.io/
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                                Host: ipinfo.io
                                2024-06-23 16:35:29 UTC514INHTTP/1.1 200 OK
                                server: nginx/1.24.0
                                date: Sun, 23 Jun 2024 16:35:29 GMT
                                content-type: application/json; charset=utf-8
                                Content-Length: 1025
                                access-control-allow-origin: *
                                x-frame-options: SAMEORIGIN
                                x-xss-protection: 1; mode=block
                                x-content-type-options: nosniff
                                referrer-policy: strict-origin-when-cross-origin
                                x-envoy-upstream-service-time: 3
                                via: 1.1 google
                                strict-transport-security: max-age=2592000; includeSubDomains
                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                Connection: close
                                2024-06-23 16:35:29 UTC876INData Raw: 7b 0a 20 20 22 69 6e 70 75 74 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 64 61 74 61 22 3a 20 7b 0a 20 20 20 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 20 20 22 68 6f 73 74 6e 61 6d 65 22 3a 20 22 73 74 61 74 69 63 2d 63 70 65 2d 38 2d 34 36 2d 31 32 33 2d 33 33 2e 63 65 6e 74 75 72 79 6c 69 6e 6b 2e 63 6f 6d 22 2c 0a 20 20 20 20 22 63 69 74 79 22 3a 20 22 4e 65 77 20 59 6f 72 6b 20 43 69 74 79 22 2c 0a 20 20 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 53 22 2c 0a 20 20 20 20 22 6c 6f 63 22 3a 20 22 34 30 2e 37 31 34 33 2c 2d 37 34 2e 30 30 36 30 22 2c 0a 20 20 20 20 22 6f 72 67 22 3a 20 22 41 53 33 33 35 36 20 4c 65 76 65 6c 20
                                Data Ascii: { "input": "8.46.123.33", "data": { "ip": "8.46.123.33", "hostname": "static-cpe-8-46-123-33.centurylink.com", "city": "New York City", "region": "New York", "country": "US", "loc": "40.7143,-74.0060", "org": "AS3356 Level
                                2024-06-23 16:35:29 UTC149INData Raw: 65 6d 61 69 6c 22 3a 20 22 61 62 75 73 65 40 61 75 70 2e 6c 75 6d 65 6e 2e 63 6f 6d 22 2c 0a 20 20 20 20 20 20 22 6e 61 6d 65 22 3a 20 22 43 65 6e 74 75 72 79 6c 69 6e 6b 20 41 62 75 73 65 20 44 65 73 6b 22 2c 0a 20 20 20 20 20 20 22 6e 65 74 77 6f 72 6b 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 30 2f 32 34 22 2c 0a 20 20 20 20 20 20 22 70 68 6f 6e 65 22 3a 20 22 2b 31 2d 38 37 37 2d 38 38 36 2d 36 35 31 35 22 0a 20 20 20 20 7d 0a 20 20 7d 0a 7d
                                Data Ascii: email": "abuse@aup.lumen.com", "name": "Centurylink Abuse Desk", "network": "8.46.123.0/24", "phone": "+1-877-886-6515" } }}


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                8192.168.2.449749104.26.5.154437872C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                                TimestampBytes transferredDirectionData
                                2024-06-23 16:35:29 UTC260OUTGET /demo/home.php?s=8.46.123.33 HTTP/1.1
                                Connection: Keep-Alive
                                Content-Type: application/x-www-form-urlencoded
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                                Host: db-ip.com
                                2024-06-23 16:35:30 UTC651INHTTP/1.1 200 OK
                                Date: Sun, 23 Jun 2024 16:35:30 GMT
                                Content-Type: application/json
                                Transfer-Encoding: chunked
                                Connection: close
                                x-iplb-request-id: AC466F13:4440_93878F2E:0050_66784ED2_15599765:4F34
                                x-iplb-instance: 59215
                                CF-Cache-Status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=c4HM3UaCos119s2VL6Z2CHKy9vu935mDuAsTjMR6wavCGdmRNzLYc5Rv0aV%2B28cnskYzgW3oE9FvQPLrNXZW5d8bGNe9ms7shcXyAE0GJC56FGJxJdWo0YAChw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 8985e4409eadc47a-EWR
                                alt-svc: h3=":443"; ma=86400
                                2024-06-23 16:35:30 UTC85INData Raw: 34 66 0d 0a 7b 22 73 74 61 74 75 73 22 3a 22 6f 6b 22 2c 22 64 65 6d 6f 49 6e 66 6f 22 3a 7b 22 65 72 72 6f 72 22 3a 22 6f 76 65 72 20 71 75 65 72 79 20 6c 69 6d 69 74 2c 20 70 6c 65 61 73 65 20 74 72 79 20 61 67 61 69 6e 20 6c 61 74 65 72 22 7d 7d 0d 0a
                                Data Ascii: 4f{"status":"ok","demoInfo":{"error":"over query limit, please try again later"}}
                                2024-06-23 16:35:30 UTC5INData Raw: 30 0d 0a 0d 0a
                                Data Ascii: 0


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                9192.168.2.44975034.117.186.1924437132C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                                TimestampBytes transferredDirectionData
                                2024-06-23 16:35:36 UTC236OUTGET /widget/demo/8.46.123.33 HTTP/1.1
                                Connection: Keep-Alive
                                Referer: https://ipinfo.io/
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                                Host: ipinfo.io
                                2024-06-23 16:35:37 UTC514INHTTP/1.1 200 OK
                                server: nginx/1.24.0
                                date: Sun, 23 Jun 2024 16:35:36 GMT
                                content-type: application/json; charset=utf-8
                                Content-Length: 1025
                                access-control-allow-origin: *
                                x-frame-options: SAMEORIGIN
                                x-xss-protection: 1; mode=block
                                x-content-type-options: nosniff
                                referrer-policy: strict-origin-when-cross-origin
                                x-envoy-upstream-service-time: 3
                                via: 1.1 google
                                strict-transport-security: max-age=2592000; includeSubDomains
                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                Connection: close
                                2024-06-23 16:35:37 UTC876INData Raw: 7b 0a 20 20 22 69 6e 70 75 74 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 64 61 74 61 22 3a 20 7b 0a 20 20 20 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 20 20 22 68 6f 73 74 6e 61 6d 65 22 3a 20 22 73 74 61 74 69 63 2d 63 70 65 2d 38 2d 34 36 2d 31 32 33 2d 33 33 2e 63 65 6e 74 75 72 79 6c 69 6e 6b 2e 63 6f 6d 22 2c 0a 20 20 20 20 22 63 69 74 79 22 3a 20 22 4e 65 77 20 59 6f 72 6b 20 43 69 74 79 22 2c 0a 20 20 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 53 22 2c 0a 20 20 20 20 22 6c 6f 63 22 3a 20 22 34 30 2e 37 31 34 33 2c 2d 37 34 2e 30 30 36 30 22 2c 0a 20 20 20 20 22 6f 72 67 22 3a 20 22 41 53 33 33 35 36 20 4c 65 76 65 6c 20
                                Data Ascii: { "input": "8.46.123.33", "data": { "ip": "8.46.123.33", "hostname": "static-cpe-8-46-123-33.centurylink.com", "city": "New York City", "region": "New York", "country": "US", "loc": "40.7143,-74.0060", "org": "AS3356 Level
                                2024-06-23 16:35:37 UTC149INData Raw: 65 6d 61 69 6c 22 3a 20 22 61 62 75 73 65 40 61 75 70 2e 6c 75 6d 65 6e 2e 63 6f 6d 22 2c 0a 20 20 20 20 20 20 22 6e 61 6d 65 22 3a 20 22 43 65 6e 74 75 72 79 6c 69 6e 6b 20 41 62 75 73 65 20 44 65 73 6b 22 2c 0a 20 20 20 20 20 20 22 6e 65 74 77 6f 72 6b 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 30 2f 32 34 22 2c 0a 20 20 20 20 20 20 22 70 68 6f 6e 65 22 3a 20 22 2b 31 2d 38 37 37 2d 38 38 36 2d 36 35 31 35 22 0a 20 20 20 20 7d 0a 20 20 7d 0a 7d
                                Data Ascii: email": "abuse@aup.lumen.com", "name": "Centurylink Abuse Desk", "network": "8.46.123.0/24", "phone": "+1-877-886-6515" } }}


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                10192.168.2.449751104.26.5.154437132C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                                TimestampBytes transferredDirectionData
                                2024-06-23 16:35:37 UTC260OUTGET /demo/home.php?s=8.46.123.33 HTTP/1.1
                                Connection: Keep-Alive
                                Content-Type: application/x-www-form-urlencoded
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                                Host: db-ip.com
                                2024-06-23 16:35:37 UTC659INHTTP/1.1 200 OK
                                Date: Sun, 23 Jun 2024 16:35:37 GMT
                                Content-Type: application/json
                                Transfer-Encoding: chunked
                                Connection: close
                                x-iplb-request-id: AC466F96:51E2_93878F2E:0050_66784ED9_155998AB:4F34
                                x-iplb-instance: 59215
                                CF-Cache-Status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=wJAZ%2BL8vpx2O7Cw1J7y2XPAAZzaU5R5VmIKQKMUaiK4Q6gHdy2GQP3yvFjSgiOHbfHC5wKTxM%2BUwWUpYa%2Fz0C%2BvhxN3YEY6tn5tTqsSlJW%2B2KhKANevaDv4rbg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 8985e47159d31921-EWR
                                alt-svc: h3=":443"; ma=86400
                                2024-06-23 16:35:37 UTC85INData Raw: 34 66 0d 0a 7b 22 73 74 61 74 75 73 22 3a 22 6f 6b 22 2c 22 64 65 6d 6f 49 6e 66 6f 22 3a 7b 22 65 72 72 6f 72 22 3a 22 6f 76 65 72 20 71 75 65 72 79 20 6c 69 6d 69 74 2c 20 70 6c 65 61 73 65 20 74 72 79 20 61 67 61 69 6e 20 6c 61 74 65 72 22 7d 7d 0d 0a
                                Data Ascii: 4f{"status":"ok","demoInfo":{"error":"over query limit, please try again later"}}
                                2024-06-23 16:35:37 UTC5INData Raw: 30 0d 0a 0d 0a
                                Data Ascii: 0


                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:12:34:55
                                Start date:23/06/2024
                                Path:C:\Users\user\Desktop\90ZF1EDs9h.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\90ZF1EDs9h.exe"
                                Imagebase:0x40000
                                File size:2'432'512 bytes
                                MD5 hash:9437D6CF2745F8683C3AA908E01B03CF
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low
                                Has exited:false

                                Target ID:1
                                Start time:12:34:58
                                Start date:23/06/2024
                                Path:C:\Windows\SysWOW64\schtasks.exe
                                Wow64 process (32bit):true
                                Commandline:schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
                                Imagebase:0x7e0000
                                File size:187'904 bytes
                                MD5 hash:48C2FE20575769DE916F48EF0676A965
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:2
                                Start time:12:34:58
                                Start date:23/06/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff7699e0000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:3
                                Start time:12:34:58
                                Start date:23/06/2024
                                Path:C:\Windows\SysWOW64\schtasks.exe
                                Wow64 process (32bit):true
                                Commandline:schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
                                Imagebase:0x7e0000
                                File size:187'904 bytes
                                MD5 hash:48C2FE20575769DE916F48EF0676A965
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:4
                                Start time:12:34:58
                                Start date:23/06/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff7699e0000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:5
                                Start time:12:34:58
                                Start date:23/06/2024
                                Path:C:\ProgramData\MPGPH131\MPGPH131.exe
                                Wow64 process (32bit):true
                                Commandline:C:\ProgramData\MPGPH131\MPGPH131.exe
                                Imagebase:0x190000
                                File size:2'432'512 bytes
                                MD5 hash:9437D6CF2745F8683C3AA908E01B03CF
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Antivirus matches:
                                • Detection: 100%, Joe Sandbox ML
                                • Detection: 50%, ReversingLabs
                                • Detection: 53%, Virustotal, Browse
                                Reputation:low
                                Has exited:false

                                Target ID:6
                                Start time:12:34:58
                                Start date:23/06/2024
                                Path:C:\ProgramData\MPGPH131\MPGPH131.exe
                                Wow64 process (32bit):true
                                Commandline:C:\ProgramData\MPGPH131\MPGPH131.exe
                                Imagebase:0x190000
                                File size:2'432'512 bytes
                                MD5 hash:9437D6CF2745F8683C3AA908E01B03CF
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low
                                Has exited:false

                                Target ID:7
                                Start time:12:35:08
                                Start date:23/06/2024
                                Path:C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
                                Imagebase:0x3e0000
                                File size:2'432'512 bytes
                                MD5 hash:9437D6CF2745F8683C3AA908E01B03CF
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Antivirus matches:
                                • Detection: 100%, Joe Sandbox ML
                                • Detection: 50%, ReversingLabs
                                • Detection: 53%, Virustotal, Browse
                                Reputation:low
                                Has exited:false

                                Target ID:9
                                Start time:12:35:17
                                Start date:23/06/2024
                                Path:C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
                                Imagebase:0x3e0000
                                File size:2'432'512 bytes
                                MD5 hash:9437D6CF2745F8683C3AA908E01B03CF
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Reputation:low
                                Has exited:false

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:3.6%
                                  Dynamic/Decrypted Code Coverage:0.5%
                                  Signature Coverage:2.6%
                                  Total number of Nodes:1822
                                  Total number of Limit Nodes:26
                                  execution_graph 18872 4bc0770 18873 4bc0715 18872->18873 18874 4bc0778 GetCurrentHwProfileW 18872->18874 18876 4bc08fb 18874->18876 16293 107b00 16294 107ecc 16293->16294 16310 107b3e std::ios_base::_Ios_base_dtor __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 16293->16310 16295 107b87 setsockopt recv 16295->16310 16297 107eb7 Sleep 16297->16294 16297->16310 16299 107e15 recv 16300 107eaf Sleep 16299->16300 16300->16297 16302 107c2d recv 16303 107c4e recv 16302->16303 16302->16310 16303->16310 16305 107ee1 16402 78c70 16305->16402 16308 107cd6 setsockopt recv 16308->16310 16309 58dc0 2 API calls 16309->16308 16310->16294 16310->16295 16310->16297 16310->16299 16310->16300 16310->16305 16310->16308 16310->16309 16313 108590 WSAStartup 16310->16313 16319 58dc0 16310->16319 16328 563b0 16310->16328 16333 107ef0 16310->16333 16389 73069 16310->16389 16392 49280 16310->16392 16314 1085c8 16313->16314 16317 108686 16313->16317 16315 108654 socket 16314->16315 16314->16317 16316 10866a connect 16315->16316 16315->16317 16316->16317 16318 10867c closesocket 16316->16318 16317->16310 16318->16315 16318->16317 16321 58de2 std::locale::_Setgloballocale 16319->16321 16322 58e11 16319->16322 16320 58ef8 16321->16302 16322->16320 16405 432d0 16322->16405 16324 58e66 std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 16325 58ecb std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 16324->16325 16419 42fe0 16324->16419 16325->16302 16327 58eb8 16327->16302 16330 563d8 16328->16330 16329 563e7 16329->16310 16330->16329 16331 432d0 std::_Throw_Cpp_error 2 API calls 16330->16331 16332 5642a std::_Locinfo::_Locinfo_ctor 16331->16332 16332->16310 16334 107f6c 16333->16334 16335 107f3e 16333->16335 16336 107f74 16334->16336 16337 107f8e 16334->16337 16338 42cf0 std::_Throw_Cpp_error 2 API calls 16335->16338 16611 56290 16336->16611 16341 107fb0 16337->16341 16342 107f96 16337->16342 16339 107f50 16338->16339 16343 49280 3 API calls 16339->16343 16345 107fd5 16341->16345 16346 107fb8 16341->16346 16344 56290 2 API calls 16342->16344 16388 107f64 16343->16388 16344->16388 16347 107ffb 16345->16347 16348 107fdd 16345->16348 16350 56290 2 API calls 16346->16350 16346->16388 16351 1082c0 16347->16351 16352 10801b 16347->16352 16347->16388 16615 812b7 16348->16615 16350->16388 16354 1082c8 16351->16354 16355 10831b 16351->16355 16574 45400 16352->16574 16644 5b430 16354->16644 16357 108323 16355->16357 16358 108376 16355->16358 16359 5b430 3 API calls 16357->16359 16360 1083d1 16358->16360 16361 10837e 16358->16361 16359->16388 16362 1083d9 16360->16362 16363 10842c 16360->16363 16364 5b430 3 API calls 16361->16364 16365 5b430 3 API calls 16362->16365 16366 108484 16363->16366 16367 108434 16363->16367 16364->16388 16365->16388 16366->16388 16651 98b00 16366->16651 16369 5b430 3 API calls 16367->16369 16369->16388 16372 108040 16373 10810b 16372->16373 16372->16388 16584 42cf0 16372->16584 16588 5ace0 16372->16588 16591 42d30 16373->16591 16377 108140 16378 1081b2 16377->16378 16380 1081e5 16377->16380 16379 563b0 std::_Throw_Cpp_error 2 API calls 16378->16379 16381 1081ce 16379->16381 16608 79820 16380->16608 16621 10f280 16381->16621 16388->16310 18195 7361d 16389->18195 16393 563b0 std::_Throw_Cpp_error 2 API calls 16392->16393 16394 492d4 16393->16394 16395 58dc0 2 API calls 16394->16395 16396 49523 std::_Locinfo::_Locinfo_ctor 16394->16396 16395->16396 16397 496e2 std::ios_base::_Ios_base_dtor 16396->16397 16399 496b6 WSASend 16396->16399 16398 4975d std::ios_base::_Ios_base_dtor 16397->16398 16400 78c70 std::_Throw_Cpp_error RtlAllocateHeap 16397->16400 16398->16310 16399->16396 16399->16397 16401 4979c 16400->16401 16401->16310 16403 78bac ___std_exception_copy RtlAllocateHeap 16402->16403 16404 78c7f __Getctype 16403->16404 16406 432e2 16405->16406 16410 43306 16405->16410 16407 4331f 16406->16407 16408 432e9 16406->16408 16432 42b50 16407->16432 16424 73672 16408->16424 16409 43318 16409->16324 16410->16409 16413 73672 std::_Facet_Register 2 API calls 16410->16413 16415 43310 16413->16415 16414 432ef 16416 78c70 std::_Throw_Cpp_error RtlAllocateHeap 16414->16416 16417 432f8 16414->16417 16415->16324 16418 43329 16416->16418 16417->16324 16420 43007 16419->16420 16421 43017 std::ios_base::_Ios_base_dtor 16419->16421 16420->16421 16422 78c70 std::_Throw_Cpp_error RtlAllocateHeap 16420->16422 16421->16327 16423 43036 16422->16423 16427 73677 std::_Facet_Register 16424->16427 16426 73691 16426->16414 16427->16426 16429 42b50 Concurrency::cancel_current_task 16427->16429 16436 823ec 16427->16436 16428 7369d 16428->16428 16429->16428 16442 74b15 16429->16442 16433 42b5e Concurrency::cancel_current_task 16432->16433 16434 74b15 ___std_exception_copy 2 API calls 16433->16434 16435 42bac 16434->16435 16435->16414 16441 8b094 __Getctype std::_Facet_Register 16436->16441 16437 8b0d2 16450 816ff 16437->16450 16439 8b0bd RtlAllocateHeap 16440 8b0d0 16439->16440 16439->16441 16440->16427 16441->16437 16441->16439 16443 74b22 16442->16443 16449 42bac 16442->16449 16443->16443 16444 823ec ___std_exception_copy 2 API calls 16443->16444 16443->16449 16445 74b3f 16444->16445 16446 74b4f 16445->16446 16512 899a5 16445->16512 16521 81c96 16446->16521 16449->16414 16453 89f93 16450->16453 16454 89f9c __Getctype 16453->16454 16455 81704 16454->16455 16464 8a65a 16454->16464 16455->16440 16457 89fe8 __Getctype 16468 8b01a 16457->16468 16458 89fe0 __Getctype 16458->16457 16459 8a020 16458->16459 16472 89c70 16459->16472 16463 8b01a ___std_exception_copy RtlAllocateHeap 16463->16455 16467 8a667 __Getctype std::_Facet_Register 16464->16467 16465 8a692 RtlAllocateHeap 16466 8a6a5 ___std_exception_copy 16465->16466 16465->16467 16466->16458 16467->16465 16467->16466 16469 8b025 ___std_exception_copy 16468->16469 16471 8b04f 16468->16471 16470 816ff ___std_exception_copy RtlAllocateHeap 16469->16470 16469->16471 16470->16471 16471->16455 16473 89cde __Getctype 16472->16473 16476 89c16 16473->16476 16475 89d07 16475->16463 16477 89c22 std::_Lockit::_Lockit std::locale::_Setgloballocale 16476->16477 16480 89df7 16477->16480 16479 89c44 __Getctype 16479->16475 16481 89e06 __Getctype 16480->16481 16483 89e2d __Getctype 16480->16483 16481->16483 16484 92146 16481->16484 16483->16479 16486 921c6 16484->16486 16487 9215c 16484->16487 16485 922b7 __Getctype RtlAllocateHeap 16493 92222 16485->16493 16488 8b01a ___std_exception_copy RtlAllocateHeap 16486->16488 16511 92214 16486->16511 16487->16486 16492 8b01a ___std_exception_copy RtlAllocateHeap 16487->16492 16494 9218f 16487->16494 16489 921e8 16488->16489 16490 8b01a ___std_exception_copy RtlAllocateHeap 16489->16490 16495 921fb 16490->16495 16491 8b01a ___std_exception_copy RtlAllocateHeap 16496 921bb 16491->16496 16498 92184 16492->16498 16497 92282 16493->16497 16506 8b01a RtlAllocateHeap ___std_exception_copy 16493->16506 16499 8b01a ___std_exception_copy RtlAllocateHeap 16494->16499 16510 921b1 16494->16510 16500 8b01a ___std_exception_copy RtlAllocateHeap 16495->16500 16503 8b01a ___std_exception_copy RtlAllocateHeap 16496->16503 16504 8b01a ___std_exception_copy RtlAllocateHeap 16497->16504 16505 9144a __Getctype RtlAllocateHeap 16498->16505 16501 921a6 16499->16501 16502 92209 16500->16502 16507 918a9 __Getctype RtlAllocateHeap 16501->16507 16508 8b01a ___std_exception_copy RtlAllocateHeap 16502->16508 16503->16486 16509 92288 16504->16509 16505->16494 16506->16493 16507->16510 16508->16511 16509->16483 16510->16491 16511->16485 16513 899b3 16512->16513 16515 899c1 16512->16515 16513->16515 16519 899d9 16513->16519 16514 816ff ___std_exception_copy RtlAllocateHeap 16516 899c9 16514->16516 16515->16514 16524 78c60 16516->16524 16517 899d3 16517->16446 16519->16517 16520 816ff ___std_exception_copy RtlAllocateHeap 16519->16520 16520->16516 16522 8b01a ___std_exception_copy RtlAllocateHeap 16521->16522 16523 81cae 16522->16523 16523->16449 16527 78bac 16524->16527 16528 78bbe ___std_exception_copy 16527->16528 16533 78be3 16528->16533 16530 78bd6 16540 7899c 16530->16540 16534 78bf3 16533->16534 16536 78bfa ___std_exception_copy __Getctype 16533->16536 16546 78a01 16534->16546 16537 78c08 16536->16537 16538 78bac ___std_exception_copy RtlAllocateHeap 16536->16538 16537->16530 16539 78c6c 16538->16539 16539->16530 16541 789a8 16540->16541 16544 789bf 16541->16544 16561 78a47 16541->16561 16543 78a47 ___std_exception_copy RtlAllocateHeap 16545 789d2 16543->16545 16544->16543 16544->16545 16545->16517 16547 78a10 16546->16547 16550 8a044 16547->16550 16551 8a057 __Getctype 16550->16551 16552 78a32 16551->16552 16553 8a65a __Getctype RtlAllocateHeap 16551->16553 16552->16536 16554 8a087 __Getctype 16553->16554 16555 8a0c3 16554->16555 16556 8a08f __Getctype 16554->16556 16557 89c70 __Getctype RtlAllocateHeap 16555->16557 16558 8b01a ___std_exception_copy RtlAllocateHeap 16556->16558 16559 8a0ce 16557->16559 16558->16552 16560 8b01a ___std_exception_copy RtlAllocateHeap 16559->16560 16560->16552 16562 78a51 16561->16562 16563 78a5a 16561->16563 16564 78a01 ___std_exception_copy RtlAllocateHeap 16562->16564 16563->16544 16565 78a56 16564->16565 16565->16563 16568 841c6 16565->16568 16567 78a63 16569 841cb std::locale::_Setgloballocale 16568->16569 16570 8f665 std::locale::_Setgloballocale RtlAllocateHeap 16569->16570 16572 841d6 std::locale::_Setgloballocale 16569->16572 16570->16572 16571 836e2 std::locale::_Setgloballocale RtlAllocateHeap 16573 84209 __Getctype std::locale::_Setgloballocale 16571->16573 16572->16571 16573->16567 16656 72b99 16574->16656 16577 45410 16578 45419 16577->16578 16580 72534 std::_Throw_Cpp_error 3 API calls 16577->16580 16578->16372 16581 45430 16580->16581 16665 7953c 16581->16665 16585 42d13 16584->16585 16585->16585 16586 43040 std::_Throw_Cpp_error 2 API calls 16585->16586 16587 42d25 16586->16587 16587->16372 16589 5ad10 16588->16589 16589->16589 16982 5fbf0 16589->16982 16592 43040 std::_Throw_Cpp_error 2 API calls 16591->16592 16593 42d55 16592->16593 16594 1162c0 16593->16594 16595 116358 16594->16595 16606 116361 std::locale::_Setgloballocale 16594->16606 16991 5e4b0 16595->16991 16598 11654f 16601 116553 16598->16601 17093 56130 16598->17093 16602 116580 std::ios_base::_Ios_base_dtor 16601->16602 16603 78c70 std::_Throw_Cpp_error RtlAllocateHeap 16601->16603 16602->16377 16604 1165ce 16603->16604 16605 73069 __Xtime_get_ticks GetSystemTimePreciseAsFileTime 16604->16605 16607 1165d6 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 16605->16607 16606->16598 16606->16601 17014 134760 16606->17014 17025 64160 16606->17025 16607->16377 17180 7975e 16608->17180 16610 79832 16610->16388 16632 81628 16610->16632 16612 562b1 16611->16612 16613 5629d 16611->16613 16612->16388 16614 56130 2 API calls 16613->16614 16614->16612 16616 812ca ___std_exception_copy 16615->16616 17204 7d6a5 16616->17204 16618 812e4 16619 7899c ___std_exception_copy RtlAllocateHeap 16618->16619 16620 812f1 16619->16620 16620->16388 16622 10f2f6 std::locale::_Setgloballocale 16621->16622 17363 5ab20 16622->17363 16625 58f00 std::_Throw_Cpp_error 2 API calls 16626 10f47f 16625->16626 17368 43440 16626->17368 16628 10f58b std::ios_base::_Ios_base_dtor 16628->16388 16630 78c70 std::_Throw_Cpp_error RtlAllocateHeap 16631 10f5ce 16630->16631 16631->16388 16633 8163b ___std_exception_copy 16632->16633 17609 8140a 16633->17609 16635 81650 16636 7899c ___std_exception_copy RtlAllocateHeap 16635->16636 16637 8165d 16636->16637 16638 7d0a8 16637->16638 16639 7d0bb ___std_exception_copy 16638->16639 17710 7cf83 16639->17710 16641 7d0c7 16642 7899c ___std_exception_copy RtlAllocateHeap 16641->16642 16643 7d0d3 16642->16643 16643->16388 17780 57ef0 16644->17780 16646 5b48d 17797 62100 16646->17797 16650 5b503 16650->16388 18164 98bb0 16651->18164 16653 98b31 std::_Locinfo::_Locinfo_ctor 16654 43040 std::_Throw_Cpp_error 2 API calls 16653->16654 16655 98b7c 16654->16655 16655->16388 16671 72bc8 16656->16671 16658 45409 16658->16577 16659 72534 16658->16659 16660 7254a std::_Throw_Cpp_error 16659->16660 16678 724e7 16660->16678 16663 7255a __EH_prolog3 std::_Throw_Cpp_error Concurrency::cancel_current_task 16684 59cb0 16663->16684 16664 725c7 std::_Throw_Cpp_error 16664->16577 16666 7954f ___std_exception_copy 16665->16666 16966 793db 16666->16966 16668 7955e 16669 7899c ___std_exception_copy RtlAllocateHeap 16668->16669 16670 45450 16669->16670 16670->16372 16672 72be2 16671->16672 16673 72bf2 _ValidateLocalCookies 16672->16673 16675 7302b 16672->16675 16673->16658 16676 73069 __Xtime_get_ticks GetSystemTimePreciseAsFileTime 16675->16676 16677 73036 __aulldiv __aullrem 16676->16677 16677->16672 16679 724f3 __EH_prolog3_GS 16678->16679 16680 42cf0 std::_Throw_Cpp_error 2 API calls 16679->16680 16681 72507 16680->16681 16695 436e0 16681->16695 16683 7251c std::_Throw_Cpp_error 16683->16663 16722 44900 16684->16722 16686 59d26 16687 73672 std::_Facet_Register 2 API calls 16686->16687 16688 59d2d 16687->16688 16727 72729 16688->16727 16690 59d39 16735 5a060 16690->16735 16692 59d76 16693 59dc7 std::_Throw_Cpp_error 16692->16693 16694 44900 std::_Throw_Cpp_error 2 API calls 16692->16694 16693->16664 16694->16693 16696 563b0 std::_Throw_Cpp_error 2 API calls 16695->16696 16697 43731 16696->16697 16698 4375a 16697->16698 16709 58f00 16697->16709 16700 58f00 std::_Throw_Cpp_error 2 API calls 16698->16700 16701 4378a 16700->16701 16702 74b15 ___std_exception_copy 2 API calls 16701->16702 16704 4381e 16702->16704 16703 4385f std::ios_base::_Ios_base_dtor 16703->16683 16704->16703 16705 78c70 std::_Throw_Cpp_error RtlAllocateHeap 16704->16705 16706 438b0 16705->16706 16718 74b78 16706->16718 16708 438f5 std::ios_base::_Ios_base_dtor 16708->16683 16710 58f22 std::_Locinfo::_Locinfo_ctor 16709->16710 16711 58f4f 16709->16711 16710->16698 16712 432d0 std::_Throw_Cpp_error 2 API calls 16711->16712 16713 5902f std::ios_base::_Ios_base_dtor 16711->16713 16714 58fa4 std::_Locinfo::_Locinfo_ctor 16712->16714 16713->16698 16715 59002 std::_Locinfo::_Locinfo_ctor 16714->16715 16716 42fe0 std::_Throw_Cpp_error RtlAllocateHeap 16714->16716 16715->16698 16717 58fef 16716->16717 16717->16698 16719 74b85 16718->16719 16720 74b8c 16718->16720 16721 81c96 ___std_exception_copy RtlAllocateHeap 16719->16721 16720->16708 16721->16720 16723 44922 16722->16723 16724 4491a std::_Throw_Cpp_error Concurrency::cancel_current_task 16722->16724 16723->16686 16747 447f0 16724->16747 16726 44968 std::ios_base::_Ios_base_dtor Concurrency::cancel_current_task 16726->16686 16728 72735 __EH_prolog3 std::_Lockit::_Lockit 16727->16728 16734 72771 std::_Throw_Cpp_error std::_Lockit::~_Lockit 16728->16734 16765 7288c 16728->16765 16730 72753 16771 728af 16730->16771 16734->16690 16737 5a0a2 std::_Throw_Cpp_error std::_Lockit::~_Lockit std::_Lockit::_Lockit 16735->16737 16736 5a144 std::_Lockit::~_Lockit 16736->16692 16737->16736 16738 73672 std::_Facet_Register 2 API calls 16737->16738 16739 5a152 16738->16739 16836 44040 16739->16836 16745 5a1f1 16871 726f7 16745->16871 16748 44851 16747->16748 16748->16748 16759 43040 16748->16759 16750 44865 16751 436e0 std::_Throw_Cpp_error 2 API calls 16750->16751 16753 4487b 16751->16753 16752 448a5 std::ios_base::_Ios_base_dtor 16752->16726 16753->16752 16754 78c70 std::_Throw_Cpp_error RtlAllocateHeap 16753->16754 16755 448f7 std::_Throw_Cpp_error Concurrency::cancel_current_task 16754->16755 16756 44922 16755->16756 16757 447f0 std::_Throw_Cpp_error 2 API calls 16755->16757 16756->16726 16758 44968 std::ios_base::_Ios_base_dtor Concurrency::cancel_current_task 16757->16758 16758->16726 16761 43052 16759->16761 16762 430c8 16759->16762 16760 43057 std::_Locinfo::_Locinfo_ctor 16760->16750 16761->16760 16763 432d0 std::_Throw_Cpp_error 2 API calls 16761->16763 16762->16750 16764 430a3 std::_Locinfo::_Locinfo_ctor 16763->16764 16764->16750 16766 73672 std::_Facet_Register 2 API calls 16765->16766 16767 72897 16766->16767 16768 728ab 16767->16768 16781 72611 16767->16781 16768->16730 16772 7275b 16771->16772 16773 728bb 16771->16773 16775 55a60 16772->16775 16784 7333a 16773->16784 16776 55a86 16775->16776 16780 55ab3 std::_Locinfo::_Locinfo_ctor 16775->16780 16777 55a90 16776->16777 16778 81c96 ___std_exception_copy RtlAllocateHeap 16776->16778 16779 823ec ___std_exception_copy 2 API calls 16777->16779 16777->16780 16778->16777 16779->16780 16780->16734 16782 55a60 std::_Locinfo::_Locinfo_ctor 2 API calls 16781->16782 16783 7264b 16782->16783 16783->16730 16785 7334a std::locale::_Setgloballocale 16784->16785 16785->16772 16788 841d6 std::locale::_Setgloballocale 16785->16788 16790 8f665 16785->16790 16811 836e2 16788->16811 16789 84209 __Getctype std::locale::_Setgloballocale 16789->16772 16795 8f671 std::locale::_Setgloballocale 16790->16795 16791 89f93 ___std_exception_copy RtlAllocateHeap 16797 8f6a2 std::locale::_Setgloballocale 16791->16797 16792 8f6c1 16794 816ff ___std_exception_copy RtlAllocateHeap 16792->16794 16793 8f6ab 16793->16788 16796 8f6c6 16794->16796 16795->16791 16795->16792 16795->16797 16799 8f6d3 std::_Lockit::_Lockit std::locale::_Setgloballocale 16795->16799 16798 78c60 ___std_exception_copy RtlAllocateHeap 16796->16798 16797->16792 16797->16793 16797->16799 16798->16793 16800 8f843 std::_Lockit::~_Lockit 16799->16800 16801 8f746 16799->16801 16803 8f774 std::locale::_Setgloballocale 16799->16803 16802 836e2 std::locale::_Setgloballocale RtlAllocateHeap 16800->16802 16801->16803 16814 89e42 16801->16814 16805 8f856 16802->16805 16803->16793 16806 89e42 __Getctype RtlAllocateHeap 16803->16806 16809 8f7c9 16803->16809 16806->16809 16808 89e42 __Getctype RtlAllocateHeap 16808->16803 16809->16793 16810 89e42 __Getctype RtlAllocateHeap 16809->16810 16810->16793 16828 83552 16811->16828 16813 836f3 16813->16789 16815 89e4b __Getctype 16814->16815 16816 8a65a __Getctype RtlAllocateHeap 16815->16816 16818 89e62 16815->16818 16819 89e8f __Getctype 16816->16819 16817 89ef2 16817->16808 16818->16817 16820 841c6 __Getctype RtlAllocateHeap 16818->16820 16821 89e97 __Getctype 16819->16821 16822 89ecf 16819->16822 16823 89efc 16820->16823 16825 8b01a ___std_exception_copy RtlAllocateHeap 16821->16825 16824 89c70 __Getctype RtlAllocateHeap 16822->16824 16826 89eda 16824->16826 16825->16818 16827 8b01a ___std_exception_copy RtlAllocateHeap 16826->16827 16827->16818 16831 8357f std::locale::_Setgloballocale 16828->16831 16830 835c8 std::locale::_Setgloballocale 16830->16813 16832 833e3 16831->16832 16833 833ef std::_Lockit::_Lockit std::locale::_Setgloballocale 16832->16833 16834 8346a std::locale::_Setgloballocale RtlAllocateHeap 16833->16834 16835 83406 std::locale::_Setgloballocale 16834->16835 16835->16830 16837 44066 std::_Lockit::_Lockit 16836->16837 16838 440e6 16837->16838 16839 440c2 16837->16839 16883 71d4a 16838->16883 16874 72827 16839->16874 16843 440f0 16844 72cf4 16915 83cf8 16844->16915 16846 72cfd __Getctype 16847 72d17 16846->16847 16848 72d35 16846->16848 16920 8454e 16847->16920 16850 8454e __Getctype RtlAllocateHeap 16848->16850 16851 72d1e 16850->16851 16925 83d42 16851->16925 16854 5a1ca 16856 44100 16854->16856 16962 72872 16856->16962 16859 44140 16861 4415b 16859->16861 16862 81c96 ___std_exception_copy RtlAllocateHeap 16859->16862 16860 81c96 ___std_exception_copy RtlAllocateHeap 16860->16859 16863 44176 16861->16863 16864 81c96 ___std_exception_copy RtlAllocateHeap 16861->16864 16862->16861 16865 81c96 ___std_exception_copy RtlAllocateHeap 16863->16865 16869 44191 16863->16869 16864->16863 16865->16869 16866 81c96 ___std_exception_copy RtlAllocateHeap 16867 441ac 16866->16867 16868 441c7 std::_Lockit::~_Lockit 16867->16868 16870 81c96 ___std_exception_copy RtlAllocateHeap 16867->16870 16868->16745 16869->16866 16869->16867 16870->16868 16872 73672 std::_Facet_Register 2 API calls 16871->16872 16873 72702 16872->16873 16873->16736 16886 84516 16874->16886 16877 55a60 std::_Locinfo::_Locinfo_ctor 2 API calls 16878 7284b 16877->16878 16879 84516 std::_Locinfo::_Locinfo_ctor 2 API calls 16878->16879 16880 7285b 16878->16880 16879->16880 16881 55a60 std::_Locinfo::_Locinfo_ctor 2 API calls 16880->16881 16882 440c9 16881->16882 16882->16844 16912 43540 16883->16912 16885 71d5b Concurrency::cancel_current_task 16885->16843 16887 84523 std::_Locinfo::_Locinfo_ctor 16886->16887 16890 842c1 16887->16890 16889 72833 16889->16877 16891 842cd std::_Lockit::_Lockit std::locale::_Setgloballocale 16890->16891 16894 8431c 16891->16894 16893 842e8 std::_Locinfo::_Locinfo_ctor 16893->16889 16895 8447b std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 16894->16895 16896 84337 16895->16896 16897 89e42 __Getctype RtlAllocateHeap 16896->16897 16903 84370 __Getctype 16896->16903 16898 84344 16897->16898 16899 83379 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 16898->16899 16900 84369 16899->16900 16901 8b094 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 16900->16901 16900->16903 16902 84395 16901->16902 16902->16903 16904 83379 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 16902->16904 16903->16893 16905 843b1 16904->16905 16906 843b8 16905->16906 16907 843d3 16905->16907 16906->16903 16908 8b01a ___std_exception_copy RtlAllocateHeap 16906->16908 16909 8b01a ___std_exception_copy RtlAllocateHeap 16907->16909 16910 843fe 16907->16910 16908->16903 16909->16910 16910->16903 16911 8b01a ___std_exception_copy RtlAllocateHeap 16910->16911 16911->16903 16913 74b15 ___std_exception_copy 2 API calls 16912->16913 16914 43585 16913->16914 16914->16885 16916 89e42 __Getctype RtlAllocateHeap 16915->16916 16917 83d03 16916->16917 16936 8a12d 16917->16936 16921 89e42 __Getctype RtlAllocateHeap 16920->16921 16922 84559 16921->16922 16923 8a12d __Getctype RtlAllocateHeap 16922->16923 16924 84569 16923->16924 16924->16851 16926 89e42 __Getctype RtlAllocateHeap 16925->16926 16927 83d4d 16926->16927 16928 8a12d __Getctype RtlAllocateHeap 16927->16928 16929 72d46 16928->16929 16929->16854 16930 84572 16929->16930 16931 8457f 16930->16931 16935 845b3 __Getctype 16930->16935 16932 823ec ___std_exception_copy 2 API calls 16931->16932 16933 845a2 16932->16933 16933->16935 16953 8e2f4 16933->16953 16935->16854 16937 8a140 16936->16937 16939 83d13 16936->16939 16937->16939 16940 92392 16937->16940 16939->16846 16941 9239e std::locale::_Setgloballocale 16940->16941 16942 89e42 __Getctype RtlAllocateHeap 16941->16942 16944 923a7 std::_Lockit::_Lockit 16942->16944 16943 923ed 16943->16939 16944->16943 16949 92413 16944->16949 16946 923d6 __Getctype 16946->16943 16947 841c6 __Getctype RtlAllocateHeap 16946->16947 16948 92412 16947->16948 16950 9242e 16949->16950 16951 92421 __Getctype 16949->16951 16950->16946 16951->16950 16952 92146 __Getctype RtlAllocateHeap 16951->16952 16952->16950 16954 8e302 16953->16954 16955 8e310 16953->16955 16954->16955 16957 8e32a 16954->16957 16956 816ff ___std_exception_copy RtlAllocateHeap 16955->16956 16961 8e31a 16956->16961 16958 8e324 16957->16958 16960 816ff ___std_exception_copy RtlAllocateHeap 16957->16960 16958->16935 16959 78c60 ___std_exception_copy RtlAllocateHeap 16959->16958 16960->16961 16961->16959 16963 7287e 16962->16963 16965 4412c 16962->16965 16964 84516 std::_Locinfo::_Locinfo_ctor 2 API calls 16963->16964 16964->16965 16965->16859 16965->16860 16967 793e7 std::locale::_Setgloballocale 16966->16967 16968 793f0 16967->16968 16970 79414 16967->16970 16969 78be3 ___std_exception_copy RtlAllocateHeap 16968->16969 16974 79409 16969->16974 16972 79432 16970->16972 16975 8a1e9 16970->16975 16973 78be3 ___std_exception_copy RtlAllocateHeap 16972->16973 16972->16974 16973->16974 16974->16668 16976 8a20a 16975->16976 16977 8a1f5 16975->16977 16976->16972 16978 816ff ___std_exception_copy RtlAllocateHeap 16977->16978 16979 8a1fa 16978->16979 16980 78c60 ___std_exception_copy RtlAllocateHeap 16979->16980 16981 8a205 16980->16981 16981->16972 16984 5fc8d 16982->16984 16986 5fc12 std::_Locinfo::_Locinfo_ctor 16982->16986 16983 5fd5e 16984->16983 16985 432d0 std::_Throw_Cpp_error 2 API calls 16984->16985 16987 5fce1 std::_Locinfo::_Locinfo_ctor 16985->16987 16988 5fd3a std::_Locinfo::_Locinfo_ctor 16987->16988 16989 42fe0 std::_Throw_Cpp_error RtlAllocateHeap 16987->16989 16990 5fd27 16989->16990 16992 5e4c2 16991->16992 16993 5e528 16991->16993 16995 5e4f9 16992->16995 16996 5e4ca 16992->16996 17104 43330 16993->17104 16999 5e516 16995->16999 17000 73672 std::_Facet_Register 2 API calls 16995->17000 16997 5e52d 16996->16997 16998 5e4d1 16996->16998 17001 42b50 Concurrency::cancel_current_task 2 API calls 16997->17001 17002 73672 std::_Facet_Register 2 API calls 16998->17002 16999->16606 17003 5e503 17000->17003 17004 5e4d7 17001->17004 17002->17004 17003->16606 17005 78c70 std::_Throw_Cpp_error RtlAllocateHeap 17004->17005 17006 5e4e0 17004->17006 17007 5e537 17005->17007 17006->16606 17107 56ad0 17007->17107 17009 44900 std::_Throw_Cpp_error 2 API calls 17012 5e5fb 17009->17012 17010 5e574 17010->17009 17011 5e613 17011->16606 17012->17011 17111 59b60 17012->17111 17015 134767 17014->17015 17016 13476c 17014->17016 17015->16606 17017 823ec ___std_exception_copy 2 API calls 17016->17017 17023 1347af 17016->17023 17017->17023 17018 1347c2 17018->16606 17019 134877 17019->16606 17020 81c96 ___std_exception_copy RtlAllocateHeap 17021 134867 17020->17021 17021->16606 17022 134821 17022->17019 17022->17020 17023->17018 17023->17022 17024 81c96 ___std_exception_copy RtlAllocateHeap 17023->17024 17024->17022 17026 64195 17025->17026 17027 64288 17025->17027 17028 641b1 17026->17028 17030 64202 17026->17030 17031 641f2 17026->17031 17029 43330 2 API calls 17027->17029 17033 73672 std::_Facet_Register 2 API calls 17028->17033 17032 6428d 17029->17032 17037 73672 std::_Facet_Register 2 API calls 17030->17037 17042 641cf std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 17030->17042 17031->17028 17031->17032 17034 42b50 Concurrency::cancel_current_task 2 API calls 17032->17034 17035 641c4 17033->17035 17036 64292 17034->17036 17035->17036 17035->17042 17038 78c70 std::_Throw_Cpp_error RtlAllocateHeap 17036->17038 17037->17042 17039 64297 17038->17039 17040 642fa 17039->17040 17041 643e9 17039->17041 17151 66ff0 17040->17151 17043 43330 2 API calls 17041->17043 17146 677d0 17042->17146 17044 643ee 17043->17044 17046 6445a 17044->17046 17047 64549 17044->17047 17051 66ff0 2 API calls 17046->17051 17049 43330 2 API calls 17047->17049 17057 6454e 17049->17057 17050 6425e 17050->16606 17053 64496 17051->17053 17052 6470b 17055 43330 2 API calls 17052->17055 17056 563b0 std::_Throw_Cpp_error 2 API calls 17053->17056 17054 64706 17058 42b50 Concurrency::cancel_current_task 2 API calls 17054->17058 17059 646af 17055->17059 17072 644c4 17056->17072 17057->17052 17057->17054 17061 64615 17057->17061 17062 645ee 17057->17062 17058->17052 17060 78c70 std::_Throw_Cpp_error RtlAllocateHeap 17059->17060 17082 646d1 std::ios_base::_Ios_base_dtor 17059->17082 17063 64715 17060->17063 17068 73672 std::_Facet_Register 2 API calls 17061->17068 17075 645ff 17061->17075 17062->17054 17064 645f9 17062->17064 17171 5d010 17063->17171 17069 73672 std::_Facet_Register 2 API calls 17064->17069 17065 64336 17159 67830 17065->17159 17068->17075 17069->17075 17070 643b0 17070->16606 17074 67830 RtlAllocateHeap 17072->17074 17076 64510 17074->17076 17075->17059 17075->17082 17164 71f9c 17075->17164 17076->16606 17077 6472f Concurrency::cancel_current_task 17078 64798 17077->17078 17080 6477f 17077->17080 17081 6475b 17077->17081 17079 42b50 Concurrency::cancel_current_task 2 API calls 17078->17079 17083 64768 17079->17083 17085 64791 17080->17085 17086 73672 std::_Facet_Register 2 API calls 17080->17086 17081->17078 17084 64762 17081->17084 17082->16606 17088 78c70 std::_Throw_Cpp_error RtlAllocateHeap 17083->17088 17092 64771 17083->17092 17089 73672 std::_Facet_Register 2 API calls 17084->17089 17085->16606 17090 64789 17086->17090 17091 647a2 17088->17091 17089->17083 17090->16606 17092->16606 17094 56174 17093->17094 17096 56143 std::_Locinfo::_Locinfo_ctor 17093->17096 17095 56200 17094->17095 17097 56180 17094->17097 17099 58f00 std::_Throw_Cpp_error 2 API calls 17095->17099 17096->16601 17098 432d0 std::_Throw_Cpp_error 2 API calls 17097->17098 17101 561bf std::_Locinfo::_Locinfo_ctor 17098->17101 17100 56232 17099->17100 17100->16601 17102 561ed 17101->17102 17103 42fe0 std::_Throw_Cpp_error RtlAllocateHeap 17101->17103 17102->16601 17103->17102 17115 71cea 17104->17115 17109 56b02 17107->17109 17108 56b1d 17108->17010 17109->17108 17135 550e0 17109->17135 17112 59bbb 17111->17112 17113 59b96 17111->17113 17112->17011 17113->17112 17143 588a0 17113->17143 17122 71a9f 17115->17122 17117 71cfb Concurrency::cancel_current_task 17125 71af4 17117->17125 17119 71d1b Concurrency::cancel_current_task 17128 71b37 17119->17128 17121 71d3b Concurrency::cancel_current_task 17132 434e0 17122->17132 17126 434e0 std::invalid_argument::invalid_argument 2 API calls 17125->17126 17127 71b06 17126->17127 17127->17119 17129 71b4b std::regex_error::regex_error 17128->17129 17130 434e0 std::invalid_argument::invalid_argument 2 API calls 17129->17130 17131 71b54 17130->17131 17131->17121 17133 74b15 ___std_exception_copy 2 API calls 17132->17133 17134 43522 17133->17134 17134->17117 17136 55117 17135->17136 17142 551b5 17135->17142 17137 56ad0 2 API calls 17136->17137 17138 55120 17137->17138 17139 5519d 17138->17139 17140 44900 std::_Throw_Cpp_error 2 API calls 17138->17140 17141 59b60 2 API calls 17139->17141 17139->17142 17140->17139 17141->17142 17142->17108 17144 44900 std::_Throw_Cpp_error 2 API calls 17143->17144 17145 588bf 17144->17145 17145->17112 17147 677dc 17146->17147 17148 677f9 std::ios_base::_Ios_base_dtor 17146->17148 17147->17148 17149 78c70 std::_Throw_Cpp_error RtlAllocateHeap 17147->17149 17148->17050 17150 67824 17149->17150 17152 6703c 17151->17152 17153 66ff9 17151->17153 17152->17152 17153->17152 17154 67013 17153->17154 17155 73672 std::_Facet_Register 2 API calls 17153->17155 17156 73672 std::_Facet_Register 2 API calls 17154->17156 17158 6701c 17154->17158 17155->17154 17157 67035 17156->17157 17157->17065 17158->17065 17160 67882 std::ios_base::_Ios_base_dtor 17159->17160 17161 6783d 17159->17161 17160->17070 17161->17160 17162 78c70 std::_Throw_Cpp_error RtlAllocateHeap 17161->17162 17163 678b6 17162->17163 17165 71fa5 17164->17165 17166 71fb2 17164->17166 17165->17166 17167 841c6 __Getctype RtlAllocateHeap 17165->17167 17166->17075 17168 71fbb 17167->17168 17169 71f9c RtlAllocateHeap 17168->17169 17170 71fca 17169->17170 17170->17075 17172 5d02e 17171->17172 17174 5d01a 17171->17174 17175 59910 17172->17175 17173 71f9c RtlAllocateHeap 17173->17174 17174->17172 17174->17173 17176 59928 17175->17176 17177 59938 std::ios_base::_Ios_base_dtor 17175->17177 17176->17177 17178 78c70 std::_Throw_Cpp_error RtlAllocateHeap 17176->17178 17177->17077 17179 5994d 17178->17179 17183 7976a std::locale::_Setgloballocale 17180->17183 17181 79771 17182 816ff ___std_exception_copy RtlAllocateHeap 17181->17182 17184 79776 17182->17184 17183->17181 17185 79791 17183->17185 17188 78c60 ___std_exception_copy RtlAllocateHeap 17184->17188 17186 79796 17185->17186 17187 797a3 17185->17187 17189 816ff ___std_exception_copy RtlAllocateHeap 17186->17189 17194 8a8ef 17187->17194 17193 79781 17188->17193 17189->17193 17191 797ac 17192 816ff ___std_exception_copy RtlAllocateHeap 17191->17192 17191->17193 17192->17193 17193->16610 17195 8a8fb std::_Lockit::_Lockit std::locale::_Setgloballocale 17194->17195 17198 8a993 17195->17198 17197 8a916 17197->17191 17199 8a9b6 17198->17199 17200 8a65a __Getctype RtlAllocateHeap 17199->17200 17203 8a9fc std::locale::_Setgloballocale 17199->17203 17201 8aa17 17200->17201 17202 8b01a ___std_exception_copy RtlAllocateHeap 17201->17202 17202->17203 17203->17197 17218 7ce79 17204->17218 17206 7d6ff 17212 7d723 17206->17212 17225 7e1d0 17206->17225 17207 7d6b7 17207->17206 17208 7d6cc 17207->17208 17217 7d6e7 std::_Locinfo::_Locinfo_ctor 17207->17217 17209 78be3 ___std_exception_copy RtlAllocateHeap 17208->17209 17209->17217 17214 7d747 17212->17214 17232 7ce94 17212->17232 17213 7d7cf 17215 7ce22 RtlAllocateHeap 17213->17215 17214->17213 17239 7ce22 17214->17239 17215->17217 17217->16618 17219 7ce91 17218->17219 17220 7ce7e 17218->17220 17219->17207 17221 816ff ___std_exception_copy RtlAllocateHeap 17220->17221 17222 7ce83 17221->17222 17223 78c60 ___std_exception_copy RtlAllocateHeap 17222->17223 17224 7ce8e 17223->17224 17224->17207 17226 78a47 ___std_exception_copy RtlAllocateHeap 17225->17226 17227 7e1e0 17226->17227 17245 8a15a 17227->17245 17233 7ceb6 17232->17233 17234 7cea0 17232->17234 17235 7cec6 17233->17235 17347 89a39 17233->17347 17236 8454e __Getctype RtlAllocateHeap 17234->17236 17235->17212 17237 7ceab std::_Locinfo::_Locinfo_ctor 17236->17237 17237->17212 17240 7ce47 17239->17240 17241 7ce33 17239->17241 17240->17213 17241->17240 17242 816ff ___std_exception_copy RtlAllocateHeap 17241->17242 17243 7ce3c 17242->17243 17244 78c60 ___std_exception_copy RtlAllocateHeap 17243->17244 17244->17240 17246 7e1fd 17245->17246 17247 8a171 17245->17247 17249 8a1b8 17246->17249 17247->17246 17248 92392 __Getctype RtlAllocateHeap 17247->17248 17248->17246 17250 8a1cf 17249->17250 17251 7e20a 17249->17251 17250->17251 17253 906bd 17250->17253 17251->17212 17254 89e42 __Getctype RtlAllocateHeap 17253->17254 17255 906c2 17254->17255 17258 905d5 17255->17258 17257 906cd 17257->17251 17262 905e1 std::_Lockit::_Lockit std::locale::_Setgloballocale 17258->17262 17259 90602 17259->17257 17260 905fb std::_Locinfo::_Locinfo_ctor 17260->17259 17261 841c6 __Getctype RtlAllocateHeap 17260->17261 17263 90674 17261->17263 17262->17260 17265 8b01a ___std_exception_copy RtlAllocateHeap 17262->17265 17268 906b0 17263->17268 17269 89efd 17263->17269 17265->17260 17268->17257 17270 89f08 __Getctype 17269->17270 17271 8a65a __Getctype RtlAllocateHeap 17270->17271 17280 89f14 17270->17280 17274 89f38 __Getctype 17271->17274 17272 841c6 __Getctype RtlAllocateHeap 17273 89f92 17272->17273 17275 89f74 17274->17275 17276 89f40 __Getctype 17274->17276 17277 89c70 __Getctype RtlAllocateHeap 17275->17277 17278 8b01a ___std_exception_copy RtlAllocateHeap 17276->17278 17279 89f7f 17277->17279 17278->17280 17281 8b01a ___std_exception_copy RtlAllocateHeap 17279->17281 17280->17272 17282 89f19 17280->17282 17281->17282 17283 90480 17282->17283 17284 905d5 std::_Locinfo::_Locinfo_ctor 2 API calls 17283->17284 17285 904aa 17284->17285 17306 90207 17285->17306 17290 904ea 17315 906d0 17290->17315 17291 904dc 17292 8b01a ___std_exception_copy RtlAllocateHeap 17291->17292 17294 904c3 17292->17294 17294->17268 17295 90517 17296 90522 17295->17296 17301 9053d std::_Locinfo::_Locinfo_ctor 17295->17301 17297 816ff ___std_exception_copy RtlAllocateHeap 17296->17297 17298 90527 17297->17298 17300 8b01a ___std_exception_copy RtlAllocateHeap 17298->17300 17299 90569 17302 905b2 17299->17302 17320 900f9 17299->17320 17300->17294 17301->17299 17304 8b01a ___std_exception_copy RtlAllocateHeap 17301->17304 17303 8b01a ___std_exception_copy RtlAllocateHeap 17302->17303 17303->17294 17304->17299 17324 795ae 17306->17324 17309 8b094 17310 8b0d2 17309->17310 17311 8b0a2 __Getctype std::_Facet_Register 17309->17311 17312 816ff ___std_exception_copy RtlAllocateHeap 17310->17312 17311->17310 17313 8b0bd RtlAllocateHeap 17311->17313 17314 8b0d0 17312->17314 17313->17311 17313->17314 17314->17290 17314->17291 17316 90207 std::_Locinfo::_Locinfo_ctor 2 API calls 17315->17316 17319 906f0 std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 17316->17319 17317 907f5 std::_Locinfo::_Locinfo_ctor _ValidateLocalCookies 17317->17295 17319->17317 17332 902db 17319->17332 17321 90105 std::_Lockit::_Lockit std::locale::_Setgloballocale 17320->17321 17340 90146 17321->17340 17323 9011c std::_Locinfo::_Locinfo_ctor 17323->17302 17325 795cc 17324->17325 17331 795c5 17324->17331 17326 89e42 __Getctype RtlAllocateHeap 17325->17326 17325->17331 17327 795ed 17326->17327 17328 8a12d __Getctype RtlAllocateHeap 17327->17328 17329 79603 17328->17329 17330 8a18b std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 17329->17330 17330->17331 17331->17294 17331->17309 17333 90303 17332->17333 17339 903cc _ValidateLocalCookies 17332->17339 17334 8f44d std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 17333->17334 17333->17339 17335 90383 17334->17335 17336 8a8a6 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 17335->17336 17337 903a4 17336->17337 17338 8a8a6 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 17337->17338 17338->17339 17339->17317 17341 7ceeb std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 17340->17341 17342 90168 17341->17342 17343 7ceeb std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 17342->17343 17344 90187 17343->17344 17345 901ae 17344->17345 17346 8b01a ___std_exception_copy RtlAllocateHeap 17344->17346 17345->17323 17346->17345 17348 795ae std::_Locinfo::_Locinfo_ctor 2 API calls 17347->17348 17349 89a56 17348->17349 17351 89a66 _ValidateLocalCookies 17349->17351 17352 8f44d 17349->17352 17351->17235 17353 795ae std::_Locinfo::_Locinfo_ctor 2 API calls 17352->17353 17354 8f46d std::_Locinfo::_Locinfo_ctor 17353->17354 17355 8f529 _ValidateLocalCookies 17354->17355 17357 8b094 std::_Locinfo::_Locinfo_ctor 2 API calls 17354->17357 17358 8f4bf std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 17354->17358 17355->17351 17357->17358 17359 73275 17358->17359 17360 73290 17359->17360 17361 7327f 17359->17361 17360->17355 17361->17360 17362 81c96 ___std_exception_copy RtlAllocateHeap 17361->17362 17362->17360 17365 5ab55 17363->17365 17364 5aba3 17365->17364 17372 5e8a0 17365->17372 17367 5ab83 17367->16625 17369 43459 17368->17369 17376 80dd7 17369->17376 17373 5e8ce 17372->17373 17375 5e8f8 std::_Locinfo::_Locinfo_ctor 17372->17375 17374 432d0 std::_Throw_Cpp_error 2 API calls 17373->17374 17374->17375 17375->17367 17377 80deb ___std_exception_copy 17376->17377 17382 7e565 17377->17382 17379 80e06 17380 7899c ___std_exception_copy RtlAllocateHeap 17379->17380 17381 43467 17380->17381 17381->16628 17381->16630 17383 7e5b4 17382->17383 17384 7e591 17382->17384 17383->17384 17386 7e5bc 17383->17386 17385 78be3 ___std_exception_copy RtlAllocateHeap 17384->17385 17387 7e5a9 _ValidateLocalCookies 17385->17387 17391 7faa7 17386->17391 17387->17379 17409 80b0d 17391->17409 17394 7facc 17395 78be3 ___std_exception_copy RtlAllocateHeap 17394->17395 17396 7e63d 17395->17396 17406 7f28d 17396->17406 17399 7e1d0 std::_Locinfo::_Locinfo_ctor 2 API calls 17401 7faf4 std::_Locinfo::_Locinfo_ctor 17399->17401 17401->17396 17401->17399 17402 7fbd0 17401->17402 17413 7f49b 17401->17413 17416 7fed4 17401->17416 17448 8036f 17401->17448 17403 78be3 ___std_exception_copy RtlAllocateHeap 17402->17403 17404 7fbea 17403->17404 17405 78be3 ___std_exception_copy RtlAllocateHeap 17404->17405 17405->17396 17407 8b01a ___std_exception_copy RtlAllocateHeap 17406->17407 17408 7f29d 17407->17408 17408->17387 17410 7fac1 17409->17410 17411 80b18 17409->17411 17410->17394 17410->17396 17410->17401 17412 78be3 ___std_exception_copy RtlAllocateHeap 17411->17412 17412->17410 17475 7e842 17413->17475 17415 7f4d6 17415->17401 17417 7fef2 17416->17417 17418 7fedb 17416->17418 17421 78be3 ___std_exception_copy RtlAllocateHeap 17417->17421 17427 7ff31 17417->17427 17419 803f4 17418->17419 17420 80394 17418->17420 17418->17427 17425 803f9 17419->17425 17426 8042d 17419->17426 17422 8041a 17420->17422 17423 8039a 17420->17423 17424 7ff26 17421->17424 17510 7ebfc 17422->17510 17437 8039f 17423->17437 17438 803eb 17423->17438 17424->17401 17428 803fb 17425->17428 17429 80426 17425->17429 17430 8044a 17426->17430 17431 80432 17426->17431 17427->17401 17433 803ae 17428->17433 17440 8040a 17428->17440 17517 80a30 17429->17517 17521 80a4d 17430->17521 17431->17422 17431->17438 17447 803c5 17431->17447 17446 80453 _ValidateLocalCookies 17433->17446 17485 80785 17433->17485 17437->17433 17441 803d8 17437->17441 17437->17447 17438->17446 17499 7ed89 17438->17499 17440->17422 17443 8040e 17440->17443 17441->17446 17495 80916 17441->17495 17443->17446 17506 809ab 17443->17506 17446->17401 17447->17446 17524 8c5ba 17447->17524 17449 803f4 17448->17449 17450 80394 17448->17450 17453 803f9 17449->17453 17454 8042d 17449->17454 17451 8041a 17450->17451 17452 8039a 17450->17452 17460 7ebfc 2 API calls 17451->17460 17464 8039f 17452->17464 17465 803eb 17452->17465 17455 803fb 17453->17455 17456 80426 17453->17456 17457 8044a 17454->17457 17458 80432 17454->17458 17462 803ae 17455->17462 17468 8040a 17455->17468 17461 80a30 2 API calls 17456->17461 17459 80a4d 2 API calls 17457->17459 17458->17451 17458->17465 17471 803c5 17458->17471 17459->17471 17460->17471 17461->17471 17463 80785 2 API calls 17462->17463 17474 80453 _ValidateLocalCookies 17462->17474 17463->17471 17464->17462 17466 803d8 17464->17466 17464->17471 17467 7ed89 2 API calls 17465->17467 17465->17474 17469 80916 2 API calls 17466->17469 17466->17474 17467->17471 17468->17451 17470 8040e 17468->17470 17469->17471 17472 809ab RtlAllocateHeap 17470->17472 17470->17474 17473 8c5ba 2 API calls 17471->17473 17471->17474 17472->17471 17473->17471 17474->17401 17476 7ce79 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 17475->17476 17477 7e854 17476->17477 17478 7e869 17477->17478 17481 7e89c 17477->17481 17484 7e884 std::_Locinfo::_Locinfo_ctor 17477->17484 17479 78be3 ___std_exception_copy RtlAllocateHeap 17478->17479 17479->17484 17480 7e933 17482 7ce22 RtlAllocateHeap 17480->17482 17481->17480 17483 7ce22 RtlAllocateHeap 17481->17483 17482->17484 17483->17480 17484->17415 17486 8079f 17485->17486 17530 7e790 17486->17530 17488 807de 17541 8c439 17488->17541 17491 7e1d0 std::_Locinfo::_Locinfo_ctor 2 API calls 17492 80895 17491->17492 17493 7e1d0 std::_Locinfo::_Locinfo_ctor 2 API calls 17492->17493 17494 808c8 17492->17494 17493->17494 17494->17447 17494->17494 17497 80931 17495->17497 17496 80967 17496->17447 17497->17496 17498 8c5ba 2 API calls 17497->17498 17498->17496 17500 7ed9e 17499->17500 17501 7ede7 17500->17501 17502 7edc0 17500->17502 17504 7e790 2 API calls 17501->17504 17505 7eddd 17501->17505 17503 78be3 ___std_exception_copy RtlAllocateHeap 17502->17503 17503->17505 17504->17505 17505->17447 17508 809c1 17506->17508 17507 78be3 ___std_exception_copy RtlAllocateHeap 17509 809e2 17507->17509 17508->17507 17508->17509 17509->17447 17511 7ec11 17510->17511 17512 7ec33 17511->17512 17514 7ec5a 17511->17514 17513 78be3 ___std_exception_copy RtlAllocateHeap 17512->17513 17516 7ec50 17513->17516 17515 7e790 2 API calls 17514->17515 17514->17516 17515->17516 17516->17447 17518 80a3c 17517->17518 17602 7ea6f 17518->17602 17520 80a4c 17520->17447 17522 7ed89 2 API calls 17521->17522 17523 80a62 17522->17523 17523->17447 17525 8c5cf 17524->17525 17526 7e1d0 std::_Locinfo::_Locinfo_ctor 2 API calls 17525->17526 17528 8c5d3 std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 17525->17528 17529 8c5fc std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 17525->17529 17526->17529 17527 78be3 ___std_exception_copy RtlAllocateHeap 17527->17528 17528->17447 17529->17527 17529->17528 17531 7e7b7 17530->17531 17532 7e7a5 17530->17532 17531->17532 17533 8b094 std::_Locinfo::_Locinfo_ctor 2 API calls 17531->17533 17532->17488 17534 7e7db 17533->17534 17535 7e7e3 17534->17535 17536 7e7ee 17534->17536 17537 8b01a ___std_exception_copy RtlAllocateHeap 17535->17537 17560 7f2a7 17536->17560 17537->17532 17540 8b01a ___std_exception_copy RtlAllocateHeap 17540->17532 17542 8c46e 17541->17542 17545 8c44a 17541->17545 17544 8c4a1 17542->17544 17542->17545 17543 78be3 ___std_exception_copy RtlAllocateHeap 17555 80871 17543->17555 17546 8c4da 17544->17546 17547 8c509 17544->17547 17545->17543 17563 8c2dd 17546->17563 17548 8c532 17547->17548 17549 8c537 17547->17549 17552 8c599 17548->17552 17553 8c55f 17548->17553 17568 8bb66 17549->17568 17595 8be93 17552->17595 17556 8c57f 17553->17556 17557 8c564 17553->17557 17555->17491 17555->17492 17588 8c08a 17556->17588 17578 8c20e 17557->17578 17561 8b01a ___std_exception_copy RtlAllocateHeap 17560->17561 17562 7e7f9 17561->17562 17562->17540 17564 8c2f3 17563->17564 17565 8c2fe 17563->17565 17564->17555 17566 899a5 ___std_exception_copy RtlAllocateHeap 17565->17566 17567 8c359 __Getctype 17566->17567 17567->17555 17569 8bb79 17568->17569 17570 8bb88 17569->17570 17571 8bbaa 17569->17571 17572 78be3 ___std_exception_copy RtlAllocateHeap 17570->17572 17573 8bbbf 17571->17573 17575 8bc12 17571->17575 17577 8bba0 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z std::locale::_Setgloballocale __allrem _strrchr 17572->17577 17574 8be93 RtlAllocateHeap RtlAllocateHeap 17573->17574 17574->17577 17576 7e1d0 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 17575->17576 17575->17577 17576->17577 17577->17555 17579 947bf RtlAllocateHeap 17578->17579 17580 8c23e 17579->17580 17581 946c5 RtlAllocateHeap 17580->17581 17582 8c27c 17581->17582 17583 8c2bc 17582->17583 17584 8c295 17582->17584 17587 8c283 17582->17587 17585 8bf37 RtlAllocateHeap RtlAllocateHeap 17583->17585 17586 8c120 RtlAllocateHeap RtlAllocateHeap 17584->17586 17585->17587 17586->17587 17587->17555 17589 947bf RtlAllocateHeap 17588->17589 17590 8c0b9 17589->17590 17591 946c5 RtlAllocateHeap 17590->17591 17592 8c0fa 17591->17592 17593 8c101 17592->17593 17594 8c120 RtlAllocateHeap RtlAllocateHeap 17592->17594 17593->17555 17594->17593 17596 947bf RtlAllocateHeap 17595->17596 17597 8bebd 17596->17597 17598 946c5 RtlAllocateHeap 17597->17598 17599 8bf0b 17598->17599 17600 8bf12 17599->17600 17601 8bf37 RtlAllocateHeap RtlAllocateHeap 17599->17601 17600->17555 17601->17600 17603 7ea84 17602->17603 17604 7eaa6 17603->17604 17606 7eacd 17603->17606 17605 78be3 ___std_exception_copy RtlAllocateHeap 17604->17605 17608 7eac3 17605->17608 17607 7e790 2 API calls 17606->17607 17606->17608 17607->17608 17608->17520 17610 81418 17609->17610 17611 81440 17609->17611 17610->17611 17612 81425 17610->17612 17613 81447 17610->17613 17611->16635 17614 78be3 ___std_exception_copy RtlAllocateHeap 17612->17614 17617 81363 17613->17617 17614->17611 17616 8147f 17616->16635 17618 8136f std::locale::_Setgloballocale 17617->17618 17621 813be 17618->17621 17620 8138a 17620->17616 17628 8c8aa 17621->17628 17648 8c86c 17628->17648 17630 8c8bb 17631 813d6 17630->17631 17632 8b094 std::_Locinfo::_Locinfo_ctor 2 API calls 17630->17632 17635 81481 17631->17635 17633 8c914 17632->17633 17634 8b01a ___std_exception_copy RtlAllocateHeap 17633->17634 17634->17631 17638 81493 17635->17638 17639 813f4 17635->17639 17636 814a1 17637 78be3 ___std_exception_copy RtlAllocateHeap 17636->17637 17637->17639 17638->17636 17638->17639 17642 814d7 std::_Locinfo::_Locinfo_ctor 17638->17642 17644 8c955 17639->17644 17641 8a1e9 RtlAllocateHeap 17641->17642 17642->17639 17642->17641 17664 79a91 17642->17664 17670 89678 17642->17670 17645 8c960 17644->17645 17647 81400 17644->17647 17646 79a91 4 API calls 17645->17646 17645->17647 17646->17647 17647->17620 17650 8c878 17648->17650 17649 8c8a2 17649->17630 17650->17649 17651 8a1e9 RtlAllocateHeap 17650->17651 17652 8c893 17651->17652 17655 93be3 17652->17655 17654 8c899 17654->17630 17656 93bfd 17655->17656 17657 93bf0 17655->17657 17660 93c09 17656->17660 17661 816ff ___std_exception_copy RtlAllocateHeap 17656->17661 17658 816ff ___std_exception_copy RtlAllocateHeap 17657->17658 17659 93bf5 17658->17659 17659->17654 17660->17654 17662 93c2a 17661->17662 17663 78c60 ___std_exception_copy RtlAllocateHeap 17662->17663 17663->17659 17665 79aaa 17664->17665 17669 79ad1 17664->17669 17666 8a1e9 RtlAllocateHeap 17665->17666 17665->17669 17667 79ac6 17666->17667 17668 89678 4 API calls 17667->17668 17668->17669 17669->17642 17671 89684 std::locale::_Setgloballocale 17670->17671 17672 896c5 17671->17672 17674 8970b 17671->17674 17676 8968c 17671->17676 17673 78be3 ___std_exception_copy RtlAllocateHeap 17672->17673 17673->17676 17674->17676 17677 89789 17674->17677 17676->17642 17678 897b1 17677->17678 17690 897d4 17677->17690 17679 897b5 17678->17679 17681 89810 17678->17681 17680 78be3 ___std_exception_copy RtlAllocateHeap 17679->17680 17680->17690 17682 8982e 17681->17682 17696 8263d 17681->17696 17691 892ce 17682->17691 17686 8988d 17688 898f6 WriteFile 17686->17688 17686->17690 17687 89846 17687->17690 17699 88e9f 17687->17699 17688->17690 17690->17676 17692 93be3 RtlAllocateHeap 17691->17692 17693 892e0 17692->17693 17694 8930e 17693->17694 17695 7e1d0 std::_Locinfo::_Locinfo_ctor 2 API calls 17693->17695 17694->17686 17694->17687 17695->17694 17705 8251c 17696->17705 17698 82656 17698->17682 17700 88f07 17699->17700 17701 7e1d0 std::_Locinfo::_Locinfo_ctor 2 API calls 17700->17701 17702 88f18 std::_Locinfo::_Locinfo_ctor 17700->17702 17701->17702 17703 8c724 RtlAllocateHeap RtlAllocateHeap 17702->17703 17704 891ce _ValidateLocalCookies 17702->17704 17703->17702 17704->17690 17706 8e940 RtlAllocateHeap 17705->17706 17707 8252e 17706->17707 17708 8254a SetFilePointerEx 17707->17708 17709 82536 17707->17709 17708->17709 17709->17698 17711 7cf8f std::locale::_Setgloballocale 17710->17711 17712 7cf99 17711->17712 17714 7cfbc 17711->17714 17713 78be3 ___std_exception_copy RtlAllocateHeap 17712->17713 17716 7cfb4 17713->17716 17714->17716 17717 7d01a 17714->17717 17716->16641 17718 7d027 17717->17718 17719 7d04a 17717->17719 17720 78be3 ___std_exception_copy RtlAllocateHeap 17718->17720 17721 7d042 17719->17721 17722 79a91 4 API calls 17719->17722 17720->17721 17721->17716 17723 7d062 17722->17723 17731 8b054 17723->17731 17726 8a1e9 RtlAllocateHeap 17727 7d076 17726->17727 17735 88d2c 17727->17735 17730 8b01a ___std_exception_copy RtlAllocateHeap 17730->17721 17732 7d06a 17731->17732 17733 8b06b 17731->17733 17732->17726 17733->17732 17734 8b01a ___std_exception_copy RtlAllocateHeap 17733->17734 17734->17732 17736 88d55 17735->17736 17737 7d07d 17735->17737 17738 88da4 17736->17738 17740 88d7c 17736->17740 17737->17721 17737->17730 17739 78be3 ___std_exception_copy RtlAllocateHeap 17738->17739 17739->17737 17742 88c9b 17740->17742 17743 88ca7 std::locale::_Setgloballocale 17742->17743 17745 88ce6 17743->17745 17746 88dff 17743->17746 17745->17737 17758 8e940 17746->17758 17748 88e15 17771 8e8af 17748->17771 17750 88e0f 17750->17748 17751 88e47 17750->17751 17752 8e940 RtlAllocateHeap 17750->17752 17751->17748 17753 8e940 RtlAllocateHeap 17751->17753 17754 88e3e 17752->17754 17755 88e53 FindCloseChangeNotification 17753->17755 17756 8e940 RtlAllocateHeap 17754->17756 17755->17748 17756->17751 17757 88e6d 17757->17745 17759 8e94d 17758->17759 17760 8e962 17758->17760 17777 816ec 17759->17777 17763 816ec RtlAllocateHeap 17760->17763 17765 8e987 17760->17765 17766 8e992 17763->17766 17764 816ff ___std_exception_copy RtlAllocateHeap 17768 8e95a 17764->17768 17765->17750 17767 816ff ___std_exception_copy RtlAllocateHeap 17766->17767 17769 8e99a 17767->17769 17768->17750 17770 78c60 ___std_exception_copy RtlAllocateHeap 17769->17770 17770->17768 17772 8e8be 17771->17772 17773 816ff ___std_exception_copy RtlAllocateHeap 17772->17773 17776 8e8e8 17772->17776 17774 8e92a 17773->17774 17775 816ec RtlAllocateHeap 17774->17775 17775->17776 17776->17757 17778 89f93 ___std_exception_copy RtlAllocateHeap 17777->17778 17779 816f1 17778->17779 17779->17764 17781 58034 17780->17781 17782 57f1d 17780->17782 17788 42cf0 std::_Throw_Cpp_error 2 API calls 17781->17788 17794 57f29 17781->17794 17783 57f24 17782->17783 17784 57fcb 17782->17784 17785 57f83 17782->17785 17786 57f7c 17782->17786 17787 57f2b 17782->17787 17855 5c3a0 17783->17855 17784->16646 17790 73672 std::_Facet_Register 2 API calls 17785->17790 17860 5cf80 17786->17860 17792 73672 std::_Facet_Register 2 API calls 17787->17792 17793 5804f 17788->17793 17790->17794 17792->17794 17865 47f90 17793->17865 17794->16646 17796 58062 Concurrency::cancel_current_task 17798 6215f 17797->17798 17922 8133b 17798->17922 17802 5b4f0 17803 5db10 17802->17803 17804 5db56 17803->17804 17805 5de3d 17803->17805 17974 5ebb0 17804->17974 17808 5fd70 2 API calls 17805->17808 17807 5dba4 17811 5fd70 2 API calls 17807->17811 17809 5de87 17808->17809 17810 5eda0 3 API calls 17809->17810 17852 5df4f std::ios_base::_Ios_base_dtor 17809->17852 17813 5dee2 17810->17813 17814 5dbc1 17811->17814 17812 5de38 std::ios_base::_Ios_base_dtor 17812->16650 17816 475c0 2 API calls 17813->17816 17854 5dcc3 std::ios_base::_Ios_base_dtor 17814->17854 17980 5eda0 17814->17980 17815 57ef0 2 API calls 17817 5dfc7 17815->17817 17818 5df06 17816->17818 17817->17812 17822 78c70 std::_Throw_Cpp_error RtlAllocateHeap 17817->17822 17823 5f440 3 API calls 17818->17823 17820 5dd82 17828 57ef0 2 API calls 17820->17828 17835 5dd9f 17820->17835 17821 5dcec 17825 57ef0 2 API calls 17821->17825 17826 5e06f 17822->17826 17837 5df1f 17823->17837 17824 5dc1c 18027 475c0 17824->18027 17848 5dd01 17825->17848 18076 590b0 17826->18076 17828->17835 17830 5e093 17834 590b0 2 API calls 17830->17834 17831 5dc40 18057 5f440 17831->18057 17832 5e07d Concurrency::cancel_current_task 17843 78c70 std::_Throw_Cpp_error RtlAllocateHeap 17832->17843 17839 5e0a1 Concurrency::cancel_current_task 17834->17839 17836 535b0 RtlAllocateHeap 17835->17836 17840 5dd6c 17836->17840 17837->17830 17841 47a20 RtlAllocateHeap 17837->17841 17838 5dc56 17838->17826 17842 5dc6b 17838->17842 17846 78c70 std::_Throw_Cpp_error RtlAllocateHeap 17839->17846 17845 535b0 RtlAllocateHeap 17840->17845 17841->17852 18066 47a20 17842->18066 17843->17830 17849 5de26 17845->17849 17847 5e0b7 17846->17847 18071 535b0 17848->18071 17851 535b0 RtlAllocateHeap 17849->17851 17851->17812 17852->17815 17852->17817 17852->17839 17853 5dc86 17853->17832 17853->17854 17854->17820 17854->17821 17856 73672 std::_Facet_Register 2 API calls 17855->17856 17857 5c3c3 17856->17857 17858 73672 std::_Facet_Register 2 API calls 17857->17858 17859 5c3ec 17858->17859 17859->17794 17861 73672 std::_Facet_Register 2 API calls 17860->17861 17862 5cfb7 17861->17862 17863 43040 std::_Throw_Cpp_error 2 API calls 17862->17863 17864 5cfee 17863->17864 17864->17794 17876 47350 17865->17876 17867 48029 17894 5ad80 17867->17894 17869 4803d 17870 48076 std::ios_base::_Ios_base_dtor 17869->17870 17872 480df 17869->17872 17898 472b0 17870->17898 17874 78c70 std::_Throw_Cpp_error RtlAllocateHeap 17872->17874 17873 480aa 17873->17796 17875 480e4 17874->17875 17875->17796 17901 44d70 17876->17901 17885 58f00 std::_Throw_Cpp_error 2 API calls 17886 473e6 17885->17886 17887 78c70 std::_Throw_Cpp_error RtlAllocateHeap 17886->17887 17888 47476 std::ios_base::_Ios_base_dtor 17886->17888 17889 474c4 17887->17889 17888->17867 17890 74b78 ___std_exception_destroy RtlAllocateHeap 17889->17890 17891 47511 17890->17891 17892 74b78 ___std_exception_destroy RtlAllocateHeap 17891->17892 17893 47527 std::ios_base::_Ios_base_dtor 17892->17893 17893->17867 17895 5adb4 17894->17895 17896 58f00 std::_Throw_Cpp_error 2 API calls 17895->17896 17897 5adbf 17896->17897 17897->17869 17899 74b15 ___std_exception_copy 2 API calls 17898->17899 17900 4731a 17899->17900 17900->17873 17902 44da6 17901->17902 17903 44dd8 17902->17903 17904 43040 std::_Throw_Cpp_error 2 API calls 17902->17904 17905 5ac50 17903->17905 17904->17903 17907 5ac81 17905->17907 17906 5acd3 17907->17906 17908 5e8a0 2 API calls 17907->17908 17909 473af 17908->17909 17910 5abb0 17909->17910 17911 5abe1 17910->17911 17911->17911 17912 58f00 std::_Throw_Cpp_error 2 API calls 17911->17912 17913 473c2 17912->17913 17914 5ae20 17913->17914 17917 5e710 17914->17917 17916 473d1 17916->17885 17918 5e753 17917->17918 17919 432d0 std::_Throw_Cpp_error 2 API calls 17918->17919 17920 5e758 std::_Locinfo::_Locinfo_ctor 17918->17920 17921 5e843 std::_Locinfo::_Locinfo_ctor 17919->17921 17920->17916 17921->17916 17923 89e42 __Getctype RtlAllocateHeap 17922->17923 17924 81346 17923->17924 17925 8a12d __Getctype RtlAllocateHeap 17924->17925 17926 6225f 17925->17926 17927 5fd70 17926->17927 17930 5fd84 17927->17930 17934 5fde4 17927->17934 17929 5ff6c 17929->17802 17935 5fdc2 17930->17935 17941 69e20 17930->17941 17933 5fecc 17933->17929 17940 69e20 2 API calls 17933->17940 17967 608f0 17933->17967 17937 5fe74 17934->17937 17963 601e0 17934->17963 17935->17934 17936 69e20 2 API calls 17935->17936 17938 5fe58 17935->17938 17936->17938 17937->17802 17938->17937 17959 61430 17938->17959 17940->17933 17942 69f76 17941->17942 17943 69e62 17941->17943 17944 43330 2 API calls 17942->17944 17945 69e7c 17943->17945 17946 69eca 17943->17946 17947 69eba 17943->17947 17948 69f7b 17944->17948 17950 73672 std::_Facet_Register 2 API calls 17945->17950 17951 73672 std::_Facet_Register 2 API calls 17946->17951 17956 69e9a std::_Locinfo::_Locinfo_ctor 17946->17956 17947->17945 17947->17948 17949 42b50 Concurrency::cancel_current_task 2 API calls 17948->17949 17952 69f80 17949->17952 17953 69e8f 17950->17953 17951->17956 17954 78c70 std::_Throw_Cpp_error RtlAllocateHeap 17952->17954 17953->17952 17953->17956 17955 69f85 17954->17955 17957 677d0 RtlAllocateHeap 17956->17957 17958 69f47 17957->17958 17958->17935 17960 61443 17959->17960 17961 61471 17960->17961 17962 69e20 2 API calls 17960->17962 17961->17934 17962->17961 17964 601f0 17963->17964 17965 69e20 2 API calls 17964->17965 17966 60260 17964->17966 17965->17964 17966->17933 17968 61430 2 API calls 17967->17968 17971 608fc 17968->17971 17969 69e20 RtlAllocateHeap RtlAllocateHeap 17973 60995 17969->17973 17970 6090a 17970->17933 17971->17970 17972 69e20 2 API calls 17971->17972 17971->17973 17972->17971 17973->17969 17973->17970 17975 5ec6d 17974->17975 17976 57ef0 2 API calls 17975->17976 17977 5ec8d 17976->17977 18079 616c0 17977->18079 17979 5ecdf 17979->17807 17982 5ee46 17980->17982 18002 5ef1f std::ios_base::_Ios_base_dtor 17980->18002 17981 58f00 std::_Throw_Cpp_error 2 API calls 17983 5ef5b 17981->17983 17984 5f425 17982->17984 17985 5e8a0 2 API calls 17982->17985 17986 5ef6a 17983->17986 17994 5f191 17983->17994 17989 78c70 std::_Throw_Cpp_error RtlAllocateHeap 17984->17989 17987 5ee79 17985->17987 17988 5f440 3 API calls 17986->17988 17990 58f00 std::_Throw_Cpp_error 2 API calls 17987->17990 17991 5ef79 17988->17991 17992 5f42f 17989->17992 17993 5ee93 17990->17993 17999 43040 std::_Throw_Cpp_error 2 API calls 17991->17999 17995 78c70 std::_Throw_Cpp_error RtlAllocateHeap 17992->17995 17996 58f00 std::_Throw_Cpp_error 2 API calls 17993->17996 17994->17994 18000 43040 std::_Throw_Cpp_error 2 API calls 17994->18000 17997 5f434 17995->17997 17998 5eee3 17996->17998 18001 78c70 std::_Throw_Cpp_error RtlAllocateHeap 17997->18001 17998->17984 17998->18002 18003 5efba 17999->18003 18004 5f1c9 18000->18004 18025 5f375 std::ios_base::_Ios_base_dtor 18001->18025 18002->17981 18006 58f00 std::_Throw_Cpp_error 2 API calls 18003->18006 18007 5fbf0 2 API calls 18004->18007 18005 78c70 std::_Throw_Cpp_error RtlAllocateHeap 18009 5f43e 18005->18009 18010 5efcd 18006->18010 18008 5f1e0 18007->18008 18011 58f00 std::_Throw_Cpp_error 2 API calls 18008->18011 18012 5e710 2 API calls 18010->18012 18017 5f22f std::ios_base::_Ios_base_dtor 18011->18017 18013 5f019 18012->18013 18014 58f00 std::_Throw_Cpp_error 2 API calls 18013->18014 18015 5f032 18014->18015 18016 58f00 std::_Throw_Cpp_error 2 API calls 18015->18016 18018 5f081 std::ios_base::_Ios_base_dtor 18016->18018 18017->17997 18020 5f161 std::ios_base::_Ios_base_dtor 18017->18020 18018->17992 18018->18020 18019 43040 std::_Throw_Cpp_error 2 API calls 18021 5f30c 18019->18021 18020->18019 18026 5f3f2 std::ios_base::_Ios_base_dtor 18020->18026 18022 5fbf0 2 API calls 18021->18022 18023 5f323 18022->18023 18024 58f00 std::_Throw_Cpp_error 2 API calls 18023->18024 18024->18025 18025->18005 18025->18026 18026->17824 18148 44e30 18027->18148 18030 44e30 2 API calls 18031 4762b 18030->18031 18032 5ace0 2 API calls 18031->18032 18033 47640 18032->18033 18034 5abb0 2 API calls 18033->18034 18035 47656 18034->18035 18036 5e710 2 API calls 18035->18036 18037 4766d std::ios_base::_Ios_base_dtor 18036->18037 18038 47a09 18037->18038 18041 4770a std::ios_base::_Ios_base_dtor 18037->18041 18039 78c70 std::_Throw_Cpp_error RtlAllocateHeap 18038->18039 18040 47a0e 18039->18040 18042 78c70 std::_Throw_Cpp_error RtlAllocateHeap 18040->18042 18044 47350 2 API calls 18041->18044 18043 47a13 18042->18043 18045 477a4 18044->18045 18046 58f00 std::_Throw_Cpp_error 2 API calls 18045->18046 18047 477b9 18046->18047 18048 5e710 2 API calls 18047->18048 18049 4780c 18048->18049 18050 58f00 std::_Throw_Cpp_error 2 API calls 18049->18050 18051 47828 18050->18051 18052 5ad80 2 API calls 18051->18052 18054 47879 std::ios_base::_Ios_base_dtor 18052->18054 18053 47975 std::ios_base::_Ios_base_dtor 18055 472b0 2 API calls 18053->18055 18054->18040 18054->18053 18056 479ca 18055->18056 18056->17831 18058 5f630 18057->18058 18064 5f4c9 std::ios_base::_Ios_base_dtor std::_Locinfo::_Locinfo_ctor 18057->18064 18058->17838 18060 5f647 18062 78c70 std::_Throw_Cpp_error RtlAllocateHeap 18060->18062 18061 432d0 std::_Throw_Cpp_error 2 API calls 18061->18064 18065 5f651 18062->18065 18063 58f00 std::_Throw_Cpp_error 2 API calls 18063->18064 18064->18058 18064->18060 18064->18061 18064->18063 18152 434a0 18064->18152 18065->17838 18065->18065 18067 74b78 ___std_exception_destroy RtlAllocateHeap 18066->18067 18068 47a61 18067->18068 18069 74b78 ___std_exception_destroy RtlAllocateHeap 18068->18069 18070 47a77 18069->18070 18070->17853 18072 535d1 18071->18072 18073 535f1 std::ios_base::_Ios_base_dtor 18071->18073 18072->18073 18074 78c70 std::_Throw_Cpp_error RtlAllocateHeap 18072->18074 18073->17840 18075 53625 18074->18075 18075->17840 18159 56590 18076->18159 18082 617d0 18079->18082 18081 616da std::locale::_Setgloballocale 18081->17979 18083 61809 18082->18083 18089 61838 18082->18089 18084 61923 18083->18084 18087 6181b 18083->18087 18099 61990 18084->18099 18087->18089 18090 69f90 18087->18090 18089->18081 18091 69fc2 18090->18091 18092 6a0a3 18090->18092 18109 6d190 18091->18109 18093 43330 2 API calls 18092->18093 18097 6a000 std::_Locinfo::_Locinfo_ctor 18093->18097 18095 78c70 std::_Throw_Cpp_error RtlAllocateHeap 18096 6a0ad 18095->18096 18097->18095 18098 6a05f std::ios_base::_Ios_base_dtor 18097->18098 18098->18089 18100 71cea 2 API calls 18099->18100 18102 6199a 18100->18102 18101 61928 18102->18101 18103 42cf0 std::_Throw_Cpp_error 2 API calls 18102->18103 18104 61a03 18103->18104 18105 5ace0 2 API calls 18104->18105 18106 61a18 18105->18106 18117 47cf0 18106->18117 18108 61a2d Concurrency::cancel_current_task 18110 6d1d9 18109->18110 18111 6d199 18109->18111 18110->18110 18111->18110 18112 6d1b0 18111->18112 18114 73672 std::_Facet_Register 2 API calls 18111->18114 18113 6d1b9 18112->18113 18115 73672 std::_Facet_Register 2 API calls 18112->18115 18113->18097 18114->18112 18116 6d1d2 18115->18116 18116->18097 18118 47350 2 API calls 18117->18118 18119 47d80 18118->18119 18120 5ad80 2 API calls 18119->18120 18121 47d94 18120->18121 18123 47dcd std::ios_base::_Ios_base_dtor 18121->18123 18124 47e33 18121->18124 18122 472b0 2 API calls 18125 47dfd 18122->18125 18123->18122 18126 78c70 std::_Throw_Cpp_error RtlAllocateHeap 18124->18126 18125->18108 18127 47e38 18126->18127 18128 47350 2 API calls 18127->18128 18129 47ece 18128->18129 18130 5ad80 2 API calls 18129->18130 18131 47ee2 18130->18131 18132 47f1b std::ios_base::_Ios_base_dtor 18131->18132 18134 47f81 18131->18134 18133 472b0 2 API calls 18132->18133 18135 47f4b 18133->18135 18136 78c70 std::_Throw_Cpp_error RtlAllocateHeap 18134->18136 18135->18108 18137 47f86 18136->18137 18138 47350 2 API calls 18137->18138 18139 48029 18138->18139 18140 5ad80 2 API calls 18139->18140 18141 4803d 18140->18141 18142 48076 std::ios_base::_Ios_base_dtor 18141->18142 18144 480df 18141->18144 18143 472b0 2 API calls 18142->18143 18145 480aa 18143->18145 18146 78c70 std::_Throw_Cpp_error RtlAllocateHeap 18144->18146 18145->18108 18147 480e4 18146->18147 18147->18108 18150 44e66 18148->18150 18149 44ea8 18149->18030 18150->18149 18151 43040 std::_Throw_Cpp_error 2 API calls 18150->18151 18151->18149 18155 43380 18152->18155 18156 43399 18155->18156 18157 80dd7 2 API calls 18156->18157 18158 433a7 18157->18158 18158->18064 18160 74b15 ___std_exception_copy 2 API calls 18159->18160 18161 565ce 18160->18161 18162 74b15 ___std_exception_copy 2 API calls 18161->18162 18163 56601 18162->18163 18163->17832 18165 98e17 18164->18165 18169 98c08 18164->18169 18165->16653 18166 98d38 std::locale::_Setgloballocale 18166->18165 18168 43130 2 API calls 18166->18168 18168->18166 18169->18166 18171 787b0 18169->18171 18180 43130 18169->18180 18172 787e3 18171->18172 18177 787c7 18171->18177 18173 89e42 __Getctype RtlAllocateHeap 18172->18173 18174 787e8 18173->18174 18175 8a12d __Getctype RtlAllocateHeap 18174->18175 18176 787f8 18175->18176 18176->18177 18178 89a39 2 API calls 18176->18178 18177->18169 18179 7882a 18178->18179 18179->18169 18181 432b3 18180->18181 18182 4316f 18180->18182 18183 43330 2 API calls 18181->18183 18184 43189 18182->18184 18185 431d7 18182->18185 18186 431c7 18182->18186 18187 432b8 18183->18187 18189 73672 std::_Facet_Register 2 API calls 18184->18189 18190 73672 std::_Facet_Register 2 API calls 18185->18190 18193 4319c std::_Locinfo::_Locinfo_ctor 18185->18193 18186->18184 18186->18187 18188 42b50 Concurrency::cancel_current_task 2 API calls 18187->18188 18188->18193 18189->18193 18190->18193 18191 78c70 std::_Throw_Cpp_error RtlAllocateHeap 18192 432c2 18191->18192 18193->18191 18194 4326b std::ios_base::_Ios_base_dtor 18193->18194 18194->18169 18196 7364d GetSystemTimePreciseAsFileTime 18195->18196 18197 73077 18195->18197 18196->18197 18197->16310 18645 4bc0728 18646 4bc0763 GetCurrentHwProfileW 18645->18646 18648 4bc08fb 18646->18648 18649 647b0 18650 648ed 18649->18650 18651 647ed 18649->18651 18652 43330 2 API calls 18650->18652 18656 64a30 2 API calls 18651->18656 18653 648f2 18652->18653 18654 64a23 18653->18654 18655 6493d 18653->18655 18657 43330 2 API calls 18654->18657 18659 64a30 2 API calls 18655->18659 18662 64827 18656->18662 18658 64a28 18657->18658 18660 64977 18659->18660 18668 53d50 18660->18668 18663 5e1e0 RtlAllocateHeap 18662->18663 18664 648b4 18663->18664 18665 6499f 18666 5e1e0 RtlAllocateHeap 18665->18666 18667 649ea 18666->18667 18669 53d8f 18668->18669 18671 53df7 std::_Locinfo::_Locinfo_ctor 18668->18671 18670 53d96 18669->18670 18669->18671 18672 53f7d 18669->18672 18673 53f1e 18669->18673 18674 53e69 18669->18674 18677 73672 std::_Facet_Register 2 API calls 18670->18677 18671->18665 18678 73672 std::_Facet_Register 2 API calls 18672->18678 18740 57e80 18673->18740 18676 73672 std::_Facet_Register 2 API calls 18674->18676 18679 53e73 18676->18679 18680 53da0 18677->18680 18681 53f8a 18678->18681 18679->18671 18701 6bf30 18679->18701 18682 73672 std::_Facet_Register 2 API calls 18680->18682 18681->18671 18685 53fd3 18681->18685 18686 5408e 18681->18686 18684 53dd2 18682->18684 18728 6f460 18684->18728 18690 54004 18685->18690 18691 53fdb 18685->18691 18689 43330 2 API calls 18686->18689 18687 53eb1 18687->18671 18698 53d50 6 API calls 18687->18698 18693 54093 18689->18693 18692 73672 std::_Facet_Register 2 API calls 18690->18692 18691->18693 18694 53fe6 18691->18694 18692->18671 18696 42b50 Concurrency::cancel_current_task 2 API calls 18693->18696 18695 73672 std::_Facet_Register 2 API calls 18694->18695 18697 53fec 18695->18697 18696->18697 18697->18671 18699 78c70 std::_Throw_Cpp_error RtlAllocateHeap 18697->18699 18698->18687 18700 5409d 18699->18700 18702 6bf42 18701->18702 18703 6bfab 18701->18703 18704 6bf7c 18702->18704 18705 6bf4d 18702->18705 18706 43330 2 API calls 18703->18706 18709 6bf99 18704->18709 18711 73672 std::_Facet_Register 2 API calls 18704->18711 18707 6bf54 18705->18707 18708 6bfb0 18705->18708 18706->18708 18710 73672 std::_Facet_Register 2 API calls 18707->18710 18712 42b50 Concurrency::cancel_current_task 2 API calls 18708->18712 18709->18687 18713 6bf5a 18710->18713 18714 6bf86 18711->18714 18712->18713 18715 6bf63 18713->18715 18716 78c70 std::_Throw_Cpp_error RtlAllocateHeap 18713->18716 18714->18687 18715->18687 18717 6bfba 18716->18717 18718 6c077 18717->18718 18719 6c00c 18717->18719 18722 6c013 std::_Locinfo::_Locinfo_ctor 18717->18722 18721 43330 2 API calls 18718->18721 18745 5fab0 18719->18745 18723 6c07c 18721->18723 18722->18687 18724 73672 std::_Facet_Register 2 API calls 18723->18724 18725 6c0ae 18724->18725 18726 43040 std::_Throw_Cpp_error 2 API calls 18725->18726 18727 6c0f2 18726->18727 18727->18687 18729 6f53f 18728->18729 18730 6f498 18728->18730 18729->18671 18731 73672 std::_Facet_Register 2 API calls 18730->18731 18732 6f4ba 18731->18732 18733 563b0 std::_Throw_Cpp_error 2 API calls 18732->18733 18734 6f4d0 18733->18734 18735 53d50 6 API calls 18734->18735 18736 6f4e0 18735->18736 18737 6f460 6 API calls 18736->18737 18738 6f531 18737->18738 18739 6f460 6 API calls 18738->18739 18739->18729 18741 73672 std::_Facet_Register 2 API calls 18740->18741 18742 57ea6 18741->18742 18743 563b0 std::_Throw_Cpp_error 2 API calls 18742->18743 18744 57ec5 18743->18744 18744->18671 18746 5fac2 18745->18746 18747 5fb2b 18745->18747 18749 5facd 18746->18749 18750 5fafc 18746->18750 18748 42b50 Concurrency::cancel_current_task 2 API calls 18747->18748 18753 5fada 18748->18753 18749->18747 18751 5fad4 18749->18751 18752 5fb19 18750->18752 18755 73672 std::_Facet_Register 2 API calls 18750->18755 18754 73672 std::_Facet_Register 2 API calls 18751->18754 18752->18722 18756 78c70 std::_Throw_Cpp_error RtlAllocateHeap 18753->18756 18758 5fae3 18753->18758 18754->18753 18757 5fb06 18755->18757 18759 5fb35 18756->18759 18757->18722 18758->18722 18760 5fb5b std::locale::_Setgloballocale 18759->18760 18763 69c70 18759->18763 18760->18722 18762 5fb7f 18762->18722 18764 69dc4 18763->18764 18768 69ca2 18763->18768 18765 43330 2 API calls 18764->18765 18778 69d04 std::_Locinfo::_Locinfo_ctor 18765->18778 18766 69dbf 18767 42b50 Concurrency::cancel_current_task 2 API calls 18766->18767 18767->18764 18768->18766 18771 69cf3 18768->18771 18772 69d1d 18768->18772 18769 78c70 std::_Throw_Cpp_error RtlAllocateHeap 18770 69dce 18769->18770 18780 59950 18770->18780 18771->18766 18774 69cfe 18771->18774 18777 73672 std::_Facet_Register 2 API calls 18772->18777 18772->18778 18776 73672 std::_Facet_Register 2 API calls 18774->18776 18775 69dd9 Concurrency::cancel_current_task 18776->18778 18777->18778 18778->18769 18779 69d8f std::ios_base::_Ios_base_dtor 18778->18779 18779->18762 18781 59968 18780->18781 18782 59978 std::ios_base::_Ios_base_dtor 18780->18782 18781->18782 18783 78c70 std::_Throw_Cpp_error RtlAllocateHeap 18781->18783 18782->18775 18784 5998d 18783->18784 18785 59a4f 18784->18785 18792 72b74 18784->18792 18785->18775 18791 59a04 18791->18775 18793 72af7 18792->18793 18794 599cc 18793->18794 18814 79815 18793->18814 18794->18785 18800 583b0 18794->18800 18796 72b43 18796->18794 18828 7d5f6 18796->18828 18799 7d0a8 5 API calls 18799->18794 18801 58463 18800->18801 18802 5843c 18800->18802 18804 5c430 18801->18804 18854 8120a 18802->18854 18805 5c45f std::_Throw_Cpp_error std::_Lockit::~_Lockit std::_Lockit::_Lockit 18804->18805 18806 73672 std::_Facet_Register 2 API calls 18805->18806 18813 5c4f8 std::_Lockit::~_Lockit 18805->18813 18807 5c506 18806->18807 18808 44040 std::_Throw_Cpp_error 3 API calls 18807->18808 18809 5c536 18808->18809 18810 44100 std::_Throw_Cpp_error 2 API calls 18809->18810 18811 5c592 18810->18811 18812 726f7 std::_Facet_Register 2 API calls 18811->18812 18812->18813 18813->18791 18815 7975e std::locale::_Setgloballocale 18814->18815 18816 79771 18815->18816 18819 79791 18815->18819 18817 816ff ___std_exception_copy RtlAllocateHeap 18816->18817 18818 79776 18817->18818 18822 78c60 ___std_exception_copy RtlAllocateHeap 18818->18822 18820 79796 18819->18820 18821 797a3 18819->18821 18823 816ff ___std_exception_copy RtlAllocateHeap 18820->18823 18824 8a8ef RtlAllocateHeap 18821->18824 18827 79781 18822->18827 18823->18827 18825 797ac 18824->18825 18826 816ff ___std_exception_copy RtlAllocateHeap 18825->18826 18825->18827 18826->18827 18827->18796 18829 7d609 ___std_exception_copy 18828->18829 18834 7d34d 18829->18834 18831 7d61e 18832 7899c ___std_exception_copy RtlAllocateHeap 18831->18832 18833 72b5e 18832->18833 18833->18794 18833->18799 18836 7d359 std::locale::_Setgloballocale 18834->18836 18835 7d35f 18837 78be3 ___std_exception_copy RtlAllocateHeap 18835->18837 18836->18835 18838 7d3a2 18836->18838 18840 7d37a 18837->18840 18841 7d4d0 18838->18841 18840->18831 18842 7d4f6 18841->18842 18843 7d4e3 18841->18843 18850 7d3f7 18842->18850 18843->18840 18845 79a91 4 API calls 18847 7d547 18845->18847 18846 7d519 18846->18845 18849 7d5a7 18846->18849 18848 8263d 2 API calls 18847->18848 18848->18849 18849->18840 18851 7d460 18850->18851 18852 7d408 18850->18852 18851->18846 18852->18851 18853 825fd SetFilePointerEx RtlAllocateHeap 18852->18853 18853->18851 18855 81216 18854->18855 18857 8122b 18854->18857 18856 816ff ___std_exception_copy RtlAllocateHeap 18855->18856 18858 8121b 18856->18858 18857->18801 18859 78c60 ___std_exception_copy RtlAllocateHeap 18858->18859 18860 81226 18859->18860 18860->18801 18199 4bc08c7 GetCurrentHwProfileW 18200 4bc08fb 18199->18200

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 79 49280-492dd call 563b0 82 49413-49521 call 42df0 call 12a420 79->82 83 492e3-492e9 79->83 99 49537-4953f call 58dc0 82->99 100 49523-49535 82->100 85 492f0-49313 83->85 87 49324-49331 85->87 88 49315-4931f 85->88 89 49342-4934f 87->89 90 49333-4933d 87->90 92 49403-49406 88->92 94 49360-4936d 89->94 95 49351-4935b 89->95 90->92 93 49409-4940d 92->93 93->82 93->85 97 4937e-4938b 94->97 98 4936f-49379 94->98 95->92 101 4938d-49397 97->101 102 49399-493a6 97->102 98->92 103 49544-49597 call 12a420 * 2 99->103 100->103 101->92 105 493b4-493c1 102->105 106 493a8-493b2 102->106 116 49599-495c8 call 12a420 call 75270 103->116 117 495cb-495e1 call 12a420 103->117 108 493c3-493cd 105->108 109 493cf-493dc 105->109 106->92 108->92 111 493de-493e8 109->111 112 493ea-493f4 109->112 111->92 112->93 115 493f6-493ff 112->115 115->92 116->117 123 495e7-495ed 117->123 124 496e2 117->124 126 495f0-496ce WSASend 123->126 127 496e6-496f0 124->127 145 496d4-496dc 126->145 146 4975f-49763 126->146 128 496f2-496fe 127->128 129 4971e-4973d 127->129 130 49714-4971b call 738f3 128->130 131 49700-4970e 128->131 132 4976f-49796 129->132 133 4973f-4974b 129->133 130->129 131->130 135 49797-497fe call 78c70 call 42df0 * 2 131->135 137 49765-4976c call 738f3 133->137 138 4974d-4975b 133->138 137->132 138->135 140 4975d 138->140 140->137 145->124 145->126 146->127
                                  APIs
                                  • WSASend.WS2_32(?,?,00000001,00000000,00000000,00000000,00000000,?,?,?,?,0018D15C,00000000,74D723A0,-001C9880), ref: 000496C9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2960516340.0000000000041000.00000040.00000001.01000000.00000003.sdmp, Offset: 00040000, based on PE: true
                                  • Associated: 00000000.00000002.2960358078.0000000000040000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960516340.00000000001C5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960835232.00000000001CA000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.00000000001CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000354000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000434000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000474000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000048A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2962598938.000000000048B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963017388.000000000062B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963119638.000000000062D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_40000_90ZF1EDs9h.jbxd
                                  Similarity
                                  • API ID: Send
                                  • String ID: Ws2_32.dll
                                  • API String ID: 121738739-3093949381
                                  • Opcode ID: a4a2fd2944bafc0f22d7fc12635688d82f9059a89c36c61644f7358b3fc14581
                                  • Instruction ID: a9470d7aa7b29b553c153853f734b3d7c7ab4afbd65823d2d47a83fd670db753
                                  • Opcode Fuzzy Hash: a4a2fd2944bafc0f22d7fc12635688d82f9059a89c36c61644f7358b3fc14581
                                  • Instruction Fuzzy Hash: 6602FEB0D04298DFDF24CFA4C8907ADBBB0EF55304F2442ADE4856B286D7741A86CF96

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 152 4bc0728-4bc08c0 166 4bc08cd-4bc08e4 GetCurrentHwProfileW 152->166 167 4bc08fb-4bc0998 call 4bc09a0 166->167
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(0000F671), ref: 04BC08DB
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2973286707.0000000004BC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04BC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4bc0000_90ZF1EDs9h.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 6a8bab0f4e8ab22fe7e13ec41d69dafe62d82dd5475b0f348f1f38349df15119
                                  • Instruction ID: 72c06ce309c36ab7bfebb4719511ac28370138bec3212765c492dc20ad379021
                                  • Opcode Fuzzy Hash: 6a8bab0f4e8ab22fe7e13ec41d69dafe62d82dd5475b0f348f1f38349df15119
                                  • Instruction Fuzzy Hash: 15412DFB24C211BDB50291866F90EFB676DD5D2B70731C86BF843C2506E3D85E4A6532

                                  Control-flow Graph

                                  APIs
                                  • setsockopt.WS2_32(00000434,0000FFFF,00001006,?,00000008), ref: 00107BA7
                                  • recv.WS2_32(?,00000004,00000002), ref: 00107BC1
                                  • recv.WS2_32(00000000,0000000C,00000002,00000000), ref: 00107C43
                                  • recv.WS2_32(00000000,0000000C,00000008), ref: 00107C64
                                  • setsockopt.WS2_32(0000FFFF,00001006,?,00000008,?,00000000), ref: 00107D01
                                    • Part of subcall function 00108590: WSAStartup.WS2_32 ref: 001085BA
                                    • Part of subcall function 00108590: socket.WS2_32(?,?,?,?,?,?,001C9328,?,?), ref: 0010865E
                                    • Part of subcall function 00108590: connect.WS2_32(00000000,00199BFC,?,?,?,?,001C9328,?,?), ref: 00108672
                                    • Part of subcall function 00108590: closesocket.WS2_32(00000000), ref: 0010867D
                                  • recv.WS2_32(00000000,?,00000008), ref: 00107D1B
                                  • recv.WS2_32(?,00000004,00000008), ref: 00107E23
                                  • __Xtime_get_ticks.LIBCPMT ref: 00107E2A
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00107E38
                                  • Sleep.KERNELBASE(00000001,00000000,?,00002710,00000000), ref: 00107EB1
                                  • Sleep.KERNELBASE(00000064,?,00002710,00000000), ref: 00107EB9
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2960516340.0000000000041000.00000040.00000001.01000000.00000003.sdmp, Offset: 00040000, based on PE: true
                                  • Associated: 00000000.00000002.2960358078.0000000000040000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960516340.00000000001C5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960835232.00000000001CA000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.00000000001CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000354000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000434000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000474000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000048A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2962598938.000000000048B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963017388.000000000062B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963119638.000000000062D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_40000_90ZF1EDs9h.jbxd
                                  Similarity
                                  • API ID: recv$Sleepsetsockopt$StartupUnothrow_t@std@@@Xtime_get_ticks__ehfuncinfo$??2@closesocketconnectsocket
                                  • String ID:
                                  • API String ID: 301102601-0
                                  • Opcode ID: 121e46e33c4ecb12b29aadedb48de41867493272cc10d85b467a8e088d550c2f
                                  • Instruction ID: bc941a876637e00b4d20b6258cbba69a7745fbea31fcecf70c5b8d0d71abcdab
                                  • Opcode Fuzzy Hash: 121e46e33c4ecb12b29aadedb48de41867493272cc10d85b467a8e088d550c2f
                                  • Instruction Fuzzy Hash: F3B1AFB0D04348DFEB10DBA4CD49BADBFB1BB45300F204259E494AB6D2D7B5AD84CB91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 57 108590-1085c2 WSAStartup 58 108696-10869f 57->58 59 1085c8-1085f2 call 12a420 * 2 57->59 64 1085f4-1085f8 59->64 65 1085fe-108644 59->65 64->58 64->65 67 108690-108695 65->67 68 108646-10864c 65->68 67->58 69 1086a4-1086ae 68->69 70 10864e 68->70 69->67 75 1086b0-1086b8 69->75 71 108654-108668 socket 70->71 71->67 74 10866a-10867a connect 71->74 76 1086a0 74->76 77 10867c-108684 closesocket 74->77 76->69 77->71 78 108686-10868a 77->78 78->67
                                  APIs
                                  • WSAStartup.WS2_32 ref: 001085BA
                                  • socket.WS2_32(?,?,?,?,?,?,001C9328,?,?), ref: 0010865E
                                  • connect.WS2_32(00000000,00199BFC,?,?,?,?,001C9328,?,?), ref: 00108672
                                  • closesocket.WS2_32(00000000), ref: 0010867D
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2960516340.0000000000041000.00000040.00000001.01000000.00000003.sdmp, Offset: 00040000, based on PE: true
                                  • Associated: 00000000.00000002.2960358078.0000000000040000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960516340.00000000001C5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960835232.00000000001CA000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.00000000001CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000354000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000434000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000474000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000048A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2962598938.000000000048B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963017388.000000000062B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963119638.000000000062D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_40000_90ZF1EDs9h.jbxd
                                  Similarity
                                  • API ID: Startupclosesocketconnectsocket
                                  • String ID:
                                  • API String ID: 3098855095-0
                                  • Opcode ID: ee81b9fed91e043f0b1a4ec7f11a3d9d8dc7c0e7c93af88d0f7ca583714be5ad
                                  • Instruction ID: 4bb73c6c782b7321c803c80d202d87552235598944838a34c30c6a24f8179bb9
                                  • Opcode Fuzzy Hash: ee81b9fed91e043f0b1a4ec7f11a3d9d8dc7c0e7c93af88d0f7ca583714be5ad
                                  • Instruction Fuzzy Hash: BE3137726043405BD7209F24CC4466BB7E9FFC6334F050F1AF9E8A22D0D7B1980486A3

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 175 4bc0770-4bc0776 176 4bc0778-4bc08c0 175->176 177 4bc0715-4bc0721 175->177 191 4bc08cd-4bc08e4 GetCurrentHwProfileW 176->191 180 4bc0722 177->180 180->180 192 4bc08fb-4bc0998 call 4bc09a0 191->192
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(0000F671), ref: 04BC08DB
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2973286707.0000000004BC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04BC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4bc0000_90ZF1EDs9h.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: ca0f2bcc49bdd88302fca6cbce53d9a8f80b8044e3b76a433aedf9907e5aa1a1
                                  • Instruction ID: 39a28a7b3b5b1db26242466ee1f20ba1a1743d3be440a15b8a29b076a275cfe1
                                  • Opcode Fuzzy Hash: ca0f2bcc49bdd88302fca6cbce53d9a8f80b8044e3b76a433aedf9907e5aa1a1
                                  • Instruction Fuzzy Hash: ED415DFB24C221BDB50291862F90EFB676DE6D6B70731C47BF442C2506E2D45A4A6531

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 200 4bc0759-4bc08c0 213 4bc08cd-4bc08e4 GetCurrentHwProfileW 200->213 214 4bc08fb-4bc0998 call 4bc09a0 213->214
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(0000F671), ref: 04BC08DB
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2973286707.0000000004BC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04BC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4bc0000_90ZF1EDs9h.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 2de7a9a1b0234a9112b9e6bb5606aa8d7a00238493f6f3f2dc4a362fbea7e42a
                                  • Instruction ID: 1c9a41b4610a114f278086cd5e4190e9c75dc52591f334705e57158b7a8be038
                                  • Opcode Fuzzy Hash: 2de7a9a1b0234a9112b9e6bb5606aa8d7a00238493f6f3f2dc4a362fbea7e42a
                                  • Instruction Fuzzy Hash: 99414FFB34C111BDB50291962F94EFB676DD5D6770731C46BF442C2106E3D45E4A6431

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 222 89789-897ab 223 8999e 222->223 224 897b1-897b3 222->224 225 899a0-899a4 223->225 226 897df-89802 224->226 227 897b5-897d4 call 78be3 224->227 229 89808-8980e 226->229 230 89804-89806 226->230 235 897d7-897da 227->235 229->227 231 89810-89821 229->231 230->229 230->231 233 89823-89831 call 8263d 231->233 234 89834-89844 call 892ce 231->234 233->234 240 8988d-8989f 234->240 241 89846-8984c 234->241 235->225 242 898a1-898a7 240->242 243 898f6-89916 WriteFile 240->243 244 8984e-89851 241->244 245 89875-8988b call 88e9f 241->245 249 898a9-898ac 242->249 250 898e2-898f4 call 8934b 242->250 246 89918-8991e 243->246 247 89921 243->247 251 8985c-8986b call 89266 244->251 252 89853-89856 244->252 261 8986e-89870 245->261 246->247 254 89924-8992f 247->254 255 898ce-898e0 call 8950f 249->255 256 898ae-898b1 249->256 273 898c9-898cc 250->273 251->261 252->251 257 89936-89939 252->257 262 89999-8999c 254->262 263 89931-89934 254->263 255->273 264 8993c-8993e 256->264 265 898b7-898c4 call 89426 256->265 257->264 261->254 262->225 263->257 270 8996c-89978 264->270 271 89940-89945 264->271 265->273 276 8997a-89980 270->276 277 89982-89994 270->277 274 8995e-89967 call 816c8 271->274 275 89947-89959 271->275 273->261 274->235 275->235 276->223 276->277 277->235
                                  APIs
                                  • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0008990E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2960516340.0000000000041000.00000040.00000001.01000000.00000003.sdmp, Offset: 00040000, based on PE: true
                                  • Associated: 00000000.00000002.2960358078.0000000000040000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960516340.00000000001C5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960835232.00000000001CA000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.00000000001CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000354000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000434000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000474000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000048A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2962598938.000000000048B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963017388.000000000062B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963119638.000000000062D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_40000_90ZF1EDs9h.jbxd
                                  Similarity
                                  • API ID: FileWrite
                                  • String ID:
                                  • API String ID: 3934441357-0
                                  • Opcode ID: 476579008cebdaf1d85365e1f2b4743e0dbd684ad87138b29b507cfd0ce00100
                                  • Instruction ID: 8eba6bd4dc0721b4aa5bf02f82bc77f7dfc10399695a59e44f35bc2efa32c11f
                                  • Opcode Fuzzy Hash: 476579008cebdaf1d85365e1f2b4743e0dbd684ad87138b29b507cfd0ce00100
                                  • Instruction Fuzzy Hash: 18619F71D0411AAFDF11BFA8C884AFEBBF9BF49304F180149E980A7246D732D951CBA0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 280 4bc078a-4bc08c0 292 4bc08cd-4bc08e4 GetCurrentHwProfileW 280->292 293 4bc08fb-4bc0998 call 4bc09a0 292->293
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(0000F671), ref: 04BC08DB
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2973286707.0000000004BC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04BC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4bc0000_90ZF1EDs9h.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 40936b771908716129534c01b480dde5ac758d3c2061290719dc2fc1c9815848
                                  • Instruction ID: bb8b7aee6046bfbfe0caf351f9ac9dcd334aac99f28a61acad66f9bb67562dd6
                                  • Opcode Fuzzy Hash: 40936b771908716129534c01b480dde5ac758d3c2061290719dc2fc1c9815848
                                  • Instruction Fuzzy Hash: E7314AFB24C221BCB50291862FA0EFB57ADD6D6B30731C87BF842C2106E2D45E8A6131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 301 4bc07e9-4bc08c0 308 4bc08cd-4bc08e4 GetCurrentHwProfileW 301->308 309 4bc08fb-4bc0998 call 4bc09a0 308->309
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(0000F671), ref: 04BC08DB
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2973286707.0000000004BC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04BC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4bc0000_90ZF1EDs9h.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 8f748c87b762ed6b5797f067111037030593df1d72d09cf201a988d3f5dbd78c
                                  • Instruction ID: 8f5a8661c358611a2e2af236da229709ab3e830a10fc6be3a32c6339787850d4
                                  • Opcode Fuzzy Hash: 8f748c87b762ed6b5797f067111037030593df1d72d09cf201a988d3f5dbd78c
                                  • Instruction Fuzzy Hash: B7314BFB20C221BCB60190862FA4EFB576DE6D1B70B31C4BBF842C2106E2D45E8D6131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 317 4bc0890-4bc0891 318 4bc089d-4bc08a3 317->318 319 4bc0893 317->319 322 4bc08a4-4bc08c0 318->322 320 4bc082d-4bc088b 319->320 321 4bc0895-4bc0899 319->321 320->322 321->318 325 4bc08cd-4bc08e4 GetCurrentHwProfileW 322->325 328 4bc08fb-4bc0998 call 4bc09a0 325->328
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(0000F671), ref: 04BC08DB
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2973286707.0000000004BC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04BC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4bc0000_90ZF1EDs9h.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: b27a8beed830b74c1dd8a66f46e46c4220017072c4cc485c46b6fa5f9bb3232e
                                  • Instruction ID: 3909b09f8cc3d235478229106e8b37070f09d6134649de51802ee3ed6e5596b0
                                  • Opcode Fuzzy Hash: b27a8beed830b74c1dd8a66f46e46c4220017072c4cc485c46b6fa5f9bb3232e
                                  • Instruction Fuzzy Hash: ED21A0FB30C211ADB601E5852BA4EFB676DE6D1B30731C8AFF442C2046F290AA4E6471

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 336 4bc0836-4bc08c0 341 4bc08cd-4bc08e4 GetCurrentHwProfileW 336->341 342 4bc08fb-4bc0998 call 4bc09a0 341->342
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(0000F671), ref: 04BC08DB
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2973286707.0000000004BC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04BC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4bc0000_90ZF1EDs9h.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 306dbade461522083f74229d60aac6a3c029a7023ec106c88fd3e58abc4f5b48
                                  • Instruction ID: 472dea23c53cdcde354c08267c91c09ee17925f99acf02015f5610a10ef7d90c
                                  • Opcode Fuzzy Hash: 306dbade461522083f74229d60aac6a3c029a7023ec106c88fd3e58abc4f5b48
                                  • Instruction Fuzzy Hash: A3114AFB20C121ADB602D1966FA0EFB576CE6D5B3073188BBF543C2046E2D46A896531

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 350 4bc085d-4bc08c0 354 4bc08cd-4bc08e4 GetCurrentHwProfileW 350->354 355 4bc08fb-4bc0998 call 4bc09a0 354->355
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(0000F671), ref: 04BC08DB
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2973286707.0000000004BC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04BC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4bc0000_90ZF1EDs9h.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: da47f3e9297747cba8c10b5e559ec80d54d84a9493d8d0487989a8491f6d471b
                                  • Instruction ID: c7d6d73764204360222a31229d017d621b80aad1a604d9545820ef6005bc1826
                                  • Opcode Fuzzy Hash: da47f3e9297747cba8c10b5e559ec80d54d84a9493d8d0487989a8491f6d471b
                                  • Instruction Fuzzy Hash: 02115BFB60C121BDB60291866F94EFA677CE6D5B3073188AFF942C2005F3A46A496531

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 363 4bc08c7-4bc08e4 GetCurrentHwProfileW 364 4bc08fb-4bc0998 call 4bc09a0 363->364
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(0000F671), ref: 04BC08DB
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2973286707.0000000004BC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04BC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4bc0000_90ZF1EDs9h.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 3159371ebe900dc21d0bc75c499ea95f3207f469b51f9a5d0e2f487728835ce0
                                  • Instruction ID: 0b277d03832638ae0edde5e253d5305cbe5aed3e8b332ff14f4eb0a20c3f022b
                                  • Opcode Fuzzy Hash: 3159371ebe900dc21d0bc75c499ea95f3207f469b51f9a5d0e2f487728835ce0
                                  • Instruction Fuzzy Hash: 2601ADFB30C112ADB60195962BA0FFA67BDE6D5B3077188ABF942C6006E3D06A4D6531

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 372 88dff-88e13 call 8e940 375 88e19-88e21 372->375 376 88e15-88e17 372->376 378 88e2c-88e2f 375->378 379 88e23-88e2a 375->379 377 88e67-88e87 call 8e8af 376->377 387 88e99 377->387 388 88e89-88e97 call 816c8 377->388 382 88e4d-88e5d call 8e940 FindCloseChangeNotification 378->382 383 88e31-88e35 378->383 379->378 381 88e37-88e4b call 8e940 * 2 379->381 381->376 381->382 382->376 394 88e5f-88e65 382->394 383->381 383->382 392 88e9b-88e9e 387->392 388->392 394->377
                                  APIs
                                  • FindCloseChangeNotification.KERNELBASE(00000000,00000000,?,?,00088CE6,00000000,?,001BA178,0000000C,00088DA2,?,?,?), ref: 00088E55
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2960516340.0000000000041000.00000040.00000001.01000000.00000003.sdmp, Offset: 00040000, based on PE: true
                                  • Associated: 00000000.00000002.2960358078.0000000000040000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960516340.00000000001C5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960835232.00000000001CA000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.00000000001CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000354000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000434000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000474000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000048A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2962598938.000000000048B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963017388.000000000062B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963119638.000000000062D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_40000_90ZF1EDs9h.jbxd
                                  Similarity
                                  • API ID: ChangeCloseFindNotification
                                  • String ID:
                                  • API String ID: 2591292051-0
                                  • Opcode ID: d267c85e84cc2aa3d95cdf9b47bdd62cf0471f83cc06e2c88b7fadbc081f3980
                                  • Instruction ID: e8a623725f96653b342bc85000e0e31a2324b5fdf81a08d656d9f88ce618d40b
                                  • Opcode Fuzzy Hash: d267c85e84cc2aa3d95cdf9b47bdd62cf0471f83cc06e2c88b7fadbc081f3980
                                  • Instruction Fuzzy Hash: 8111AB3360516416C6A03234AC85BBE2BC96B83738F684699F9C88B0C3DFB0CC824359

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 398 8251c-82534 call 8e940 401 8254a-82560 SetFilePointerEx 398->401 402 82536-8253d 398->402 404 82562-82573 call 816c8 401->404 405 82575-8257f 401->405 403 82544-82548 402->403 406 8259b-8259e 403->406 404->403 405->403 407 82581-82596 405->407 407->406
                                  APIs
                                  • SetFilePointerEx.KERNELBASE(00000000,?,?,?,?,?,00000000,?,?,?,00082626,?,?,?,?,?), ref: 00082558
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2960516340.0000000000041000.00000040.00000001.01000000.00000003.sdmp, Offset: 00040000, based on PE: true
                                  • Associated: 00000000.00000002.2960358078.0000000000040000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960516340.00000000001C5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960835232.00000000001CA000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.00000000001CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000354000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000434000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000474000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000048A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2962598938.000000000048B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963017388.000000000062B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963119638.000000000062D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_40000_90ZF1EDs9h.jbxd
                                  Similarity
                                  • API ID: FilePointer
                                  • String ID:
                                  • API String ID: 973152223-0
                                  • Opcode ID: ecb316e5aa332a764089ad01330399352794391211d4e6b67153f652fd41ec73
                                  • Instruction ID: b14febf1e2efe8b061a6068e58a926df1508ac8d214211ac4a2e8de14ddf4da9
                                  • Opcode Fuzzy Hash: ecb316e5aa332a764089ad01330399352794391211d4e6b67153f652fd41ec73
                                  • Instruction Fuzzy Hash: 7A012632640645AFCF19EF68CC11C9E3B69EF85330B340148F8909B2A1EA71ED818B94
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0004331F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2960516340.0000000000041000.00000040.00000001.01000000.00000003.sdmp, Offset: 00040000, based on PE: true
                                  • Associated: 00000000.00000002.2960358078.0000000000040000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960516340.00000000001C5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960835232.00000000001CA000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.00000000001CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000354000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000434000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000474000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000048A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2962598938.000000000048B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963017388.000000000062B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963119638.000000000062D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_40000_90ZF1EDs9h.jbxd
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID:
                                  • API String ID: 118556049-0
                                  • Opcode ID: 0fd589d96c9d07b1efa01aec19e4ff46bb0766daf2056f60d33bc81ca57302d3
                                  • Instruction ID: 7ad16dac2deb31805d31c646f93367d19d41169be7b9d0c557f8f890376c0e71
                                  • Opcode Fuzzy Hash: 0fd589d96c9d07b1efa01aec19e4ff46bb0766daf2056f60d33bc81ca57302d3
                                  • Instruction Fuzzy Hash: ECF0B4B25001049BEB186F64D8194EAB3E8DF24366750497AF88DC7213EB2ADB4087D8
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000008,?,00000001,?,00089FE0,00000001,00000364,00000001,00000006,000000FF,?,00074B3F,?,?,74D723A0,?), ref: 0008A69B
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2960516340.0000000000041000.00000040.00000001.01000000.00000003.sdmp, Offset: 00040000, based on PE: true
                                  • Associated: 00000000.00000002.2960358078.0000000000040000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960516340.00000000001C5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960835232.00000000001CA000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.00000000001CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000354000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000434000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000474000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000048A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2962598938.000000000048B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963017388.000000000062B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963119638.000000000062D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_40000_90ZF1EDs9h.jbxd
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 220ea1035828c05dc4b8bd5aca1cbcbb0259e8549d38e1ca454fd251474d76d6
                                  • Instruction ID: 939de52cfe6f8fd1e489fdbb7d4cc75bd289420cad3684b8520411161cc8cb25
                                  • Opcode Fuzzy Hash: 220ea1035828c05dc4b8bd5aca1cbcbb0259e8549d38e1ca454fd251474d76d6
                                  • Instruction Fuzzy Hash: 4FF0B4327115306ABB617A619C05B9A778DBF42770F1D8123A8C4E6888EA30EC2147A6
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000000,00000001,?,?,00074B3F,?,?,74D723A0,?,?,00043522,?,?), ref: 0008B0C7
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2960516340.0000000000041000.00000040.00000001.01000000.00000003.sdmp, Offset: 00040000, based on PE: true
                                  • Associated: 00000000.00000002.2960358078.0000000000040000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960516340.00000000001C5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960835232.00000000001CA000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.00000000001CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000354000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000434000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000474000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000048A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2962598938.000000000048B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963017388.000000000062B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963119638.000000000062D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_40000_90ZF1EDs9h.jbxd
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: d0a5d34fa3011a2584c7cb72ebd846371200d84db38949d35ace9dd61c666bb1
                                  • Instruction ID: bcef45653f7d7cfe41d7a2ba3c364cfcf1e8a99e218e67eaa0baf07e16bb381c
                                  • Opcode Fuzzy Hash: d0a5d34fa3011a2584c7cb72ebd846371200d84db38949d35ace9dd61c666bb1
                                  • Instruction Fuzzy Hash: 14E06D312016256AEAB136A59C11B9F768DBF423B1F594320ACE4A65C2DB24CC118BA5
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2973367528.0000000004BD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4bd0000_90ZF1EDs9h.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 04acb0da247ce7a859f5b2fe37aad160ab42c2b7b9f77b0674bc35a8f0b1a807
                                  • Instruction ID: 0ad92e7e057fecc2dd9db5dc3edac12d8e10d8aceeae958c1168089258903fa3
                                  • Opcode Fuzzy Hash: 04acb0da247ce7a859f5b2fe37aad160ab42c2b7b9f77b0674bc35a8f0b1a807
                                  • Instruction Fuzzy Hash: E9115CE770C150BEE20265602D15AFB2F28EAD673DB3088E7F046D6102F1886A1A6271
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2973367528.0000000004BD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4bd0000_90ZF1EDs9h.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c616a55b791b6a4c3be043e9750f51476d470820ee96d54326f0f04c057a1908
                                  • Instruction ID: 075e00a93a216be53fa06a0066228a144f93b86488a677112236664449225400
                                  • Opcode Fuzzy Hash: c616a55b791b6a4c3be043e9750f51476d470820ee96d54326f0f04c057a1908
                                  • Instruction Fuzzy Hash: 90018CEB34C110BEB102A9916A14EFB6B2DE5DA738B3088EBF842D5102F2991E5D7131
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2973367528.0000000004BD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4bd0000_90ZF1EDs9h.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3f8dc51b2fdf56ed225a381b8e3de103cc2a79e92e07a74abc9850365b19830d
                                  • Instruction ID: 0a250ee456de7c7dd6a645503bf5beb7ca190aa26a0bb63ad851d9a33d40476f
                                  • Opcode Fuzzy Hash: 3f8dc51b2fdf56ed225a381b8e3de103cc2a79e92e07a74abc9850365b19830d
                                  • Instruction Fuzzy Hash: DE0147B720C260AFA206AD6129159FB7B69EAD633477084FFF042C7102F20A1A6D7231
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2973367528.0000000004BD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4bd0000_90ZF1EDs9h.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e640314141b4128fc6cf5b26261c32110df8295150ee5fad2ebd546187443faf
                                  • Instruction ID: a9b62fbbb7e4aa6f25e409d2118fff8baf9d8a9c3f391411fc120244f28c822e
                                  • Opcode Fuzzy Hash: e640314141b4128fc6cf5b26261c32110df8295150ee5fad2ebd546187443faf
                                  • Instruction Fuzzy Hash: 64F0A7FB60C110AE7102AD513A15AFB676CD5DA73477088EBF442D6502F5491D6E3131
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2973367528.0000000004BD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4bd0000_90ZF1EDs9h.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9b19a59ae1d0870deffad71bd599e36bbf685ad0012716216d99d6facf2bd808
                                  • Instruction ID: 1c68061c6648d4d97a5e4a3f4f01fa377a6a531cf2522f627627d4897302ac2b
                                  • Opcode Fuzzy Hash: 9b19a59ae1d0870deffad71bd599e36bbf685ad0012716216d99d6facf2bd808
                                  • Instruction Fuzzy Hash: BEF0A7EB60C110AE600269512A149FB676CD9DA735771C9EBF402D7102F5495D5D2131
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2960516340.0000000000041000.00000040.00000001.01000000.00000003.sdmp, Offset: 00040000, based on PE: true
                                  • Associated: 00000000.00000002.2960358078.0000000000040000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960516340.00000000001C5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960835232.00000000001CA000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.00000000001CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000354000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000434000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000474000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000048A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2962598938.000000000048B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963017388.000000000062B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963119638.000000000062D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_40000_90ZF1EDs9h.jbxd
                                  Similarity
                                  • API ID: __floor_pentium4
                                  • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                  • API String ID: 4168288129-2761157908
                                  • Opcode ID: 3b82a91966ee1018f4dad71e857d2622c9ac3e228bdc55a3172021adbfe4d0fa
                                  • Instruction ID: 03c1c9055329f167a4407b10f12136301dc2d3042ff86f0f9278597c39095cbe
                                  • Opcode Fuzzy Hash: 3b82a91966ee1018f4dad71e857d2622c9ac3e228bdc55a3172021adbfe4d0fa
                                  • Instruction Fuzzy Hash: E7D22671E086298FDF65CE28DC40BEAB7B5EB44305F1441EAD84DE7240EB78AE859F41
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2960516340.0000000000041000.00000040.00000001.01000000.00000003.sdmp, Offset: 00040000, based on PE: true
                                  • Associated: 00000000.00000002.2960358078.0000000000040000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960516340.00000000001C5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960835232.00000000001CA000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.00000000001CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000354000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000434000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000474000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000048A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2962598938.000000000048B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963017388.000000000062B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963119638.000000000062D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_40000_90ZF1EDs9h.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 333d4b6d5425d6f9d03797ee82114c3711da98524c03317fffdb5ec62fb2b380
                                  • Instruction ID: 5456ebcf850de1b373410f4cf02f2de111d1e694bc3bf137b0383f033b2f0c0c
                                  • Opcode Fuzzy Hash: 333d4b6d5425d6f9d03797ee82114c3711da98524c03317fffdb5ec62fb2b380
                                  • Instruction Fuzzy Hash: 65021C71E012199BEF14CFA9D880AAEBBF1FF48314F24826DE919A7341D735AD418B94
                                  APIs
                                  • GetSystemTimePreciseAsFileTime.KERNEL32(?,00073077,?,?,?,?,00107E2F), ref: 00073655
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2960516340.0000000000041000.00000040.00000001.01000000.00000003.sdmp, Offset: 00040000, based on PE: true
                                  • Associated: 00000000.00000002.2960358078.0000000000040000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960516340.00000000001C5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960835232.00000000001CA000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.00000000001CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000354000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000434000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000474000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000048A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2962598938.000000000048B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963017388.000000000062B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963119638.000000000062D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_40000_90ZF1EDs9h.jbxd
                                  Similarity
                                  • API ID: Time$FilePreciseSystem
                                  • String ID:
                                  • API String ID: 1802150274-0
                                  • Opcode ID: 3079bc4bf9d9d8bb398cd04554495aca79f76213428f00b86360193c7694ac58
                                  • Instruction ID: 99c046999703a8e1f90a03a6147372f57577ba1418f22d2fc584547274d26343
                                  • Opcode Fuzzy Hash: 3079bc4bf9d9d8bb398cd04554495aca79f76213428f00b86360193c7694ac58
                                  • Instruction Fuzzy Hash: 76F06572944554FFDB119F54EC41F5DBBE8F709B24F008166E812D7B90DB74AA409AC4
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2960516340.0000000000041000.00000040.00000001.01000000.00000003.sdmp, Offset: 00040000, based on PE: true
                                  • Associated: 00000000.00000002.2960358078.0000000000040000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960516340.00000000001C5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960835232.00000000001CA000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.00000000001CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000354000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000434000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000474000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000048A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2962598938.000000000048B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963017388.000000000062B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963119638.000000000062D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_40000_90ZF1EDs9h.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: abd5fda85498f2fdf9c8e6ef95b73943d8fade84a0105c378513a092c0579cc1
                                  • Instruction ID: 543476f2604a58859c860bffdff64fa276cc8c4f2ea1295daec95816583655bb
                                  • Opcode Fuzzy Hash: abd5fda85498f2fdf9c8e6ef95b73943d8fade84a0105c378513a092c0579cc1
                                  • Instruction Fuzzy Hash: 40625DB1E002159FDF19CF59C5846AEBBB1BF48308F2481ADD824AB342D775EA46CF94
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2960516340.0000000000041000.00000040.00000001.01000000.00000003.sdmp, Offset: 00040000, based on PE: true
                                  • Associated: 00000000.00000002.2960358078.0000000000040000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960516340.00000000001C5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960835232.00000000001CA000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.00000000001CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000354000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000434000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000474000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000048A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2962598938.000000000048B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963017388.000000000062B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963119638.000000000062D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_40000_90ZF1EDs9h.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 80b9970b4e61b3a89387c81d03852b8640c12f30169ca405eadcc1892538b820
                                  • Instruction ID: 5e7172a505b6f61b34e57b3b9b9d30d6ab73d94904ee927da7835bab8bc67262
                                  • Opcode Fuzzy Hash: 80b9970b4e61b3a89387c81d03852b8640c12f30169ca405eadcc1892538b820
                                  • Instruction Fuzzy Hash: 8FE10476E1122A9FCB05CFA8D4816ADFBF2FF89324F1941A9D815B7340D670AD45CBA0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2960516340.0000000000041000.00000040.00000001.01000000.00000003.sdmp, Offset: 00040000, based on PE: true
                                  • Associated: 00000000.00000002.2960358078.0000000000040000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960516340.00000000001C5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960835232.00000000001CA000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.00000000001CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000354000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000434000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000474000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000048A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2962598938.000000000048B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963017388.000000000062B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963119638.000000000062D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_40000_90ZF1EDs9h.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9fae76d475b7cbcaea4236f3d15fdbaa36b535f795efbd17608e7427fcb31a36
                                  • Instruction ID: 383067f62a3052465d8c9e569197d17087f0fa74bc1135640c3b33e5b126f8dd
                                  • Opcode Fuzzy Hash: 9fae76d475b7cbcaea4236f3d15fdbaa36b535f795efbd17608e7427fcb31a36
                                  • Instruction Fuzzy Hash: FFC10EB0A00A068FDBF4EF68C4946BABBF1BF45310F145619D5D697692D330AD4CCB21
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2960516340.0000000000041000.00000040.00000001.01000000.00000003.sdmp, Offset: 00040000, based on PE: true
                                  • Associated: 00000000.00000002.2960358078.0000000000040000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960516340.00000000001C5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960835232.00000000001CA000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.00000000001CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000354000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000434000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000474000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000048A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2962598938.000000000048B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963017388.000000000062B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963119638.000000000062D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_40000_90ZF1EDs9h.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8f29218e384ce32b867f2d9fa5b50d9c7b5e765c017618b1b17fda3c98999e22
                                  • Instruction ID: e873bcfb85b01023bba19ea8cb96c38e013fa5c1827f59d8088bf6adcd852e2d
                                  • Opcode Fuzzy Hash: 8f29218e384ce32b867f2d9fa5b50d9c7b5e765c017618b1b17fda3c98999e22
                                  • Instruction Fuzzy Hash: 6EB137312106099FD769DF28C48AB657BE0FF45364F29865AE8DACF2E1C335E981CB40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2960516340.0000000000041000.00000040.00000001.01000000.00000003.sdmp, Offset: 00040000, based on PE: true
                                  • Associated: 00000000.00000002.2960358078.0000000000040000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960516340.00000000001C5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960835232.00000000001CA000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.00000000001CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000354000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000434000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000474000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000048A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2962598938.000000000048B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963017388.000000000062B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963119638.000000000062D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_40000_90ZF1EDs9h.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fe41a50df89e7edc02f9f33d72f0df6f6b173424ec3e0190a56e931547efd30c
                                  • Instruction ID: 8e43e2dd7b4c4d9fcd6e4d3c5077dfc70fe1c59110b96230967a45031578fa82
                                  • Opcode Fuzzy Hash: fe41a50df89e7edc02f9f33d72f0df6f6b173424ec3e0190a56e931547efd30c
                                  • Instruction Fuzzy Hash: DE81EEB1E052469FDB108F68D895BEEBBF4EB1A300F448169D85997783CB349909E7A0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2960516340.0000000000041000.00000040.00000001.01000000.00000003.sdmp, Offset: 00040000, based on PE: true
                                  • Associated: 00000000.00000002.2960358078.0000000000040000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960516340.00000000001C5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960835232.00000000001CA000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.00000000001CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000354000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000434000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000474000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000048A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2962598938.000000000048B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963017388.000000000062B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963119638.000000000062D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_40000_90ZF1EDs9h.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1ccddb83a97e472c2628f6981debb63efa50d44bb605a1d8c216493510b0a75a
                                  • Instruction ID: b6c114dffbede18fb0d93e9cdab3a420a89ab802fca97666b032cdc1122b3c1f
                                  • Opcode Fuzzy Hash: 1ccddb83a97e472c2628f6981debb63efa50d44bb605a1d8c216493510b0a75a
                                  • Instruction Fuzzy Hash: 366161317245644FE718CF1EECC05767B62A38B30178A422AEA81CB7D5C635EB66C7E0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2960516340.0000000000041000.00000040.00000001.01000000.00000003.sdmp, Offset: 00040000, based on PE: true
                                  • Associated: 00000000.00000002.2960358078.0000000000040000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960516340.00000000001C5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960835232.00000000001CA000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.00000000001CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000354000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000434000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000474000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000048A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2962598938.000000000048B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963017388.000000000062B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963119638.000000000062D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_40000_90ZF1EDs9h.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 46680d0314554fd398ed7fd020ff60bee8df1d437ae882661bd78aeb1168d151
                                  • Instruction ID: 8c7e37ad817701a4ecfdf31a980029e2e75f244f022fd4b47c941edc9f7e261d
                                  • Opcode Fuzzy Hash: 46680d0314554fd398ed7fd020ff60bee8df1d437ae882661bd78aeb1168d151
                                  • Instruction Fuzzy Hash: E7516E72E00219AFDF14CF98C940AEEBBF2FF89304F19C459E555AB201D738AA50DB95
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2973286707.0000000004BC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04BC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4bc0000_90ZF1EDs9h.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3cee622ea45581db1f1db5963f9487fc2fa9d8888c3b90c2e02d5f3fce777c1b
                                  • Instruction ID: 45b54c91c5df14ac9a44168a4d73b2a9c6c49ce2feff4f97313dcddd2ae50642
                                  • Opcode Fuzzy Hash: 3cee622ea45581db1f1db5963f9487fc2fa9d8888c3b90c2e02d5f3fce777c1b
                                  • Instruction Fuzzy Hash: 1B11C6B720C150FEB601AA96ABD4DFB7B3DD6C1B30330C46FF802C481AE2A55E4A6171
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2960516340.0000000000041000.00000040.00000001.01000000.00000003.sdmp, Offset: 00040000, based on PE: true
                                  • Associated: 00000000.00000002.2960358078.0000000000040000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960516340.00000000001C5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960835232.00000000001CA000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.00000000001CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000354000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000434000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000474000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000048A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2962598938.000000000048B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963017388.000000000062B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963119638.000000000062D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_40000_90ZF1EDs9h.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                  • Instruction ID: 4de64dd896e446aba8c01a9df5aad5b8e5f7fc70eb11c71bbb0f25c8546bc735
                                  • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                  • Instruction Fuzzy Hash: 0E11B177B0D08143D6A4C63DC8B46B7A7C5EBC63A176DC376D09D4BB08C12ED9029708
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2973286707.0000000004BC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04BC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4bc0000_90ZF1EDs9h.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6621933ca3c18c61a04e619f8163a612ee9cfbcbc7c6c38a56251db61f8f0aba
                                  • Instruction ID: 8bd8886ec3a02d3b499924f55629e5bfe2f3604a6e13653502a3a31968d55fd5
                                  • Opcode Fuzzy Hash: 6621933ca3c18c61a04e619f8163a612ee9cfbcbc7c6c38a56251db61f8f0aba
                                  • Instruction Fuzzy Hash: AFE012BB38C5506D7100E5A5BF989FA671EF5C1775331896BF001C4405F2959D4A55B0
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2960516340.0000000000041000.00000040.00000001.01000000.00000003.sdmp, Offset: 00040000, based on PE: true
                                  • Associated: 00000000.00000002.2960358078.0000000000040000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960516340.00000000001C5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960835232.00000000001CA000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.00000000001CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000354000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000434000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000474000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000048A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2962598938.000000000048B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963017388.000000000062B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963119638.000000000062D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_40000_90ZF1EDs9h.jbxd
                                  Similarity
                                  • API ID: _strrchr
                                  • String ID:
                                  • API String ID: 3213747228-0
                                  • Opcode ID: 785c90e8ff89e0f1a3d98e37725974d6f6ea20f06d45e48120c47f1ca5a82ffe
                                  • Instruction ID: 9cd6b95b7b58597d0faf83f6180589e48d491e1d3a7b87330db2a3bd9c77d49c
                                  • Opcode Fuzzy Hash: 785c90e8ff89e0f1a3d98e37725974d6f6ea20f06d45e48120c47f1ca5a82ffe
                                  • Instruction Fuzzy Hash: 5CB14772A00355AFDB21AF68CC82BEE7BE5FF56310F144165E984AF382E7749901C7A0
                                  APIs
                                  • _ValidateLocalCookies.LIBCMT ref: 00077307
                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 0007730F
                                  • _ValidateLocalCookies.LIBCMT ref: 00077398
                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 000773C3
                                  • _ValidateLocalCookies.LIBCMT ref: 00077418
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2960516340.0000000000041000.00000040.00000001.01000000.00000003.sdmp, Offset: 00040000, based on PE: true
                                  • Associated: 00000000.00000002.2960358078.0000000000040000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960516340.00000000001C5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960835232.00000000001CA000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.00000000001CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000354000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000434000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000474000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000048A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2962598938.000000000048B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963017388.000000000062B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963119638.000000000062D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_40000_90ZF1EDs9h.jbxd
                                  Similarity
                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                  • String ID: csm
                                  • API String ID: 1170836740-1018135373
                                  • Opcode ID: eed22010b592fce111b8cba39a00059de87f3d6e2b1e0e80c8f967ff8af492d9
                                  • Instruction ID: 697a69c8071daa02f8d9ce46828b627c03974cc8aa3e60360be23554ce91c593
                                  • Opcode Fuzzy Hash: eed22010b592fce111b8cba39a00059de87f3d6e2b1e0e80c8f967ff8af492d9
                                  • Instruction Fuzzy Hash: 8A41BD30E04209ABCF10DF68C885A9EBBE5AF04358F14C055FD1CAB392DB79EA51DB95
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0005A09D
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0005A0BF
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0005A0E7
                                  • __Getctype.LIBCPMT ref: 0005A1C5
                                  • std::_Facet_Register.LIBCPMT ref: 0005A1F9
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0005A223
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2960516340.0000000000041000.00000040.00000001.01000000.00000003.sdmp, Offset: 00040000, based on PE: true
                                  • Associated: 00000000.00000002.2960358078.0000000000040000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960516340.00000000001C5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960835232.00000000001CA000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.00000000001CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000354000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000434000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000474000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000048A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2962598938.000000000048B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963017388.000000000062B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963119638.000000000062D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_40000_90ZF1EDs9h.jbxd
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetctypeRegister
                                  • String ID:
                                  • API String ID: 1102183713-0
                                  • Opcode ID: 14437897a4913d640f5db56aacae3b3d97e4dff9b13e589d8ec573ddae87ae80
                                  • Instruction ID: bf0b7afae55023440ab87072205a601c9194a8f9864219fa866d1436b671c8ac
                                  • Opcode Fuzzy Hash: 14437897a4913d640f5db56aacae3b3d97e4dff9b13e589d8ec573ddae87ae80
                                  • Instruction Fuzzy Hash: 9651B8B0E00249CFCB11CF98C945BAEBBF0FB01714F148259D845AB392DB74AA48CBD2
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0005C45A
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0005C47C
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0005C4A4
                                  • std::_Facet_Register.LIBCPMT ref: 0005C59A
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0005C5C4
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2960516340.0000000000041000.00000040.00000001.01000000.00000003.sdmp, Offset: 00040000, based on PE: true
                                  • Associated: 00000000.00000002.2960358078.0000000000040000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960516340.00000000001C5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960835232.00000000001CA000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.00000000001CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000354000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000434000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000474000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000048A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2962598938.000000000048B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963017388.000000000062B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963119638.000000000062D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_40000_90ZF1EDs9h.jbxd
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                  • String ID:
                                  • API String ID: 459529453-0
                                  • Opcode ID: 4f81cf761cd5611c6be7f3b8845e95a195deacace714abe5081ea8d73c0130c3
                                  • Instruction ID: dc1ea0138ef7eddaa3a043d9c0a600ebdc5461496eefa5619482d62c5013e142
                                  • Opcode Fuzzy Hash: 4f81cf761cd5611c6be7f3b8845e95a195deacace714abe5081ea8d73c0130c3
                                  • Instruction Fuzzy Hash: 73519BB0900248DFEB11DF98D954FAEBBF0FB01314F248199E845AB381D775AE49CB91
                                  APIs
                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 0004499F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2960516340.0000000000041000.00000040.00000001.01000000.00000003.sdmp, Offset: 00040000, based on PE: true
                                  • Associated: 00000000.00000002.2960358078.0000000000040000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960516340.00000000001C5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960835232.00000000001CA000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.00000000001CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000354000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000434000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000474000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000048A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2962598938.000000000048B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963017388.000000000062B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963119638.000000000062D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_40000_90ZF1EDs9h.jbxd
                                  Similarity
                                  • API ID: Ios_base_dtorstd::ios_base::_
                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                  • API String ID: 323602529-1866435925
                                  • Opcode ID: c919c5830e561f18423a00d14359f3bce5804e30dfcfa5b20f1c50d3a9ad30b1
                                  • Instruction ID: fd02cacb7c1015cd1752d7e9c652b8a34cb2bf144b7c1808629f92a65f6e4554
                                  • Opcode Fuzzy Hash: c919c5830e561f18423a00d14359f3bce5804e30dfcfa5b20f1c50d3a9ad30b1
                                  • Instruction Fuzzy Hash: 42112CF29086447BC710DE589C02BDA73D8DB05720F448679FE589B2C2EB759D04879A
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 00072730
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0007273B
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 000727A9
                                    • Part of subcall function 0007288C: std::locale::_Locimp::_Locimp.LIBCPMT ref: 000728A4
                                  • std::locale::_Setgloballocale.LIBCPMT ref: 00072756
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2960516340.0000000000041000.00000040.00000001.01000000.00000003.sdmp, Offset: 00040000, based on PE: true
                                  • Associated: 00000000.00000002.2960358078.0000000000040000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960516340.00000000001C5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960835232.00000000001CA000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.00000000001CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000354000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000434000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000474000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000048A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2962598938.000000000048B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963017388.000000000062B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963119638.000000000062D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_40000_90ZF1EDs9h.jbxd
                                  Similarity
                                  • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                                  • String ID:
                                  • API String ID: 677527491-0
                                  • Opcode ID: 3df8ca8f6dc643cba7a2891739ce94ee820469decf96bd779bfc03e3ec46f563
                                  • Instruction ID: ec3ba9859d21eedf7170c8d7ea4e8fd320ce4910c3a32902af7eee768b8adaca
                                  • Opcode Fuzzy Hash: 3df8ca8f6dc643cba7a2891739ce94ee820469decf96bd779bfc03e3ec46f563
                                  • Instruction Fuzzy Hash: 56018475E012519BD709EB24D8959BD7BB1FF84750B148009E81557392CF38AE82CBDA
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 0004750C
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00047522
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2960516340.0000000000041000.00000040.00000001.01000000.00000003.sdmp, Offset: 00040000, based on PE: true
                                  • Associated: 00000000.00000002.2960358078.0000000000040000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960516340.00000000001C5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960835232.00000000001CA000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.00000000001CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000354000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000434000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000474000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000048A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2962598938.000000000048B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963017388.000000000062B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963119638.000000000062D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_40000_90ZF1EDs9h.jbxd
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: [json.exception.
                                  • API String ID: 4194217158-791563284
                                  • Opcode ID: 63e856d22b267f616f43e4d23f55a3ec5162342b305727e701dbff9bded53d9b
                                  • Instruction ID: 2658031d5a382f19b9ff31f90b8ab69f50ee5463d7b4dfa81d0ce081a6300b4b
                                  • Opcode Fuzzy Hash: 63e856d22b267f616f43e4d23f55a3ec5162342b305727e701dbff9bded53d9b
                                  • Instruction Fuzzy Hash: 8451E1B0D047489FDB00DFA8C906BDEBBB4EF15314F148269E855A7382E7B95A44C7E2
                                  APIs
                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 0004499F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2960516340.0000000000041000.00000040.00000001.01000000.00000003.sdmp, Offset: 00040000, based on PE: true
                                  • Associated: 00000000.00000002.2960358078.0000000000040000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960516340.00000000001C5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960835232.00000000001CA000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.00000000001CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000354000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000434000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000474000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000048A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2962598938.000000000048B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963017388.000000000062B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963119638.000000000062D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_40000_90ZF1EDs9h.jbxd
                                  Similarity
                                  • API ID: Ios_base_dtorstd::ios_base::_
                                  • String ID: ios_base::badbit set$ios_base::failbit set
                                  • API String ID: 323602529-1240500531
                                  • Opcode ID: 0d88e4ce9b6bccede1a3c5c277c0da90f85be0d627d2671338dc636e7aeaa97b
                                  • Instruction ID: 0873a3eb53f8ca494261379237f88d66eb5c4eba5fc4c431c022f55d0bab77ac
                                  • Opcode Fuzzy Hash: 0d88e4ce9b6bccede1a3c5c277c0da90f85be0d627d2671338dc636e7aeaa97b
                                  • Instruction Fuzzy Hash: 8941F2B1D04248ABCB04DF58CD46BEEBBF8EB09710F14826DF554AB282DB755E00CBA5
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00044061
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 000440C4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2960516340.0000000000041000.00000040.00000001.01000000.00000003.sdmp, Offset: 00040000, based on PE: true
                                  • Associated: 00000000.00000002.2960358078.0000000000040000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960516340.00000000001C5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960835232.00000000001CA000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.00000000001CD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000354000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000434000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.0000000000474000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000047C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2960879822.000000000048A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2962598938.000000000048B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963017388.000000000062B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2963119638.000000000062D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_40000_90ZF1EDs9h.jbxd
                                  Similarity
                                  • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                  • String ID: bad locale name
                                  • API String ID: 3988782225-1405518554
                                  • Opcode ID: 2a31141896fedc4966fbeb9f22d510696e15853209f00ee2da82fef864a9bda7
                                  • Instruction ID: ca0e99886a6b06fb7d2e42b9a0f9f030faec20fa16ce96fee15ffb8a18d1da8c
                                  • Opcode Fuzzy Hash: 2a31141896fedc4966fbeb9f22d510696e15853209f00ee2da82fef864a9bda7
                                  • Instruction Fuzzy Hash: 94110370805B84EED321CF68C50478BBFF0AF15714F10868DD49997782C3B95A04CBA5

                                  Execution Graph

                                  Execution Coverage:3.3%
                                  Dynamic/Decrypted Code Coverage:5.5%
                                  Signature Coverage:0%
                                  Total number of Nodes:1906
                                  Total number of Limit Nodes:45
                                  execution_graph 20527 4d0085b 20530 4d00864 20527->20530 20531 4d00875 20530->20531 20532 4d0091f 3 API calls 20531->20532 20533 4d0092e 20531->20533 20532->20531 20534 4d00998 2 API calls 20533->20534 20535 4d00994 20534->20535 20536 4d00af5 GetCurrentHwProfileW 20535->20536 20538 4d00aeb 20536->20538 20537 4d00af1 20538->20537 20539 4d00c50 GetCurrentHwProfileW 20538->20539 20540 4d00c78 20539->20540 20310 4d00c87 20311 4d00c50 GetCurrentHwProfileW 20310->20311 20312 4d00c78 20310->20312 20311->20312 20541 4d00847 20542 4d00851 20541->20542 20544 4d0089d 20541->20544 20543 4d0091f 3 API calls 20543->20544 20544->20543 20545 4d0092e 20544->20545 20546 4d00998 2 API calls 20545->20546 20547 4d00994 20546->20547 20548 4d00af5 GetCurrentHwProfileW 20547->20548 20550 4d00aeb 20548->20550 20549 4d00af1 20550->20549 20551 4d00c50 GetCurrentHwProfileW 20550->20551 20552 4d00c78 20551->20552 20444 4d00a89 20445 4d00a8c 20444->20445 20447 4d00aeb 20444->20447 20446 4d00af5 GetCurrentHwProfileW 20445->20446 20446->20447 20448 4d00af1 20447->20448 20449 4d00c50 GetCurrentHwProfileW 20447->20449 20450 4d00c78 20449->20450 20387 4d008ca 20388 4d00894 20387->20388 20390 4d0092e 20388->20390 20398 4d0091f 20388->20398 20407 4d00998 20390->20407 20399 4d00930 20398->20399 20400 4d00998 2 API calls 20399->20400 20401 4d00994 20400->20401 20414 4d00af5 20401->20414 20408 4d009b1 20407->20408 20409 4d00af5 GetCurrentHwProfileW 20408->20409 20411 4d00aeb 20409->20411 20410 4d00af1 20411->20410 20412 4d00c50 GetCurrentHwProfileW 20411->20412 20413 4d00c78 20412->20413 20415 4d00b0e GetCurrentHwProfileW 20414->20415 20417 4d00c78 20415->20417 20553 4d00872 20554 4d00889 20553->20554 20555 4d0091f 3 API calls 20554->20555 20556 4d0092e 20554->20556 20555->20554 20557 4d00998 2 API calls 20556->20557 20558 4d00994 20557->20558 20559 4d00af5 GetCurrentHwProfileW 20558->20559 20561 4d00aeb 20559->20561 20560 4d00af1 20561->20560 20562 4d00c50 GetCurrentHwProfileW 20561->20562 20563 4d00c78 20562->20563 18435 257b00 18436 257ecc 18435->18436 18439 257b3e std::ios_base::_Ios_base_dtor __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 18435->18439 18437 257b87 setsockopt recv 18437->18439 18439->18436 18439->18437 18440 257eb7 Sleep 18439->18440 18441 257e15 recv 18439->18441 18443 257eaf Sleep 18439->18443 18447 257ee1 18439->18447 18451 257cd6 setsockopt recv 18439->18451 18452 1a8dc0 2 API calls 18439->18452 18455 258590 WSAStartup 18439->18455 18461 1a8dc0 18439->18461 18470 1a63b0 18439->18470 18475 257ef0 18439->18475 18531 1c3069 18439->18531 18534 199280 18439->18534 18440->18436 18440->18439 18441->18443 18443->18440 18445 257c2d recv 18445->18439 18446 257c4e recv 18445->18446 18446->18439 18544 1c8c70 18447->18544 18451->18439 18452->18451 18456 2585c8 18455->18456 18459 258686 18455->18459 18457 258654 socket 18456->18457 18456->18459 18458 25866a connect 18457->18458 18457->18459 18458->18459 18460 25867c closesocket 18458->18460 18459->18439 18460->18457 18460->18459 18463 1a8de2 std::locale::_Setgloballocale 18461->18463 18464 1a8e11 18461->18464 18462 1a8ef8 18463->18445 18464->18462 18547 1932d0 18464->18547 18466 1a8ecb std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 18466->18445 18467 1a8e66 std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 18467->18466 18561 192fe0 18467->18561 18469 1a8eb8 18469->18445 18472 1a63d8 18470->18472 18471 1a63e7 18471->18439 18472->18471 18473 1932d0 std::_Throw_Cpp_error 2 API calls 18472->18473 18474 1a642a std::_Locinfo::_Locinfo_ctor 18473->18474 18474->18439 18476 257f6c 18475->18476 18477 257f3e 18475->18477 18479 257f74 18476->18479 18480 257f8e 18476->18480 18478 192cf0 std::_Throw_Cpp_error 2 API calls 18477->18478 18481 257f50 18478->18481 18759 1a6290 18479->18759 18483 257f96 18480->18483 18484 257fb0 18480->18484 18487 199280 3 API calls 18481->18487 18488 1a6290 2 API calls 18483->18488 18485 257fd5 18484->18485 18486 257fb8 18484->18486 18489 257fdd 18485->18489 18490 257ffb 18485->18490 18491 1a6290 2 API calls 18486->18491 18530 257f64 18486->18530 18487->18530 18488->18530 18763 1d12b7 18489->18763 18493 2582c0 18490->18493 18494 25801b 18490->18494 18490->18530 18491->18530 18495 2582c8 18493->18495 18496 25831b 18493->18496 18716 195400 18494->18716 18786 1ab430 18495->18786 18499 258376 18496->18499 18500 258323 18496->18500 18501 2583d1 18499->18501 18502 25837e 18499->18502 18503 1ab430 3 API calls 18500->18503 18505 25842c 18501->18505 18506 2583d9 18501->18506 18504 1ab430 3 API calls 18502->18504 18503->18530 18504->18530 18509 258484 18505->18509 18510 258434 18505->18510 18508 1ab430 3 API calls 18506->18508 18508->18530 18509->18530 18793 1e8b00 18509->18793 18511 1ab430 3 API calls 18510->18511 18511->18530 18514 258040 18515 25810b 18514->18515 18514->18530 18726 192cf0 18514->18726 18730 1aace0 18514->18730 18733 192d30 18515->18733 18519 258140 18520 2581b2 18519->18520 18521 2581e5 18519->18521 18522 1a63b0 std::_Throw_Cpp_error 2 API calls 18520->18522 18750 1c9820 18521->18750 18524 2581ce 18522->18524 18769 25f280 18524->18769 18530->18439 20306 1c361d 18531->20306 18535 1a63b0 std::_Throw_Cpp_error 2 API calls 18534->18535 18536 1992d4 18535->18536 18537 1a8dc0 2 API calls 18536->18537 18538 199523 std::_Locinfo::_Locinfo_ctor 18536->18538 18537->18538 18539 1996e2 std::ios_base::_Ios_base_dtor 18538->18539 18541 1996b6 WSASend 18538->18541 18540 19975d std::ios_base::_Ios_base_dtor 18539->18540 18542 1c8c70 std::_Throw_Cpp_error RtlAllocateHeap 18539->18542 18540->18439 18541->18538 18541->18539 18543 19979c 18542->18543 18543->18439 18545 1c8bac ___std_exception_copy RtlAllocateHeap 18544->18545 18546 1c8c7f __Getctype 18545->18546 18548 1932e2 18547->18548 18549 193306 18547->18549 18550 1932e9 18548->18550 18551 19331f 18548->18551 18552 193318 18549->18552 18554 1c3672 std::_Facet_Register 2 API calls 18549->18554 18566 1c3672 18550->18566 18574 192b50 18551->18574 18552->18467 18557 193310 18554->18557 18556 1932ef 18558 1932f8 18556->18558 18559 1c8c70 std::_Throw_Cpp_error RtlAllocateHeap 18556->18559 18557->18467 18558->18467 18560 193329 18559->18560 18562 193017 std::ios_base::_Ios_base_dtor 18561->18562 18563 193007 18561->18563 18562->18469 18563->18562 18564 1c8c70 std::_Throw_Cpp_error RtlAllocateHeap 18563->18564 18565 193036 18564->18565 18567 1c3677 std::_Facet_Register 18566->18567 18569 1c3691 18567->18569 18571 192b50 Concurrency::cancel_current_task 18567->18571 18578 1d23ec 18567->18578 18569->18556 18570 1c369d 18570->18570 18571->18570 18584 1c4b15 18571->18584 18575 192b5e Concurrency::cancel_current_task 18574->18575 18576 1c4b15 ___std_exception_copy 2 API calls 18575->18576 18577 192bac 18576->18577 18577->18556 18583 1db094 __Getctype std::_Facet_Register 18578->18583 18579 1db0d2 18592 1d16ff 18579->18592 18581 1db0bd RtlAllocateHeap 18582 1db0d0 18581->18582 18581->18583 18582->18567 18583->18579 18583->18581 18585 1c4b22 18584->18585 18591 192bac 18584->18591 18586 1d23ec ___std_exception_copy 2 API calls 18585->18586 18585->18591 18587 1c4b3f 18586->18587 18590 1c4b4f 18587->18590 18654 1d99a5 18587->18654 18663 1d1c96 18590->18663 18591->18556 18595 1d9f93 18592->18595 18596 1d9f9c __Getctype 18595->18596 18603 1d1704 18596->18603 18606 1da65a 18596->18606 18598 1d9fe0 __Getctype 18599 1d9fe8 __Getctype 18598->18599 18600 1da020 18598->18600 18610 1db01a 18599->18610 18614 1d9c70 18600->18614 18603->18582 18605 1db01a ___std_exception_copy RtlAllocateHeap 18605->18603 18609 1da667 __Getctype std::_Facet_Register 18606->18609 18607 1da692 RtlAllocateHeap 18608 1da6a5 __floor_pentium4 18607->18608 18607->18609 18608->18598 18609->18607 18609->18608 18611 1db025 ___std_exception_copy 18610->18611 18613 1db04f 18610->18613 18612 1d16ff __floor_pentium4 RtlAllocateHeap 18611->18612 18611->18613 18612->18613 18613->18603 18615 1d9cde __Getctype 18614->18615 18618 1d9c16 18615->18618 18617 1d9d07 18617->18605 18619 1d9c22 std::_Lockit::_Lockit std::locale::_Setgloballocale 18618->18619 18622 1d9df7 18619->18622 18621 1d9c44 __Getctype 18621->18617 18623 1d9e06 __Getctype 18622->18623 18624 1d9e2d __Getctype 18622->18624 18623->18624 18626 1e2146 18623->18626 18624->18621 18627 1e21c6 18626->18627 18630 1e215c 18626->18630 18629 1db01a ___std_exception_copy RtlAllocateHeap 18627->18629 18652 1e2214 18627->18652 18628 1e22b7 __Getctype RtlAllocateHeap 18633 1e2222 18628->18633 18631 1e21e8 18629->18631 18630->18627 18634 1db01a ___std_exception_copy RtlAllocateHeap 18630->18634 18636 1e218f 18630->18636 18632 1db01a ___std_exception_copy RtlAllocateHeap 18631->18632 18635 1e21fb 18632->18635 18638 1e2282 18633->18638 18651 1db01a RtlAllocateHeap ___std_exception_copy 18633->18651 18639 1e2184 18634->18639 18640 1db01a ___std_exception_copy RtlAllocateHeap 18635->18640 18641 1db01a ___std_exception_copy RtlAllocateHeap 18636->18641 18653 1e21b1 18636->18653 18637 1db01a ___std_exception_copy RtlAllocateHeap 18642 1e21bb 18637->18642 18643 1db01a ___std_exception_copy RtlAllocateHeap 18638->18643 18644 1e144a __Getctype RtlAllocateHeap 18639->18644 18645 1e2209 18640->18645 18646 1e21a6 18641->18646 18647 1db01a ___std_exception_copy RtlAllocateHeap 18642->18647 18648 1e2288 18643->18648 18644->18636 18649 1db01a ___std_exception_copy RtlAllocateHeap 18645->18649 18650 1e18a9 __Getctype RtlAllocateHeap 18646->18650 18647->18627 18648->18624 18649->18652 18650->18653 18651->18633 18652->18628 18653->18637 18655 1d99c1 18654->18655 18656 1d99b3 18654->18656 18657 1d16ff __floor_pentium4 RtlAllocateHeap 18655->18657 18656->18655 18661 1d99d9 18656->18661 18658 1d99c9 18657->18658 18666 1c8c60 18658->18666 18660 1d99d3 18660->18590 18661->18660 18662 1d16ff __floor_pentium4 RtlAllocateHeap 18661->18662 18662->18658 18664 1db01a ___std_exception_copy RtlAllocateHeap 18663->18664 18665 1d1cae 18664->18665 18665->18591 18669 1c8bac 18666->18669 18670 1c8bbe ___std_exception_copy 18669->18670 18675 1c8be3 18670->18675 18672 1c8bd6 18682 1c899c 18672->18682 18676 1c8bf3 18675->18676 18679 1c8bfa ___std_exception_copy __Getctype 18675->18679 18688 1c8a01 18676->18688 18678 1c8c08 18678->18672 18679->18678 18680 1c8bac ___std_exception_copy RtlAllocateHeap 18679->18680 18681 1c8c6c 18680->18681 18681->18672 18683 1c89a8 18682->18683 18686 1c89bf 18683->18686 18703 1c8a47 18683->18703 18685 1c8a47 ___std_exception_copy RtlAllocateHeap 18687 1c89d2 18685->18687 18686->18685 18686->18687 18687->18660 18689 1c8a10 18688->18689 18692 1da044 18689->18692 18693 1da057 __Getctype 18692->18693 18694 1da65a __Getctype RtlAllocateHeap 18693->18694 18702 1c8a32 18693->18702 18695 1da087 __Getctype 18694->18695 18696 1da08f __Getctype 18695->18696 18697 1da0c3 18695->18697 18699 1db01a ___std_exception_copy RtlAllocateHeap 18696->18699 18698 1d9c70 __Getctype RtlAllocateHeap 18697->18698 18700 1da0ce 18698->18700 18699->18702 18701 1db01a ___std_exception_copy RtlAllocateHeap 18700->18701 18701->18702 18702->18679 18704 1c8a5a 18703->18704 18705 1c8a51 18703->18705 18704->18686 18706 1c8a01 ___std_exception_copy RtlAllocateHeap 18705->18706 18707 1c8a56 18706->18707 18707->18704 18710 1d41c6 18707->18710 18709 1c8a63 18711 1d41cb std::locale::_Setgloballocale 18710->18711 18712 1df665 std::locale::_Setgloballocale RtlAllocateHeap 18711->18712 18714 1d41d6 std::locale::_Setgloballocale 18711->18714 18712->18714 18713 1d36e2 std::locale::_Setgloballocale RtlAllocateHeap 18715 1d4209 __Getctype std::locale::_Setgloballocale 18713->18715 18714->18713 18715->18709 18798 1c2b99 18716->18798 18719 195410 18720 195419 18719->18720 18722 1c2534 std::_Throw_Cpp_error 3 API calls 18719->18722 18720->18514 18723 195430 18722->18723 18807 1c953c 18723->18807 18727 192d13 18726->18727 18727->18727 18728 193040 std::_Throw_Cpp_error 2 API calls 18727->18728 18729 192d25 18728->18729 18729->18514 18731 1aad10 18730->18731 19124 1afbf0 18731->19124 18734 193040 std::_Throw_Cpp_error 2 API calls 18733->18734 18735 192d55 18734->18735 18736 2662c0 18735->18736 18737 266358 18736->18737 18742 266361 std::locale::_Setgloballocale 18736->18742 19133 1ae4b0 18737->19133 18740 26654f 18744 266553 18740->18744 19235 1a6130 18740->19235 18742->18740 18742->18744 19156 284760 18742->19156 19167 1b4160 18742->19167 18745 266580 std::ios_base::_Ios_base_dtor 18744->18745 18746 1c8c70 std::_Throw_Cpp_error RtlAllocateHeap 18744->18746 18745->18519 18747 2665ce 18746->18747 18748 1c3069 __Xtime_get_ticks GetSystemTimePreciseAsFileTime 18747->18748 18749 2665d6 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 18748->18749 18749->18519 19322 1c975e 18750->19322 18752 1c9832 18752->18530 18753 1d1628 18752->18753 18754 1d163b ___std_exception_copy 18753->18754 19346 1d140a 18754->19346 18756 1d1650 18757 1c899c ___std_exception_copy RtlAllocateHeap 18756->18757 18758 1d165d 18757->18758 18780 1cd0a8 18758->18780 18760 1a629d 18759->18760 18761 1a62b1 18759->18761 18762 1a6130 2 API calls 18760->18762 18761->18530 18762->18761 18764 1d12ca ___std_exception_copy 18763->18764 19460 1cd6a5 18764->19460 18766 1d12e4 18767 1c899c ___std_exception_copy RtlAllocateHeap 18766->18767 18768 1d12f1 18767->18768 18768->18530 18770 25f2f6 std::locale::_Setgloballocale 18769->18770 19575 1aab20 18770->19575 18773 1a8f00 std::_Throw_Cpp_error 2 API calls 18774 25f47f 18773->18774 19580 193440 18774->19580 18777 25f58b std::ios_base::_Ios_base_dtor 18777->18530 18778 1c8c70 std::_Throw_Cpp_error RtlAllocateHeap 18779 25f5ce 18778->18779 18779->18530 18781 1cd0bb ___std_exception_copy 18780->18781 19821 1ccf83 18781->19821 18783 1cd0c7 18784 1c899c ___std_exception_copy RtlAllocateHeap 18783->18784 18785 1cd0d3 18784->18785 18785->18530 19891 1a7ef0 18786->19891 18788 1ab48d 19908 1b2100 18788->19908 18792 1ab503 18792->18530 20275 1e8bb0 18793->20275 18795 1e8b31 std::_Locinfo::_Locinfo_ctor 18796 193040 std::_Throw_Cpp_error 2 API calls 18795->18796 18797 1e8b7c 18796->18797 18797->18530 18813 1c2bc8 18798->18813 18800 195409 18800->18719 18801 1c2534 18800->18801 18802 1c254a std::_Throw_Cpp_error 18801->18802 18820 1c24e7 18802->18820 18804 1c255a __EH_prolog3 std::_Throw_Cpp_error Concurrency::cancel_current_task 18826 1a9cb0 18804->18826 18806 1c25c7 std::_Throw_Cpp_error 18806->18719 18808 1c954f ___std_exception_copy 18807->18808 19108 1c93db 18808->19108 18810 1c955e 18811 1c899c ___std_exception_copy RtlAllocateHeap 18810->18811 18812 195450 18811->18812 18812->18514 18816 1c2be1 18813->18816 18814 1c2bf2 _ValidateLocalCookies 18814->18800 18816->18814 18817 1c302b 18816->18817 18818 1c3069 __Xtime_get_ticks GetSystemTimePreciseAsFileTime 18817->18818 18819 1c3036 __aulldiv __aullrem 18818->18819 18819->18816 18821 1c24f3 __EH_prolog3_GS 18820->18821 18822 192cf0 std::_Throw_Cpp_error 2 API calls 18821->18822 18823 1c2507 18822->18823 18837 1936e0 18823->18837 18825 1c251c std::_Throw_Cpp_error 18825->18804 18864 194900 18826->18864 18828 1a9d26 18829 1c3672 std::_Facet_Register 2 API calls 18828->18829 18830 1a9d2d 18829->18830 18869 1c2729 18830->18869 18832 1a9d39 18877 1aa060 18832->18877 18834 1a9d76 18835 1a9dc7 std::_Throw_Cpp_error 18834->18835 18836 194900 std::_Throw_Cpp_error 2 API calls 18834->18836 18835->18806 18836->18835 18838 1a63b0 std::_Throw_Cpp_error 2 API calls 18837->18838 18839 193731 18838->18839 18840 19375a 18839->18840 18851 1a8f00 18839->18851 18842 1a8f00 std::_Throw_Cpp_error 2 API calls 18840->18842 18843 19378a 18842->18843 18844 1c4b15 ___std_exception_copy 2 API calls 18843->18844 18846 19381e 18844->18846 18845 19385f std::ios_base::_Ios_base_dtor 18845->18825 18846->18845 18847 1c8c70 std::_Throw_Cpp_error RtlAllocateHeap 18846->18847 18848 1938b0 18847->18848 18860 1c4b78 18848->18860 18850 1938f5 std::ios_base::_Ios_base_dtor 18850->18825 18852 1a8f22 std::_Locinfo::_Locinfo_ctor 18851->18852 18853 1a8f4f 18851->18853 18852->18840 18854 1932d0 std::_Throw_Cpp_error 2 API calls 18853->18854 18855 1a902f std::ios_base::_Ios_base_dtor 18853->18855 18856 1a8fa4 std::_Locinfo::_Locinfo_ctor 18854->18856 18855->18840 18857 1a9002 std::_Locinfo::_Locinfo_ctor 18856->18857 18858 192fe0 std::_Throw_Cpp_error RtlAllocateHeap 18856->18858 18857->18840 18859 1a8fef 18858->18859 18859->18840 18861 1c4b8c 18860->18861 18862 1c4b85 18860->18862 18861->18850 18863 1d1c96 ___std_exception_copy RtlAllocateHeap 18862->18863 18863->18861 18865 194922 18864->18865 18866 19491a std::_Throw_Cpp_error Concurrency::cancel_current_task 18864->18866 18865->18828 18889 1947f0 18866->18889 18868 194968 std::ios_base::_Ios_base_dtor Concurrency::cancel_current_task 18868->18828 18870 1c2735 __EH_prolog3 std::_Lockit::_Lockit 18869->18870 18875 1c2771 std::_Throw_Cpp_error std::_Lockit::~_Lockit 18870->18875 18907 1c288c 18870->18907 18872 1c2753 18913 1c28af 18872->18913 18875->18832 18879 1aa0a2 std::_Throw_Cpp_error std::_Lockit::~_Lockit std::_Lockit::_Lockit 18877->18879 18878 1aa144 std::_Lockit::~_Lockit 18878->18834 18879->18878 18880 1c3672 std::_Facet_Register 2 API calls 18879->18880 18881 1aa152 18880->18881 18978 194040 18881->18978 18887 1aa1f1 19013 1c26f7 18887->19013 18890 194851 18889->18890 18890->18890 18901 193040 18890->18901 18892 194865 18893 1936e0 std::_Throw_Cpp_error 2 API calls 18892->18893 18895 19487b 18893->18895 18894 1948a5 std::ios_base::_Ios_base_dtor 18894->18868 18895->18894 18896 1c8c70 std::_Throw_Cpp_error RtlAllocateHeap 18895->18896 18898 1948f7 std::_Throw_Cpp_error Concurrency::cancel_current_task 18896->18898 18897 194922 18897->18868 18898->18897 18899 1947f0 std::_Throw_Cpp_error 2 API calls 18898->18899 18900 194968 std::ios_base::_Ios_base_dtor Concurrency::cancel_current_task 18899->18900 18900->18868 18902 1930c8 18901->18902 18904 193052 18901->18904 18902->18892 18903 193057 std::_Locinfo::_Locinfo_ctor 18903->18892 18904->18903 18905 1932d0 std::_Throw_Cpp_error 2 API calls 18904->18905 18906 1930a3 std::_Locinfo::_Locinfo_ctor 18905->18906 18906->18892 18908 1c3672 std::_Facet_Register 2 API calls 18907->18908 18909 1c2897 18908->18909 18910 1c28ab 18909->18910 18923 1c2611 18909->18923 18910->18872 18914 1c275b 18913->18914 18915 1c28bb 18913->18915 18917 1a5a60 18914->18917 18926 1c333a 18915->18926 18918 1a5a86 18917->18918 18922 1a5ab3 std::_Locinfo::_Locinfo_ctor 18917->18922 18919 1a5a90 18918->18919 18920 1d1c96 ___std_exception_copy RtlAllocateHeap 18918->18920 18921 1d23ec ___std_exception_copy 2 API calls 18919->18921 18919->18922 18920->18919 18921->18922 18922->18875 18924 1a5a60 std::_Locinfo::_Locinfo_ctor 2 API calls 18923->18924 18925 1c264b 18924->18925 18925->18872 18927 1c334a std::locale::_Setgloballocale 18926->18927 18927->18914 18928 1d41d6 std::locale::_Setgloballocale 18927->18928 18932 1df665 18927->18932 18953 1d36e2 18928->18953 18931 1d4209 __Getctype std::locale::_Setgloballocale 18931->18914 18933 1df671 std::locale::_Setgloballocale 18932->18933 18934 1d9f93 std::locale::_Setgloballocale RtlAllocateHeap 18933->18934 18935 1df6c1 18933->18935 18938 1df6a2 std::locale::_Setgloballocale 18933->18938 18940 1df6d3 std::_Lockit::_Lockit std::locale::_Setgloballocale 18933->18940 18934->18938 18936 1d16ff __floor_pentium4 RtlAllocateHeap 18935->18936 18937 1df6c6 18936->18937 18939 1c8c60 ___std_exception_copy RtlAllocateHeap 18937->18939 18938->18935 18938->18940 18952 1df6ab 18938->18952 18939->18952 18941 1df746 18940->18941 18942 1df843 std::_Lockit::~_Lockit 18940->18942 18944 1df774 std::locale::_Setgloballocale 18940->18944 18941->18944 18956 1d9e42 18941->18956 18943 1d36e2 std::locale::_Setgloballocale RtlAllocateHeap 18942->18943 18945 1df856 18943->18945 18948 1d9e42 __Getctype RtlAllocateHeap 18944->18948 18950 1df7c9 18944->18950 18944->18952 18948->18950 18949 1d9e42 __Getctype RtlAllocateHeap 18949->18944 18951 1d9e42 __Getctype RtlAllocateHeap 18950->18951 18950->18952 18951->18952 18952->18928 18970 1d3552 18953->18970 18955 1d36f3 18955->18931 18957 1d9e4b __Getctype 18956->18957 18958 1da65a __Getctype RtlAllocateHeap 18957->18958 18959 1d9e62 18957->18959 18961 1d9e8f __Getctype 18958->18961 18960 1d9ef2 18959->18960 18962 1d41c6 __Getctype RtlAllocateHeap 18959->18962 18960->18949 18963 1d9ecf 18961->18963 18964 1d9e97 __Getctype 18961->18964 18965 1d9efc 18962->18965 18966 1d9c70 __Getctype RtlAllocateHeap 18963->18966 18967 1db01a ___std_exception_copy RtlAllocateHeap 18964->18967 18968 1d9eda 18966->18968 18967->18959 18969 1db01a ___std_exception_copy RtlAllocateHeap 18968->18969 18969->18959 18971 1d357f std::locale::_Setgloballocale 18970->18971 18974 1d33e3 18971->18974 18973 1d35c8 std::locale::_Setgloballocale 18973->18955 18975 1d33ef std::_Lockit::_Lockit std::locale::_Setgloballocale 18974->18975 18976 1d346a std::locale::_Setgloballocale RtlAllocateHeap 18975->18976 18977 1d3406 std::locale::_Setgloballocale 18976->18977 18977->18973 18979 194066 std::_Lockit::_Lockit 18978->18979 18980 1940c2 18979->18980 18981 1940e6 18979->18981 19016 1c2827 18980->19016 19025 1c1d4a 18981->19025 18985 1940f0 18986 1c2cf4 19057 1d3cf8 18986->19057 18988 1c2cfd __Getctype 18989 1c2d35 18988->18989 18990 1c2d17 18988->18990 18992 1d454e __Getctype RtlAllocateHeap 18989->18992 19062 1d454e 18990->19062 18993 1c2d1e 18992->18993 19067 1d3d42 18993->19067 18996 1aa1ca 18998 194100 18996->18998 19104 1c2872 18998->19104 19001 194140 19003 19415b 19001->19003 19004 1d1c96 ___std_exception_copy RtlAllocateHeap 19001->19004 19002 1d1c96 ___std_exception_copy RtlAllocateHeap 19002->19001 19005 1d1c96 ___std_exception_copy RtlAllocateHeap 19003->19005 19006 194176 19003->19006 19004->19003 19005->19006 19007 194191 19006->19007 19008 1d1c96 ___std_exception_copy RtlAllocateHeap 19006->19008 19009 1941ac 19007->19009 19010 1d1c96 ___std_exception_copy RtlAllocateHeap 19007->19010 19008->19007 19011 1941c7 std::_Lockit::~_Lockit 19009->19011 19012 1d1c96 ___std_exception_copy RtlAllocateHeap 19009->19012 19010->19009 19011->18887 19012->19011 19014 1c3672 std::_Facet_Register 2 API calls 19013->19014 19015 1c2702 19014->19015 19015->18878 19028 1d4516 19016->19028 19019 1a5a60 std::_Locinfo::_Locinfo_ctor 2 API calls 19020 1c284b 19019->19020 19021 1c285b 19020->19021 19022 1d4516 std::_Locinfo::_Locinfo_dtor 2 API calls 19020->19022 19023 1a5a60 std::_Locinfo::_Locinfo_ctor 2 API calls 19021->19023 19022->19021 19024 1940c9 19023->19024 19024->18986 19054 193540 19025->19054 19027 1c1d5b Concurrency::cancel_current_task 19027->18985 19029 1d4523 std::_Lockit::_Lockit 19028->19029 19032 1d42c1 19029->19032 19031 1c2833 19031->19019 19033 1d42cd std::_Lockit::_Lockit std::locale::_Setgloballocale 19032->19033 19036 1d431c 19033->19036 19035 1d42e8 std::_Locinfo::_Locinfo_dtor 19035->19031 19037 1d447b std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 19036->19037 19038 1d4337 19037->19038 19039 1d9e42 __Getctype RtlAllocateHeap 19038->19039 19049 1d4370 __Getctype 19038->19049 19040 1d4344 19039->19040 19041 1d3379 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 19040->19041 19042 1d4369 19041->19042 19043 1db094 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 19042->19043 19042->19049 19044 1d4395 19043->19044 19045 1d3379 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 19044->19045 19044->19049 19046 1d43b1 19045->19046 19047 1d43b8 19046->19047 19048 1d43d3 19046->19048 19047->19049 19050 1db01a ___std_exception_copy RtlAllocateHeap 19047->19050 19051 1db01a ___std_exception_copy RtlAllocateHeap 19048->19051 19052 1d43fe 19048->19052 19049->19035 19050->19049 19051->19052 19052->19049 19053 1db01a ___std_exception_copy RtlAllocateHeap 19052->19053 19053->19049 19055 1c4b15 ___std_exception_copy 2 API calls 19054->19055 19056 193585 19055->19056 19056->19027 19058 1d9e42 __Getctype RtlAllocateHeap 19057->19058 19059 1d3d03 19058->19059 19078 1da12d 19059->19078 19063 1d9e42 __Getctype RtlAllocateHeap 19062->19063 19064 1d4559 19063->19064 19065 1da12d __Getctype RtlAllocateHeap 19064->19065 19066 1d4569 19065->19066 19066->18993 19068 1d9e42 __Getctype RtlAllocateHeap 19067->19068 19069 1d3d4d 19068->19069 19070 1da12d __Getctype RtlAllocateHeap 19069->19070 19071 1c2d46 19070->19071 19071->18996 19072 1d4572 19071->19072 19073 1d457f 19072->19073 19077 1d45b3 __Getctype 19072->19077 19074 1d23ec ___std_exception_copy 2 API calls 19073->19074 19075 1d45a2 19074->19075 19075->19077 19095 1de2f4 19075->19095 19077->18996 19079 1d3d13 19078->19079 19080 1da140 19078->19080 19079->18988 19080->19079 19082 1e2392 19080->19082 19083 1e239e std::locale::_Setgloballocale 19082->19083 19084 1d9e42 __Getctype RtlAllocateHeap 19083->19084 19086 1e23a7 std::_Lockit::_Lockit 19084->19086 19085 1e23ed 19085->19079 19086->19085 19091 1e2413 19086->19091 19088 1e23d6 __Getctype 19088->19085 19089 1d41c6 __Getctype RtlAllocateHeap 19088->19089 19090 1e2412 19089->19090 19092 1e2421 __Getctype 19091->19092 19094 1e242e 19091->19094 19093 1e2146 __Getctype RtlAllocateHeap 19092->19093 19092->19094 19093->19094 19094->19088 19096 1de310 19095->19096 19097 1de302 19095->19097 19098 1d16ff __floor_pentium4 RtlAllocateHeap 19096->19098 19097->19096 19099 1de32a 19097->19099 19103 1de31a 19098->19103 19101 1de324 19099->19101 19102 1d16ff __floor_pentium4 RtlAllocateHeap 19099->19102 19100 1c8c60 ___std_exception_copy RtlAllocateHeap 19100->19101 19101->19077 19102->19103 19103->19100 19105 1c287e 19104->19105 19106 19412c 19104->19106 19107 1d4516 std::_Locinfo::_Locinfo_dtor 2 API calls 19105->19107 19106->19001 19106->19002 19107->19106 19109 1c93e7 std::locale::_Setgloballocale 19108->19109 19110 1c93f0 19109->19110 19112 1c9414 19109->19112 19111 1c8be3 ___std_exception_copy RtlAllocateHeap 19110->19111 19115 1c9409 19111->19115 19116 1c9432 19112->19116 19117 1da1e9 19112->19117 19114 1c8be3 ___std_exception_copy RtlAllocateHeap 19114->19115 19115->18810 19116->19114 19116->19115 19118 1da20a 19117->19118 19119 1da1f5 19117->19119 19118->19116 19120 1d16ff __floor_pentium4 RtlAllocateHeap 19119->19120 19121 1da1fa 19120->19121 19122 1c8c60 ___std_exception_copy RtlAllocateHeap 19121->19122 19123 1da205 19122->19123 19123->19116 19126 1afc8d 19124->19126 19129 1afc12 std::_Locinfo::_Locinfo_ctor 19124->19129 19125 1afd5e 19126->19125 19127 1932d0 std::_Throw_Cpp_error 2 API calls 19126->19127 19128 1afce1 std::_Locinfo::_Locinfo_ctor 19127->19128 19130 1afd3a std::_Locinfo::_Locinfo_ctor 19128->19130 19131 192fe0 std::_Throw_Cpp_error RtlAllocateHeap 19128->19131 19132 1afd27 19131->19132 19134 1ae528 19133->19134 19135 1ae4c2 19133->19135 19246 193330 19134->19246 19137 1ae4ca 19135->19137 19138 1ae4f9 19135->19138 19139 1ae52d 19137->19139 19140 1ae4d1 19137->19140 19141 1ae516 19138->19141 19144 1c3672 std::_Facet_Register 2 API calls 19138->19144 19142 192b50 Concurrency::cancel_current_task 2 API calls 19139->19142 19143 1c3672 std::_Facet_Register 2 API calls 19140->19143 19141->18742 19145 1ae4d7 19142->19145 19143->19145 19146 1ae503 19144->19146 19147 1c8c70 std::_Throw_Cpp_error RtlAllocateHeap 19145->19147 19148 1ae4e0 19145->19148 19146->18742 19149 1ae537 19147->19149 19148->18742 19249 1a6ad0 19149->19249 19151 1ae574 19152 194900 std::_Throw_Cpp_error 2 API calls 19151->19152 19153 1ae5fb 19152->19153 19155 1ae613 19153->19155 19253 1a9b60 19153->19253 19155->18742 19157 284767 19156->19157 19158 28476c 19156->19158 19157->18742 19159 1d23ec ___std_exception_copy 2 API calls 19158->19159 19165 2847af 19158->19165 19159->19165 19160 2847c2 19160->18742 19161 284877 19161->18742 19162 1d1c96 ___std_exception_copy RtlAllocateHeap 19163 284867 19162->19163 19163->18742 19164 284821 19164->19161 19164->19162 19165->19160 19165->19164 19166 1d1c96 ___std_exception_copy RtlAllocateHeap 19165->19166 19166->19164 19168 1b4288 19167->19168 19169 1b4195 19167->19169 19171 193330 2 API calls 19168->19171 19170 1b41b1 19169->19170 19172 1b4202 19169->19172 19173 1b41f2 19169->19173 19175 1c3672 std::_Facet_Register 2 API calls 19170->19175 19174 1b428d 19171->19174 19178 1c3672 std::_Facet_Register 2 API calls 19172->19178 19184 1b41cf std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 19172->19184 19173->19170 19173->19174 19176 192b50 Concurrency::cancel_current_task 2 API calls 19174->19176 19179 1b41c4 19175->19179 19177 1b4292 19176->19177 19180 1c8c70 std::_Throw_Cpp_error RtlAllocateHeap 19177->19180 19178->19184 19179->19177 19179->19184 19181 1b4297 19180->19181 19182 1b42fa 19181->19182 19183 1b43e9 19181->19183 19293 1b6ff0 19182->19293 19185 193330 2 API calls 19183->19185 19288 1b77d0 19184->19288 19186 1b43ee 19185->19186 19188 1b445a 19186->19188 19189 1b4549 19186->19189 19193 1b6ff0 2 API calls 19188->19193 19191 193330 2 API calls 19189->19191 19201 1b454e 19191->19201 19192 1b425e 19192->18742 19196 1b4496 19193->19196 19194 1b470b 19195 193330 2 API calls 19194->19195 19198 1b46af 19195->19198 19200 1a63b0 std::_Throw_Cpp_error 2 API calls 19196->19200 19197 1b4706 19202 192b50 Concurrency::cancel_current_task 2 API calls 19197->19202 19203 1c8c70 std::_Throw_Cpp_error RtlAllocateHeap 19198->19203 19225 1b46d1 std::ios_base::_Ios_base_dtor 19198->19225 19199 1b4336 19301 1b7830 19199->19301 19214 1b44c4 19200->19214 19201->19194 19201->19197 19204 1b45ee 19201->19204 19205 1b4615 19201->19205 19202->19194 19206 1b4715 19203->19206 19204->19197 19207 1b45f9 19204->19207 19211 1c3672 std::_Facet_Register 2 API calls 19205->19211 19217 1b45ff 19205->19217 19313 1ad010 19206->19313 19208 1c3672 std::_Facet_Register 2 API calls 19207->19208 19208->19217 19211->19217 19212 1b43b0 19212->18742 19216 1b7830 RtlAllocateHeap 19214->19216 19218 1b4510 19216->19218 19217->19198 19217->19225 19306 1c1f9c 19217->19306 19218->18742 19219 1b4798 19221 192b50 Concurrency::cancel_current_task 2 API calls 19219->19221 19220 1b472f Concurrency::cancel_current_task 19220->19219 19222 1b475b 19220->19222 19223 1b477f 19220->19223 19226 1b4768 19221->19226 19222->19219 19227 1b4762 19222->19227 19224 1b4791 19223->19224 19228 1c3672 std::_Facet_Register 2 API calls 19223->19228 19224->18742 19225->18742 19230 1c8c70 std::_Throw_Cpp_error RtlAllocateHeap 19226->19230 19234 1b4771 19226->19234 19231 1c3672 std::_Facet_Register 2 API calls 19227->19231 19232 1b4789 19228->19232 19233 1b47a2 19230->19233 19231->19226 19232->18742 19234->18742 19236 1a6174 19235->19236 19238 1a6143 std::_Locinfo::_Locinfo_ctor 19235->19238 19237 1a6180 19236->19237 19239 1a6200 19236->19239 19240 1932d0 std::_Throw_Cpp_error 2 API calls 19237->19240 19238->18744 19239->19239 19241 1a8f00 std::_Throw_Cpp_error 2 API calls 19239->19241 19244 1a61bf std::_Locinfo::_Locinfo_ctor 19240->19244 19242 1a6232 19241->19242 19242->18744 19243 1a61ed 19243->18744 19244->19243 19245 192fe0 std::_Throw_Cpp_error RtlAllocateHeap 19244->19245 19245->19243 19257 1c1cea 19246->19257 19250 1a6b02 19249->19250 19251 1a6b1d 19250->19251 19277 1a50e0 19250->19277 19251->19151 19254 1a9bbb 19253->19254 19255 1a9b96 19253->19255 19254->19155 19255->19254 19285 1a88a0 19255->19285 19264 1c1a9f 19257->19264 19259 1c1cfb Concurrency::cancel_current_task 19267 1c1af4 19259->19267 19261 1c1d1b Concurrency::cancel_current_task 19270 1c1b37 19261->19270 19263 1c1d3b Concurrency::cancel_current_task 19274 1934e0 19264->19274 19268 1934e0 std::invalid_argument::invalid_argument 2 API calls 19267->19268 19269 1c1b06 19268->19269 19269->19261 19271 1c1b4b std::regex_error::regex_error 19270->19271 19272 1934e0 std::invalid_argument::invalid_argument 2 API calls 19271->19272 19273 1c1b54 19272->19273 19273->19263 19275 1c4b15 ___std_exception_copy 2 API calls 19274->19275 19276 193522 19275->19276 19276->19259 19278 1a5117 19277->19278 19282 1a51b5 19277->19282 19279 1a6ad0 2 API calls 19278->19279 19280 1a5120 19279->19280 19281 1a519d 19280->19281 19283 194900 std::_Throw_Cpp_error 2 API calls 19280->19283 19281->19282 19284 1a9b60 2 API calls 19281->19284 19282->19251 19283->19281 19284->19282 19286 194900 std::_Throw_Cpp_error 2 API calls 19285->19286 19287 1a88bf 19286->19287 19287->19254 19289 1b77f9 std::ios_base::_Ios_base_dtor 19288->19289 19290 1b77dc 19288->19290 19289->19192 19290->19289 19291 1c8c70 std::_Throw_Cpp_error RtlAllocateHeap 19290->19291 19292 1b7824 19291->19292 19294 1b703c 19293->19294 19296 1b6ff9 19293->19296 19294->19294 19295 1b7013 19297 1c3672 std::_Facet_Register 2 API calls 19295->19297 19300 1b701c 19295->19300 19296->19294 19296->19295 19298 1c3672 std::_Facet_Register 2 API calls 19296->19298 19299 1b7035 19297->19299 19298->19295 19299->19199 19300->19199 19302 1b7882 std::ios_base::_Ios_base_dtor 19301->19302 19303 1b783d 19301->19303 19302->19212 19303->19302 19304 1c8c70 std::_Throw_Cpp_error RtlAllocateHeap 19303->19304 19305 1b78b6 19304->19305 19307 1c1fa5 19306->19307 19308 1c1fb2 19306->19308 19307->19308 19309 1d41c6 __Getctype RtlAllocateHeap 19307->19309 19308->19217 19310 1c1fbb 19309->19310 19311 1c1f9c RtlAllocateHeap 19310->19311 19312 1c1fca 19311->19312 19312->19217 19314 1ad01a 19313->19314 19315 1ad02e 19313->19315 19314->19315 19316 1c1f9c RtlAllocateHeap 19314->19316 19317 1a9910 19315->19317 19316->19314 19318 1a9938 std::ios_base::_Ios_base_dtor 19317->19318 19319 1a9928 19317->19319 19318->19220 19319->19318 19320 1c8c70 std::_Throw_Cpp_error RtlAllocateHeap 19319->19320 19321 1a994d 19320->19321 19325 1c976a std::locale::_Setgloballocale 19322->19325 19323 1c9771 19324 1d16ff __floor_pentium4 RtlAllocateHeap 19323->19324 19326 1c9776 19324->19326 19325->19323 19327 1c9791 19325->19327 19328 1c8c60 ___std_exception_copy RtlAllocateHeap 19326->19328 19329 1c9796 19327->19329 19330 1c97a3 19327->19330 19333 1c9781 19328->19333 19332 1d16ff __floor_pentium4 RtlAllocateHeap 19329->19332 19336 1da8ef 19330->19336 19332->19333 19333->18752 19334 1c97ac 19334->19333 19335 1d16ff __floor_pentium4 RtlAllocateHeap 19334->19335 19335->19333 19337 1da8fb std::_Lockit::_Lockit std::locale::_Setgloballocale 19336->19337 19340 1da993 19337->19340 19339 1da916 19339->19334 19342 1da9b6 19340->19342 19341 1da65a __Getctype RtlAllocateHeap 19343 1daa17 19341->19343 19342->19341 19345 1da9fc std::locale::_Setgloballocale 19342->19345 19344 1db01a ___std_exception_copy RtlAllocateHeap 19343->19344 19344->19345 19345->19339 19347 1d1418 19346->19347 19348 1d1440 19346->19348 19347->19348 19349 1d1425 19347->19349 19350 1d1447 19347->19350 19348->18756 19351 1c8be3 ___std_exception_copy RtlAllocateHeap 19349->19351 19354 1d1363 19350->19354 19351->19348 19353 1d147f 19353->18756 19355 1d136f std::locale::_Setgloballocale 19354->19355 19358 1d13be 19355->19358 19357 1d138a 19357->19353 19365 1dc8aa 19358->19365 19385 1dc86c 19365->19385 19367 1d13d6 19372 1d1481 19367->19372 19368 1dc8bb 19368->19367 19392 1db094 19368->19392 19371 1db01a ___std_exception_copy RtlAllocateHeap 19371->19367 19375 1d1493 19372->19375 19376 1d13f4 19372->19376 19373 1d14a1 19374 1c8be3 ___std_exception_copy RtlAllocateHeap 19373->19374 19374->19376 19375->19373 19375->19376 19379 1d14d7 std::_Locinfo::_Locinfo_ctor 19375->19379 19381 1dc955 19376->19381 19378 1da1e9 RtlAllocateHeap 19378->19379 19379->19376 19379->19378 19407 1c9a91 19379->19407 19413 1d9678 19379->19413 19382 1d1400 19381->19382 19383 1dc960 19381->19383 19382->19357 19383->19382 19384 1c9a91 4 API calls 19383->19384 19384->19382 19386 1dc878 19385->19386 19387 1dc8a2 19386->19387 19388 1da1e9 RtlAllocateHeap 19386->19388 19387->19368 19389 1dc893 19388->19389 19398 1e3be3 19389->19398 19391 1dc899 19391->19368 19393 1db0d2 19392->19393 19397 1db0a2 __Getctype std::_Facet_Register 19392->19397 19394 1d16ff __floor_pentium4 RtlAllocateHeap 19393->19394 19396 1db0d0 19394->19396 19395 1db0bd RtlAllocateHeap 19395->19396 19395->19397 19396->19371 19397->19393 19397->19395 19399 1e3bf0 19398->19399 19401 1e3bfd 19398->19401 19400 1d16ff __floor_pentium4 RtlAllocateHeap 19399->19400 19402 1e3bf5 19400->19402 19403 1e3c09 19401->19403 19404 1d16ff __floor_pentium4 RtlAllocateHeap 19401->19404 19402->19391 19403->19391 19405 1e3c2a 19404->19405 19406 1c8c60 ___std_exception_copy RtlAllocateHeap 19405->19406 19406->19402 19408 1c9aaa 19407->19408 19412 1c9ad1 19407->19412 19409 1da1e9 RtlAllocateHeap 19408->19409 19408->19412 19410 1c9ac6 19409->19410 19411 1d9678 4 API calls 19410->19411 19411->19412 19412->19379 19414 1d9684 std::locale::_Setgloballocale 19413->19414 19415 1d96c5 19414->19415 19417 1d970b 19414->19417 19418 1d968c 19414->19418 19416 1c8be3 ___std_exception_copy RtlAllocateHeap 19415->19416 19416->19418 19417->19418 19420 1d9789 19417->19420 19418->19379 19421 1d97b1 19420->19421 19433 1d97d4 19420->19433 19422 1d97b5 19421->19422 19424 1d9810 19421->19424 19423 1c8be3 ___std_exception_copy RtlAllocateHeap 19422->19423 19423->19433 19425 1d982e 19424->19425 19439 1d263d 19424->19439 19434 1d92ce 19425->19434 19429 1d988d 19431 1d98f6 WriteFile 19429->19431 19429->19433 19430 1d9846 19430->19433 19442 1d8e9f 19430->19442 19431->19433 19433->19418 19435 1e3be3 RtlAllocateHeap 19434->19435 19437 1d92e0 19435->19437 19436 1d930e 19436->19429 19436->19430 19437->19436 19448 1ce1d0 19437->19448 19455 1d251c 19439->19455 19441 1d2656 19441->19425 19443 1d8f07 19442->19443 19444 1ce1d0 std::_Locinfo::_Locinfo_dtor 2 API calls 19443->19444 19447 1d8f18 std::_Locinfo::_Locinfo_dtor std::_Locinfo::_Locinfo_ctor 19443->19447 19444->19447 19445 1dc724 RtlAllocateHeap RtlAllocateHeap 19445->19447 19446 1d91ce _ValidateLocalCookies 19446->19433 19446->19446 19447->19445 19447->19446 19449 1c8a47 ___std_exception_copy RtlAllocateHeap 19448->19449 19450 1ce1e0 19449->19450 19451 1da15a std::_Locinfo::_Locinfo_dtor RtlAllocateHeap 19450->19451 19452 1ce1fd 19451->19452 19453 1da1b8 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 19452->19453 19454 1ce20a 19453->19454 19454->19436 19456 1de940 RtlAllocateHeap 19455->19456 19457 1d252e 19456->19457 19458 1d254a SetFilePointerEx 19457->19458 19459 1d2536 19457->19459 19458->19459 19459->19441 19474 1cce79 19460->19474 19462 1cd6ff 19463 1cd723 19462->19463 19466 1ce1d0 std::_Locinfo::_Locinfo_dtor 2 API calls 19462->19466 19470 1cd747 19463->19470 19481 1cce94 19463->19481 19464 1cd6cc 19467 1c8be3 ___std_exception_copy RtlAllocateHeap 19464->19467 19465 1cd6b7 19465->19462 19465->19464 19473 1cd6e7 std::_Locinfo::_Locinfo_dtor 19465->19473 19466->19463 19467->19473 19469 1cd7cf 19471 1cce22 RtlAllocateHeap 19469->19471 19470->19469 19488 1cce22 19470->19488 19471->19473 19473->18766 19475 1cce7e 19474->19475 19476 1cce91 19474->19476 19477 1d16ff __floor_pentium4 RtlAllocateHeap 19475->19477 19476->19465 19478 1cce83 19477->19478 19479 1c8c60 ___std_exception_copy RtlAllocateHeap 19478->19479 19480 1cce8e 19479->19480 19480->19465 19482 1ccea0 19481->19482 19485 1cceb6 19481->19485 19483 1d454e __Getctype RtlAllocateHeap 19482->19483 19486 1cceab std::_Locinfo::_Locinfo_dtor 19483->19486 19484 1ccec6 19484->19463 19485->19484 19494 1d9a39 19485->19494 19486->19463 19489 1cce47 19488->19489 19490 1cce33 19488->19490 19489->19469 19490->19489 19491 1d16ff __floor_pentium4 RtlAllocateHeap 19490->19491 19492 1cce3c 19491->19492 19493 1c8c60 ___std_exception_copy RtlAllocateHeap 19492->19493 19493->19489 19499 1c95ae 19494->19499 19498 1d9a66 _ValidateLocalCookies 19498->19484 19500 1c95cc 19499->19500 19501 1c95c5 19499->19501 19500->19501 19502 1d9e42 __Getctype RtlAllocateHeap 19500->19502 19501->19498 19507 1df44d 19501->19507 19503 1c95ed 19502->19503 19504 1da12d __Getctype RtlAllocateHeap 19503->19504 19505 1c9603 19504->19505 19514 1da18b 19505->19514 19508 1c95ae std::_Locinfo::_Locinfo_dtor 2 API calls 19507->19508 19509 1df46d std::_Locinfo::_Locinfo_dtor 19508->19509 19511 1db094 std::_Locinfo::_Locinfo_dtor 2 API calls 19509->19511 19512 1df529 _ValidateLocalCookies 19509->19512 19513 1df4bf std::_Locinfo::_Locinfo_dtor std::locale::_Setgloballocale 19509->19513 19511->19513 19512->19498 19571 1c3275 19513->19571 19515 1da19e 19514->19515 19516 1da1b3 19514->19516 19515->19516 19518 1e06bd 19515->19518 19516->19501 19519 1d9e42 __Getctype RtlAllocateHeap 19518->19519 19520 1e06c2 19519->19520 19523 1e05d5 19520->19523 19522 1e06cd 19522->19516 19524 1e05e1 std::_Lockit::_Lockit std::locale::_Setgloballocale 19523->19524 19527 1e05fb std::_Locinfo::_Locinfo_dtor 19524->19527 19531 1db01a ___std_exception_copy RtlAllocateHeap 19524->19531 19525 1e0602 19525->19522 19526 1d41c6 __Getctype RtlAllocateHeap 19528 1e0674 19526->19528 19527->19525 19527->19526 19529 1e06b0 19528->19529 19534 1d9efd 19528->19534 19529->19522 19531->19527 19535 1d9f08 __Getctype 19534->19535 19536 1da65a __Getctype RtlAllocateHeap 19535->19536 19546 1d9f14 19535->19546 19540 1d9f38 __Getctype 19536->19540 19537 1d41c6 __Getctype RtlAllocateHeap 19539 1d9f92 19537->19539 19538 1d9f19 19548 1e0480 19538->19548 19541 1d9f40 __Getctype 19540->19541 19542 1d9f74 19540->19542 19544 1db01a ___std_exception_copy RtlAllocateHeap 19541->19544 19543 1d9c70 __Getctype RtlAllocateHeap 19542->19543 19545 1d9f7f 19543->19545 19544->19546 19547 1db01a ___std_exception_copy RtlAllocateHeap 19545->19547 19546->19537 19546->19538 19547->19538 19549 1e05d5 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 19548->19549 19550 1e04aa 19549->19550 19551 1e0207 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 19550->19551 19552 1e04b2 19551->19552 19553 1db094 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 19552->19553 19559 1e04c3 19552->19559 19554 1e04d4 19553->19554 19555 1e04dc 19554->19555 19556 1e04ea 19554->19556 19557 1db01a ___std_exception_copy RtlAllocateHeap 19555->19557 19558 1e06d0 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 19556->19558 19557->19559 19560 1e0517 19558->19560 19559->19529 19561 1e0522 19560->19561 19565 1e053d std::_Locinfo::_Locinfo_dtor 19560->19565 19562 1d16ff __floor_pentium4 RtlAllocateHeap 19561->19562 19564 1e0527 19562->19564 19563 1e0569 19566 1e05b2 19563->19566 19569 1e00f9 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap 19563->19569 19567 1db01a ___std_exception_copy RtlAllocateHeap 19564->19567 19565->19563 19568 1db01a ___std_exception_copy RtlAllocateHeap 19565->19568 19570 1db01a ___std_exception_copy RtlAllocateHeap 19566->19570 19567->19559 19568->19563 19569->19566 19570->19559 19572 1c327f 19571->19572 19574 1c3290 19571->19574 19573 1d1c96 ___std_exception_copy RtlAllocateHeap 19572->19573 19572->19574 19573->19574 19574->19512 19576 1aab55 19575->19576 19577 1aaba3 19576->19577 19584 1ae8a0 19576->19584 19579 1aab83 19579->18773 19581 193459 19580->19581 19588 1d0dd7 19581->19588 19585 1ae8ce 19584->19585 19587 1ae8f8 std::_Locinfo::_Locinfo_ctor 19584->19587 19586 1932d0 std::_Throw_Cpp_error 2 API calls 19585->19586 19586->19587 19587->19579 19589 1d0deb ___std_exception_copy 19588->19589 19594 1ce565 19589->19594 19591 1d0e06 19592 1c899c ___std_exception_copy RtlAllocateHeap 19591->19592 19593 193467 19592->19593 19593->18777 19593->18778 19595 1ce5b4 19594->19595 19596 1ce591 19594->19596 19595->19596 19598 1ce5bc 19595->19598 19597 1c8be3 ___std_exception_copy RtlAllocateHeap 19596->19597 19599 1ce5a9 _ValidateLocalCookies 19597->19599 19603 1cfaa7 19598->19603 19599->19591 19621 1d0b0d 19603->19621 19606 1cfacc 19607 1c8be3 ___std_exception_copy RtlAllocateHeap 19606->19607 19608 1ce63d 19607->19608 19618 1cf28d 19608->19618 19611 1ce1d0 std::_Locinfo::_Locinfo_dtor 2 API calls 19613 1cfaf4 std::_Locinfo::_Locinfo_dtor 19611->19613 19613->19608 19613->19611 19614 1cfbd0 19613->19614 19625 1cf49b 19613->19625 19628 1cfed4 19613->19628 19660 1d036f 19613->19660 19615 1c8be3 ___std_exception_copy RtlAllocateHeap 19614->19615 19616 1cfbea 19615->19616 19617 1c8be3 ___std_exception_copy RtlAllocateHeap 19616->19617 19617->19608 19619 1db01a ___std_exception_copy RtlAllocateHeap 19618->19619 19620 1cf29d 19619->19620 19620->19599 19622 1cfac1 19621->19622 19623 1d0b18 19621->19623 19622->19606 19622->19608 19622->19613 19624 1c8be3 ___std_exception_copy RtlAllocateHeap 19623->19624 19624->19622 19687 1ce842 19625->19687 19627 1cf4d6 19627->19613 19629 1cfedb 19628->19629 19630 1cfef2 19628->19630 19631 1d03f4 19629->19631 19632 1d0394 19629->19632 19639 1cff31 19629->19639 19633 1c8be3 ___std_exception_copy RtlAllocateHeap 19630->19633 19630->19639 19637 1d042d 19631->19637 19638 1d03f9 19631->19638 19634 1d041a 19632->19634 19635 1d039a 19632->19635 19636 1cff26 19633->19636 19722 1cebfc 19634->19722 19649 1d039f 19635->19649 19650 1d03eb 19635->19650 19636->19613 19640 1d044a 19637->19640 19641 1d0432 19637->19641 19642 1d03fb 19638->19642 19643 1d0426 19638->19643 19639->19613 19733 1d0a4d 19640->19733 19641->19634 19641->19650 19659 1d03c5 19641->19659 19645 1d03ae 19642->19645 19653 1d040a 19642->19653 19729 1d0a30 19643->19729 19658 1d0453 _ValidateLocalCookies 19645->19658 19697 1d0785 19645->19697 19649->19645 19651 1d03d8 19649->19651 19649->19659 19650->19658 19711 1ced89 19650->19711 19651->19658 19707 1d0916 19651->19707 19653->19634 19655 1d040e 19653->19655 19655->19658 19718 1d09ab 19655->19718 19658->19613 19659->19658 19736 1dc5ba 19659->19736 19661 1d03f4 19660->19661 19662 1d0394 19660->19662 19665 1d042d 19661->19665 19666 1d03f9 19661->19666 19663 1d041a 19662->19663 19664 1d039a 19662->19664 19672 1cebfc 2 API calls 19663->19672 19676 1d039f 19664->19676 19677 1d03eb 19664->19677 19667 1d044a 19665->19667 19668 1d0432 19665->19668 19669 1d03fb 19666->19669 19670 1d0426 19666->19670 19671 1d0a4d 2 API calls 19667->19671 19668->19663 19668->19677 19686 1d03c5 19668->19686 19674 1d03ae 19669->19674 19679 1d040a 19669->19679 19673 1d0a30 2 API calls 19670->19673 19671->19686 19672->19686 19673->19686 19675 1d0785 2 API calls 19674->19675 19685 1d0453 _ValidateLocalCookies 19674->19685 19675->19686 19676->19674 19678 1d03d8 19676->19678 19676->19686 19680 1ced89 2 API calls 19677->19680 19677->19685 19682 1d0916 2 API calls 19678->19682 19678->19685 19679->19663 19681 1d040e 19679->19681 19680->19686 19683 1d09ab RtlAllocateHeap 19681->19683 19681->19685 19682->19686 19683->19686 19684 1dc5ba 2 API calls 19684->19686 19685->19613 19686->19684 19686->19685 19688 1cce79 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap 19687->19688 19689 1ce854 19688->19689 19690 1ce869 19689->19690 19692 1ce89c 19689->19692 19696 1ce884 std::_Locinfo::_Locinfo_dtor 19689->19696 19691 1c8be3 ___std_exception_copy RtlAllocateHeap 19690->19691 19691->19696 19693 1ce933 19692->19693 19695 1cce22 RtlAllocateHeap 19692->19695 19694 1cce22 RtlAllocateHeap 19693->19694 19694->19696 19695->19693 19696->19627 19698 1d079f 19697->19698 19742 1ce790 19698->19742 19700 1d07de 19753 1dc439 19700->19753 19703 1d0895 19705 1ce1d0 std::_Locinfo::_Locinfo_dtor 2 API calls 19703->19705 19706 1d08c8 19703->19706 19704 1ce1d0 std::_Locinfo::_Locinfo_dtor 2 API calls 19704->19703 19705->19706 19706->19659 19706->19706 19709 1d0931 19707->19709 19708 1d0967 19708->19659 19709->19708 19710 1dc5ba 2 API calls 19709->19710 19710->19708 19712 1ced9e 19711->19712 19713 1cedc0 19712->19713 19715 1cede7 19712->19715 19714 1c8be3 ___std_exception_copy RtlAllocateHeap 19713->19714 19717 1ceddd 19714->19717 19716 1ce790 2 API calls 19715->19716 19715->19717 19716->19717 19717->19659 19719 1d09c1 19718->19719 19720 1c8be3 ___std_exception_copy RtlAllocateHeap 19719->19720 19721 1d09e2 19719->19721 19720->19721 19721->19659 19723 1cec11 19722->19723 19724 1cec33 19723->19724 19726 1cec5a 19723->19726 19725 1c8be3 ___std_exception_copy RtlAllocateHeap 19724->19725 19728 1cec50 19725->19728 19727 1ce790 2 API calls 19726->19727 19726->19728 19727->19728 19728->19659 19730 1d0a3c 19729->19730 19814 1cea6f 19730->19814 19732 1d0a4c 19732->19659 19734 1ced89 2 API calls 19733->19734 19735 1d0a62 19734->19735 19735->19659 19737 1dc5cf 19736->19737 19739 1ce1d0 std::_Locinfo::_Locinfo_dtor 2 API calls 19737->19739 19740 1dc5fc std::_Locinfo::_Locinfo_dtor std::locale::_Setgloballocale 19737->19740 19741 1dc5d3 std::_Locinfo::_Locinfo_dtor std::locale::_Setgloballocale 19737->19741 19738 1c8be3 ___std_exception_copy RtlAllocateHeap 19738->19741 19739->19740 19740->19738 19740->19741 19741->19659 19743 1ce7b7 19742->19743 19744 1ce7a5 19742->19744 19743->19744 19745 1db094 std::_Locinfo::_Locinfo_dtor 2 API calls 19743->19745 19744->19700 19746 1ce7db 19745->19746 19747 1ce7ee 19746->19747 19748 1ce7e3 19746->19748 19772 1cf2a7 19747->19772 19749 1db01a ___std_exception_copy RtlAllocateHeap 19748->19749 19749->19744 19752 1db01a ___std_exception_copy RtlAllocateHeap 19752->19744 19754 1dc46e 19753->19754 19756 1dc44a 19753->19756 19754->19756 19757 1dc4a1 19754->19757 19755 1c8be3 ___std_exception_copy RtlAllocateHeap 19767 1d0871 19755->19767 19756->19755 19758 1dc509 19757->19758 19759 1dc4da 19757->19759 19760 1dc532 19758->19760 19761 1dc537 19758->19761 19775 1dc2dd 19759->19775 19764 1dc55f 19760->19764 19765 1dc599 19760->19765 19780 1dbb66 19761->19780 19768 1dc57f 19764->19768 19769 1dc564 19764->19769 19807 1dbe93 19765->19807 19767->19703 19767->19704 19800 1dc08a 19768->19800 19790 1dc20e 19769->19790 19773 1db01a ___std_exception_copy RtlAllocateHeap 19772->19773 19774 1ce7f9 19773->19774 19774->19752 19776 1dc2f3 19775->19776 19777 1dc2fe 19775->19777 19776->19767 19778 1d99a5 ___std_exception_copy RtlAllocateHeap 19777->19778 19779 1dc359 __Getctype 19778->19779 19779->19767 19781 1dbb79 19780->19781 19782 1dbb88 19781->19782 19783 1dbbaa 19781->19783 19784 1c8be3 ___std_exception_copy RtlAllocateHeap 19782->19784 19785 1dbbbf 19783->19785 19787 1dbc12 19783->19787 19789 1dbba0 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z std::locale::_Setgloballocale __allrem _strrchr 19784->19789 19786 1dbe93 RtlAllocateHeap RtlAllocateHeap 19785->19786 19786->19789 19788 1ce1d0 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 19787->19788 19787->19789 19788->19789 19789->19767 19791 1e47bf RtlAllocateHeap 19790->19791 19792 1dc23e 19791->19792 19793 1e46c5 RtlAllocateHeap 19792->19793 19796 1dc27c 19793->19796 19794 1dc283 19794->19767 19795 1dc2bc 19798 1dbf37 RtlAllocateHeap RtlAllocateHeap 19795->19798 19796->19794 19796->19795 19797 1dc295 19796->19797 19799 1dc120 RtlAllocateHeap RtlAllocateHeap 19797->19799 19798->19794 19799->19794 19801 1e47bf RtlAllocateHeap 19800->19801 19802 1dc0b9 19801->19802 19803 1e46c5 RtlAllocateHeap 19802->19803 19804 1dc0fa 19803->19804 19805 1dc101 19804->19805 19806 1dc120 RtlAllocateHeap RtlAllocateHeap 19804->19806 19805->19767 19806->19805 19808 1e47bf RtlAllocateHeap 19807->19808 19809 1dbebd 19808->19809 19810 1e46c5 RtlAllocateHeap 19809->19810 19811 1dbf0b 19810->19811 19812 1dbf12 19811->19812 19813 1dbf37 RtlAllocateHeap RtlAllocateHeap 19811->19813 19812->19767 19813->19812 19815 1cea84 19814->19815 19816 1ceaa6 19815->19816 19818 1ceacd 19815->19818 19817 1c8be3 ___std_exception_copy RtlAllocateHeap 19816->19817 19820 1ceac3 19817->19820 19819 1ce790 2 API calls 19818->19819 19818->19820 19819->19820 19820->19732 19822 1ccf8f std::locale::_Setgloballocale 19821->19822 19823 1ccf99 19822->19823 19825 1ccfbc 19822->19825 19824 1c8be3 ___std_exception_copy RtlAllocateHeap 19823->19824 19827 1ccfb4 19824->19827 19825->19827 19828 1cd01a 19825->19828 19827->18783 19829 1cd04a 19828->19829 19830 1cd027 19828->19830 19832 1cd042 19829->19832 19833 1c9a91 4 API calls 19829->19833 19831 1c8be3 ___std_exception_copy RtlAllocateHeap 19830->19831 19831->19832 19832->19827 19834 1cd062 19833->19834 19842 1db054 19834->19842 19837 1da1e9 RtlAllocateHeap 19838 1cd076 19837->19838 19846 1d8d2c 19838->19846 19841 1db01a ___std_exception_copy RtlAllocateHeap 19841->19832 19843 1db06b 19842->19843 19845 1cd06a 19842->19845 19844 1db01a ___std_exception_copy RtlAllocateHeap 19843->19844 19843->19845 19844->19845 19845->19837 19847 1cd07d 19846->19847 19848 1d8d55 19846->19848 19847->19832 19847->19841 19849 1d8da4 19848->19849 19851 1d8d7c 19848->19851 19850 1c8be3 ___std_exception_copy RtlAllocateHeap 19849->19850 19850->19847 19853 1d8c9b 19851->19853 19854 1d8ca7 std::locale::_Setgloballocale 19853->19854 19855 1d8ce6 19854->19855 19857 1d8dff 19854->19857 19855->19847 19869 1de940 19857->19869 19860 1d8e0f 19861 1de940 RtlAllocateHeap 19860->19861 19867 1d8e15 19860->19867 19868 1d8e47 19860->19868 19863 1d8e3e 19861->19863 19862 1de940 RtlAllocateHeap 19864 1d8e53 FindCloseChangeNotification 19862->19864 19866 1de940 RtlAllocateHeap 19863->19866 19864->19867 19865 1d8e6d 19865->19855 19866->19868 19882 1de8af 19867->19882 19868->19862 19868->19867 19870 1de94d 19869->19870 19871 1de962 19869->19871 19888 1d16ec 19870->19888 19874 1d16ec RtlAllocateHeap 19871->19874 19876 1de987 19871->19876 19877 1de992 19874->19877 19875 1d16ff __floor_pentium4 RtlAllocateHeap 19879 1de95a 19875->19879 19876->19860 19878 1d16ff __floor_pentium4 RtlAllocateHeap 19877->19878 19880 1de99a 19878->19880 19879->19860 19881 1c8c60 ___std_exception_copy RtlAllocateHeap 19880->19881 19881->19879 19883 1de8be 19882->19883 19884 1d16ff __floor_pentium4 RtlAllocateHeap 19883->19884 19887 1de8e8 19883->19887 19885 1de92a 19884->19885 19886 1d16ec RtlAllocateHeap 19885->19886 19886->19887 19887->19865 19889 1d9f93 std::locale::_Setgloballocale RtlAllocateHeap 19888->19889 19890 1d16f1 19889->19890 19890->19875 19892 1a7f1d 19891->19892 19893 1a8034 19891->19893 19894 1a7fcb 19892->19894 19895 1a7f2b 19892->19895 19896 1a7f7c 19892->19896 19897 1a7f83 19892->19897 19898 1a7f24 19892->19898 19902 192cf0 std::_Throw_Cpp_error 2 API calls 19893->19902 19904 1a7f29 19893->19904 19894->18788 19901 1c3672 std::_Facet_Register 2 API calls 19895->19901 19971 1acf80 19896->19971 19899 1c3672 std::_Facet_Register 2 API calls 19897->19899 19966 1ac3a0 19898->19966 19899->19904 19901->19904 19905 1a804f 19902->19905 19904->18788 19976 197f90 19905->19976 19907 1a8062 Concurrency::cancel_current_task 19910 1b215f 19908->19910 20033 1d133b 19910->20033 19913 1ab4f0 19914 1adb10 19913->19914 19915 1ade3d 19914->19915 19916 1adb56 19914->19916 19918 1afd70 2 API calls 19915->19918 20085 1aebb0 19916->20085 19920 1ade87 19918->19920 19919 1adba4 19921 1afd70 2 API calls 19919->19921 19922 1aeda0 3 API calls 19920->19922 19963 1adf4f std::ios_base::_Ios_base_dtor 19920->19963 19924 1adbc1 19921->19924 19923 1adee2 19922->19923 19927 1975c0 2 API calls 19923->19927 19965 1adcc3 std::ios_base::_Ios_base_dtor 19924->19965 20091 1aeda0 19924->20091 19925 1a7ef0 2 API calls 19928 1adfc7 19925->19928 19926 1ade38 std::ios_base::_Ios_base_dtor 19926->18792 19929 1adf06 19927->19929 19928->19926 19933 1c8c70 std::_Throw_Cpp_error RtlAllocateHeap 19928->19933 19934 1af440 3 API calls 19929->19934 19931 1adcec 19936 1a7ef0 2 API calls 19931->19936 19932 1add82 19939 1a7ef0 2 API calls 19932->19939 19946 1add9f 19932->19946 19937 1ae06f 19933->19937 19948 1adf1f 19934->19948 19935 1adc1c 20138 1975c0 19935->20138 19958 1add01 19936->19958 20187 1a90b0 19937->20187 19939->19946 19941 1ae093 19945 1a90b0 2 API calls 19941->19945 19942 1adc40 20168 1af440 19942->20168 19943 1ae07d Concurrency::cancel_current_task 19954 1c8c70 std::_Throw_Cpp_error RtlAllocateHeap 19943->19954 19950 1ae0a1 Concurrency::cancel_current_task 19945->19950 19947 1a35b0 RtlAllocateHeap 19946->19947 19951 1add6c 19947->19951 19948->19941 19952 197a20 RtlAllocateHeap 19948->19952 19949 1adc56 19949->19937 19953 1adc6b 19949->19953 19957 1c8c70 std::_Throw_Cpp_error RtlAllocateHeap 19950->19957 19956 1a35b0 RtlAllocateHeap 19951->19956 19952->19963 20177 197a20 19953->20177 19954->19941 19959 1ade26 19956->19959 19961 1ae0b7 19957->19961 20182 1a35b0 19958->20182 19962 1a35b0 RtlAllocateHeap 19959->19962 19962->19926 19963->19925 19963->19928 19963->19950 19964 1adc86 19964->19943 19964->19965 19965->19931 19965->19932 19967 1c3672 std::_Facet_Register 2 API calls 19966->19967 19968 1ac3c3 19967->19968 19969 1c3672 std::_Facet_Register 2 API calls 19968->19969 19970 1ac3ec 19969->19970 19970->19904 19972 1c3672 std::_Facet_Register 2 API calls 19971->19972 19973 1acfb7 19972->19973 19974 193040 std::_Throw_Cpp_error 2 API calls 19973->19974 19975 1acfee 19974->19975 19975->19904 19987 197350 19976->19987 19978 198029 20005 1aad80 19978->20005 19980 19803d 19982 1980df 19980->19982 19983 198076 std::ios_base::_Ios_base_dtor 19980->19983 19985 1c8c70 std::_Throw_Cpp_error RtlAllocateHeap 19982->19985 20009 1972b0 19983->20009 19984 1980aa 19984->19907 19986 1980e4 19985->19986 19986->19907 20012 194d70 19987->20012 19996 1a8f00 std::_Throw_Cpp_error 2 API calls 19997 1973e6 19996->19997 19998 197476 std::ios_base::_Ios_base_dtor 19997->19998 19999 1c8c70 std::_Throw_Cpp_error RtlAllocateHeap 19997->19999 19998->19978 20000 1974c4 19999->20000 20001 1c4b78 ___std_exception_destroy RtlAllocateHeap 20000->20001 20002 197511 20001->20002 20003 1c4b78 ___std_exception_destroy RtlAllocateHeap 20002->20003 20004 197527 std::ios_base::_Ios_base_dtor 20003->20004 20004->19978 20006 1aadb4 20005->20006 20007 1a8f00 std::_Throw_Cpp_error 2 API calls 20006->20007 20008 1aadbf 20007->20008 20008->19980 20010 1c4b15 ___std_exception_copy 2 API calls 20009->20010 20011 19731a 20010->20011 20011->19984 20013 194da6 20012->20013 20014 194dd8 20013->20014 20015 193040 std::_Throw_Cpp_error 2 API calls 20013->20015 20016 1aac50 20014->20016 20015->20014 20017 1aac81 20016->20017 20017->20017 20018 1aacd3 20017->20018 20019 1ae8a0 2 API calls 20017->20019 20020 1973af 20019->20020 20021 1aabb0 20020->20021 20022 1aabe1 20021->20022 20022->20022 20023 1a8f00 std::_Throw_Cpp_error 2 API calls 20022->20023 20024 1973c2 20023->20024 20025 1aae20 20024->20025 20028 1ae710 20025->20028 20027 1973d1 20027->19996 20029 1ae753 20028->20029 20030 1ae758 std::_Locinfo::_Locinfo_ctor 20029->20030 20031 1932d0 std::_Throw_Cpp_error 2 API calls 20029->20031 20030->20027 20032 1ae843 std::_Locinfo::_Locinfo_ctor 20031->20032 20032->20027 20034 1d9e42 __Getctype RtlAllocateHeap 20033->20034 20035 1d1346 20034->20035 20036 1da12d __Getctype RtlAllocateHeap 20035->20036 20037 1b225f 20036->20037 20038 1afd70 20037->20038 20041 1afd84 20038->20041 20042 1afde4 20038->20042 20040 1aff6c 20040->19913 20045 1afdc2 20041->20045 20052 1b9e20 20041->20052 20047 1afe74 20042->20047 20074 1b01e0 20042->20074 20045->20042 20046 1b9e20 2 API calls 20045->20046 20049 1afe58 20045->20049 20046->20049 20047->19913 20048 1afecc 20048->20040 20051 1b9e20 2 API calls 20048->20051 20078 1b08f0 20048->20078 20049->20047 20070 1b1430 20049->20070 20051->20048 20053 1b9e62 20052->20053 20054 1b9f76 20052->20054 20056 1b9e7c 20053->20056 20057 1b9eca 20053->20057 20058 1b9eba 20053->20058 20055 193330 2 API calls 20054->20055 20059 1b9f7b 20055->20059 20061 1c3672 std::_Facet_Register 2 API calls 20056->20061 20062 1c3672 std::_Facet_Register 2 API calls 20057->20062 20067 1b9e9a std::_Locinfo::_Locinfo_ctor 20057->20067 20058->20056 20058->20059 20060 192b50 Concurrency::cancel_current_task 2 API calls 20059->20060 20063 1b9f80 20060->20063 20064 1b9e8f 20061->20064 20062->20067 20065 1c8c70 std::_Throw_Cpp_error RtlAllocateHeap 20063->20065 20064->20063 20064->20067 20066 1b9f85 20065->20066 20068 1b77d0 RtlAllocateHeap 20067->20068 20069 1b9f47 20068->20069 20069->20045 20072 1b1443 20070->20072 20071 1b1471 20071->20042 20072->20071 20073 1b9e20 2 API calls 20072->20073 20073->20071 20075 1b01f0 20074->20075 20076 1b9e20 2 API calls 20075->20076 20077 1b0260 20075->20077 20076->20075 20077->20048 20079 1b1430 2 API calls 20078->20079 20080 1b08fc 20079->20080 20081 1b9e20 2 API calls 20080->20081 20082 1b090a 20080->20082 20083 1b0995 20080->20083 20081->20080 20082->20048 20083->20082 20084 1b9e20 RtlAllocateHeap RtlAllocateHeap 20083->20084 20084->20083 20086 1aec6d 20085->20086 20087 1a7ef0 2 API calls 20086->20087 20088 1aec8d 20087->20088 20190 1b16c0 20088->20190 20090 1aecdf 20090->19919 20092 1aee46 20091->20092 20115 1aef1f std::ios_base::_Ios_base_dtor 20091->20115 20093 1af425 20092->20093 20096 1ae8a0 2 API calls 20092->20096 20098 1c8c70 std::_Throw_Cpp_error RtlAllocateHeap 20093->20098 20094 1a8f00 std::_Throw_Cpp_error 2 API calls 20095 1aef5b 20094->20095 20097 1aef6a 20095->20097 20104 1af191 20095->20104 20099 1aee79 20096->20099 20100 1af440 3 API calls 20097->20100 20101 1af42f 20098->20101 20102 1a8f00 std::_Throw_Cpp_error 2 API calls 20099->20102 20103 1aef79 20100->20103 20105 1c8c70 std::_Throw_Cpp_error RtlAllocateHeap 20101->20105 20106 1aee93 20102->20106 20110 193040 std::_Throw_Cpp_error 2 API calls 20103->20110 20104->20104 20111 193040 std::_Throw_Cpp_error 2 API calls 20104->20111 20108 1af434 20105->20108 20107 1a8f00 std::_Throw_Cpp_error 2 API calls 20106->20107 20109 1aeee3 20107->20109 20112 1c8c70 std::_Throw_Cpp_error RtlAllocateHeap 20108->20112 20109->20093 20109->20115 20113 1aefba 20110->20113 20114 1af1c9 20111->20114 20137 1af375 std::ios_base::_Ios_base_dtor 20112->20137 20116 1a8f00 std::_Throw_Cpp_error 2 API calls 20113->20116 20117 1afbf0 2 API calls 20114->20117 20115->20094 20119 1aefcd 20116->20119 20120 1af1e0 20117->20120 20118 1c8c70 std::_Throw_Cpp_error RtlAllocateHeap 20121 1af43e 20118->20121 20122 1ae710 2 API calls 20119->20122 20123 1a8f00 std::_Throw_Cpp_error 2 API calls 20120->20123 20124 1af019 20122->20124 20127 1af22f std::ios_base::_Ios_base_dtor 20123->20127 20125 1a8f00 std::_Throw_Cpp_error 2 API calls 20124->20125 20126 1af032 20125->20126 20128 1a8f00 std::_Throw_Cpp_error 2 API calls 20126->20128 20127->20108 20129 1af161 std::ios_base::_Ios_base_dtor 20127->20129 20130 1af081 std::ios_base::_Ios_base_dtor 20128->20130 20131 193040 std::_Throw_Cpp_error 2 API calls 20129->20131 20136 1af3f2 std::ios_base::_Ios_base_dtor 20129->20136 20130->20101 20130->20129 20132 1af30c 20131->20132 20133 1afbf0 2 API calls 20132->20133 20134 1af323 20133->20134 20135 1a8f00 std::_Throw_Cpp_error 2 API calls 20134->20135 20135->20137 20136->19935 20137->20118 20137->20136 20259 194e30 20138->20259 20141 194e30 2 API calls 20142 19762b 20141->20142 20143 1aace0 2 API calls 20142->20143 20144 197640 20143->20144 20145 1aabb0 2 API calls 20144->20145 20146 197656 20145->20146 20147 1ae710 2 API calls 20146->20147 20148 19766d std::ios_base::_Ios_base_dtor 20147->20148 20149 197a09 20148->20149 20152 19770a std::ios_base::_Ios_base_dtor 20148->20152 20150 1c8c70 std::_Throw_Cpp_error RtlAllocateHeap 20149->20150 20151 197a0e 20150->20151 20153 1c8c70 std::_Throw_Cpp_error RtlAllocateHeap 20151->20153 20155 197350 2 API calls 20152->20155 20154 197a13 20153->20154 20156 1977a4 20155->20156 20157 1a8f00 std::_Throw_Cpp_error 2 API calls 20156->20157 20158 1977b9 20157->20158 20159 1ae710 2 API calls 20158->20159 20160 19780c 20159->20160 20161 1a8f00 std::_Throw_Cpp_error 2 API calls 20160->20161 20162 197828 20161->20162 20163 1aad80 2 API calls 20162->20163 20165 197879 std::ios_base::_Ios_base_dtor 20163->20165 20164 197975 std::ios_base::_Ios_base_dtor 20166 1972b0 2 API calls 20164->20166 20165->20151 20165->20164 20167 1979ca 20166->20167 20167->19942 20169 1af630 20168->20169 20175 1af4c9 std::ios_base::_Ios_base_dtor std::_Locinfo::_Locinfo_ctor 20168->20175 20169->19949 20171 1af647 20173 1c8c70 std::_Throw_Cpp_error RtlAllocateHeap 20171->20173 20172 1932d0 std::_Throw_Cpp_error 2 API calls 20172->20175 20176 1af651 20173->20176 20174 1a8f00 std::_Throw_Cpp_error 2 API calls 20174->20175 20175->20169 20175->20171 20175->20172 20175->20174 20263 1934a0 20175->20263 20176->19949 20178 1c4b78 ___std_exception_destroy RtlAllocateHeap 20177->20178 20179 197a61 20178->20179 20180 1c4b78 ___std_exception_destroy RtlAllocateHeap 20179->20180 20181 197a77 20180->20181 20181->19964 20183 1a35d1 20182->20183 20184 1a35f1 std::ios_base::_Ios_base_dtor 20182->20184 20183->20184 20185 1c8c70 std::_Throw_Cpp_error RtlAllocateHeap 20183->20185 20184->19951 20186 1a3625 20185->20186 20186->19951 20270 1a6590 20187->20270 20193 1b17d0 20190->20193 20192 1b16da std::locale::_Setgloballocale 20192->20090 20194 1b1809 20193->20194 20200 1b1838 20193->20200 20195 1b1923 20194->20195 20198 1b181b 20194->20198 20210 1b1990 20195->20210 20198->20200 20201 1b9f90 20198->20201 20200->20192 20202 1ba0a3 20201->20202 20203 1b9fc2 20201->20203 20204 193330 2 API calls 20202->20204 20220 1bd190 20203->20220 20207 1ba000 std::_Locinfo::_Locinfo_ctor 20204->20207 20206 1c8c70 std::_Throw_Cpp_error RtlAllocateHeap 20208 1ba0ad 20206->20208 20207->20206 20209 1ba05f std::ios_base::_Ios_base_dtor 20207->20209 20209->20200 20211 1c1cea 2 API calls 20210->20211 20213 1b199a 20211->20213 20212 1b1928 20213->20212 20214 192cf0 std::_Throw_Cpp_error 2 API calls 20213->20214 20215 1b1a03 20214->20215 20216 1aace0 2 API calls 20215->20216 20217 1b1a18 20216->20217 20228 197cf0 20217->20228 20219 1b1a2d Concurrency::cancel_current_task 20221 1bd1d9 20220->20221 20223 1bd199 20220->20223 20221->20221 20222 1bd1b0 20224 1bd1b9 20222->20224 20226 1c3672 std::_Facet_Register 2 API calls 20222->20226 20223->20221 20223->20222 20225 1c3672 std::_Facet_Register 2 API calls 20223->20225 20224->20207 20225->20222 20227 1bd1d2 20226->20227 20227->20207 20229 197350 2 API calls 20228->20229 20230 197d80 20229->20230 20231 1aad80 2 API calls 20230->20231 20232 197d94 20231->20232 20233 197dcd std::ios_base::_Ios_base_dtor 20232->20233 20235 197e33 20232->20235 20234 1972b0 2 API calls 20233->20234 20236 197dfd 20234->20236 20237 1c8c70 std::_Throw_Cpp_error RtlAllocateHeap 20235->20237 20236->20219 20238 197e38 20237->20238 20239 197350 2 API calls 20238->20239 20240 197ece 20239->20240 20241 1aad80 2 API calls 20240->20241 20242 197ee2 20241->20242 20243 197f1b std::ios_base::_Ios_base_dtor 20242->20243 20245 197f81 20242->20245 20244 1972b0 2 API calls 20243->20244 20246 197f4b 20244->20246 20247 1c8c70 std::_Throw_Cpp_error RtlAllocateHeap 20245->20247 20246->20219 20248 197f86 20247->20248 20249 197350 2 API calls 20248->20249 20250 198029 20249->20250 20251 1aad80 2 API calls 20250->20251 20252 19803d 20251->20252 20253 198076 std::ios_base::_Ios_base_dtor 20252->20253 20255 1980df 20252->20255 20254 1972b0 2 API calls 20253->20254 20256 1980aa 20254->20256 20257 1c8c70 std::_Throw_Cpp_error RtlAllocateHeap 20255->20257 20256->20219 20258 1980e4 20257->20258 20258->20219 20260 194e66 20259->20260 20260->20260 20261 194ea8 20260->20261 20262 193040 std::_Throw_Cpp_error 2 API calls 20260->20262 20261->20141 20262->20261 20266 193380 20263->20266 20267 193399 20266->20267 20268 1d0dd7 2 API calls 20267->20268 20269 1933a7 20268->20269 20269->20175 20271 1c4b15 ___std_exception_copy 2 API calls 20270->20271 20272 1a65ce 20271->20272 20273 1c4b15 ___std_exception_copy 2 API calls 20272->20273 20274 1a6601 20273->20274 20274->19943 20276 1e8e17 20275->20276 20280 1e8c08 20275->20280 20276->18795 20278 1e8d38 std::locale::_Setgloballocale 20278->20276 20279 193130 2 API calls 20278->20279 20279->20278 20280->20278 20282 1c87b0 20280->20282 20291 193130 20280->20291 20283 1c87e3 20282->20283 20288 1c87c7 20282->20288 20284 1d9e42 __Getctype RtlAllocateHeap 20283->20284 20285 1c87e8 20284->20285 20286 1da12d __Getctype RtlAllocateHeap 20285->20286 20287 1c87f8 20286->20287 20287->20288 20289 1d9a39 2 API calls 20287->20289 20288->20280 20290 1c882a 20289->20290 20290->20280 20292 1932b3 20291->20292 20295 19316f 20291->20295 20293 193330 2 API calls 20292->20293 20296 1932b8 20293->20296 20294 193189 20300 1c3672 std::_Facet_Register 2 API calls 20294->20300 20295->20294 20297 1931d7 20295->20297 20298 1931c7 20295->20298 20299 192b50 Concurrency::cancel_current_task 2 API calls 20296->20299 20301 1c3672 std::_Facet_Register 2 API calls 20297->20301 20304 19319c std::_Locinfo::_Locinfo_ctor 20297->20304 20298->20294 20298->20296 20299->20304 20300->20304 20301->20304 20302 1c8c70 std::_Throw_Cpp_error RtlAllocateHeap 20303 1932c2 20302->20303 20304->20302 20305 19326b std::ios_base::_Ios_base_dtor 20304->20305 20305->20280 20307 1c364d GetSystemTimePreciseAsFileTime 20306->20307 20308 1c3077 20306->20308 20307->20308 20308->18439 20418 4d008f8 20419 4d0090d 20418->20419 20421 4d0092e 20418->20421 20420 4d0091f 3 API calls 20419->20420 20419->20421 20420->20419 20422 4d00998 2 API calls 20421->20422 20423 4d00994 20422->20423 20424 4d00af5 GetCurrentHwProfileW 20423->20424 20426 4d00aeb 20424->20426 20425 4d00af1 20426->20425 20427 4d00c50 GetCurrentHwProfileW 20426->20427 20428 4d00c78 20427->20428 20313 1a6130 20314 1a6174 20313->20314 20316 1a6143 std::_Locinfo::_Locinfo_ctor 20313->20316 20315 1a6180 20314->20315 20317 1a6200 20314->20317 20318 1932d0 std::_Throw_Cpp_error 2 API calls 20315->20318 20317->20317 20319 1a8f00 std::_Throw_Cpp_error 2 API calls 20317->20319 20322 1a61bf std::_Locinfo::_Locinfo_ctor 20318->20322 20320 1a6232 20319->20320 20321 1a61ed 20322->20321 20323 192fe0 std::_Throw_Cpp_error RtlAllocateHeap 20322->20323 20323->20321 20429 4d00afb 20430 4d00afe GetCurrentHwProfileW 20429->20430 20432 4d00c78 20430->20432 20955 1b47b0 20956 1b48ed 20955->20956 20957 1b47ed 20955->20957 20958 193330 2 API calls 20956->20958 20962 1b4a30 2 API calls 20957->20962 20959 1b48f2 20958->20959 20960 1b493d 20959->20960 20961 1b4a23 20959->20961 20965 1b4a30 2 API calls 20960->20965 20963 193330 2 API calls 20961->20963 20968 1b4827 20962->20968 20964 1b4a28 20963->20964 20966 1b4977 20965->20966 20974 1a3d50 20966->20974 20969 1ae1e0 RtlAllocateHeap 20968->20969 20970 1b48b4 20969->20970 20971 1b499f 20972 1ae1e0 RtlAllocateHeap 20971->20972 20973 1b49ea 20972->20973 20975 1a3d8f 20974->20975 20999 1a3df7 std::_Locinfo::_Locinfo_ctor 20974->20999 20976 1a3e69 20975->20976 20977 1a3f1e 20975->20977 20978 1a3f7d 20975->20978 20979 1a3d96 20975->20979 20975->20999 20980 1c3672 std::_Facet_Register 2 API calls 20976->20980 21046 1a7e80 20977->21046 20982 1c3672 std::_Facet_Register 2 API calls 20978->20982 20981 1c3672 std::_Facet_Register 2 API calls 20979->20981 20984 1a3e73 20980->20984 20985 1a3da0 20981->20985 20987 1a3f8a 20982->20987 20984->20999 21007 1bbf30 20984->21007 20986 1c3672 std::_Facet_Register 2 API calls 20985->20986 20989 1a3dd2 20986->20989 20990 1a408e 20987->20990 20991 1a3fd3 20987->20991 20987->20999 21034 1bf460 20989->21034 20993 193330 2 API calls 20990->20993 20994 1a3fdb 20991->20994 20995 1a4004 20991->20995 20996 1a4093 20993->20996 20994->20996 20997 1a3fe6 20994->20997 20998 1c3672 std::_Facet_Register 2 API calls 20995->20998 21000 192b50 Concurrency::cancel_current_task 2 API calls 20996->21000 21001 1c3672 std::_Facet_Register 2 API calls 20997->21001 20998->20999 20999->20971 21003 1a3fec 21000->21003 21001->21003 21002 1a3d50 6 API calls 21004 1a3eb1 21002->21004 21003->20999 21005 1c8c70 std::_Throw_Cpp_error RtlAllocateHeap 21003->21005 21004->20999 21004->21002 21006 1a409d 21005->21006 21008 1bbfab 21007->21008 21009 1bbf42 21007->21009 21010 193330 2 API calls 21008->21010 21011 1bbf4d 21009->21011 21012 1bbf7c 21009->21012 21014 1bbfb0 21010->21014 21011->21014 21015 1bbf54 21011->21015 21013 1bbf99 21012->21013 21016 1c3672 std::_Facet_Register 2 API calls 21012->21016 21013->21004 21017 192b50 Concurrency::cancel_current_task 2 API calls 21014->21017 21018 1c3672 std::_Facet_Register 2 API calls 21015->21018 21019 1bbf86 21016->21019 21020 1bbf5a 21017->21020 21018->21020 21019->21004 21021 1c8c70 std::_Throw_Cpp_error RtlAllocateHeap 21020->21021 21022 1bbf63 21020->21022 21023 1bbfba 21021->21023 21022->21004 21024 1bc00c 21023->21024 21025 1bc077 21023->21025 21029 1bc013 std::_Locinfo::_Locinfo_ctor 21023->21029 21051 1afab0 21024->21051 21026 193330 2 API calls 21025->21026 21028 1bc07c 21026->21028 21030 1c3672 std::_Facet_Register 2 API calls 21028->21030 21029->21004 21031 1bc0ae 21030->21031 21032 193040 std::_Throw_Cpp_error 2 API calls 21031->21032 21033 1bc0f2 21032->21033 21033->21004 21035 1bf498 21034->21035 21045 1bf53f 21034->21045 21036 1c3672 std::_Facet_Register 2 API calls 21035->21036 21037 1bf4ba 21036->21037 21038 1a63b0 std::_Throw_Cpp_error 2 API calls 21037->21038 21039 1bf4d0 21038->21039 21040 1a3d50 6 API calls 21039->21040 21041 1bf4e0 21040->21041 21042 1bf460 6 API calls 21041->21042 21043 1bf531 21042->21043 21044 1bf460 6 API calls 21043->21044 21044->21045 21045->20999 21047 1c3672 std::_Facet_Register 2 API calls 21046->21047 21048 1a7ea6 21047->21048 21049 1a63b0 std::_Throw_Cpp_error 2 API calls 21048->21049 21050 1a7ec5 21049->21050 21050->20999 21052 1afb2b 21051->21052 21053 1afac2 21051->21053 21056 192b50 Concurrency::cancel_current_task 2 API calls 21052->21056 21054 1afafc 21053->21054 21055 1afacd 21053->21055 21059 1afb19 21054->21059 21062 1c3672 std::_Facet_Register 2 API calls 21054->21062 21055->21052 21058 1afad4 21055->21058 21057 1afada 21056->21057 21060 1c8c70 std::_Throw_Cpp_error RtlAllocateHeap 21057->21060 21066 1afae3 21057->21066 21061 1c3672 std::_Facet_Register 2 API calls 21058->21061 21059->21029 21063 1afb35 21060->21063 21061->21057 21064 1afb06 21062->21064 21065 1afb5b std::locale::_Setgloballocale 21063->21065 21069 1b9c70 21063->21069 21064->21029 21065->21029 21066->21029 21068 1afb7f 21068->21029 21070 1b9dc4 21069->21070 21074 1b9ca2 21069->21074 21071 193330 2 API calls 21070->21071 21084 1b9d04 std::_Locinfo::_Locinfo_ctor 21071->21084 21072 1b9dbf 21073 192b50 Concurrency::cancel_current_task 2 API calls 21072->21073 21073->21070 21074->21072 21077 1b9d1d 21074->21077 21078 1b9cf3 21074->21078 21075 1c8c70 std::_Throw_Cpp_error RtlAllocateHeap 21076 1b9dce 21075->21076 21086 1a9950 21076->21086 21082 1c3672 std::_Facet_Register 2 API calls 21077->21082 21077->21084 21078->21072 21080 1b9cfe 21078->21080 21081 1c3672 std::_Facet_Register 2 API calls 21080->21081 21081->21084 21082->21084 21083 1b9dd9 Concurrency::cancel_current_task 21084->21075 21085 1b9d8f std::ios_base::_Ios_base_dtor 21084->21085 21085->21068 21087 1a9978 std::ios_base::_Ios_base_dtor 21086->21087 21088 1a9968 21086->21088 21087->21083 21088->21087 21089 1c8c70 std::_Throw_Cpp_error RtlAllocateHeap 21088->21089 21090 1a998d 21089->21090 21091 1a9a4f 21090->21091 21098 1c2b74 21090->21098 21091->21083 21097 1a9a04 21097->21083 21099 1c2af7 21098->21099 21100 1a99cc 21099->21100 21120 1c9815 21099->21120 21100->21091 21106 1a83b0 21100->21106 21102 1c2b43 21102->21100 21134 1cd5f6 21102->21134 21105 1cd0a8 5 API calls 21105->21100 21107 1a843c 21106->21107 21108 1a8463 21106->21108 21160 1d120a 21107->21160 21110 1ac430 21108->21110 21112 1ac45f std::_Throw_Cpp_error std::_Lockit::~_Lockit std::_Lockit::_Lockit 21110->21112 21111 1ac4f8 std::_Lockit::~_Lockit 21111->21097 21112->21111 21113 1c3672 std::_Facet_Register 2 API calls 21112->21113 21114 1ac506 21113->21114 21115 194040 std::_Throw_Cpp_error 3 API calls 21114->21115 21116 1ac536 21115->21116 21117 194100 std::_Throw_Cpp_error 2 API calls 21116->21117 21118 1ac592 21117->21118 21119 1c26f7 std::_Facet_Register 2 API calls 21118->21119 21119->21111 21121 1c975e std::locale::_Setgloballocale 21120->21121 21122 1c9771 21121->21122 21125 1c9791 21121->21125 21123 1d16ff __floor_pentium4 RtlAllocateHeap 21122->21123 21124 1c9776 21123->21124 21126 1c8c60 ___std_exception_copy RtlAllocateHeap 21124->21126 21127 1c9796 21125->21127 21128 1c97a3 21125->21128 21133 1c9781 21126->21133 21130 1d16ff __floor_pentium4 RtlAllocateHeap 21127->21130 21129 1da8ef RtlAllocateHeap 21128->21129 21131 1c97ac 21129->21131 21130->21133 21132 1d16ff __floor_pentium4 RtlAllocateHeap 21131->21132 21131->21133 21132->21133 21133->21102 21135 1cd609 ___std_exception_copy 21134->21135 21140 1cd34d 21135->21140 21137 1cd61e 21138 1c899c ___std_exception_copy RtlAllocateHeap 21137->21138 21139 1c2b5e 21138->21139 21139->21100 21139->21105 21142 1cd359 std::locale::_Setgloballocale 21140->21142 21141 1cd35f 21143 1c8be3 ___std_exception_copy RtlAllocateHeap 21141->21143 21142->21141 21144 1cd3a2 21142->21144 21146 1cd37a 21143->21146 21147 1cd4d0 21144->21147 21146->21137 21148 1cd4f6 21147->21148 21149 1cd4e3 21147->21149 21156 1cd3f7 21148->21156 21149->21146 21151 1cd519 21152 1c9a91 4 API calls 21151->21152 21155 1cd5a7 21151->21155 21153 1cd547 21152->21153 21154 1d263d 2 API calls 21153->21154 21154->21155 21155->21146 21157 1cd408 21156->21157 21159 1cd460 21156->21159 21158 1d25fd SetFilePointerEx RtlAllocateHeap 21157->21158 21157->21159 21158->21159 21159->21151 21161 1d1216 21160->21161 21164 1d122b 21160->21164 21162 1d16ff __floor_pentium4 RtlAllocateHeap 21161->21162 21163 1d121b 21162->21163 21165 1c8c60 ___std_exception_copy RtlAllocateHeap 21163->21165 21164->21108 21166 1d1226 21165->21166 21166->21108 21187 4d0093b 21188 4d0095a 21187->21188 21189 4d00998 2 API calls 21188->21189 21190 4d00994 21189->21190 21191 4d00af5 GetCurrentHwProfileW 21190->21191 21193 4d00aeb 21191->21193 21192 4d00af1 21193->21192 21194 4d00c50 GetCurrentHwProfileW 21193->21194 21195 4d00c78 21194->21195 20564 4d0087d 20565 4d00827 20564->20565 20566 4d0088a 20564->20566 20565->20565 20567 4d0091f 3 API calls 20566->20567 20568 4d0092e 20566->20568 20567->20566 20569 4d00998 2 API calls 20568->20569 20570 4d00994 20569->20570 20571 4d00af5 GetCurrentHwProfileW 20570->20571 20573 4d00aeb 20571->20573 20572 4d00af1 20573->20572 20574 4d00c50 GetCurrentHwProfileW 20573->20574 20575 4d00c78 20574->20575 20931 4d009a6 20932 4d009b0 20931->20932 20933 4d00af5 GetCurrentHwProfileW 20932->20933 20935 4d00aeb 20933->20935 20934 4d00af1 20935->20934 20936 4d00c50 GetCurrentHwProfileW 20935->20936 20937 4d00c78 20936->20937
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2974457666.0000000004D10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04D10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_4d10000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5d001719609cf864dde9a7fb354b28d14f78f542a6acaca77e7235284d780767
                                  • Instruction ID: 15db8f43f055c8701d71ad05501dbcb8768bbee814ef72ca958e6cfea6912239
                                  • Opcode Fuzzy Hash: 5d001719609cf864dde9a7fb354b28d14f78f542a6acaca77e7235284d780767
                                  • Instruction Fuzzy Hash: FA31F8EB388214BE650370867B54AFA6B6EE5D7330330C427FC83D6913E2D59A896071

                                  Control-flow Graph

                                  APIs
                                  • setsockopt.WS2_32(000003EC,0000FFFF,00001006,?,00000008), ref: 00257BA6
                                  • recv.WS2_32(?,00000004,00000002), ref: 00257BC1
                                  • recv.WS2_32(00000000,0000000C,00000002,00000000), ref: 00257C43
                                  • recv.WS2_32(00000000,0000000C,00000008), ref: 00257C64
                                  • setsockopt.WS2_32(0000FFFF,00001006,?,00000008,?,00000000), ref: 00257D01
                                    • Part of subcall function 00258590: WSAStartup.WS2_32 ref: 002585BA
                                    • Part of subcall function 00258590: socket.WS2_32(?,?,?,?,?,?,00319328,?,?), ref: 0025865E
                                    • Part of subcall function 00258590: connect.WS2_32(00000000,002E9BFC,?,?,?,?,00319328,?,?), ref: 00258671
                                    • Part of subcall function 00258590: closesocket.WS2_32(00000000), ref: 0025867D
                                  • recv.WS2_32(00000000,?,00000008), ref: 00257D1B
                                  • recv.WS2_32(?,00000004,00000008), ref: 00257E23
                                  • __Xtime_get_ticks.LIBCPMT ref: 00257E2A
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00257E38
                                  • Sleep.KERNELBASE(00000001,00000000,?,00002710,00000000), ref: 00257EB1
                                  • Sleep.KERNELBASE(00000064,?,00002710,00000000), ref: 00257EB9
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2960518096.0000000000191000.00000040.00000001.01000000.00000005.sdmp, Offset: 00190000, based on PE: true
                                  • Associated: 00000005.00000002.2960355499.0000000000190000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2960518096.0000000000315000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2961275866.000000000031A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.000000000031D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000004A4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005C4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005CC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005DA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2963200674.00000000005DB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2964498464.000000000077B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2964562085.000000000077D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_190000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: recv$Sleepsetsockopt$StartupUnothrow_t@std@@@Xtime_get_ticks__ehfuncinfo$??2@closesocketconnectsocket
                                  • String ID:
                                  • API String ID: 301102601-0
                                  • Opcode ID: 6f1f7899684a7bca35a5f6a72025869d924439d77e6be33e0bed4182c77debc1
                                  • Instruction ID: 4291fb4221242875eb2d85e548a6a437cb780635c3e2b38238754e81c7e368aa
                                  • Opcode Fuzzy Hash: 6f1f7899684a7bca35a5f6a72025869d924439d77e6be33e0bed4182c77debc1
                                  • Instruction Fuzzy Hash: 01B1DF70D58308DFEB11DFA4DC49BADBBB5BB58300F108259E854AB2D2D7B45D48CB91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 57 258590-2585c2 WSAStartup 58 258696-25869f 57->58 59 2585c8-2585f2 call 27a420 * 2 57->59 64 2585f4-2585f8 59->64 65 2585fe-258644 59->65 64->58 64->65 67 258646-25864c 65->67 68 258690 65->68 69 2586a4-2586ae 67->69 70 25864e 67->70 68->58 69->68 74 2586b0-2586b8 69->74 71 258654-258668 socket 70->71 71->68 73 25866a-25867a connect 71->73 75 2586a0 73->75 76 25867c-258684 closesocket 73->76 75->69 76->71 77 258686-25868f 76->77 77->68
                                  APIs
                                  • WSAStartup.WS2_32 ref: 002585BA
                                  • socket.WS2_32(?,?,?,?,?,?,00319328,?,?), ref: 0025865E
                                  • connect.WS2_32(00000000,002E9BFC,?,?,?,?,00319328,?,?), ref: 00258671
                                  • closesocket.WS2_32(00000000), ref: 0025867D
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2960518096.0000000000191000.00000040.00000001.01000000.00000005.sdmp, Offset: 00190000, based on PE: true
                                  • Associated: 00000005.00000002.2960355499.0000000000190000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2960518096.0000000000315000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2961275866.000000000031A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.000000000031D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000004A4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005C4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005CC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005DA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2963200674.00000000005DB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2964498464.000000000077B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2964562085.000000000077D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_190000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: Startupclosesocketconnectsocket
                                  • String ID:
                                  • API String ID: 3098855095-0
                                  • Opcode ID: a3609e51366d8d88dfe4ae23617d1b877dac5b7fa82eaabf8a7c89692ed3d3c4
                                  • Instruction ID: e16e3248d58611d67992b3292984a7842e289255bfd6add62496eaf2c48958d3
                                  • Opcode Fuzzy Hash: a3609e51366d8d88dfe4ae23617d1b877dac5b7fa82eaabf8a7c89692ed3d3c4
                                  • Instruction Fuzzy Hash: B331E4725153015BD7208F248C4462FB7E9EBC9735F105F19F9A8A21D0D7719D1886A7

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 79 199280-1992dd call 1a63b0 82 199413-199521 call 192df0 call 27a420 79->82 83 1992e3-1992e9 79->83 99 199523-199535 82->99 100 199537-19953f call 1a8dc0 82->100 85 1992f0-199313 83->85 87 199315-19931f 85->87 88 199324-199331 85->88 89 199403-199406 87->89 90 199333-19933d 88->90 91 199342-19934f 88->91 93 199409-19940d 89->93 90->89 94 199351-19935b 91->94 95 199360-19936d 91->95 93->82 93->85 94->89 97 19936f-199379 95->97 98 19937e-19938b 95->98 97->89 101 199399-1993a6 98->101 102 19938d-199397 98->102 103 199544-199597 call 27a420 * 2 99->103 100->103 105 1993a8-1993b2 101->105 106 1993b4-1993c1 101->106 102->89 116 199599-1995c8 call 27a420 call 1c5270 103->116 117 1995cb-1995e1 call 27a420 103->117 105->89 108 1993cf-1993dc 106->108 109 1993c3-1993cd 106->109 111 1993ea-1993f4 108->111 112 1993de-1993e8 108->112 109->89 111->93 115 1993f6-1993ff 111->115 112->89 115->89 116->117 123 1996e2 117->123 124 1995e7-1995ed 117->124 127 1996e6-1996f0 123->127 126 1995f0-1996ce WSASend 124->126 146 19975f-199763 126->146 147 1996d4-1996dc 126->147 128 19971e-19973d 127->128 129 1996f2-1996fe 127->129 132 19976f-199796 128->132 133 19973f-19974b 128->133 130 199700-19970e 129->130 131 199714-19971b call 1c38f3 129->131 130->131 135 199797-1997fe call 1c8c70 call 192df0 * 2 130->135 131->128 137 19974d-19975b 133->137 138 199765-19976c call 1c38f3 133->138 137->135 140 19975d 137->140 138->132 140->138 146->127 147->123 147->126
                                  APIs
                                  • WSASend.WS2_32(?,?,00000001,00000000,00000000,00000000,00000000,?,?,?,?,002DD15C,00000000,74D723A0,-00319880), ref: 001996C9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2960518096.0000000000191000.00000040.00000001.01000000.00000005.sdmp, Offset: 00190000, based on PE: true
                                  • Associated: 00000005.00000002.2960355499.0000000000190000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2960518096.0000000000315000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2961275866.000000000031A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.000000000031D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000004A4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005C4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005CC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005DA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2963200674.00000000005DB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2964498464.000000000077B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2964562085.000000000077D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_190000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: Send
                                  • String ID: Ws2_32.dll
                                  • API String ID: 121738739-3093949381
                                  • Opcode ID: d447d516765ea995fdcc7b6bcc06ac9756a4c4224173b42c3d62d654d9c4b4fc
                                  • Instruction ID: ff32d6d82fad83335568563e99b7fea442f7fe4ef94732419a39e35e4354b5b0
                                  • Opcode Fuzzy Hash: d447d516765ea995fdcc7b6bcc06ac9756a4c4224173b42c3d62d654d9c4b4fc
                                  • Instruction Fuzzy Hash: 7502BD70D14298DEDF25CFA8C8907ADBBB0EF59314F24428DE4856B286D7741986CF92

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 152 4d00998-4d00aef call 4d00af5 167 4d00af1-4d00af3 152->167 168 4d00b68-4d00b72 152->168 169 4d00b74-4d00b8d 168->169 170 4d00b9f 168->170 172 4d00ba0-4d00bff 169->172 170->172 176 4d00c16-4d00c1b 172->176 177 4d00c06-4d00c15 176->177 178 4d00c1c-4d00c39 176->178 177->176 181 4d00c50-4d00c61 GetCurrentHwProfileW 178->181 182 4d00c78-4d00d5d call 4d00d69 181->182 193 4d00dd6-4d00de1 182->193 194 4d00d5f-4d00d67 182->194 195 4d00de2-4d00fa4 193->195 196 4d00d69-4d00d6a 194->196 197 4d00d6e-4d00d76 194->197 198 4d00d7c-4d00dcc 196->198 197->198 198->195
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2974366115.0000000004D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 04D00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_4d00000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 5ba091648dcbf68a20959bd7ccc82b774da3ee672b00e606e7ed78e70de746f3
                                  • Instruction ID: f14fc4ce2255a13852465f228a9c6c8a740c1e01388f104a24bbcc48f8ed947f
                                  • Opcode Fuzzy Hash: 5ba091648dcbf68a20959bd7ccc82b774da3ee672b00e606e7ed78e70de746f3
                                  • Instruction Fuzzy Hash: 7581F4EB30D110BDA14381553B54BF66A6EEAD7730330C467F487D7A82F694AE497131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 225 4d00a89-4d00a8a 226 4d00a8c-4d00aef call 4d00af5 225->226 227 4d00aff-4d00b82 225->227 240 4d00af1-4d00af3 226->240 241 4d00b68-4d00b72 226->241 238 4d00b8d 227->238 239 4d00ba0-4d00bff 238->239 247 4d00c16-4d00c1b 239->247 242 4d00b74-4d00b82 241->242 243 4d00b9f 241->243 242->238 243->239 248 4d00c06-4d00c15 247->248 249 4d00c1c-4d00c39 247->249 248->247 252 4d00c50-4d00c61 GetCurrentHwProfileW 249->252 253 4d00c78-4d00d5d call 4d00d69 252->253 264 4d00dd6-4d00de1 253->264 265 4d00d5f-4d00d67 253->265 266 4d00de2-4d00fa4 264->266 267 4d00d69-4d00d6a 265->267 268 4d00d6e-4d00d76 265->268 269 4d00d7c-4d00dcc 267->269 268->269 269->266
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04D00C50
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2974366115.0000000004D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 04D00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_4d00000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: e2dae81792af6e7daca4a4de3b8871faf1c5f9ce7b75125c4e2cf65b05eaa387
                                  • Instruction ID: c0808fd62a4bb74af8200e8feef227ca822a2ba8797aae42f29add3dd786c52a
                                  • Opcode Fuzzy Hash: e2dae81792af6e7daca4a4de3b8871faf1c5f9ce7b75125c4e2cf65b05eaa387
                                  • Instruction Fuzzy Hash: 8661F3EB70C210BDA15341513B54BF62A6EEAD7630730C066F487DBBC2F6D4AA8A7131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 296 4d00b2d-4d00b30 297 4d00b32-4d00b82 296->297 298 4d00acb-4d00aef call 4d00af5 296->298 309 4d00b8d 297->309 304 4d00af1-4d00af3 298->304 305 4d00b68-4d00b72 298->305 306 4d00b74-4d00b82 305->306 307 4d00b9f 305->307 306->309 310 4d00ba0-4d00bff 307->310 309->310 314 4d00c16-4d00c1b 310->314 315 4d00c06-4d00c15 314->315 316 4d00c1c-4d00c39 314->316 315->314 319 4d00c50-4d00c61 GetCurrentHwProfileW 316->319 320 4d00c78-4d00d5d call 4d00d69 319->320 331 4d00dd6-4d00de1 320->331 332 4d00d5f-4d00d67 320->332 333 4d00de2-4d00fa4 331->333 334 4d00d69-4d00d6a 332->334 335 4d00d6e-4d00d76 332->335 336 4d00d7c-4d00dcc 334->336 335->336 336->333
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04D00C50
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2974366115.0000000004D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 04D00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_4d00000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 799c8a84a8fbdd2081261a55a87419d05f90d41e89e0d42bf45a344a07d5618e
                                  • Instruction ID: 503351ae51758fe6c078a928ab1a341c14a7c6a9c5c85b912cadd4ac2e312616
                                  • Opcode Fuzzy Hash: 799c8a84a8fbdd2081261a55a87419d05f90d41e89e0d42bf45a344a07d5618e
                                  • Instruction Fuzzy Hash: AE51F2EB70D110BDA15341523B54BF62A6EE6D7630730C067F887DBAC2F6D4AA897031

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 363 4d00af5-4d00bff 375 4d00c16-4d00c1b 363->375 376 4d00c06-4d00c15 375->376 377 4d00c1c-4d00c39 375->377 376->375 380 4d00c50-4d00c61 GetCurrentHwProfileW 377->380 381 4d00c78-4d00d5d call 4d00d69 380->381 392 4d00dd6-4d00de1 381->392 393 4d00d5f-4d00d67 381->393 394 4d00de2-4d00fa4 392->394 395 4d00d69-4d00d6a 393->395 396 4d00d6e-4d00d76 393->396 397 4d00d7c-4d00dcc 395->397 396->397 397->394
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04D00C50
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2974366115.0000000004D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 04D00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_4d00000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 1929bb2bae288bce20f1dd60334913220cc7b1f2adaf34eebe3db4b355846410
                                  • Instruction ID: c40895fdf37d264708dcf498cd662b2b1277d0b263a3b247ce47e9ed67e02968
                                  • Opcode Fuzzy Hash: 1929bb2bae288bce20f1dd60334913220cc7b1f2adaf34eebe3db4b355846410
                                  • Instruction Fuzzy Hash: 1B5113DB70C110BDA15385413B54BF66A6EE6D7230730C067F487DBBC2F684AA897131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 424 4d00afb-4d00afc 425 4d00b03-4d00bff 424->425 426 4d00afe-4d00b02 424->426 437 4d00c16-4d00c1b 425->437 426->425 438 4d00c06-4d00c15 437->438 439 4d00c1c-4d00c39 437->439 438->437 442 4d00c50-4d00c61 GetCurrentHwProfileW 439->442 443 4d00c78-4d00d5d call 4d00d69 442->443 454 4d00dd6-4d00de1 443->454 455 4d00d5f-4d00d67 443->455 456 4d00de2-4d00fa4 454->456 457 4d00d69-4d00d6a 455->457 458 4d00d6e-4d00d76 455->458 459 4d00d7c-4d00dcc 457->459 458->459 459->456
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04D00C50
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2974366115.0000000004D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 04D00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_4d00000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 28900dd99a5e4e5c72e02ab831ccdd86ecfe848a8690e869e6849d583c5a2519
                                  • Instruction ID: 4c8cbe78b2e3228c887440b5f5bda45376fc8b894e9250fae47df3fe63c83166
                                  • Opcode Fuzzy Hash: 28900dd99a5e4e5c72e02ab831ccdd86ecfe848a8690e869e6849d583c5a2519
                                  • Instruction Fuzzy Hash: C651DFEB70C110BDA15385453B54BF66A6EE6D7230730C067F887DBAC2F694AB8A7131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 486 4d00c05 487 4d00c06-4d00c1b 486->487 489 4d00c1c-4d00c39 487->489 492 4d00c50-4d00c61 GetCurrentHwProfileW 489->492 493 4d00c78-4d00d5d call 4d00d69 492->493 504 4d00dd6-4d00de1 493->504 505 4d00d5f-4d00d67 493->505 506 4d00de2-4d00fa4 504->506 507 4d00d69-4d00d6a 505->507 508 4d00d6e-4d00d76 505->508 509 4d00d7c-4d00dcc 507->509 508->509 509->506
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2974366115.0000000004D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 04D00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_4d00000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d1ccd8f12dca989ccb6cf7383f8012fcb7a13586d7e348c856a06abdb4569e37
                                  • Instruction ID: 11d4eb4d5b10b5403a915e2bd08b014990a48e8b3ecfd09e7e3f0dc480ed6158
                                  • Opcode Fuzzy Hash: d1ccd8f12dca989ccb6cf7383f8012fcb7a13586d7e348c856a06abdb4569e37
                                  • Instruction Fuzzy Hash: CF5148E770C150BDA20381557B54BF66F6EEA97230330C06BF487DB6C2F685AA897131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 536 4d00b43-4d00bff 544 4d00c16-4d00c1b 536->544 545 4d00c06-4d00c15 544->545 546 4d00c1c-4d00c39 544->546 545->544 549 4d00c50-4d00c61 GetCurrentHwProfileW 546->549 550 4d00c78-4d00d5d call 4d00d69 549->550 561 4d00dd6-4d00de1 550->561 562 4d00d5f-4d00d67 550->562 563 4d00de2-4d00fa4 561->563 564 4d00d69-4d00d6a 562->564 565 4d00d6e-4d00d76 562->565 566 4d00d7c-4d00dcc 564->566 565->566 566->563
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04D00C50
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2974366115.0000000004D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 04D00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_4d00000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 3c7dbc40fb919c43ea19c32ef3c3e9311b28134f9e9c1a17f10f99d08344a229
                                  • Instruction ID: 33b47cab2116d4ff1212c791a3fac82e6693c8d093efb52e4a56c11b56f7c4ed
                                  • Opcode Fuzzy Hash: 3c7dbc40fb919c43ea19c32ef3c3e9311b28134f9e9c1a17f10f99d08344a229
                                  • Instruction Fuzzy Hash: 2D51F1EB70C114BDA15341413B54BF62A6EE6D7230B30C067F887EBBC2F694AA897031

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 593 4d00b5d-4d00bff 600 4d00c16-4d00c1b 593->600 601 4d00c06-4d00c15 600->601 602 4d00c1c-4d00c39 600->602 601->600 605 4d00c50-4d00c61 GetCurrentHwProfileW 602->605 606 4d00c78-4d00d5d call 4d00d69 605->606 617 4d00dd6-4d00de1 606->617 618 4d00d5f-4d00d67 606->618 619 4d00de2-4d00fa4 617->619 620 4d00d69-4d00d6a 618->620 621 4d00d6e-4d00d76 618->621 622 4d00d7c-4d00dcc 620->622 621->622 622->619
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04D00C50
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2974366115.0000000004D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 04D00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_4d00000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: c733ca287ef201fb898c37f415af09eec7bc2305587ecf8564ce787792cd91d6
                                  • Instruction ID: 4b896dd6b7600776c8acdfb96801652b1bc170aa01164e6491247d1369625e65
                                  • Opcode Fuzzy Hash: c733ca287ef201fb898c37f415af09eec7bc2305587ecf8564ce787792cd91d6
                                  • Instruction Fuzzy Hash: 2D51B0EB70D124BDA15345413B54BF66A6EE6D7230730C067F487EBBC2F694AA897031

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 649 4d00b87-4d00bff 655 4d00c16-4d00c1b 649->655 656 4d00c06-4d00c15 655->656 657 4d00c1c-4d00c39 655->657 656->655 660 4d00c50-4d00c61 GetCurrentHwProfileW 657->660 661 4d00c78-4d00d5d call 4d00d69 660->661 672 4d00dd6-4d00de1 661->672 673 4d00d5f-4d00d67 661->673 674 4d00de2-4d00fa4 672->674 675 4d00d69-4d00d6a 673->675 676 4d00d6e-4d00d76 673->676 677 4d00d7c-4d00dcc 675->677 676->677 677->674
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04D00C50
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2974366115.0000000004D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 04D00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_4d00000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 048fbcae69bf09793411e15aa86504f1f7ea1173a772d3bd1fb35f995522577b
                                  • Instruction ID: 5fac316a088297d1940ab2ef7ecbba873a52549b0a6efe1f3fc9d10a6b9c824c
                                  • Opcode Fuzzy Hash: 048fbcae69bf09793411e15aa86504f1f7ea1173a772d3bd1fb35f995522577b
                                  • Instruction Fuzzy Hash: F851C0EB70D124BDA15341453B54BF66A6EE6D7230730C067F487EBBC2F694AA897031

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 704 4d00b92-4d00bff 710 4d00c16-4d00c1b 704->710 711 4d00c06-4d00c15 710->711 712 4d00c1c-4d00c39 710->712 711->710 715 4d00c50-4d00c61 GetCurrentHwProfileW 712->715 716 4d00c78-4d00d5d call 4d00d69 715->716 727 4d00dd6-4d00de1 716->727 728 4d00d5f-4d00d67 716->728 729 4d00de2-4d00fa4 727->729 730 4d00d69-4d00d6a 728->730 731 4d00d6e-4d00d76 728->731 732 4d00d7c-4d00dcc 730->732 731->732 732->729
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04D00C50
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2974366115.0000000004D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 04D00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_4d00000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 82ff464bb9f83e40b726cfd8ac76e65d6f45b1a2956bd2fe4773e499bb875ab5
                                  • Instruction ID: 921ddb7dfff7ce1bfb3e0a472602afd2e6bbf2014d1596cf9287ccc404003322
                                  • Opcode Fuzzy Hash: 82ff464bb9f83e40b726cfd8ac76e65d6f45b1a2956bd2fe4773e499bb875ab5
                                  • Instruction Fuzzy Hash: 6D51E2EB70C210BDA15385513B54BF62A6EE6D7230730C167F487EBBC2F694AA897131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 759 4d00bbe-4d00bff 762 4d00c16-4d00c1b 759->762 763 4d00c06-4d00c15 762->763 764 4d00c1c-4d00c39 762->764 763->762 767 4d00c50-4d00c61 GetCurrentHwProfileW 764->767 768 4d00c78-4d00d5d call 4d00d69 767->768 779 4d00dd6-4d00de1 768->779 780 4d00d5f-4d00d67 768->780 781 4d00de2-4d00fa4 779->781 782 4d00d69-4d00d6a 780->782 783 4d00d6e-4d00d76 780->783 784 4d00d7c-4d00dcc 782->784 783->784 784->781
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04D00C50
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2974366115.0000000004D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 04D00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_4d00000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: e0d24ab22712b2742469a5f7a16b419db479c1f1962504a8fd4ba4a5bc9c9482
                                  • Instruction ID: 0a66e8a89304004f59f5541152d68f8822e058570353958193877e8c0e9f8618
                                  • Opcode Fuzzy Hash: e0d24ab22712b2742469a5f7a16b419db479c1f1962504a8fd4ba4a5bc9c9482
                                  • Instruction Fuzzy Hash: 9E41E2EB70D120BDA15341413B54BF66A6EE6D7230730C067F887EBBC2F694AA897031

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 811 4d00be2-4d00bff 812 4d00c16-4d00c1b 811->812 813 4d00c06-4d00c15 812->813 814 4d00c1c-4d00c39 812->814 813->812 817 4d00c50-4d00c61 GetCurrentHwProfileW 814->817 818 4d00c78-4d00d5d call 4d00d69 817->818 829 4d00dd6-4d00de1 818->829 830 4d00d5f-4d00d67 818->830 831 4d00de2-4d00fa4 829->831 832 4d00d69-4d00d6a 830->832 833 4d00d6e-4d00d76 830->833 834 4d00d7c-4d00dcc 832->834 833->834 834->831
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04D00C50
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2974366115.0000000004D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 04D00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_4d00000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 1b9f98321f166a76b99ab4bf898921fdecec3287989c5aa2aeea44629194a3b8
                                  • Instruction ID: 5bc06c572602c6db816a4c25b614022aed8c303867b4e4ad2eeba5707b514542
                                  • Opcode Fuzzy Hash: 1b9f98321f166a76b99ab4bf898921fdecec3287989c5aa2aeea44629194a3b8
                                  • Instruction Fuzzy Hash: 7B41DFEB70C120BDA15385423B54BF66A6EE6D7230730C06BF487D7B82F694AA897031
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04D00C50
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2974366115.0000000004D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 04D00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_4d00000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 35b953d38f1b5aa0397d3131941bca12a5a2102dcf57f31ca386ccfa93b35575
                                  • Instruction ID: 53a976589657672014b22189276dfe353f84f931e5d990bf273b61b9db80031b
                                  • Opcode Fuzzy Hash: 35b953d38f1b5aa0397d3131941bca12a5a2102dcf57f31ca386ccfa93b35575
                                  • Instruction Fuzzy Hash: 3641E0EB70D120BDA15385417B54BF62A6EE6D7230730C467F887DBAC2F694AA897031
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04D00C50
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2974366115.0000000004D00000.00000040.00001000.00020000.00000000.sdmp, Offset: 04D00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_4d00000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 4b94de90284c621ce600336d3faad2e3ac53575a4baa0e42e21df7cf7b21be4e
                                  • Instruction ID: 0c97c8a6f09b55a10e25d9c81550dbbe878363c15cded4eb93635a1e49d081d7
                                  • Opcode Fuzzy Hash: 4b94de90284c621ce600336d3faad2e3ac53575a4baa0e42e21df7cf7b21be4e
                                  • Instruction Fuzzy Hash: 1C41C3EB70D120BDA15381523B54BF61A6EE6D7330730C167F487D7AC2F694AA897131
                                  APIs
                                  • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,?,?,?,?,?,?,?,00000000,?), ref: 001D990E
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2960518096.0000000000191000.00000040.00000001.01000000.00000005.sdmp, Offset: 00190000, based on PE: true
                                  • Associated: 00000005.00000002.2960355499.0000000000190000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2960518096.0000000000315000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2961275866.000000000031A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.000000000031D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000004A4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005C4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005CC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005DA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2963200674.00000000005DB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2964498464.000000000077B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2964562085.000000000077D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_190000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: FileWrite
                                  • String ID:
                                  • API String ID: 3934441357-0
                                  • Opcode ID: 575e0cf06405d5ae709a9d3db70b863f2db9e05012dee2c29dfc6abd690d42df
                                  • Instruction ID: 61b10d519f73381e439c3593c4f66ad2523d390ee68c3e38eb563c488b454dcb
                                  • Opcode Fuzzy Hash: 575e0cf06405d5ae709a9d3db70b863f2db9e05012dee2c29dfc6abd690d42df
                                  • Instruction Fuzzy Hash: 9061C472D04119BFDF15DFA8C880EEEBBB9AF19308F15014AE904A7346D732D901DBA0
                                  APIs
                                  • FindCloseChangeNotification.KERNELBASE(00000000,00000000,?,?,001D8CE6,00000000,?,0030A178,0000000C,001D8DA2,?,?,?), ref: 001D8E55
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2960518096.0000000000191000.00000040.00000001.01000000.00000005.sdmp, Offset: 00190000, based on PE: true
                                  • Associated: 00000005.00000002.2960355499.0000000000190000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2960518096.0000000000315000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2961275866.000000000031A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.000000000031D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000004A4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005C4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005CC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005DA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2963200674.00000000005DB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2964498464.000000000077B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2964562085.000000000077D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_190000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: ChangeCloseFindNotification
                                  • String ID:
                                  • API String ID: 2591292051-0
                                  • Opcode ID: f22c7ffff4bb386eeeadf5f02e643b68fd6a448f0fa2576d2f0cce5bbe4c920f
                                  • Instruction ID: d01d7c8ef708482bb846e8bfa13fbd2bdcc120a6986f3cffab03b0ace5325c4f
                                  • Opcode Fuzzy Hash: f22c7ffff4bb386eeeadf5f02e643b68fd6a448f0fa2576d2f0cce5bbe4c920f
                                  • Instruction Fuzzy Hash: 8B114E337061246AD6293335A841BBE678D4B9273CF290A1FF9188F3C2DF71DC814599
                                  APIs
                                  • SetFilePointerEx.KERNELBASE(00000000,?,?,?,?,?,00000000,?,?,?,001D2626,?,?,?,?,?), ref: 001D2558
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2960518096.0000000000191000.00000040.00000001.01000000.00000005.sdmp, Offset: 00190000, based on PE: true
                                  • Associated: 00000005.00000002.2960355499.0000000000190000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2960518096.0000000000315000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2961275866.000000000031A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.000000000031D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000004A4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005C4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005CC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005DA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2963200674.00000000005DB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2964498464.000000000077B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2964562085.000000000077D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_190000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: FilePointer
                                  • String ID:
                                  • API String ID: 973152223-0
                                  • Opcode ID: 86c4f43d916f647db112ce0037858b8c888244b1a05d8be8a4a7bdf851fc6718
                                  • Instruction ID: 57617628cadb9da59016b3a516ba85e7690e88719bfbb6147e8f444760cc677b
                                  • Opcode Fuzzy Hash: 86c4f43d916f647db112ce0037858b8c888244b1a05d8be8a4a7bdf851fc6718
                                  • Instruction Fuzzy Hash: 5D010432600114ABCF09DF59DC11CDE7B5A9B95320B250109F8119B2A0EB71ED428B90
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0019331F
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2960518096.0000000000191000.00000040.00000001.01000000.00000005.sdmp, Offset: 00190000, based on PE: true
                                  • Associated: 00000005.00000002.2960355499.0000000000190000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2960518096.0000000000315000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2961275866.000000000031A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.000000000031D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000004A4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005C4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005CC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005DA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2963200674.00000000005DB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2964498464.000000000077B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2964562085.000000000077D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_190000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID:
                                  • API String ID: 118556049-0
                                  • Opcode ID: 0fd589d96c9d07b1efa01aec19e4ff46bb0766daf2056f60d33bc81ca57302d3
                                  • Instruction ID: 9a938fad64ebf40b021adcaa69c9ae37b2d8c2f4359c334488802a9686c87024
                                  • Opcode Fuzzy Hash: 0fd589d96c9d07b1efa01aec19e4ff46bb0766daf2056f60d33bc81ca57302d3
                                  • Instruction Fuzzy Hash: AFF09A72140114AADF186FA4E8159EAB3E8EE353A1750096EE8A9C7212EF26DB408790
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000008,?,00000001,?,001D9FE0,00000001,00000364,00000001,00000006,000000FF,?,001C4B3F,?,?,74D723A0,?), ref: 001DA69B
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2960518096.0000000000191000.00000040.00000001.01000000.00000005.sdmp, Offset: 00190000, based on PE: true
                                  • Associated: 00000005.00000002.2960355499.0000000000190000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2960518096.0000000000315000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2961275866.000000000031A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.000000000031D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000004A4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005C4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005CC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005DA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2963200674.00000000005DB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2964498464.000000000077B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2964562085.000000000077D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_190000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: a3ce7ba9c36264ef53e6848143688496e05053dc719ef4e1f3e6a8658efc9d1f
                                  • Instruction ID: e3396bd517c7f21b8c0d1ddb14cf0c2436a55897ec0ac0dea9e4806bbb78f30b
                                  • Opcode Fuzzy Hash: a3ce7ba9c36264ef53e6848143688496e05053dc719ef4e1f3e6a8658efc9d1f
                                  • Instruction Fuzzy Hash: 0FF0E232111520EA9F22EA72DC11BAB3B4DAF41760FAD8123EC04EB380DB34DC0086E7
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000000,00000001,?,?,001C4B3F,?,?,74D723A0,?,?,00193522,?,?), ref: 001DB0C7
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2960518096.0000000000191000.00000040.00000001.01000000.00000005.sdmp, Offset: 00190000, based on PE: true
                                  • Associated: 00000005.00000002.2960355499.0000000000190000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2960518096.0000000000315000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2961275866.000000000031A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.000000000031D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000004A4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005C4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005CC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005DA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2963200674.00000000005DB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2964498464.000000000077B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2964562085.000000000077D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_190000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 5018fbb2dad5e068dbf1336f309079549558df01085d111790af6581d767e998
                                  • Instruction ID: dfd0d8e366a4d9b8894b3680df03abb18e66e18d3a5b822b1807bb3a5c002b58
                                  • Opcode Fuzzy Hash: 5018fbb2dad5e068dbf1336f309079549558df01085d111790af6581d767e998
                                  • Instruction Fuzzy Hash: D0E02B31108220EADB3136699C90B5F766D9F413A0F070213FC26927C0DB30CC0081E5
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2974457666.0000000004D10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04D10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_4d10000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ae2f01e2b603b8227925f80cd67d26340688740cf22c73145321d24f1f876f80
                                  • Instruction ID: 5727de5eb1ec26e823a8918206fc2848fcab461b56778fecc92acb31673766b3
                                  • Opcode Fuzzy Hash: ae2f01e2b603b8227925f80cd67d26340688740cf22c73145321d24f1f876f80
                                  • Instruction Fuzzy Hash: 7A21B2E7388214BF654360867B54AFA6B5ED6DB730330C026FC83D7A13F2959A892171
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2974457666.0000000004D10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04D10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_4d10000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: de52576389eff6bcb315b44a3387f523e92ede748481be53adf4ed9324290a57
                                  • Instruction ID: 72f83d4d490a6afd8fc6b58346164f359e0ded1fa120088735f8f5e3cd4a09cd
                                  • Opcode Fuzzy Hash: de52576389eff6bcb315b44a3387f523e92ede748481be53adf4ed9324290a57
                                  • Instruction Fuzzy Hash: 6421A1EB3482547E650360957B54EFA6B5EDACB7303308026FC83D6A13E2898A896171
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2974457666.0000000004D10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04D10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_4d10000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 57a2c27ced50796cab23af267f2b99618c7c45e17cc2d6b097557fbc08143d85
                                  • Instruction ID: ad3524ac25cb89def8023ea4893742702ce7c9cc08ce8e93863107bda6f46c2a
                                  • Opcode Fuzzy Hash: 57a2c27ced50796cab23af267f2b99618c7c45e17cc2d6b097557fbc08143d85
                                  • Instruction Fuzzy Hash: 9511E6EB3481147E750370963F54EFA6B5ED6CA730330C027FC83C6913E2998A896172
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2974457666.0000000004D10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04D10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_4d10000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a088b718c50eba4d57672e86b8027066316aed88d4f7cb377a3d1a07f899d5f4
                                  • Instruction ID: 696ff345ab310e1c50ee8a43256057f672f5997f3e3b83f6eace411ba5c01860
                                  • Opcode Fuzzy Hash: a088b718c50eba4d57672e86b8027066316aed88d4f7cb377a3d1a07f899d5f4
                                  • Instruction Fuzzy Hash: 9F11E6EB3481047F6503B4967B59AFA6B5DDACB3303308127FCC3D6913E1959A896172
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2974457666.0000000004D10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04D10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_4d10000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 32f85628bc8abfcdd094e72f5eb0834f30adbd10395b4c162e8d564607ecfc72
                                  • Instruction ID: 2fbdf7b27041414856749ac77c669563b5774858404a2ff4d1159749546f2d4c
                                  • Opcode Fuzzy Hash: 32f85628bc8abfcdd094e72f5eb0834f30adbd10395b4c162e8d564607ecfc72
                                  • Instruction Fuzzy Hash: CB1138EB24D2407FB10361953F55AFA6B5DEAD7330330802BF8C3D7A13E1944A856171
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2974457666.0000000004D10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04D10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_4d10000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3d041883ef189d9c87f09d8d33373038fdb0854e5c87b531dfdfc2b13a2f8a9f
                                  • Instruction ID: 2a10860961d1cd3843664ba05e5b5a30f1d486bb0fac88618b6d061c37ef5850
                                  • Opcode Fuzzy Hash: 3d041883ef189d9c87f09d8d33373038fdb0854e5c87b531dfdfc2b13a2f8a9f
                                  • Instruction Fuzzy Hash: AD01A7EB349110BE714360867B44EFA5B5DE6D7330370C027F883C2913E1948A997171
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2974457666.0000000004D10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04D10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_4d10000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 246ee1cadf6e5b13c96e8e2d22ff18266108d101889f638e604b612af2dfc9e0
                                  • Instruction ID: fd888f8bedaca9a762db801c0f0e22aae06ddd6f85ead579e5623c68f76e2bf2
                                  • Opcode Fuzzy Hash: 246ee1cadf6e5b13c96e8e2d22ff18266108d101889f638e604b612af2dfc9e0
                                  • Instruction Fuzzy Hash: D40126AB34C210BFE143A0823B58AF9676DE6D7330334C02BF8C3C5513E1889A8D6272
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2974457666.0000000004D10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04D10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_4d10000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 38f9e5411d2b8ad3c61864ef6fec42416994bc55192fb028856ee94a49688d15
                                  • Instruction ID: 05b0d727ea4329b1c00fb41aef0647276dd80cbf943caa333fdd25f21f88e6ae
                                  • Opcode Fuzzy Hash: 38f9e5411d2b8ad3c61864ef6fec42416994bc55192fb028856ee94a49688d15
                                  • Instruction Fuzzy Hash: 23F022EB3890107E6043A0927F88AFA676CD5C73303348427F8C3C1013F1888ACE6171
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2974457666.0000000004D10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04D10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_4d10000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0e39667ebbb5cccecace448f12ee26379ce385ae20f486ccb5f7bdaa54360aa6
                                  • Instruction ID: d95e66a5fd54f663e62abf24e80ffa0c5221964608d11a46958b0807df11079f
                                  • Opcode Fuzzy Hash: 0e39667ebbb5cccecace448f12ee26379ce385ae20f486ccb5f7bdaa54360aa6
                                  • Instruction Fuzzy Hash: 3EF090EB349110BE6043A0963B49AFA975DE5DB330374C037F8C3C5513E2888A8E6132
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2974457666.0000000004D10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04D10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_4d10000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5cf43984d852bab900ca7d53761aa91be95ace05124fc94dfadf867105d06f8c
                                  • Instruction ID: d857286b51b6ec3010762a4b4eeb41b1b9a9e4717fab9ef9b21b6780f72850ae
                                  • Opcode Fuzzy Hash: 5cf43984d852bab900ca7d53761aa91be95ace05124fc94dfadf867105d06f8c
                                  • Instruction Fuzzy Hash: 3DF012EB3491107EB042A1967F59BFA975DE5D7331374C437F887C1513E2988A8E6131
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2974457666.0000000004D10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04D10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_4d10000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6dcbfadb8d042812359222c39410ce906fea3c587d5eaad635aa09c8bcaa995a
                                  • Instruction ID: 05a94f3234bcc7c37fabaf3fb95e7d69732b917328fd5f5f9a41e2770b098e6a
                                  • Opcode Fuzzy Hash: 6dcbfadb8d042812359222c39410ce906fea3c587d5eaad635aa09c8bcaa995a
                                  • Instruction Fuzzy Hash: B0E0265B3491807A8203616835856F56F9A6DE723237840BAFDC1CAA17E049854EA330
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2960518096.0000000000191000.00000040.00000001.01000000.00000005.sdmp, Offset: 00190000, based on PE: true
                                  • Associated: 00000005.00000002.2960355499.0000000000190000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2960518096.0000000000315000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2961275866.000000000031A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.000000000031D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000004A4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005C4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005CC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005DA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2963200674.00000000005DB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2964498464.000000000077B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2964562085.000000000077D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_190000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 333d4b6d5425d6f9d03797ee82114c3711da98524c03317fffdb5ec62fb2b380
                                  • Instruction ID: 27f0dc3dd47f61ba77ccf921b8d0747872099d25bc87f4dda97fa330c784dd36
                                  • Opcode Fuzzy Hash: 333d4b6d5425d6f9d03797ee82114c3711da98524c03317fffdb5ec62fb2b380
                                  • Instruction Fuzzy Hash: 6E021971E012199BDB14CFA9C890BAEBBB1FF58314F24826DE919E7380D731AD41CB94
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2960518096.0000000000191000.00000040.00000001.01000000.00000005.sdmp, Offset: 00190000, based on PE: true
                                  • Associated: 00000005.00000002.2960355499.0000000000190000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2960518096.0000000000315000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2961275866.000000000031A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.000000000031D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000004A4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005C4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005CC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005DA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2963200674.00000000005DB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2964498464.000000000077B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2964562085.000000000077D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_190000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: _strrchr
                                  • String ID:
                                  • API String ID: 3213747228-0
                                  • Opcode ID: 785c90e8ff89e0f1a3d98e37725974d6f6ea20f06d45e48120c47f1ca5a82ffe
                                  • Instruction ID: 50663312eafb5820b65abbd14ad4ab6c215d965b6876ee8b9d508dc424d69d71
                                  • Opcode Fuzzy Hash: 785c90e8ff89e0f1a3d98e37725974d6f6ea20f06d45e48120c47f1ca5a82ffe
                                  • Instruction Fuzzy Hash: DDB16632E08695DFDB158F68CCC2BEE7BA5EF69310F164157E906AB382D7749801C7A0
                                  APIs
                                  • _ValidateLocalCookies.LIBCMT ref: 001C7307
                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 001C730F
                                  • _ValidateLocalCookies.LIBCMT ref: 001C7398
                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 001C73C3
                                  • _ValidateLocalCookies.LIBCMT ref: 001C7418
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2960518096.0000000000191000.00000040.00000001.01000000.00000005.sdmp, Offset: 00190000, based on PE: true
                                  • Associated: 00000005.00000002.2960355499.0000000000190000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2960518096.0000000000315000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2961275866.000000000031A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.000000000031D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000004A4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005C4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005CC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005DA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2963200674.00000000005DB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2964498464.000000000077B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2964562085.000000000077D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_190000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                  • String ID: csm
                                  • API String ID: 1170836740-1018135373
                                  • Opcode ID: ac65a7f329f5bd00bc35a4b7d404c1ce5908e3d955e1547b75e9d6e68bcf6263
                                  • Instruction ID: 58abb4dd4b351b33951902f6a90f349e2192a7fa1c374b55b4a08cc8b9ffac3e
                                  • Opcode Fuzzy Hash: ac65a7f329f5bd00bc35a4b7d404c1ce5908e3d955e1547b75e9d6e68bcf6263
                                  • Instruction Fuzzy Hash: FD41A034E04249ABCF14DF68C885F9EBBA5BF64324F148059EC189B392DB71EA01DF91
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 001AA09D
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 001AA0BF
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 001AA0E7
                                  • __Getctype.LIBCPMT ref: 001AA1C5
                                  • std::_Facet_Register.LIBCPMT ref: 001AA1F9
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 001AA223
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2960518096.0000000000191000.00000040.00000001.01000000.00000005.sdmp, Offset: 00190000, based on PE: true
                                  • Associated: 00000005.00000002.2960355499.0000000000190000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2960518096.0000000000315000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2961275866.000000000031A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.000000000031D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000004A4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005C4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005CC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005DA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2963200674.00000000005DB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2964498464.000000000077B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2964562085.000000000077D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_190000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetctypeRegister
                                  • String ID:
                                  • API String ID: 1102183713-0
                                  • Opcode ID: bc9cc9e601676c6b4b21f0ebf1c299c82444e4d8edf9584006264c34b7f996dd
                                  • Instruction ID: 2ffea626b30d328ac3bf93d1ae520ffd7b57dfe8a7070992e3a0c15811bd2104
                                  • Opcode Fuzzy Hash: bc9cc9e601676c6b4b21f0ebf1c299c82444e4d8edf9584006264c34b7f996dd
                                  • Instruction Fuzzy Hash: A851DAB4D00248DFCB11CF58C941BAEBBF4AF25710F28815DE854AB391EB75AE04CB92
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 001AC45A
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 001AC47C
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 001AC4A4
                                  • std::_Facet_Register.LIBCPMT ref: 001AC59A
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 001AC5C4
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2960518096.0000000000191000.00000040.00000001.01000000.00000005.sdmp, Offset: 00190000, based on PE: true
                                  • Associated: 00000005.00000002.2960355499.0000000000190000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2960518096.0000000000315000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2961275866.000000000031A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.000000000031D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000004A4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005C4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005CC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005DA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2963200674.00000000005DB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2964498464.000000000077B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2964562085.000000000077D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_190000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                  • String ID:
                                  • API String ID: 459529453-0
                                  • Opcode ID: d96190c4cd2e722338be58131a39320fbd5b12bec00555f4b179fdfd53b2c7a3
                                  • Instruction ID: 664c1004bc02da5abfec0968a4e3eb53a387f1799a585e20dd926a23a072c1f6
                                  • Opcode Fuzzy Hash: d96190c4cd2e722338be58131a39320fbd5b12bec00555f4b179fdfd53b2c7a3
                                  • Instruction Fuzzy Hash: 0651DBB0900248DFDB12CF58C854BAEBBF4FB26314F24815DE855AB380D771AA05CBD0
                                  APIs
                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 0019499F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2960518096.0000000000191000.00000040.00000001.01000000.00000005.sdmp, Offset: 00190000, based on PE: true
                                  • Associated: 00000005.00000002.2960355499.0000000000190000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2960518096.0000000000315000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2961275866.000000000031A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.000000000031D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000004A4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005C4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005CC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005DA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2963200674.00000000005DB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2964498464.000000000077B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2964562085.000000000077D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_190000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: Ios_base_dtorstd::ios_base::_
                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                  • API String ID: 323602529-1866435925
                                  • Opcode ID: d17cb17f824c2ba873af8c42df071e22496943d7707552bb527d29d2cc4a806e
                                  • Instruction ID: e399aa6cc94ba60d89ab9b881228e0b6805d9fa69d5b806feed30ee744388dec
                                  • Opcode Fuzzy Hash: d17cb17f824c2ba873af8c42df071e22496943d7707552bb527d29d2cc4a806e
                                  • Instruction Fuzzy Hash: 4D115972914A48ABCB14DF588C02FAA7398DB19724F08462DFA588B2C1EB35A911C7D2
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 001C2730
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 001C273B
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 001C27A9
                                    • Part of subcall function 001C288C: std::locale::_Locimp::_Locimp.LIBCPMT ref: 001C28A4
                                  • std::locale::_Setgloballocale.LIBCPMT ref: 001C2756
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2960518096.0000000000191000.00000040.00000001.01000000.00000005.sdmp, Offset: 00190000, based on PE: true
                                  • Associated: 00000005.00000002.2960355499.0000000000190000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2960518096.0000000000315000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2961275866.000000000031A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.000000000031D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000004A4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005C4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005CC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005DA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2963200674.00000000005DB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2964498464.000000000077B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2964562085.000000000077D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_190000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                                  • String ID:
                                  • API String ID: 677527491-0
                                  • Opcode ID: 08cb9cd91c81c4ecea6b7384bdb36b0153a2e617cabfba80cdb19d6a8b2a4f83
                                  • Instruction ID: 4cec7bb373b569fecb7c56b422d1c8c32cd4f14744d36664055e1c1ad77500c6
                                  • Opcode Fuzzy Hash: 08cb9cd91c81c4ecea6b7384bdb36b0153a2e617cabfba80cdb19d6a8b2a4f83
                                  • Instruction Fuzzy Hash: 0D01D479A002108BC70AEB20D885A7D77B1BFB9750B18444DE82157381CF74EE02CFD5
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 0019750C
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00197522
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2960518096.0000000000191000.00000040.00000001.01000000.00000005.sdmp, Offset: 00190000, based on PE: true
                                  • Associated: 00000005.00000002.2960355499.0000000000190000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2960518096.0000000000315000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2961275866.000000000031A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.000000000031D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000004A4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005C4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005CC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005DA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2963200674.00000000005DB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2964498464.000000000077B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2964562085.000000000077D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_190000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: [json.exception.
                                  • API String ID: 4194217158-791563284
                                  • Opcode ID: 0c3c2b6850d2a758a1e5cd396362de189af7eabdcab0a77548a7d5c87e896f1c
                                  • Instruction ID: 03a24a4de163aa6bab2a21098ea8bb69e012dc7da200ef8ef41eb1029525f81b
                                  • Opcode Fuzzy Hash: 0c3c2b6850d2a758a1e5cd396362de189af7eabdcab0a77548a7d5c87e896f1c
                                  • Instruction Fuzzy Hash: FC51C1B1C146489FDB00DFA8C905BAEFBF4EF25314F144269E854A7382E7B49A44C7E1
                                  APIs
                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 0019499F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2960518096.0000000000191000.00000040.00000001.01000000.00000005.sdmp, Offset: 00190000, based on PE: true
                                  • Associated: 00000005.00000002.2960355499.0000000000190000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2960518096.0000000000315000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2961275866.000000000031A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.000000000031D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000004A4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005C4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005CC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005DA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2963200674.00000000005DB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2964498464.000000000077B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2964562085.000000000077D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_190000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: Ios_base_dtorstd::ios_base::_
                                  • String ID: ios_base::badbit set$ios_base::failbit set
                                  • API String ID: 323602529-1240500531
                                  • Opcode ID: 489e2cd1f8cfcf8f7aa312c65650e7b83eee281504639bc4e1f2bb0331df1ea8
                                  • Instruction ID: ebd4416008110776002eaee5368f9e2f34b50e75521f3353e8388eb94c0f66aa
                                  • Opcode Fuzzy Hash: 489e2cd1f8cfcf8f7aa312c65650e7b83eee281504639bc4e1f2bb0331df1ea8
                                  • Instruction Fuzzy Hash: 9D41F6B1D04248AFCB04DF98CC45FAEBBB8EB19710F14825DF554AB781D775AA01CBA1
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00194061
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 001940C4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.2960518096.0000000000191000.00000040.00000001.01000000.00000005.sdmp, Offset: 00190000, based on PE: true
                                  • Associated: 00000005.00000002.2960355499.0000000000190000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2960518096.0000000000315000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2961275866.000000000031A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.000000000031D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000004A4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005C4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005CC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2962287913.00000000005DA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2963200674.00000000005DB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2964498464.000000000077B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.2964562085.000000000077D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_190000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                  • String ID: bad locale name
                                  • API String ID: 3988782225-1405518554
                                  • Opcode ID: 253a6eb378c3a017e9fd6111ac7ebb26f850daaf73351ed85e6e143f505618f4
                                  • Instruction ID: 19d4d650ea26e29ead6ae31d717b767757b63de6647f8f3765b2c6878af4373c
                                  • Opcode Fuzzy Hash: 253a6eb378c3a017e9fd6111ac7ebb26f850daaf73351ed85e6e143f505618f4
                                  • Instruction Fuzzy Hash: 18118170805B84EFD721CFA8C504B4BBFE4AF26714F14869DE49597781D3B5AA04C791

                                  Control-flow Graph

                                  APIs
                                  • setsockopt.WS2_32(000003D8,0000FFFF,00001006,?,00000008), ref: 00257BA7
                                  • recv.WS2_32(?,00000004,00000002), ref: 00257BC1
                                  • recv.WS2_32(00000000,0000000C,00000002,00000000), ref: 00257C43
                                  • recv.WS2_32(00000000,0000000C,00000008), ref: 00257C64
                                  • setsockopt.WS2_32(0000FFFF,00001006,?,00000008,?,00000000), ref: 00257D01
                                    • Part of subcall function 00258590: WSAStartup.WS2_32 ref: 002585BB
                                    • Part of subcall function 00258590: socket.WS2_32(?,?,?,?,?,?,00319328,?,?), ref: 0025865D
                                    • Part of subcall function 00258590: connect.WS2_32(00000000,002E9BFC,?,?,?,?,00319328,?,?), ref: 00258672
                                    • Part of subcall function 00258590: closesocket.WS2_32(00000000), ref: 0025867D
                                  • recv.WS2_32(00000000,?,00000008), ref: 00257D1B
                                  • recv.WS2_32(?,00000004,00000008), ref: 00257E23
                                  • __Xtime_get_ticks.LIBCPMT ref: 00257E2A
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00257E38
                                  • Sleep.KERNELBASE(00000001,00000000,?,00002710,00000000), ref: 00257EB1
                                  • Sleep.KERNELBASE(00000064,?,00002710,00000000), ref: 00257EB9
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.2960323258.0000000000191000.00000040.00000001.01000000.00000005.sdmp, Offset: 00190000, based on PE: true
                                  • Associated: 00000006.00000002.2960301741.0000000000190000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2960323258.0000000000315000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961085053.000000000031A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.000000000031D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000004A4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005C4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005CC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005DA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2963155791.00000000005DB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2964449781.000000000077B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2964517557.000000000077D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_190000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: recv$Sleepsetsockopt$StartupUnothrow_t@std@@@Xtime_get_ticks__ehfuncinfo$??2@closesocketconnectsocket
                                  • String ID:
                                  • API String ID: 301102601-0
                                  • Opcode ID: 624395be71bc457e061a17e4eac4767d8e574364ef31969d78318a8f7692a84f
                                  • Instruction ID: a2984d7ac0baa3b02a3521b757a8dee29257be5875ae01efc68bc27c0f569bce
                                  • Opcode Fuzzy Hash: 624395be71bc457e061a17e4eac4767d8e574364ef31969d78318a8f7692a84f
                                  • Instruction Fuzzy Hash: ADB1DE70D58308DFEB11DFA4DC49BADBBB5BB58300F208259E854AB2D2D7745D48CB91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 57 258590-2585c2 WSAStartup 58 258696-25869f 57->58 59 2585c8-2585f2 call 27a420 * 2 57->59 64 2585f4-2585f8 59->64 65 2585fe-258644 59->65 64->58 64->65 67 258646-25864c 65->67 68 258690 65->68 69 2586a4-2586ae 67->69 70 25864e 67->70 68->58 69->68 74 2586b0-2586b8 69->74 71 258654-258668 socket 70->71 71->68 72 25866a-25867a connect 71->72 75 2586a0 72->75 76 25867c-258684 closesocket 72->76 75->69 76->71 77 258686-25868a 76->77 77->68
                                  APIs
                                  • WSAStartup.WS2_32 ref: 002585BB
                                  • socket.WS2_32(?,?,?,?,?,?,00319328,?,?), ref: 0025865D
                                  • connect.WS2_32(00000000,002E9BFC,?,?,?,?,00319328,?,?), ref: 00258672
                                  • closesocket.WS2_32(00000000), ref: 0025867D
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.2960323258.0000000000191000.00000040.00000001.01000000.00000005.sdmp, Offset: 00190000, based on PE: true
                                  • Associated: 00000006.00000002.2960301741.0000000000190000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2960323258.0000000000315000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961085053.000000000031A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.000000000031D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000004A4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005C4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005CC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005DA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2963155791.00000000005DB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2964449781.000000000077B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2964517557.000000000077D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_190000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: Startupclosesocketconnectsocket
                                  • String ID:
                                  • API String ID: 3098855095-0
                                  • Opcode ID: 389687fc8f83132d045f1df28e422653441d93c46069942d9efa3a94fb66cf63
                                  • Instruction ID: 53f8c174e396633f0cbd8048d701d26cc2ef563e0c82e7fa156e144f634edee5
                                  • Opcode Fuzzy Hash: 389687fc8f83132d045f1df28e422653441d93c46069942d9efa3a94fb66cf63
                                  • Instruction Fuzzy Hash: 7331F5725153015BD7208F248C4466FB7E9FFC9375F004F1AFEA8A21D0E770991886A7

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 78 199280-1992dd call 1a63b0 81 199413-199521 call 192df0 call 27a420 78->81 82 1992e3-1992e9 78->82 98 199523-199535 81->98 99 199537-19953f call 1a8dc0 81->99 83 1992f0-199313 82->83 85 199315-19931f 83->85 86 199324-199331 83->86 88 199403-199406 85->88 89 199333-19933d 86->89 90 199342-19934f 86->90 92 199409-19940d 88->92 89->88 93 199351-19935b 90->93 94 199360-19936d 90->94 92->81 92->83 93->88 96 19936f-199379 94->96 97 19937e-19938b 94->97 96->88 100 199399-1993a6 97->100 101 19938d-199397 97->101 102 199544-199597 call 27a420 * 2 98->102 99->102 104 1993a8-1993b2 100->104 105 1993b4-1993c1 100->105 101->88 115 199599-1995c8 call 27a420 call 1c5270 102->115 116 1995cb-1995e1 call 27a420 102->116 104->88 107 1993cf-1993dc 105->107 108 1993c3-1993cd 105->108 110 1993ea-1993f4 107->110 111 1993de-1993e8 107->111 108->88 110->92 114 1993f6-1993ff 110->114 111->88 114->88 115->116 122 1996e2 116->122 123 1995e7-1995ed 116->123 124 1996e6-1996f0 122->124 126 1995f0-1996ce WSASend 123->126 127 19971e-19973d 124->127 128 1996f2-1996fe 124->128 145 19975f-199763 126->145 146 1996d4-1996dc 126->146 131 19976f-199796 127->131 132 19973f-19974b 127->132 129 199700-19970e 128->129 130 199714-19971b call 1c38f3 128->130 129->130 134 199797-1997fe call 1c8c70 call 192df0 * 2 129->134 130->127 136 19974d-19975b 132->136 137 199765-19976c call 1c38f3 132->137 136->134 140 19975d 136->140 137->131 140->137 145->124 146->122 146->126
                                  APIs
                                  • WSASend.WS2_32(?,?,00000001,00000000,00000000,00000000,00000000,?,?,?,?,002DD15C,00000000,74D723A0,-00319880), ref: 001996C9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.2960323258.0000000000191000.00000040.00000001.01000000.00000005.sdmp, Offset: 00190000, based on PE: true
                                  • Associated: 00000006.00000002.2960301741.0000000000190000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2960323258.0000000000315000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961085053.000000000031A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.000000000031D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000004A4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005C4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005CC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005DA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2963155791.00000000005DB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2964449781.000000000077B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2964517557.000000000077D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_190000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: Send
                                  • String ID: Ws2_32.dll
                                  • API String ID: 121738739-3093949381
                                  • Opcode ID: c957782b0b56759ea7d2f601c97181c95dc369a9c088b793f4358b55b31edb16
                                  • Instruction ID: cf7aa4fa535e96f84edd4bd0f74e32b2d6733a4b0e8513a3814828c131b5b0fe
                                  • Opcode Fuzzy Hash: c957782b0b56759ea7d2f601c97181c95dc369a9c088b793f4358b55b31edb16
                                  • Instruction Fuzzy Hash: 1C02BC70D14298DEDF25CFA8C8907ADBBB0EF59314F24428DE4856B286D7741A86CF92

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 151 4c50000-4c5020f call 4c5003b 173 4c50228-4c50236 GetCurrentHwProfileW 151->173 174 4c50240-4c5027f 173->174 176 4c50280-4c50295 call 4c5029d 174->176 180 4c50297-4c50524 176->180
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.2973317412.0000000004C50000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_4c50000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9fcd835c3797e619d7c27664a34000b4f9a16035dd41642bcf42ea4a2980ee9a
                                  • Instruction ID: 85e86dc2dc1ba7dbe4b7814adcbeb12c0ee088d1ea73c521a76cee2912181968
                                  • Opcode Fuzzy Hash: 9fcd835c3797e619d7c27664a34000b4f9a16035dd41642bcf42ea4a2980ee9a
                                  • Instruction Fuzzy Hash: 7761C2EB34C221BDB14285476F54AFF6A6FE6D63307388426BC07D6522F3946AC97039

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 213 4c50027-4c5020f 232 4c50228-4c50236 GetCurrentHwProfileW 213->232 233 4c50240-4c5027f 232->233 235 4c50280-4c50295 call 4c5029d 233->235 239 4c50297-4c50524 235->239
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04C50231
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.2973317412.0000000004C50000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_4c50000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 85108d2f2c71df9cc4a24c9f4ab660c0bf9ddf3d951b90d7cb4f91522eacec9d
                                  • Instruction ID: f0426824ce2a85c2fb6f3563565c7ef8ef3bbda1e13f78eb18e869f868fd3dbf
                                  • Opcode Fuzzy Hash: 85108d2f2c71df9cc4a24c9f4ab660c0bf9ddf3d951b90d7cb4f91522eacec9d
                                  • Instruction Fuzzy Hash: D661C1EB34C121BDB14285476B54AFF6B6FE6D63307388426FC07D6522F3946AC96039

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 272 4c50051-4c5005b 274 4c5005d-4c5005f 272->274 275 4c5003c-4c5004c 272->275 276 4c50061-4c5020f 274->276 275->276 294 4c50228-4c50236 GetCurrentHwProfileW 276->294 295 4c50240-4c5027f 294->295 297 4c50280-4c50295 call 4c5029d 295->297 301 4c50297-4c50524 297->301
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.2973317412.0000000004C50000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_4c50000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8736bd24bfe79bba55e079ca721ca1dcbc3dbb679386a88c635af259c00d4bd1
                                  • Instruction ID: 9d10c546e9af6aadfe3f9e4b1c91baba75f479296daf0c6bc4af59ee4d2db9d1
                                  • Opcode Fuzzy Hash: 8736bd24bfe79bba55e079ca721ca1dcbc3dbb679386a88c635af259c00d4bd1
                                  • Instruction Fuzzy Hash: 3151C0EB34C220BDB10285572B54AFF5B6FE6D63707388426BC07D6522F3946AC97039

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 334 4c5003b-4c5020f 353 4c50228-4c50236 GetCurrentHwProfileW 334->353 354 4c50240-4c5027f 353->354 356 4c50280-4c50295 call 4c5029d 354->356 360 4c50297-4c50524 356->360
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04C50231
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.2973317412.0000000004C50000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_4c50000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 698f87f28555b92da5e94c94154359a570ec631321f2271a8f9c14ad968ce8ec
                                  • Instruction ID: 1a3d17b185de95269753b16915b99946e82d09f0d058f35771b118094966473e
                                  • Opcode Fuzzy Hash: 698f87f28555b92da5e94c94154359a570ec631321f2271a8f9c14ad968ce8ec
                                  • Instruction Fuzzy Hash: AB51C1EB34C121BDB10285472B54AFF5B6FE6D63707388426BC07D2522F3946AC96039

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 393 4c5000a-4c5001a 394 4c5001c-4c5001f 393->394 395 4c50078-4c5020f 393->395 394->395 412 4c50228-4c50236 GetCurrentHwProfileW 395->412 413 4c50240-4c5027f 412->413 415 4c50280-4c50295 call 4c5029d 413->415 419 4c50297-4c50524 415->419
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.2973317412.0000000004C50000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_4c50000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f15188d8f6923d259570423d0487baad5c604e13a739632f6ede1430933b5d32
                                  • Instruction ID: 433756bba45a03adcffa8e2e6ad89d8e7566ab4db846265e7007facd46d5a406
                                  • Opcode Fuzzy Hash: f15188d8f6923d259570423d0487baad5c604e13a739632f6ede1430933b5d32
                                  • Instruction Fuzzy Hash: 8651B0EB34C121BDB20285476B54AFF5B6FE6D63707388426FC07D6522F2946EC96039

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 452 4c50074-4c5020f 470 4c50228-4c50236 GetCurrentHwProfileW 452->470 471 4c50240-4c5027f 470->471 473 4c50280-4c50295 call 4c5029d 471->473 477 4c50297-4c50524 473->477
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04C50231
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.2973317412.0000000004C50000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_4c50000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: a32a98e3539f9fcb73c929e4f97c970181ffa2f419af9355e6e9b5780aa7b671
                                  • Instruction ID: 97d0eb9f4493390bbad8ad5774197299a868cb42e5b10e3d7f89213c21c87e0a
                                  • Opcode Fuzzy Hash: a32a98e3539f9fcb73c929e4f97c970181ffa2f419af9355e6e9b5780aa7b671
                                  • Instruction Fuzzy Hash: 0351AFEB34C221BDB20285476B54AFF576FE6D67307388426FC07D6522F3946AC96039

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 510 4c500d3-4c500d9 511 4c50152 510->511 512 4c500db-4c500e3 510->512 515 4c50154-4c50155 511->515 516 4c5013d-4c50141 511->516 513 4c500e5-4c500e9 512->513 514 4c500ea-4c50132 512->514 513->514 514->516 517 4c5015a-4c5020f 515->517 516->517 526 4c50228-4c50236 GetCurrentHwProfileW 517->526 527 4c50240-4c5027f 526->527 529 4c50280-4c50295 call 4c5029d 527->529 533 4c50297-4c50524 529->533
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04C50231
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.2973317412.0000000004C50000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_4c50000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: a7dc7820ae40f5649e6306903907023735b14b53572ac509baefa9e3cf83580e
                                  • Instruction ID: aac14cbe776c8b151783e5ece8cc783656a5ae1c7bc902256d12727ce9279a64
                                  • Opcode Fuzzy Hash: a7dc7820ae40f5649e6306903907023735b14b53572ac509baefa9e3cf83580e
                                  • Instruction Fuzzy Hash: FF51BFEB70C221BDB20285532B14AFF5B6FE6D67307388426FC07D5522F3946AC96039

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 566 4c500c6-4c5020f 579 4c50228-4c50236 GetCurrentHwProfileW 566->579 580 4c50240-4c5027f 579->580 582 4c50280-4c50295 call 4c5029d 580->582 586 4c50297-4c50524 582->586
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04C50231
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.2973317412.0000000004C50000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_4c50000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 1e64444f3c71873b28ae0fd5c66a8989ac6708790b00bf07c94ba191df937bb8
                                  • Instruction ID: f3e65b12a781fe8b6e15a024f0734e65b910d0b7709e82a735a17d54b9a40721
                                  • Opcode Fuzzy Hash: 1e64444f3c71873b28ae0fd5c66a8989ac6708790b00bf07c94ba191df937bb8
                                  • Instruction Fuzzy Hash: 9A519FEB74C221BDB24285836B14AFF576FE6D67307388426BC07D5522F3946AC97039

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 619 4c50137-4c5013b 620 4c50100-4c50132 619->620 621 4c5013d-4c5020f 619->621 620->621 631 4c50228-4c50236 GetCurrentHwProfileW 621->631 632 4c50240-4c5027f 631->632 634 4c50280-4c50295 call 4c5029d 632->634 638 4c50297-4c50524 634->638
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04C50231
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.2973317412.0000000004C50000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_4c50000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 0d6452e5890fe0c5168d180d4b3a471c96f4debcf752459e4730213b41f5b7d1
                                  • Instruction ID: e0a68cfb87f3b05bea5cb6caf9e1a2dd7a9214b5694c77ff900dceca3a68b4d8
                                  • Opcode Fuzzy Hash: 0d6452e5890fe0c5168d180d4b3a471c96f4debcf752459e4730213b41f5b7d1
                                  • Instruction Fuzzy Hash: 3A51AFEB74C121BDB10285436B64AFF5B6FE6D67307388826BC07D5522F3945ACA6039

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 671 4c500ff-4c5020f 683 4c50228-4c50236 GetCurrentHwProfileW 671->683 684 4c50240-4c5027f 683->684 686 4c50280-4c50295 call 4c5029d 684->686 690 4c50297-4c50524 686->690
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04C50231
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.2973317412.0000000004C50000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_4c50000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 32cce674c1feaac9e4d53ad9e31bde862cc89bd583a2a1ec04dc1d67d663aec1
                                  • Instruction ID: cbd8a5379dc0d8d3aae820ff76cb1b90f07573b47679b6d3fee54c4e2d9950d0
                                  • Opcode Fuzzy Hash: 32cce674c1feaac9e4d53ad9e31bde862cc89bd583a2a1ec04dc1d67d663aec1
                                  • Instruction Fuzzy Hash: 8551D1EB74C121BDB10285436B14AFF576FE6D67307388826FC07D5522F3845ACA6039

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 723 4c5011c-4c5020f 733 4c50228-4c50236 GetCurrentHwProfileW 723->733 734 4c50240-4c5027f 733->734 736 4c50280-4c50295 call 4c5029d 734->736 740 4c50297-4c50524 736->740
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04C50231
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.2973317412.0000000004C50000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_4c50000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: b87e8c3db20e7fd8ba56ce6b51c12318cf2b2570baa1c2031f475150e0fc4d12
                                  • Instruction ID: 1874a09876bffcd36efabf056aa638a9f4d8c25991326e8351b5a530a9d48762
                                  • Opcode Fuzzy Hash: b87e8c3db20e7fd8ba56ce6b51c12318cf2b2570baa1c2031f475150e0fc4d12
                                  • Instruction Fuzzy Hash: 94519DEB74C221BEB10285436F14AFF676FE6D67307388426BC07D5522F3946ACA6039

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 773 4c50147-4c5020f 781 4c50228-4c50236 GetCurrentHwProfileW 773->781 782 4c50240-4c5027f 781->782 784 4c50280-4c50295 call 4c5029d 782->784 788 4c50297-4c50524 784->788
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04C50231
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.2973317412.0000000004C50000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_4c50000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: ca65c367cbd83bd5b31ae893c64106a4377e870894386400a7cb8a5f293c81a9
                                  • Instruction ID: 25f4aa89deefea6dd9052965c6155a533b463f9cd3963daa033a1e41c2338ed4
                                  • Opcode Fuzzy Hash: ca65c367cbd83bd5b31ae893c64106a4377e870894386400a7cb8a5f293c81a9
                                  • Instruction Fuzzy Hash: AE51B0EB74C120BDB20285472B54AFF576FE6D67307388826FC07D6522F3945ACA6139
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04C50231
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.2973317412.0000000004C50000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_4c50000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 926da158d3552fd46dfacff67bbc3b4505038582eda2d6bb6153b507a9c8f747
                                  • Instruction ID: 55507b41d97f1dab0ce33cb689e0b3aba3cda3e98ba38dea3ad7527e5450e9c1
                                  • Opcode Fuzzy Hash: 926da158d3552fd46dfacff67bbc3b4505038582eda2d6bb6153b507a9c8f747
                                  • Instruction Fuzzy Hash: ED519DEB74C121BEB20285572F14AFF676FE6D67307388426BC07D2522F3945ACA6039
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04C50231
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.2973317412.0000000004C50000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_4c50000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 57fc414d6ca993e630cc12f5a3ae5af4fc5ec332cb25243be7bc60ff3a93ae3a
                                  • Instruction ID: 78465b166253c894f75c6e30b3fc411ba8a1aa66db6f121c323789f36021b04f
                                  • Opcode Fuzzy Hash: 57fc414d6ca993e630cc12f5a3ae5af4fc5ec332cb25243be7bc60ff3a93ae3a
                                  • Instruction Fuzzy Hash: 68419CEB34C120BDB10285932F14AFE676FE6D67307388826FC07D1522F3946ACA6039
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04C50231
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.2973317412.0000000004C50000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_4c50000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: a3df37296005b5b0944431638c2afb40b19cb8b6cfb61fe801202866590de9c2
                                  • Instruction ID: c7613971162e06b2a28bb79a41682b7e2d3e7429528ac365962eefb7c8911c1d
                                  • Opcode Fuzzy Hash: a3df37296005b5b0944431638c2afb40b19cb8b6cfb61fe801202866590de9c2
                                  • Instruction Fuzzy Hash: B0416EEB34C120BDB14285972F24AFE576FE6D67307388426FC07D5522F3945AC96039
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04C50231
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.2973317412.0000000004C50000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_4c50000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: c3f6a7478e52115612c3f10d1f4695b48afd3f5479966361c1a4b3fade86eef5
                                  • Instruction ID: 4b59b6c960a1d07150e89461fca1c946e1a6c101a07f3553435b4fb18170b03c
                                  • Opcode Fuzzy Hash: c3f6a7478e52115612c3f10d1f4695b48afd3f5479966361c1a4b3fade86eef5
                                  • Instruction Fuzzy Hash: B041A2EB74C120BEB14285572B14AFE576FE6D67307388426FC07D1522F3945AC96039
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04C50231
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.2973317412.0000000004C50000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_4c50000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 8c93a7ece5be7aa056f8a6c5db668e7ebd73b52ee496b1163fe80f8987a21640
                                  • Instruction ID: 26f456163dddaafd26e255634ecfd03e11f6cc904332770a1ab04be83a9d7d16
                                  • Opcode Fuzzy Hash: 8c93a7ece5be7aa056f8a6c5db668e7ebd73b52ee496b1163fe80f8987a21640
                                  • Instruction Fuzzy Hash: 4841C5EB74C110BEB14281572F24AFE6B6FE6D67307388426FC07D6522F3945AC96039
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04C50231
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.2973317412.0000000004C50000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_4c50000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 9b72e5b454a92e9b917563d6e7a2b533ae25c224ea2d95ec6dddad80673c7002
                                  • Instruction ID: 11c7eecb46cfb94cdf3184da7b70a8eef064eba2968b562789cb26d56636bb00
                                  • Opcode Fuzzy Hash: 9b72e5b454a92e9b917563d6e7a2b533ae25c224ea2d95ec6dddad80673c7002
                                  • Instruction Fuzzy Hash: 1741B1EB74C120BEB14281972B14AFE5B6FE6D67307388422BC07D5522F3945AC97039
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04C50231
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.2973317412.0000000004C50000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_4c50000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 7d46c6f96bad658e5692eb0b1892908cc7e7ad080bc86ea12e2e66794d7ec6ef
                                  • Instruction ID: 96a0c6f8295771cb3527e935eb935213cc3377bd96c5c6bc27ebb79cec661867
                                  • Opcode Fuzzy Hash: 7d46c6f96bad658e5692eb0b1892908cc7e7ad080bc86ea12e2e66794d7ec6ef
                                  • Instruction Fuzzy Hash: 1D419EEB34C120BEB54285972B14AFE6B6FE6D67307388426FC07D6522F3945AC96039
                                  APIs
                                  • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,?,?,?,?,?,?,?,00000000,?), ref: 001D990E
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.2960323258.0000000000191000.00000040.00000001.01000000.00000005.sdmp, Offset: 00190000, based on PE: true
                                  • Associated: 00000006.00000002.2960301741.0000000000190000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2960323258.0000000000315000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961085053.000000000031A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.000000000031D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000004A4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005C4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005CC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005DA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2963155791.00000000005DB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2964449781.000000000077B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2964517557.000000000077D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_190000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: FileWrite
                                  • String ID:
                                  • API String ID: 3934441357-0
                                  • Opcode ID: 61dd991c2deaa1b8eea7bc2378ec7afd5a462a98d4428d2064ab239692b8c03e
                                  • Instruction ID: b20d86af326a0cdfae9f095767f630773a36a8619b5f1d2d6b3df2001581b2a5
                                  • Opcode Fuzzy Hash: 61dd991c2deaa1b8eea7bc2378ec7afd5a462a98d4428d2064ab239692b8c03e
                                  • Instruction Fuzzy Hash: 5261B472D04119BFDF15DFA8C880EEEBBB9AF19308F14018AE904A7346D732D901DBA0
                                  APIs
                                  • FindCloseChangeNotification.KERNELBASE(00000000,00000000,?,?,001D8CE6,00000000,?,0030A178,0000000C,001D8DA2,?,?,?), ref: 001D8E55
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.2960323258.0000000000191000.00000040.00000001.01000000.00000005.sdmp, Offset: 00190000, based on PE: true
                                  • Associated: 00000006.00000002.2960301741.0000000000190000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2960323258.0000000000315000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961085053.000000000031A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.000000000031D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000004A4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005C4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005CC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005DA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2963155791.00000000005DB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2964449781.000000000077B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2964517557.000000000077D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_190000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: ChangeCloseFindNotification
                                  • String ID:
                                  • API String ID: 2591292051-0
                                  • Opcode ID: 4135fd90e1334349a08d4fca327b4cbf925c9f66aa5043ad80cd6a0e638242e5
                                  • Instruction ID: af2f94ec8ad903e2ab82810af4c0a53c278020e0bce513698ebe8c3b8a6944d3
                                  • Opcode Fuzzy Hash: 4135fd90e1334349a08d4fca327b4cbf925c9f66aa5043ad80cd6a0e638242e5
                                  • Instruction Fuzzy Hash: B4114E3360612069D62933389841BBE678D4B92738F39065FF9189F3C2DF61DC814595
                                  APIs
                                  • SetFilePointerEx.KERNELBASE(00000000,?,?,?,?,?,00000000,?,?,?,001D2626,?,?,?,?,?), ref: 001D2558
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.2960323258.0000000000191000.00000040.00000001.01000000.00000005.sdmp, Offset: 00190000, based on PE: true
                                  • Associated: 00000006.00000002.2960301741.0000000000190000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2960323258.0000000000315000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961085053.000000000031A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.000000000031D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000004A4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005C4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005CC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005DA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2963155791.00000000005DB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2964449781.000000000077B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2964517557.000000000077D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_190000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: FilePointer
                                  • String ID:
                                  • API String ID: 973152223-0
                                  • Opcode ID: 8d14e757dd7dd64ebf03629d5992cfea73bba0a82f6a0bee8faf105d640e92f0
                                  • Instruction ID: 85806d0ca5df745b1c86d008416914374319fd61bc78ed0233a78caa4547a402
                                  • Opcode Fuzzy Hash: 8d14e757dd7dd64ebf03629d5992cfea73bba0a82f6a0bee8faf105d640e92f0
                                  • Instruction Fuzzy Hash: 93012632710104AFDF09DF19DC11CDE7B5ADB95330B240149F8119B3A1E771ED428B90
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0019331F
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.2960323258.0000000000191000.00000040.00000001.01000000.00000005.sdmp, Offset: 00190000, based on PE: true
                                  • Associated: 00000006.00000002.2960301741.0000000000190000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2960323258.0000000000315000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961085053.000000000031A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.000000000031D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000004A4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005C4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005CC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005DA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2963155791.00000000005DB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2964449781.000000000077B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2964517557.000000000077D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_190000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID:
                                  • API String ID: 118556049-0
                                  • Opcode ID: 0fd589d96c9d07b1efa01aec19e4ff46bb0766daf2056f60d33bc81ca57302d3
                                  • Instruction ID: 9a938fad64ebf40b021adcaa69c9ae37b2d8c2f4359c334488802a9686c87024
                                  • Opcode Fuzzy Hash: 0fd589d96c9d07b1efa01aec19e4ff46bb0766daf2056f60d33bc81ca57302d3
                                  • Instruction Fuzzy Hash: AFF09A72140114AADF186FA4E8159EAB3E8EE353A1750096EE8A9C7212EF26DB408790
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000008,?,00000001,?,001D9FE0,00000001,00000364,00000001,00000006,000000FF,?,001C4B3F,?,?,74D723A0,?), ref: 001DA69C
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.2960323258.0000000000191000.00000040.00000001.01000000.00000005.sdmp, Offset: 00190000, based on PE: true
                                  • Associated: 00000006.00000002.2960301741.0000000000190000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2960323258.0000000000315000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961085053.000000000031A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.000000000031D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000004A4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005C4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005CC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005DA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2963155791.00000000005DB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2964449781.000000000077B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2964517557.000000000077D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_190000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: bce1902c95caa2262a5829939a512512eb8b836beac50f788a8e1a3ff0f34c04
                                  • Instruction ID: 16275f13c606c0fba3abb1954581328fa33858020486986dbd1737da9ea7d26e
                                  • Opcode Fuzzy Hash: bce1902c95caa2262a5829939a512512eb8b836beac50f788a8e1a3ff0f34c04
                                  • Instruction Fuzzy Hash: DCF08232511625EA9F22EA769C25BAB3B5DAF51760F9D8113FC04EB380DB34DC0086E6
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000000,00000001,?,?,001C4B3F,?,?,74D723A0,?,?,00193522,?,?), ref: 001DB0C6
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.2960323258.0000000000191000.00000040.00000001.01000000.00000005.sdmp, Offset: 00190000, based on PE: true
                                  • Associated: 00000006.00000002.2960301741.0000000000190000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2960323258.0000000000315000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961085053.000000000031A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.000000000031D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000004A4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005C4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005CC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005DA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2963155791.00000000005DB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2964449781.000000000077B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2964517557.000000000077D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_190000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 8da2479887605d9b561bff288e2efcef68a9a98000d084d1d994bb1854b11a65
                                  • Instruction ID: 435775c4d127634cdd608ef4b87ebdd08bcec15c77d1862dd40c37df957efbed
                                  • Opcode Fuzzy Hash: 8da2479887605d9b561bff288e2efcef68a9a98000d084d1d994bb1854b11a65
                                  • Instruction Fuzzy Hash: B2E09B32149620E6DB3136699C51B5F766D9F413A0F574213FC26A77D1DB74CC1081E5
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.2960323258.0000000000191000.00000040.00000001.01000000.00000005.sdmp, Offset: 00190000, based on PE: true
                                  • Associated: 00000006.00000002.2960301741.0000000000190000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2960323258.0000000000315000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961085053.000000000031A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.000000000031D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000004A4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005C4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005CC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005DA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2963155791.00000000005DB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2964449781.000000000077B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2964517557.000000000077D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_190000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 333d4b6d5425d6f9d03797ee82114c3711da98524c03317fffdb5ec62fb2b380
                                  • Instruction ID: 27f0dc3dd47f61ba77ccf921b8d0747872099d25bc87f4dda97fa330c784dd36
                                  • Opcode Fuzzy Hash: 333d4b6d5425d6f9d03797ee82114c3711da98524c03317fffdb5ec62fb2b380
                                  • Instruction Fuzzy Hash: 6E021971E012199BDB14CFA9C890BAEBBB1FF58314F24826DE919E7380D731AD41CB94
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.2960323258.0000000000191000.00000040.00000001.01000000.00000005.sdmp, Offset: 00190000, based on PE: true
                                  • Associated: 00000006.00000002.2960301741.0000000000190000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2960323258.0000000000315000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961085053.000000000031A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.000000000031D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000004A4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005C4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005CC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005DA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2963155791.00000000005DB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2964449781.000000000077B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2964517557.000000000077D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_190000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: _strrchr
                                  • String ID:
                                  • API String ID: 3213747228-0
                                  • Opcode ID: 785c90e8ff89e0f1a3d98e37725974d6f6ea20f06d45e48120c47f1ca5a82ffe
                                  • Instruction ID: 50663312eafb5820b65abbd14ad4ab6c215d965b6876ee8b9d508dc424d69d71
                                  • Opcode Fuzzy Hash: 785c90e8ff89e0f1a3d98e37725974d6f6ea20f06d45e48120c47f1ca5a82ffe
                                  • Instruction Fuzzy Hash: DDB16632E08695DFDB158F68CCC2BEE7BA5EF69310F164157E906AB382D7749801C7A0
                                  APIs
                                  • _ValidateLocalCookies.LIBCMT ref: 001C7307
                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 001C730F
                                  • _ValidateLocalCookies.LIBCMT ref: 001C7398
                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 001C73C3
                                  • _ValidateLocalCookies.LIBCMT ref: 001C7418
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.2960323258.0000000000191000.00000040.00000001.01000000.00000005.sdmp, Offset: 00190000, based on PE: true
                                  • Associated: 00000006.00000002.2960301741.0000000000190000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2960323258.0000000000315000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961085053.000000000031A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.000000000031D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000004A4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005C4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005CC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005DA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2963155791.00000000005DB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2964449781.000000000077B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2964517557.000000000077D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_190000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                  • String ID: csm
                                  • API String ID: 1170836740-1018135373
                                  • Opcode ID: ac65a7f329f5bd00bc35a4b7d404c1ce5908e3d955e1547b75e9d6e68bcf6263
                                  • Instruction ID: 58abb4dd4b351b33951902f6a90f349e2192a7fa1c374b55b4a08cc8b9ffac3e
                                  • Opcode Fuzzy Hash: ac65a7f329f5bd00bc35a4b7d404c1ce5908e3d955e1547b75e9d6e68bcf6263
                                  • Instruction Fuzzy Hash: FD41A034E04249ABCF14DF68C885F9EBBA5BF64324F148059EC189B392DB71EA01DF91
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 001AA09D
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 001AA0BF
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 001AA0E7
                                  • __Getctype.LIBCPMT ref: 001AA1C5
                                  • std::_Facet_Register.LIBCPMT ref: 001AA1F9
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 001AA223
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.2960323258.0000000000191000.00000040.00000001.01000000.00000005.sdmp, Offset: 00190000, based on PE: true
                                  • Associated: 00000006.00000002.2960301741.0000000000190000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2960323258.0000000000315000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961085053.000000000031A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.000000000031D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000004A4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005C4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005CC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005DA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2963155791.00000000005DB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2964449781.000000000077B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2964517557.000000000077D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_190000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetctypeRegister
                                  • String ID:
                                  • API String ID: 1102183713-0
                                  • Opcode ID: bc9cc9e601676c6b4b21f0ebf1c299c82444e4d8edf9584006264c34b7f996dd
                                  • Instruction ID: 2ffea626b30d328ac3bf93d1ae520ffd7b57dfe8a7070992e3a0c15811bd2104
                                  • Opcode Fuzzy Hash: bc9cc9e601676c6b4b21f0ebf1c299c82444e4d8edf9584006264c34b7f996dd
                                  • Instruction Fuzzy Hash: A851DAB4D00248DFCB11CF58C941BAEBBF4AF25710F28815DE854AB391EB75AE04CB92
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 001AC45A
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 001AC47C
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 001AC4A4
                                  • std::_Facet_Register.LIBCPMT ref: 001AC59A
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 001AC5C4
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.2960323258.0000000000191000.00000040.00000001.01000000.00000005.sdmp, Offset: 00190000, based on PE: true
                                  • Associated: 00000006.00000002.2960301741.0000000000190000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2960323258.0000000000315000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961085053.000000000031A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.000000000031D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000004A4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005C4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005CC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005DA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2963155791.00000000005DB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2964449781.000000000077B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2964517557.000000000077D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_190000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                  • String ID:
                                  • API String ID: 459529453-0
                                  • Opcode ID: d96190c4cd2e722338be58131a39320fbd5b12bec00555f4b179fdfd53b2c7a3
                                  • Instruction ID: 664c1004bc02da5abfec0968a4e3eb53a387f1799a585e20dd926a23a072c1f6
                                  • Opcode Fuzzy Hash: d96190c4cd2e722338be58131a39320fbd5b12bec00555f4b179fdfd53b2c7a3
                                  • Instruction Fuzzy Hash: 0651DBB0900248DFDB12CF58C854BAEBBF4FB26314F24815DE855AB380D771AA05CBD0
                                  APIs
                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 0019499F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.2960323258.0000000000191000.00000040.00000001.01000000.00000005.sdmp, Offset: 00190000, based on PE: true
                                  • Associated: 00000006.00000002.2960301741.0000000000190000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2960323258.0000000000315000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961085053.000000000031A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.000000000031D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000004A4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005C4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005CC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005DA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2963155791.00000000005DB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2964449781.000000000077B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2964517557.000000000077D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_190000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: Ios_base_dtorstd::ios_base::_
                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                  • API String ID: 323602529-1866435925
                                  • Opcode ID: d17cb17f824c2ba873af8c42df071e22496943d7707552bb527d29d2cc4a806e
                                  • Instruction ID: e399aa6cc94ba60d89ab9b881228e0b6805d9fa69d5b806feed30ee744388dec
                                  • Opcode Fuzzy Hash: d17cb17f824c2ba873af8c42df071e22496943d7707552bb527d29d2cc4a806e
                                  • Instruction Fuzzy Hash: 4D115972914A48ABCB14DF588C02FAA7398DB19724F08462DFA588B2C1EB35A911C7D2
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 001C2730
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 001C273B
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 001C27A9
                                    • Part of subcall function 001C288C: std::locale::_Locimp::_Locimp.LIBCPMT ref: 001C28A4
                                  • std::locale::_Setgloballocale.LIBCPMT ref: 001C2756
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.2960323258.0000000000191000.00000040.00000001.01000000.00000005.sdmp, Offset: 00190000, based on PE: true
                                  • Associated: 00000006.00000002.2960301741.0000000000190000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2960323258.0000000000315000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961085053.000000000031A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.000000000031D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000004A4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005C4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005CC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005DA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2963155791.00000000005DB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2964449781.000000000077B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2964517557.000000000077D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_190000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                                  • String ID:
                                  • API String ID: 677527491-0
                                  • Opcode ID: 08cb9cd91c81c4ecea6b7384bdb36b0153a2e617cabfba80cdb19d6a8b2a4f83
                                  • Instruction ID: 4cec7bb373b569fecb7c56b422d1c8c32cd4f14744d36664055e1c1ad77500c6
                                  • Opcode Fuzzy Hash: 08cb9cd91c81c4ecea6b7384bdb36b0153a2e617cabfba80cdb19d6a8b2a4f83
                                  • Instruction Fuzzy Hash: 0D01D479A002108BC70AEB20D885A7D77B1BFB9750B18444DE82157381CF74EE02CFD5
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 0019750C
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00197522
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.2960323258.0000000000191000.00000040.00000001.01000000.00000005.sdmp, Offset: 00190000, based on PE: true
                                  • Associated: 00000006.00000002.2960301741.0000000000190000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2960323258.0000000000315000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961085053.000000000031A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.000000000031D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000004A4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005C4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005CC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005DA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2963155791.00000000005DB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2964449781.000000000077B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2964517557.000000000077D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_190000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: [json.exception.
                                  • API String ID: 4194217158-791563284
                                  • Opcode ID: 0c3c2b6850d2a758a1e5cd396362de189af7eabdcab0a77548a7d5c87e896f1c
                                  • Instruction ID: 03a24a4de163aa6bab2a21098ea8bb69e012dc7da200ef8ef41eb1029525f81b
                                  • Opcode Fuzzy Hash: 0c3c2b6850d2a758a1e5cd396362de189af7eabdcab0a77548a7d5c87e896f1c
                                  • Instruction Fuzzy Hash: FC51C1B1C146489FDB00DFA8C905BAEFBF4EF25314F144269E854A7382E7B49A44C7E1
                                  APIs
                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 0019499F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.2960323258.0000000000191000.00000040.00000001.01000000.00000005.sdmp, Offset: 00190000, based on PE: true
                                  • Associated: 00000006.00000002.2960301741.0000000000190000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2960323258.0000000000315000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961085053.000000000031A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.000000000031D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000004A4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005C4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005CC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005DA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2963155791.00000000005DB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2964449781.000000000077B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2964517557.000000000077D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_190000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: Ios_base_dtorstd::ios_base::_
                                  • String ID: ios_base::badbit set$ios_base::failbit set
                                  • API String ID: 323602529-1240500531
                                  • Opcode ID: 489e2cd1f8cfcf8f7aa312c65650e7b83eee281504639bc4e1f2bb0331df1ea8
                                  • Instruction ID: ebd4416008110776002eaee5368f9e2f34b50e75521f3353e8388eb94c0f66aa
                                  • Opcode Fuzzy Hash: 489e2cd1f8cfcf8f7aa312c65650e7b83eee281504639bc4e1f2bb0331df1ea8
                                  • Instruction Fuzzy Hash: 9D41F6B1D04248AFCB04DF98CC45FAEBBB8EB19710F14825DF554AB781D775AA01CBA1
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00194061
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 001940C4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.2960323258.0000000000191000.00000040.00000001.01000000.00000005.sdmp, Offset: 00190000, based on PE: true
                                  • Associated: 00000006.00000002.2960301741.0000000000190000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2960323258.0000000000315000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961085053.000000000031A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.000000000031D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000004A4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005C4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005CC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2961218867.00000000005DA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2963155791.00000000005DB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2964449781.000000000077B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.2964517557.000000000077D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_190000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                  • String ID: bad locale name
                                  • API String ID: 3988782225-1405518554
                                  • Opcode ID: 253a6eb378c3a017e9fd6111ac7ebb26f850daaf73351ed85e6e143f505618f4
                                  • Instruction ID: 19d4d650ea26e29ead6ae31d717b767757b63de6647f8f3765b2c6878af4373c
                                  • Opcode Fuzzy Hash: 253a6eb378c3a017e9fd6111ac7ebb26f850daaf73351ed85e6e143f505618f4
                                  • Instruction Fuzzy Hash: 18118170805B84EFD721CFA8C504B4BBFE4AF26714F14869DE49597781D3B5AA04C791

                                  Control-flow Graph

                                  APIs
                                  • setsockopt.WS2_32(00000404,0000FFFF,00001006,?,00000008), ref: 004A7BA7
                                  • recv.WS2_32(?,00000004,00000002), ref: 004A7BC1
                                  • recv.WS2_32(00000000,0000000C,00000002,00000000), ref: 004A7C43
                                  • recv.WS2_32(00000000,0000000C,00000008), ref: 004A7C64
                                  • setsockopt.WS2_32(0000FFFF,00001006,?,00000008,?,00000000), ref: 004A7D01
                                    • Part of subcall function 004A8590: WSAStartup.WS2_32 ref: 004A85BA
                                    • Part of subcall function 004A8590: socket.WS2_32(?,?,?,?,?,?,00569328,?,?), ref: 004A865D
                                    • Part of subcall function 004A8590: connect.WS2_32(00000000,00539BFC,?,?,?,?,00569328,?,?), ref: 004A8671
                                    • Part of subcall function 004A8590: closesocket.WS2_32(00000000), ref: 004A867D
                                  • recv.WS2_32(00000000,?,00000008), ref: 004A7D1B
                                  • recv.WS2_32(?,00000004,00000008), ref: 004A7E23
                                  • __Xtime_get_ticks.LIBCPMT ref: 004A7E2A
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004A7E38
                                  • Sleep.KERNELBASE(00000001,00000000,?,00002710,00000000), ref: 004A7EB1
                                  • Sleep.KERNELBASE(00000064,?,00002710,00000000), ref: 004A7EB9
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2960594163.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, Offset: 003E0000, based on PE: true
                                  • Associated: 00000007.00000002.2960341431.00000000003E0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2960594163.0000000000565000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962230714.000000000056A000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000056D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.00000000006F4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.00000000007D4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.0000000000814000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000081C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000082A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964273883.000000000082B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964697391.00000000009CB000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964768546.00000000009CD000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_3e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: recv$Sleepsetsockopt$StartupUnothrow_t@std@@@Xtime_get_ticks__ehfuncinfo$??2@closesocketconnectsocket
                                  • String ID:
                                  • API String ID: 301102601-0
                                  • Opcode ID: 23b4d3d5403841792f29d6e4ed52ad9155e0bc26d34068bb420b3e5caa6655fe
                                  • Instruction ID: e68ca7674752a0852d388c142a40fd27721d5cc1e44d8677166a3cfab5308135
                                  • Opcode Fuzzy Hash: 23b4d3d5403841792f29d6e4ed52ad9155e0bc26d34068bb420b3e5caa6655fe
                                  • Instruction Fuzzy Hash: 91B1CF70D043089FEB20DBA8CC49BAEBBB5BB65304F104259E454AB2E2D7B45D88DB91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 57 4a8590-4a85c2 WSAStartup 58 4a85c8-4a85f2 call 4ca420 * 2 57->58 59 4a8696-4a869f 57->59 64 4a85fe-4a8644 58->64 65 4a85f4-4a85f8 58->65 67 4a8690-4a8695 64->67 68 4a8646-4a864c 64->68 65->59 65->64 67->59 69 4a864e 68->69 70 4a86a4-4a86ae 68->70 71 4a8654-4a8668 socket 69->71 70->67 77 4a86b0-4a86b8 70->77 71->67 73 4a866a-4a867a connect 71->73 75 4a867c-4a8684 closesocket 73->75 76 4a86a0 73->76 75->71 78 4a8686-4a868a 75->78 76->70 78->67
                                  APIs
                                  • WSAStartup.WS2_32 ref: 004A85BA
                                  • socket.WS2_32(?,?,?,?,?,?,00569328,?,?), ref: 004A865D
                                  • connect.WS2_32(00000000,00539BFC,?,?,?,?,00569328,?,?), ref: 004A8671
                                  • closesocket.WS2_32(00000000), ref: 004A867D
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2960594163.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, Offset: 003E0000, based on PE: true
                                  • Associated: 00000007.00000002.2960341431.00000000003E0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2960594163.0000000000565000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962230714.000000000056A000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000056D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.00000000006F4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.00000000007D4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.0000000000814000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000081C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000082A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964273883.000000000082B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964697391.00000000009CB000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964768546.00000000009CD000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_3e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: Startupclosesocketconnectsocket
                                  • String ID:
                                  • API String ID: 3098855095-0
                                  • Opcode ID: 73d86a58414e999d262a8315df3bf9d8a242cad484aafdb393fe8563f383d10d
                                  • Instruction ID: f47beb5b3d69ee4ba010e4bf9c99316da0b02351c6c65cdd2acb182833907309
                                  • Opcode Fuzzy Hash: 73d86a58414e999d262a8315df3bf9d8a242cad484aafdb393fe8563f383d10d
                                  • Instruction Fuzzy Hash: 9A31E6725053005BE7209F648C44A2BB7E5FBD6738F104F1EF9A4A22D0D7749C1486AB

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 79 3e9280-3e92dd call 3f63b0 82 3e9413-3e9521 call 3e2df0 call 4ca420 79->82 83 3e92e3-3e92e9 79->83 99 3e9537-3e953f call 3f8dc0 82->99 100 3e9523-3e9535 82->100 84 3e92f0-3e9313 83->84 86 3e9324-3e9331 84->86 87 3e9315-3e931f 84->87 90 3e9342-3e934f 86->90 91 3e9333-3e933d 86->91 89 3e9403-3e9406 87->89 93 3e9409-3e940d 89->93 94 3e9360-3e936d 90->94 95 3e9351-3e935b 90->95 91->89 93->82 93->84 97 3e937e-3e938b 94->97 98 3e936f-3e9379 94->98 95->89 101 3e938d-3e9397 97->101 102 3e9399-3e93a6 97->102 98->89 103 3e9544-3e9597 call 4ca420 * 2 99->103 100->103 101->89 105 3e93a8-3e93b2 102->105 106 3e93b4-3e93c1 102->106 116 3e95cb-3e95e1 call 4ca420 103->116 117 3e9599-3e95c8 call 4ca420 call 415270 103->117 105->89 108 3e93cf-3e93dc 106->108 109 3e93c3-3e93cd 106->109 111 3e93de-3e93e8 108->111 112 3e93ea-3e93f4 108->112 109->89 111->89 112->93 115 3e93f6-3e93ff 112->115 115->89 123 3e95e7-3e95ed 116->123 124 3e96e2 116->124 117->116 127 3e95f0-3e96ce WSASend 123->127 125 3e96e6-3e96f0 124->125 128 3e971e-3e973d 125->128 129 3e96f2-3e96fe 125->129 146 3e975f-3e9763 127->146 147 3e96d4-3e96dc 127->147 132 3e976f-3e9796 128->132 133 3e973f-3e974b 128->133 130 3e9714-3e971b call 4138f3 129->130 131 3e9700-3e970e 129->131 130->128 131->130 135 3e9797-3e97fe call 418c70 call 3e2df0 * 2 131->135 137 3e974d-3e975b 133->137 138 3e9765-3e976c call 4138f3 133->138 137->135 141 3e975d 137->141 138->132 141->138 146->125 147->124 147->127
                                  APIs
                                  • WSASend.WS2_32(?,?,00000001,00000000,00000000,00000000,00000000,?,?,?,?,0052D15C,00000000,74D723A0,-00569880), ref: 003E96C9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2960594163.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, Offset: 003E0000, based on PE: true
                                  • Associated: 00000007.00000002.2960341431.00000000003E0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2960594163.0000000000565000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962230714.000000000056A000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000056D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.00000000006F4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.00000000007D4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.0000000000814000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000081C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000082A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964273883.000000000082B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964697391.00000000009CB000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964768546.00000000009CD000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_3e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: Send
                                  • String ID: Ws2_32.dll
                                  • API String ID: 121738739-3093949381
                                  • Opcode ID: 01e7805059a7c888566921afd42c58fe31c6f13c5eed8d8e924d3309e29e3139
                                  • Instruction ID: cd48b06d28ca2808f8789daf5ffec60a764cdc534bf8fdfd23293f741d28501e
                                  • Opcode Fuzzy Hash: 01e7805059a7c888566921afd42c58fe31c6f13c5eed8d8e924d3309e29e3139
                                  • Instruction Fuzzy Hash: 5502CC70D042A8DFDF25CFA5C8907ADBBB0EF55304F24428EE4856B6C6D7741986CB92

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 152 4f808a3-4f808a4 153 4f808b0-4f80b46 152->153 154 4f808a6 152->154 187 4f80b57-4f80b67 GetCurrentHwProfileW 153->187 156 4f808a8-4f808ac 154->156 157 4f80840-4f8086c 154->157 156->153 157->152 188 4f80b80-4f80c54 call 4f80c56 187->188
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2974513079.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4f80000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 8ZF6
                                  • API String ID: 0-476698926
                                  • Opcode ID: 7a3f78d57b01beddd8cddc4d3c5538b9c3243197fe67e62e8a0abd4daf9b1947
                                  • Instruction ID: b629801dca7dc7b727bd07ce25240988b5930311bb81cffd1c682ee710cc52fa
                                  • Opcode Fuzzy Hash: 7a3f78d57b01beddd8cddc4d3c5538b9c3243197fe67e62e8a0abd4daf9b1947
                                  • Instruction Fuzzy Hash: C35104EB34D114BDB142A5856B55AF66B6EE7D37303B2842EF403D9602FAD81A8F3031

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 201 4f8087c-4f80884 call 4f80892 204 4f808fd-4f80b46 201->204 205 4f80886-4f8088e 201->205 237 4f80b57-4f80b67 GetCurrentHwProfileW 204->237 206 4f80890-4f80894 205->206 207 4f80895-4f808fc 205->207 206->207 207->204 238 4f80b80-4f80c54 call 4f80c56 237->238
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2974513079.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4f80000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 8ZF6
                                  • API String ID: 0-476698926
                                  • Opcode ID: 5704159c62ba150149f8f095b022edfcb04c3e63ea4c09e28e49b124ae5d6b2c
                                  • Instruction ID: e2bc418aa0bea67ff6ed3c90801ff319713c75239e45ed680a7740af1fd4c6d0
                                  • Opcode Fuzzy Hash: 5704159c62ba150149f8f095b022edfcb04c3e63ea4c09e28e49b124ae5d6b2c
                                  • Instruction Fuzzy Hash: E051F5E734D115BD7142A1856B55AF66B6EE7D73303B2842EF003DD602FAD82A8F2131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 251 4f808e0-4f808ea 252 4f808ec-4f808ed 251->252 253 4f808af-4f808db 251->253 255 4f808ad 252->255 256 4f808ef-4f808f1 252->256 257 4f808f4-4f80b46 253->257 255->253 256->257 285 4f80b57-4f80b67 GetCurrentHwProfileW 257->285 286 4f80b80-4f80c54 call 4f80c56 285->286
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2974513079.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4f80000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 8ZF6
                                  • API String ID: 0-476698926
                                  • Opcode ID: b0e6fd48d86ba299b882aa4be558aae20c50c41a40766540a63179432dc99b01
                                  • Instruction ID: 0d3080a2859804af8d12a0cdf86859eea84bd34880bac8195788a0b33b7b4dcf
                                  • Opcode Fuzzy Hash: b0e6fd48d86ba299b882aa4be558aae20c50c41a40766540a63179432dc99b01
                                  • Instruction Fuzzy Hash: 4251F6E734D115BDB142A5856B51AF66B6EE7D33303B2842EF407D9602FA982A8F2031

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 299 4f80892-4f80b46 330 4f80b57-4f80b67 GetCurrentHwProfileW 299->330 331 4f80b80-4f80c54 call 4f80c56 330->331
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(00000ED7), ref: 04F80B5F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2974513079.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4f80000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID: 8ZF6
                                  • API String ID: 2104809126-476698926
                                  • Opcode ID: 7bccb69238b8cfd6a9ff62716a365ab05607563a8d5a9f6e1f4d4f1f92c1363f
                                  • Instruction ID: 1922fb7e2f048444cd306ff3f2a7ffc30765b04a9f92ae490ff0eae582fd6774
                                  • Opcode Fuzzy Hash: 7bccb69238b8cfd6a9ff62716a365ab05607563a8d5a9f6e1f4d4f1f92c1363f
                                  • Instruction Fuzzy Hash: 0441F4EB34D115BD7142A1856B51AF65AAEE7D73303B2842EF403D9602FAD81A8F3131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 344 4f80931-4f8093f 345 4f80920-4f8092c 344->345 346 4f80941-4f80943 344->346 348 4f80945-4f80b46 345->348 346->348 372 4f80b57-4f80b67 GetCurrentHwProfileW 348->372 373 4f80b80-4f80c54 call 4f80c56 372->373
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2974513079.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4f80000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 8ZF6
                                  • API String ID: 0-476698926
                                  • Opcode ID: 8945a4ac0078198ab3f911fe5e79e2b601e9be6f9c1c5fbc8d293d7f590f3bd6
                                  • Instruction ID: 238dc44f1dea5c324d7db912883152156699d27fdc3b5c3c6f7994fb2f243d67
                                  • Opcode Fuzzy Hash: 8945a4ac0078198ab3f911fe5e79e2b601e9be6f9c1c5fbc8d293d7f590f3bd6
                                  • Instruction Fuzzy Hash: DE410AE734D111BDB142A5855B55AF66A6EF7D33307B2842EF403D9642FA982A4F3031

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 386 4f80919-4f80b46 412 4f80b57-4f80b67 GetCurrentHwProfileW 386->412 413 4f80b80-4f80c54 call 4f80c56 412->413
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(00000ED7), ref: 04F80B5F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2974513079.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4f80000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID: 8ZF6
                                  • API String ID: 2104809126-476698926
                                  • Opcode ID: 02116c370f0f3ef825efc7dd2fafbba81bea4be803a26020b7fcd3b0503b3e88
                                  • Instruction ID: 52400fe7c495250ec40f04e934301484000507559cf648edde2e5729b6aedf62
                                  • Opcode Fuzzy Hash: 02116c370f0f3ef825efc7dd2fafbba81bea4be803a26020b7fcd3b0503b3e88
                                  • Instruction Fuzzy Hash: C141F7E734D111BDB142A5856B55AF65A6EE7D37307B2842EF403D9642FAC82A8F3031

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 426 4f8090b-4f80b46 452 4f80b57-4f80b67 GetCurrentHwProfileW 426->452 453 4f80b80-4f80c54 call 4f80c56 452->453
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(00000ED7), ref: 04F80B5F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2974513079.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4f80000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID: 8ZF6
                                  • API String ID: 2104809126-476698926
                                  • Opcode ID: 7637713c8656ad772fd0201c39a0c6debae3a007b9a756dca09b015741b8c8f5
                                  • Instruction ID: 12429d99c3e528af140eb423e9bd48aa6fae94119568ed903bbbc6d7ed120976
                                  • Opcode Fuzzy Hash: 7637713c8656ad772fd0201c39a0c6debae3a007b9a756dca09b015741b8c8f5
                                  • Instruction Fuzzy Hash: 334104E734D111BDB142A1856B51EF65A6EE7D33303B2842EF403D9602FA882A8F3032

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 466 4f80951-4f80b46 491 4f80b57-4f80b67 GetCurrentHwProfileW 466->491 492 4f80b80-4f80c54 call 4f80c56 491->492
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2974513079.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4f80000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 8ZF6
                                  • API String ID: 0-476698926
                                  • Opcode ID: 99bd548293d5582193acbfb18b834e6125964eb5d7b98e770dcee7e2ad34742a
                                  • Instruction ID: 5feff05ec228e5a23bfb2694c1c44ef4c3992777eed1335348166847f63a2d2a
                                  • Opcode Fuzzy Hash: 99bd548293d5582193acbfb18b834e6125964eb5d7b98e770dcee7e2ad34742a
                                  • Instruction Fuzzy Hash: 9D4116E734D115BC7142A1866B55EF75A6EE7D33307B2842EF407DA602FA881A8F3032

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 505 4f8095a-4f80b46 529 4f80b57-4f80b67 GetCurrentHwProfileW 505->529 530 4f80b80-4f80c54 call 4f80c56 529->530
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(00000ED7), ref: 04F80B5F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2974513079.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4f80000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID: 8ZF6
                                  • API String ID: 2104809126-476698926
                                  • Opcode ID: d6d96ccd3a405dde239be5f2691dce955303ac49169ce3b0697e723b9d87bc38
                                  • Instruction ID: 178b096534420e36c68feec7faae1a1ec80cb6864592202e4bd499a3b1f4c70c
                                  • Opcode Fuzzy Hash: d6d96ccd3a405dde239be5f2691dce955303ac49169ce3b0697e723b9d87bc38
                                  • Instruction Fuzzy Hash: 1F41F6E734D111BCB142A5865B55EF65A6EE7E33347B2842EF403D9602FA881A8F3131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 543 4f809d9-4f809e4 544 4f80983-4f809d4 543->544 545 4f809e5-4f80b46 543->545 544->545 566 4f80b57-4f80b67 GetCurrentHwProfileW 545->566 567 4f80b80-4f80c54 call 4f80c56 566->567
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2974513079.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4f80000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 8ZF6
                                  • API String ID: 0-476698926
                                  • Opcode ID: b3fdb932e742fcf976e7c2e98467e291ecded7b46aac9cd9a59cd3fd35b1ef66
                                  • Instruction ID: c04d35534010b29be24d725892f84708a65da2a5f86e6089959dd25bc4135c59
                                  • Opcode Fuzzy Hash: b3fdb932e742fcf976e7c2e98467e291ecded7b46aac9cd9a59cd3fd35b1ef66
                                  • Instruction Fuzzy Hash: C74116E730D111BCB242A5856B55EF65A6EE7D73347B2842EF403D9602FA881A8F3132

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 580 4f8098d-4f80b46 602 4f80b57-4f80b67 GetCurrentHwProfileW 580->602 603 4f80b80-4f80c54 call 4f80c56 602->603
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(00000ED7), ref: 04F80B5F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2974513079.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4f80000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID: 8ZF6
                                  • API String ID: 2104809126-476698926
                                  • Opcode ID: 224e1bea2df8e9affd26ad7b03bd50b0cb25abc51bcd550495e28f54f7fb5b66
                                  • Instruction ID: 18aa8ac0460da250cb009fc6ee7dd2fbf83c95d3d3e78890353ea362d8b4da54
                                  • Opcode Fuzzy Hash: 224e1bea2df8e9affd26ad7b03bd50b0cb25abc51bcd550495e28f54f7fb5b66
                                  • Instruction Fuzzy Hash: 963104E770D115BDB242A1856B55AF65AAEE7D73307B2842FF403D9601FA881A8E2132

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 616 429789-4297ab 617 4297b1-4297b3 616->617 618 42999e 616->618 620 4297b5-4297d4 call 418be3 617->620 621 4297df-429802 617->621 619 4299a0-4299a4 618->619 629 4297d7-4297da 620->629 623 429804-429806 621->623 624 429808-42980e 621->624 623->624 626 429810-429821 623->626 624->620 624->626 627 429823-429831 call 42263d 626->627 628 429834-429844 call 4292ce 626->628 627->628 634 429846-42984c 628->634 635 42988d-42989f 628->635 629->619 638 429875-42988b call 428e9f 634->638 639 42984e-429851 634->639 636 4298a1-4298a7 635->636 637 4298f6-429916 WriteFile 635->637 640 4298e2-4298f4 call 42934b 636->640 641 4298a9-4298ac 636->641 644 429921 637->644 645 429918-42991e 637->645 655 42986e-429870 638->655 642 429853-429856 639->642 643 42985c-42986b call 429266 639->643 667 4298c9-4298cc 640->667 648 4298ce-4298e0 call 42950f 641->648 649 4298ae-4298b1 641->649 642->643 650 429936-429939 642->650 643->655 647 429924-42992f 644->647 645->644 656 429931-429934 647->656 657 429999-42999c 647->657 648->667 658 4298b7-4298c4 call 429426 649->658 659 42993c-42993e 649->659 650->659 655->647 656->650 657->619 658->667 664 429940-429945 659->664 665 42996c-429978 659->665 668 429947-429959 664->668 669 42995e-429967 call 4216c8 664->669 670 429982-429994 665->670 671 42997a-429980 665->671 667->655 668->629 669->629 670->629 671->618 671->670
                                  APIs
                                  • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0042990E
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2960594163.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, Offset: 003E0000, based on PE: true
                                  • Associated: 00000007.00000002.2960341431.00000000003E0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2960594163.0000000000565000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962230714.000000000056A000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000056D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.00000000006F4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.00000000007D4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.0000000000814000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000081C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000082A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964273883.000000000082B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964697391.00000000009CB000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964768546.00000000009CD000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_3e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: FileWrite
                                  • String ID:
                                  • API String ID: 3934441357-0
                                  • Opcode ID: d2e116fdd986dde568c64d4568a90b2dc5e62b66719bc21cb9c6e0fc4e439ad2
                                  • Instruction ID: 6d515f79d27d4fe54e006007122da01533c121e3cfb7be18b03f2d8d05e68544
                                  • Opcode Fuzzy Hash: d2e116fdd986dde568c64d4568a90b2dc5e62b66719bc21cb9c6e0fc4e439ad2
                                  • Instruction Fuzzy Hash: EB61D6B1E04129AEDF11DFA8E840AEF7BB9AF49314F58014AE800A7302D739DD51CB69
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2974513079.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4f80000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6e4c899e83d039b13883493ffb41e071566202cd0604f78fbaf2b12bdee54986
                                  • Instruction ID: c0eb8b0985be9c94f5337c9d14a750c316db5de7021d116ee39325fe69329c28
                                  • Opcode Fuzzy Hash: 6e4c899e83d039b13883493ffb41e071566202cd0604f78fbaf2b12bdee54986
                                  • Instruction Fuzzy Hash: 9E412AE730D151BCA242A5459B55AF21B6EE7D3330772406EF443DD642FA892A4F6131
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2974513079.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4f80000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4efa93e260ef1126559dc58fc9d4efcc4131a0f3930ff856cc135f35724d4cbd
                                  • Instruction ID: d67e60391621f05b6225460e0efdf28cc706d9dbc1c336cd3221db88368f6802
                                  • Opcode Fuzzy Hash: 4efa93e260ef1126559dc58fc9d4efcc4131a0f3930ff856cc135f35724d4cbd
                                  • Instruction Fuzzy Hash: 413104E734D115BC7242A5859B55EF65AAEE7D73307B2802EF407D9601FAC82A8E3132
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(00000ED7), ref: 04F80B5F
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2974513079.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4f80000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 9e1b00a6bfdd0e581431f8c9dfb74a97f756f3a810655bc73fefcced53149585
                                  • Instruction ID: 82308bee63250bd0af840f9dddb4de8f3d53c2cc33b550b59e0c6044e6f6aff2
                                  • Opcode Fuzzy Hash: 9e1b00a6bfdd0e581431f8c9dfb74a97f756f3a810655bc73fefcced53149585
                                  • Instruction Fuzzy Hash: FA3127E730D115BC7242A5859B55EF65A6EF7D33307B2842EF407D9601FA881A8E2031
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(00000ED7), ref: 04F80B5F
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2974513079.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4f80000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: fb2851f026d013176cc57c74eb53552b9f0997494ef0c8151d24fb7e225a360f
                                  • Instruction ID: 66b9bfcd958d023bce083038921e9c39b8fb0bcfab6385fe6ab703fd077c8f29
                                  • Opcode Fuzzy Hash: fb2851f026d013176cc57c74eb53552b9f0997494ef0c8151d24fb7e225a360f
                                  • Instruction Fuzzy Hash: FC3108EB34D115BCB142A5856B51EF65A6EE7E73307B2802EF403D9641FAC82A8F2131
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(00000ED7), ref: 04F80B5F
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2974513079.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4f80000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 0ca827d6dab7b6a239e4761fe8595e34300e776a98d8d009f35fda9b5636dcf4
                                  • Instruction ID: c40f8255d156a96cfb008e704876b12bf04944a6cd69ec5f3812f7259f6eb42e
                                  • Opcode Fuzzy Hash: 0ca827d6dab7b6a239e4761fe8595e34300e776a98d8d009f35fda9b5636dcf4
                                  • Instruction Fuzzy Hash: E52106E774D115BCB242A5855B51AF666AFF7E73307B2403EB003DA641FBC91A8E2131
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(00000ED7), ref: 04F80B5F
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2974513079.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4f80000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: e9a24204011efcd8bff4102ebe3fef85ce2910ef2d65bbd1a70ea21e297646e5
                                  • Instruction ID: 1cb91e4038ad9142cfecb1bf9b524a1222796263ea497bde6312531422dcc010
                                  • Opcode Fuzzy Hash: e9a24204011efcd8bff4102ebe3fef85ce2910ef2d65bbd1a70ea21e297646e5
                                  • Instruction Fuzzy Hash: 3B21F3E370D115BCF242A5415B51AF65AAEE7E63347B2442EF003CD642FA88268F2132
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(00000ED7), ref: 04F80B5F
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2974513079.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4f80000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: f3f4f5e034e405a9816494191fb4ef270daffa5a4c092840a7cdee6a31c3ef98
                                  • Instruction ID: b98a32667fb0085ac9dad9023ecdbc13922b2ed2322ec13f1319ee897972533d
                                  • Opcode Fuzzy Hash: f3f4f5e034e405a9816494191fb4ef270daffa5a4c092840a7cdee6a31c3ef98
                                  • Instruction Fuzzy Hash: DA1193E764D115BCA28275855B61AF65A5EFBE73343B3405EF403CD241BE892A8F2132
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(00000ED7), ref: 04F80B5F
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2974513079.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4f80000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 14d26b8c4d7ca2d8e4cff130032bd877a09040929253232475450d8160557c1e
                                  • Instruction ID: e63d7a3b085052011c8f4c72b10fcdb45c13e1915e71f6c1a37ec5efa54cb3d1
                                  • Opcode Fuzzy Hash: 14d26b8c4d7ca2d8e4cff130032bd877a09040929253232475450d8160557c1e
                                  • Instruction Fuzzy Hash: 4511BFE774D125BC618275811B52EF65A5EF7E73343B2802EB403CA641BE882A8E2172
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(00000ED7), ref: 04F80B5F
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2974513079.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4f80000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 746ed48378f344ef0d8577e2d4f5913884021cbc89a6b4c2949b07f123866ce8
                                  • Instruction ID: cb2592c8f7d1efba2317849c586723490705fb6efd072e498fc2fa6b1cb4a86f
                                  • Opcode Fuzzy Hash: 746ed48378f344ef0d8577e2d4f5913884021cbc89a6b4c2949b07f123866ce8
                                  • Instruction Fuzzy Hash: BD11E7E774D1116C724665916B51AF66A5EF7D32383B3846FF403CE141FA886A8F2131
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(00000ED7), ref: 04F80B5F
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2974513079.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4f80000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: b9904dc0505007e75740a2cac21e92bbb7b58073c8d5626e114ca705a81ee538
                                  • Instruction ID: 32db19aa0716085155579c598ec4a58e52d5174f2d3e48b0de92d67cf0574d99
                                  • Opcode Fuzzy Hash: b9904dc0505007e75740a2cac21e92bbb7b58073c8d5626e114ca705a81ee538
                                  • Instruction Fuzzy Hash: 0111A3E774D125BCB242B5852B51EF65A6EF7E63343B2402EF403C9641FE892A4F2131
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(00000ED7), ref: 04F80B5F
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2974513079.0000000004F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F80000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4f80000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: d887492c4575ec00e11dc34f2201141d680033f2662541eed88acd0d8186b548
                                  • Instruction ID: 400f3b1448cf6ed41369bb1929ddcff5784a2a37cb9cb2af6282a04a140e8655
                                  • Opcode Fuzzy Hash: d887492c4575ec00e11dc34f2201141d680033f2662541eed88acd0d8186b548
                                  • Instruction Fuzzy Hash: CE01A1E774D1117CB246A4816B51AF65A5EF7E22343B2842EF403C9241FA896A8E2131
                                  APIs
                                  • FindCloseChangeNotification.KERNELBASE(00000000,00000000,?,?,00428CE6,00000000,?,0055A178,0000000C,00428DA2,?,?,?), ref: 00428E55
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2960594163.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, Offset: 003E0000, based on PE: true
                                  • Associated: 00000007.00000002.2960341431.00000000003E0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2960594163.0000000000565000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962230714.000000000056A000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000056D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.00000000006F4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.00000000007D4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.0000000000814000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000081C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000082A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964273883.000000000082B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964697391.00000000009CB000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964768546.00000000009CD000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_3e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: ChangeCloseFindNotification
                                  • String ID:
                                  • API String ID: 2591292051-0
                                  • Opcode ID: 945bc596d65e0ab25593887c58db4f2dbceaec68e64f9a227e8758a286691513
                                  • Instruction ID: 60811b81567e49a438ef4811a3e800e3eb715f0df9d70350803798ac57d751b6
                                  • Opcode Fuzzy Hash: 945bc596d65e0ab25593887c58db4f2dbceaec68e64f9a227e8758a286691513
                                  • Instruction Fuzzy Hash: 6B11483370213016D62522367842B7F27494B92738FAA061FF918CB2C2DE6DAC81415D
                                  APIs
                                  • SetFilePointerEx.KERNELBASE(00000000,?,?,?,?,?,00000000,?,?,?,00422626,?,?,?,?,?), ref: 00422558
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2960594163.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, Offset: 003E0000, based on PE: true
                                  • Associated: 00000007.00000002.2960341431.00000000003E0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2960594163.0000000000565000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962230714.000000000056A000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000056D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.00000000006F4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.00000000007D4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.0000000000814000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000081C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000082A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964273883.000000000082B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964697391.00000000009CB000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964768546.00000000009CD000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_3e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: FilePointer
                                  • String ID:
                                  • API String ID: 973152223-0
                                  • Opcode ID: 698ee2b92eacc8d0cd85eef32dd1aa25811728ad62f1395678f9e2b42f3154ed
                                  • Instruction ID: 0ef52d04ab8d2150f5b70f62e193f8379dcf9cbabccce2cccc8b44b388147d22
                                  • Opcode Fuzzy Hash: 698ee2b92eacc8d0cd85eef32dd1aa25811728ad62f1395678f9e2b42f3154ed
                                  • Instruction Fuzzy Hash: B10126327105657FCF09CF19EC1189E3B59DB85334B64420AF8109B2A1EAB5ED92CB94
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 003E331F
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2960594163.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, Offset: 003E0000, based on PE: true
                                  • Associated: 00000007.00000002.2960341431.00000000003E0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2960594163.0000000000565000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962230714.000000000056A000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000056D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.00000000006F4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.00000000007D4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.0000000000814000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000081C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000082A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964273883.000000000082B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964697391.00000000009CB000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964768546.00000000009CD000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_3e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID:
                                  • API String ID: 118556049-0
                                  • Opcode ID: 0fd589d96c9d07b1efa01aec19e4ff46bb0766daf2056f60d33bc81ca57302d3
                                  • Instruction ID: f8b98b88075d2d4b5673de16b9d3de2ea707dd53297a1e11f4916432b4237e84
                                  • Opcode Fuzzy Hash: 0fd589d96c9d07b1efa01aec19e4ff46bb0766daf2056f60d33bc81ca57302d3
                                  • Instruction Fuzzy Hash: B7F059361001109BCB246F62D4099EAB3E8DF243627500A7FE88CC7292EF2ADA80C7C0
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000008,?,00000001,?,00429FE0,00000001,00000364,00000001,00000006,000000FF,?,00414B3F,?,?,74D723A0,?), ref: 0042A69B
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2960594163.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, Offset: 003E0000, based on PE: true
                                  • Associated: 00000007.00000002.2960341431.00000000003E0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2960594163.0000000000565000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962230714.000000000056A000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000056D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.00000000006F4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.00000000007D4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.0000000000814000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000081C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000082A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964273883.000000000082B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964697391.00000000009CB000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964768546.00000000009CD000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_3e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 7457c6601432358f82ee40ae2728a6bc33fb928b0629c87a2d2609bc6b6fff6a
                                  • Instruction ID: 5319a74dd87f8a0d3d4e6bfc27a4be277f5b8287362978d7d70a2dd6f6a09bb3
                                  • Opcode Fuzzy Hash: 7457c6601432358f82ee40ae2728a6bc33fb928b0629c87a2d2609bc6b6fff6a
                                  • Instruction Fuzzy Hash: 39F02432311130ABDB216A62BC05B1B334CAF41760F9C8157EC84EB280CB38DC2045AE
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000000,00000001,?,?,00414B3F,?,?,74D723A0,?,?,003E3522,?,?), ref: 0042B0C7
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2960594163.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, Offset: 003E0000, based on PE: true
                                  • Associated: 00000007.00000002.2960341431.00000000003E0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2960594163.0000000000565000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962230714.000000000056A000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000056D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.00000000006F4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.00000000007D4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.0000000000814000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000081C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000082A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964273883.000000000082B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964697391.00000000009CB000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964768546.00000000009CD000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_3e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 56a4308f72e2e773c26b4e551322172a43d508ed82648db8fe86b4d3c63a8690
                                  • Instruction ID: 828bafd6939f7551dc20332530eaf4ecfa01efacc8ffa330921995ff194ed03d
                                  • Opcode Fuzzy Hash: 56a4308f72e2e773c26b4e551322172a43d508ed82648db8fe86b4d3c63a8690
                                  • Instruction Fuzzy Hash: 6AE0ED313012326AEA232666BC15B5B7748DF423A0FC90213ED64E22C0DB6CCC0082EE
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2974590215.0000000004F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4f90000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6f128037c47050ee00a2e1e900ad07596e2b638f65623a1bff6c33a26989cd9c
                                  • Instruction ID: 772f5be7a75c89c2a750e60af4d7502084f24a821391699688401e9ac7f85431
                                  • Opcode Fuzzy Hash: 6f128037c47050ee00a2e1e900ad07596e2b638f65623a1bff6c33a26989cd9c
                                  • Instruction Fuzzy Hash: 33F024CB688040BD7853A58D9A00BF77BAEDBC2A343349826F146C6402F985AD47A860
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2974590215.0000000004F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4f90000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ac9d94819150fe53a7131716b3cb69a3d1a7b842e4dc3fca1067c728c7a969fa
                                  • Instruction ID: 8545db425d698a6746bfe246f9f311653fbe8a5503ad019a073cb4217b4295fb
                                  • Opcode Fuzzy Hash: ac9d94819150fe53a7131716b3cb69a3d1a7b842e4dc3fca1067c728c7a969fa
                                  • Instruction Fuzzy Hash: 9AE0E5AB248110BE7052A58DA6006F67BFEDAC72703348437F106C7102EA905D0AB631
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2960594163.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, Offset: 003E0000, based on PE: true
                                  • Associated: 00000007.00000002.2960341431.00000000003E0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2960594163.0000000000565000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962230714.000000000056A000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000056D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.00000000006F4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.00000000007D4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.0000000000814000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000081C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000082A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964273883.000000000082B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964697391.00000000009CB000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964768546.00000000009CD000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_3e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 333d4b6d5425d6f9d03797ee82114c3711da98524c03317fffdb5ec62fb2b380
                                  • Instruction ID: cbfc449cf2442b255de6347451e99f1171a3ad121806e747b8cfe1b614e3fe9e
                                  • Opcode Fuzzy Hash: 333d4b6d5425d6f9d03797ee82114c3711da98524c03317fffdb5ec62fb2b380
                                  • Instruction Fuzzy Hash: F0022A71E402199BDF14CFA9D9C06EEBBB1FF48314F24826AD919E7340D735A981CB98
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 003FA09D
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 003FA0BF
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 003FA0E7
                                  • __Getctype.LIBCPMT ref: 003FA1C5
                                  • std::_Facet_Register.LIBCPMT ref: 003FA1F9
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 003FA223
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2960594163.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, Offset: 003E0000, based on PE: true
                                  • Associated: 00000007.00000002.2960341431.00000000003E0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2960594163.0000000000565000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962230714.000000000056A000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000056D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.00000000006F4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.00000000007D4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.0000000000814000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000081C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000082A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964273883.000000000082B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964697391.00000000009CB000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964768546.00000000009CD000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_3e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetctypeRegister
                                  • String ID: @c$PD>$PG>$E>
                                  • API String ID: 1102183713-1092430407
                                  • Opcode ID: bb082c7adb6b919f928da73c6886a4ec8593b44cc1c70a810303630e8f89d76f
                                  • Instruction ID: c69e4e7eb98d8ab7040c3b558b6887cf82765893059b6bbc8365cfeac07f6639
                                  • Opcode Fuzzy Hash: bb082c7adb6b919f928da73c6886a4ec8593b44cc1c70a810303630e8f89d76f
                                  • Instruction Fuzzy Hash: AC51CBB0D00649CFCB12CF58D9417AEBBF4BB10314F14825DD849AB381DBB4AE88CB92
                                  APIs
                                  • _ValidateLocalCookies.LIBCMT ref: 00417307
                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 0041730F
                                  • _ValidateLocalCookies.LIBCMT ref: 00417398
                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 004173C3
                                  • _ValidateLocalCookies.LIBCMT ref: 00417418
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2960594163.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, Offset: 003E0000, based on PE: true
                                  • Associated: 00000007.00000002.2960341431.00000000003E0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2960594163.0000000000565000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962230714.000000000056A000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000056D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.00000000006F4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.00000000007D4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.0000000000814000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000081C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000082A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964273883.000000000082B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964697391.00000000009CB000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964768546.00000000009CD000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_3e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                  • String ID: `->$csm
                                  • API String ID: 1170836740-1728804828
                                  • Opcode ID: c043c6fa2de01198bbc9f8f779a7a4b850e7f1dba340b1e38ef72583e3d0986f
                                  • Instruction ID: 07c8c52506078abc0b61489e1dd418abcac4bafb1d930278b6d6b388f7018ef8
                                  • Opcode Fuzzy Hash: c043c6fa2de01198bbc9f8f779a7a4b850e7f1dba340b1e38ef72583e3d0986f
                                  • Instruction Fuzzy Hash: F941C634A042199BCF10DF59C885ADEBBB5AF04318F14815AFC149B392DB39DA81DB95
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 003FC45A
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 003FC47C
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 003FC4A4
                                  • std::_Facet_Register.LIBCPMT ref: 003FC59A
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 003FC5C4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2960594163.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, Offset: 003E0000, based on PE: true
                                  • Associated: 00000007.00000002.2960341431.00000000003E0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2960594163.0000000000565000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962230714.000000000056A000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000056D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.00000000006F4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.00000000007D4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.0000000000814000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000081C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000082A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964273883.000000000082B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964697391.00000000009CB000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964768546.00000000009CD000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_3e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                  • String ID: E>$PD>
                                  • API String ID: 459529453-97385129
                                  • Opcode ID: 7f6e8b4fe99ced46bc85cf5e4686343daf684767a82e194e9167e3f44a36bf6b
                                  • Instruction ID: 3492fd7c7d05926ade36f58f1ad398ba38e993e82426c6f0a77ece471c9ea8a9
                                  • Opcode Fuzzy Hash: 7f6e8b4fe99ced46bc85cf5e4686343daf684767a82e194e9167e3f44a36bf6b
                                  • Instruction Fuzzy Hash: 1A51DB70900248DBDB12CF99DA50BAEBBF4FB11314F24815DE845AB381D7B5AE09CB90
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2960594163.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, Offset: 003E0000, based on PE: true
                                  • Associated: 00000007.00000002.2960341431.00000000003E0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2960594163.0000000000565000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962230714.000000000056A000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000056D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.00000000006F4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.00000000007D4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.0000000000814000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000081C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000082A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964273883.000000000082B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964697391.00000000009CB000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964768546.00000000009CD000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_3e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: _strrchr
                                  • String ID:
                                  • API String ID: 3213747228-0
                                  • Opcode ID: 785c90e8ff89e0f1a3d98e37725974d6f6ea20f06d45e48120c47f1ca5a82ffe
                                  • Instruction ID: b72e321d3f6d5d67aeeb02919d18be7adf54166526bfe91b0a390d3b9fe8f9f4
                                  • Opcode Fuzzy Hash: 785c90e8ff89e0f1a3d98e37725974d6f6ea20f06d45e48120c47f1ca5a82ffe
                                  • Instruction Fuzzy Hash: F3B14532B003659FDB118E24DC82BEFBBA5EF59310F55416BE944AB382D7789801C7E9
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 00412730
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0041273B
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 004127A9
                                    • Part of subcall function 0041288C: std::locale::_Locimp::_Locimp.LIBCPMT ref: 004128A4
                                  • std::locale::_Setgloballocale.LIBCPMT ref: 00412756
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2960594163.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, Offset: 003E0000, based on PE: true
                                  • Associated: 00000007.00000002.2960341431.00000000003E0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2960594163.0000000000565000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962230714.000000000056A000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000056D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.00000000006F4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.00000000007D4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.0000000000814000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000081C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000082A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964273883.000000000082B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964697391.00000000009CB000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964768546.00000000009CD000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_3e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                                  • String ID: `->
                                  • API String ID: 677527491-1457345910
                                  • Opcode ID: 24b659bd5b82bbeca5c7cd7a25cfabecdc0d9f5a5629cf3319d47b4afc8bfd7c
                                  • Instruction ID: 3dec5aab2ac03ce3e4c2badf16e5a16401bf6cb26a9454d6adc833208091372b
                                  • Opcode Fuzzy Hash: 24b659bd5b82bbeca5c7cd7a25cfabecdc0d9f5a5629cf3319d47b4afc8bfd7c
                                  • Instruction Fuzzy Hash: 2001FC35A002109BCB0AAB24D8415BE7BB0BF94754B08050EE81197381CFB8AE96DB89
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 003E750C
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 003E7522
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2960594163.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, Offset: 003E0000, based on PE: true
                                  • Associated: 00000007.00000002.2960341431.00000000003E0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2960594163.0000000000565000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962230714.000000000056A000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000056D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.00000000006F4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.00000000007D4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.0000000000814000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000081C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000082A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964273883.000000000082B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964697391.00000000009CB000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964768546.00000000009CD000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_3e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: )>$[json.exception.
                                  • API String ID: 4194217158-421053594
                                  • Opcode ID: da9df3443d6c982feb030e59eeafa46a3a2709feb705c61f0c886107177e791c
                                  • Instruction ID: 6599f1a14fed2dffd2668f3631baacfcb63c0901fbfbd920b410a0fe4885ea4d
                                  • Opcode Fuzzy Hash: da9df3443d6c982feb030e59eeafa46a3a2709feb705c61f0c886107177e791c
                                  • Instruction Fuzzy Hash: 0C51DFB1D046889FDB01DFA8C905BAEBBF4EF15314F144259E854AB3C2E7B85A44CBE1
                                  APIs
                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 003E499F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2960594163.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, Offset: 003E0000, based on PE: true
                                  • Associated: 00000007.00000002.2960341431.00000000003E0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2960594163.0000000000565000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962230714.000000000056A000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000056D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.00000000006F4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.00000000007D4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.0000000000814000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000081C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000082A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964273883.000000000082B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964697391.00000000009CB000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964768546.00000000009CD000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_3e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: Ios_base_dtorstd::ios_base::_
                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                  • API String ID: 323602529-1866435925
                                  • Opcode ID: 022f27686ebb0bea830665f8ca77e2b8b728ef1fdf5e7cfb9f430f6a3de66036
                                  • Instruction ID: e0108155942b1716ecbb9a595a2b0022be2a256d6f5becc1a78b776f59b38de4
                                  • Opcode Fuzzy Hash: 022f27686ebb0bea830665f8ca77e2b8b728ef1fdf5e7cfb9f430f6a3de66036
                                  • Instruction Fuzzy Hash: CC119C72804694ABC711DE299C02BE637DCF709710F04472AFD549B2C2FB35A800C796
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 003E3819
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 003E38F0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2960594163.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, Offset: 003E0000, based on PE: true
                                  • Associated: 00000007.00000002.2960341431.00000000003E0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2960594163.0000000000565000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962230714.000000000056A000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000056D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.00000000006F4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.00000000007D4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.0000000000814000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000081C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000082A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964273883.000000000082B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964697391.00000000009CB000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964768546.00000000009CD000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_3e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: ___std_exception_copy___std_exception_destroy
                                  • String ID: )>
                                  • API String ID: 2970364248-1110121906
                                  • Opcode ID: 444e03847a8fe4afe798d7392c969e054ec1bf9bc5cdbb2c39a68e0544d8c3bd
                                  • Instruction ID: 9e735ac2627b2f6f304f5a277481f85841809954c683130283dc3d6c93ec116a
                                  • Opcode Fuzzy Hash: 444e03847a8fe4afe798d7392c969e054ec1bf9bc5cdbb2c39a68e0544d8c3bd
                                  • Instruction Fuzzy Hash: B06169B1C04258EFDB11CF98C849B9DFFB4FF19324F14825AE814AB282D7B55A44CBA1
                                  APIs
                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 003E499F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2960594163.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, Offset: 003E0000, based on PE: true
                                  • Associated: 00000007.00000002.2960341431.00000000003E0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2960594163.0000000000565000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962230714.000000000056A000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000056D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.00000000006F4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.00000000007D4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.0000000000814000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000081C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000082A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964273883.000000000082B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964697391.00000000009CB000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964768546.00000000009CD000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_3e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: Ios_base_dtorstd::ios_base::_
                                  • String ID: ios_base::badbit set$ios_base::failbit set
                                  • API String ID: 323602529-1240500531
                                  • Opcode ID: 1bd3847d109f9543bd607e9f8548c36c89da8282289638e539c263d33e83765e
                                  • Instruction ID: 55db3f0f3a41efbec10717cf1fa0cb2fbc18634589536c41fc7c78681de11789
                                  • Opcode Fuzzy Hash: 1bd3847d109f9543bd607e9f8548c36c89da8282289638e539c263d33e83765e
                                  • Instruction Fuzzy Hash: FB4123B1C00298ABCB05DF69D845BAEBBB8FB09710F14835DF454AB2C2D7756A00CBA1
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 003E4061
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 003E40C4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2960594163.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, Offset: 003E0000, based on PE: true
                                  • Associated: 00000007.00000002.2960341431.00000000003E0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2960594163.0000000000565000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962230714.000000000056A000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000056D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.00000000006F4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.00000000007D4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.0000000000814000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000081C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000082A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964273883.000000000082B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964697391.00000000009CB000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964768546.00000000009CD000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_3e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                  • String ID: bad locale name
                                  • API String ID: 3988782225-1405518554
                                  • Opcode ID: 72ac13644fce9f1e7c2e17a66e90edf1d3fe0d9c7e3650a2b2b324a6ce242b57
                                  • Instruction ID: a189d638d45b9a71b0debd529c327e43c9e462032541aa667d8b6f46390d2de3
                                  • Opcode Fuzzy Hash: 72ac13644fce9f1e7c2e17a66e90edf1d3fe0d9c7e3650a2b2b324a6ce242b57
                                  • Instruction Fuzzy Hash: 7D110370805B84EED721CF69C50478BBFF0AF15714F10868DD09597B82D3B96A04C791
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 003F65C9
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 003F65FC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2960594163.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, Offset: 003E0000, based on PE: true
                                  • Associated: 00000007.00000002.2960341431.00000000003E0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2960594163.0000000000565000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962230714.000000000056A000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000056D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.00000000006F4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.00000000007D4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.0000000000814000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000081C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000082A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964273883.000000000082B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964697391.00000000009CB000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964768546.00000000009CD000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_3e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: )>
                                  • API String ID: 2659868963-1110121906
                                  • Opcode ID: 8cf3c359dce0db1a9b4cc3a92e756038ac4fa383c77791c670c42fec0b9abf73
                                  • Instruction ID: a15d27ecf778d78b18a7bcead0eaf6feeb653572dd4362e5035b282136e9ccb8
                                  • Opcode Fuzzy Hash: 8cf3c359dce0db1a9b4cc3a92e756038ac4fa383c77791c670c42fec0b9abf73
                                  • Instruction Fuzzy Hash: B11130B5904748EBCB11DF99D980B86FBF8FF09724F10876AF81497641E774A5408BA0
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 003E7A5C
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 003E7A72
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2960594163.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, Offset: 003E0000, based on PE: true
                                  • Associated: 00000007.00000002.2960341431.00000000003E0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2960594163.0000000000565000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962230714.000000000056A000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000056D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.00000000006F4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.00000000007D4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.0000000000814000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000081C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2962318691.000000000082A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964273883.000000000082B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964697391.00000000009CB000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2964768546.00000000009CD000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_3e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: )>
                                  • API String ID: 4194217158-1110121906
                                  • Opcode ID: 6d5944d71b9cbe39469e1dd18e5ad17861c5d33586b31f30fb978a6eea7596a6
                                  • Instruction ID: 6a645197ac80297d8d2e281e4e9c9141b3013f91c5cdd7d51eb5076eaa305aca
                                  • Opcode Fuzzy Hash: 6d5944d71b9cbe39469e1dd18e5ad17861c5d33586b31f30fb978a6eea7596a6
                                  • Instruction Fuzzy Hash: 99F06DB1804748EFC710DF98D90178DBBF8FB06729F50066AE824A3780D3B566048BA1

                                  Control-flow Graph

                                  APIs
                                  • setsockopt.WS2_32(000003E0,0000FFFF,00001006,?,00000008), ref: 004A7BA6
                                  • recv.WS2_32(?,00000004,00000002), ref: 004A7BC1
                                  • recv.WS2_32(00000000,0000000C,00000002,00000000), ref: 004A7C43
                                  • recv.WS2_32(00000000,0000000C,00000008), ref: 004A7C64
                                  • setsockopt.WS2_32(0000FFFF,00001006,?,00000008,?,00000000), ref: 004A7D01
                                    • Part of subcall function 004A8590: WSAStartup.WS2_32 ref: 004A85BA
                                    • Part of subcall function 004A8590: socket.WS2_32(?,?,?,?,?,?,00569328,?,?), ref: 004A865E
                                    • Part of subcall function 004A8590: connect.WS2_32(00000000,00539BFC,?,?,?,?,00569328,?,?), ref: 004A8671
                                    • Part of subcall function 004A8590: closesocket.WS2_32(00000000), ref: 004A867D
                                  • recv.WS2_32(00000000,?,00000008), ref: 004A7D1B
                                  • recv.WS2_32(?,00000004,00000008), ref: 004A7E23
                                  • __Xtime_get_ticks.LIBCPMT ref: 004A7E2A
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004A7E38
                                  • Sleep.KERNELBASE(00000001,00000000,?,00002710,00000000), ref: 004A7EB1
                                  • Sleep.KERNELBASE(00000064,?,00002710,00000000), ref: 004A7EB9
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2960668282.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, Offset: 003E0000, based on PE: true
                                  • Associated: 00000009.00000002.2960639491.00000000003E0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2960668282.0000000000565000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2960949617.000000000056A000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000056D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.00000000006F4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.00000000007D4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.0000000000814000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000081C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000082A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2962813085.000000000082B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2964301087.00000000009CB000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2964349504.00000000009CD000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_3e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: recv$Sleepsetsockopt$StartupUnothrow_t@std@@@Xtime_get_ticks__ehfuncinfo$??2@closesocketconnectsocket
                                  • String ID:
                                  • API String ID: 301102601-0
                                  • Opcode ID: 2efb60f059abf427376085e3028b96a6e4a5d2e3ca000675154f45c92dad290a
                                  • Instruction ID: 398b3229bced26e9f836480b7af389950bf33069aedc93864ea86cbf49513bfa
                                  • Opcode Fuzzy Hash: 2efb60f059abf427376085e3028b96a6e4a5d2e3ca000675154f45c92dad290a
                                  • Instruction Fuzzy Hash: 89B1C070D04308DFEB20DBA8CD49BAEBBB5BF65314F104259E444AB2E2D7B45D88DB91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 57 4a8590-4a85c2 WSAStartup 58 4a85c8-4a85f2 call 4ca420 * 2 57->58 59 4a8696-4a869f 57->59 64 4a85fe-4a8644 58->64 65 4a85f4-4a85f8 58->65 67 4a8690 64->67 68 4a8646-4a864c 64->68 65->59 65->64 67->59 69 4a864e 68->69 70 4a86a4-4a86ae 68->70 71 4a8654-4a8668 socket 69->71 70->67 76 4a86b0-4a86b8 70->76 71->67 72 4a866a-4a867a connect 71->72 74 4a867c-4a8684 closesocket 72->74 75 4a86a0 72->75 74->71 77 4a8686-4a868f 74->77 75->70 77->67
                                  APIs
                                  • WSAStartup.WS2_32 ref: 004A85BA
                                  • socket.WS2_32(?,?,?,?,?,?,00569328,?,?), ref: 004A865E
                                  • connect.WS2_32(00000000,00539BFC,?,?,?,?,00569328,?,?), ref: 004A8671
                                  • closesocket.WS2_32(00000000), ref: 004A867D
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2960668282.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, Offset: 003E0000, based on PE: true
                                  • Associated: 00000009.00000002.2960639491.00000000003E0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2960668282.0000000000565000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2960949617.000000000056A000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000056D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.00000000006F4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.00000000007D4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.0000000000814000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000081C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000082A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2962813085.000000000082B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2964301087.00000000009CB000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2964349504.00000000009CD000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_3e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: Startupclosesocketconnectsocket
                                  • String ID:
                                  • API String ID: 3098855095-0
                                  • Opcode ID: 1333f6de6474a841e561420d4abe45b8af20374c81484fc4aee77b0d6ad612e2
                                  • Instruction ID: aa04d6e5e1a55c061cee842785c54bc013d56d8c4682543ebc893c59f810b55e
                                  • Opcode Fuzzy Hash: 1333f6de6474a841e561420d4abe45b8af20374c81484fc4aee77b0d6ad612e2
                                  • Instruction Fuzzy Hash: 7B31E4729053005BE7209F248C44A2BB7E5FBD6738F104F1EF9A8A32D0D7749D1486AB

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 79 3e9280-3e92dd call 3f63b0 82 3e9413-3e9521 call 3e2df0 call 4ca420 79->82 83 3e92e3-3e92e9 79->83 99 3e9537-3e953f call 3f8dc0 82->99 100 3e9523-3e9535 82->100 84 3e92f0-3e9313 83->84 86 3e9324-3e9331 84->86 87 3e9315-3e931f 84->87 90 3e9342-3e934f 86->90 91 3e9333-3e933d 86->91 89 3e9403-3e9406 87->89 93 3e9409-3e940d 89->93 94 3e9360-3e936d 90->94 95 3e9351-3e935b 90->95 91->89 93->82 93->84 97 3e937e-3e938b 94->97 98 3e936f-3e9379 94->98 95->89 103 3e938d-3e9397 97->103 104 3e9399-3e93a6 97->104 98->89 101 3e9544-3e9597 call 4ca420 * 2 99->101 100->101 116 3e95cb-3e95e1 call 4ca420 101->116 117 3e9599-3e95c8 call 4ca420 call 415270 101->117 103->89 105 3e93a8-3e93b2 104->105 106 3e93b4-3e93c1 104->106 105->89 108 3e93cf-3e93dc 106->108 109 3e93c3-3e93cd 106->109 111 3e93de-3e93e8 108->111 112 3e93ea-3e93f4 108->112 109->89 111->89 112->93 115 3e93f6-3e93ff 112->115 115->89 123 3e95e7-3e95ed 116->123 124 3e96e2 116->124 117->116 125 3e95f0-3e96ce WSASend 123->125 126 3e96e6-3e96f0 124->126 145 3e975f-3e9763 125->145 146 3e96d4-3e96dc 125->146 128 3e971e-3e973d 126->128 129 3e96f2-3e96fe 126->129 133 3e976f-3e9796 128->133 134 3e973f-3e974b 128->134 131 3e9714-3e971b call 4138f3 129->131 132 3e9700-3e970e 129->132 131->128 132->131 135 3e9797-3e97fe call 418c70 call 3e2df0 * 2 132->135 137 3e974d-3e975b 134->137 138 3e9765-3e976c call 4138f3 134->138 137->135 139 3e975d 137->139 138->133 139->138 145->126 146->124 146->125
                                  APIs
                                  • WSASend.WS2_32(?,?,00000001,00000000,00000000,00000000,00000000,?,?,?,?,0052D15C,00000000,74D723A0,-00569880), ref: 003E96C9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2960668282.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, Offset: 003E0000, based on PE: true
                                  • Associated: 00000009.00000002.2960639491.00000000003E0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2960668282.0000000000565000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2960949617.000000000056A000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000056D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.00000000006F4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.00000000007D4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.0000000000814000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000081C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000082A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2962813085.000000000082B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2964301087.00000000009CB000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2964349504.00000000009CD000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_3e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: Send
                                  • String ID: Ws2_32.dll
                                  • API String ID: 121738739-3093949381
                                  • Opcode ID: 390599b1558f39fa4ec0d471925250956efbf639c1b6e7ae82f05572b6528229
                                  • Instruction ID: 37c6f719f3dc1e0bb3c79bef24264470d3b189381d22f8c6ac81e7e9c89bfa1e
                                  • Opcode Fuzzy Hash: 390599b1558f39fa4ec0d471925250956efbf639c1b6e7ae82f05572b6528229
                                  • Instruction Fuzzy Hash: A102CC70D042A8DFDF26CFA5C8907ADBBB0EF55304F24428EE4856B6C6D7741986CB92

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 152 4e102a6-4e102e8 156 4e102f3-4e10302 GetCurrentHwProfileW 152->156 157 4e10319-4e1059a 156->157
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E102F7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2972787784.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_4e10000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID: kZXP
                                  • API String ID: 2104809126-3040969424
                                  • Opcode ID: b343bd73721059c302d0a0d25861872b623ecc24361bddbbd5bb0c9f99d872c4
                                  • Instruction ID: 495eb133e8ec5b593a0fec0e5fc8a25dfedd5d8c61564d80118e8fd63d808ae7
                                  • Opcode Fuzzy Hash: b343bd73721059c302d0a0d25861872b623ecc24361bddbbd5bb0c9f99d872c4
                                  • Instruction Fuzzy Hash: 90318DFB78C124BEF11281812B54AFB276DE7C6730330A427F803D1966F6946EC96171

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 187 4e10000-4e1007e call 4e1007f 194 4e100e0-4e102e8 187->194 195 4e10080-4e10092 187->195 227 4e102f3-4e10302 GetCurrentHwProfileW 194->227 199 4e100a5-4e100bc call 4e100c0 195->199 204 4e1009d-4e100a4 199->204 205 4e100be 199->205 204->199 228 4e10319-4e1059a 227->228
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2972787784.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_4e10000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6c6bbc32685f916d535d8aa8b4646206dd21aed1fc1ae19b2a61b7bd66264c16
                                  • Instruction ID: 27650f3e334cfa7411d15c00f53aa54140a6ad497fc66d869a4714e896a0c650
                                  • Opcode Fuzzy Hash: 6c6bbc32685f916d535d8aa8b4646206dd21aed1fc1ae19b2a61b7bd66264c16
                                  • Instruction Fuzzy Hash: 90618BFB38C224BDF15285812B54AFB676DE7C6630730A826F407D6922F6982EC97131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 258 4e100d0-4e102e8 285 4e102f3-4e10302 GetCurrentHwProfileW 258->285 286 4e10319-4e1059a 285->286
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E102F7
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2972787784.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_4e10000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 7674f90bc2be8f9970bd9e5d26010e53b76eb7b162c29decf4891cbe1254ba4c
                                  • Instruction ID: 9ed25b9d8122a796c602b0d7d05ca9f27b20e0a0bb09410c7256d6cf7e26e32e
                                  • Opcode Fuzzy Hash: 7674f90bc2be8f9970bd9e5d26010e53b76eb7b162c29decf4891cbe1254ba4c
                                  • Instruction Fuzzy Hash: 615168FB78C224BDF15285812B54AFB676DE3CA730730A426F807D1922F2942EC96031

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 316 4e100d2-4e102e8 343 4e102f3-4e10302 GetCurrentHwProfileW 316->343 344 4e10319-4e1059a 343->344
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E102F7
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2972787784.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_4e10000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 669c9a4984110e301119de73429673a811d257c8346f0499eb047f16cc105041
                                  • Instruction ID: f333940b3ad6b03b8a8856a78d5606e335f6fdbd7fd051fa2972b37c0cfab129
                                  • Opcode Fuzzy Hash: 669c9a4984110e301119de73429673a811d257c8346f0499eb047f16cc105041
                                  • Instruction Fuzzy Hash: 0D5169FB78C224BDF15285812B54AFB676DE3CA730730A426F807D1922F2942EC97031

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 431 4e100eb-4e102e8 457 4e102f3-4e10302 GetCurrentHwProfileW 431->457 458 4e10319-4e1059a 457->458
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E102F7
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2972787784.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_4e10000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 451e58d67e607ed1c6fdd8a6fbe032984eb21c4bdd2fb0bdf70e5aeaea9aa15e
                                  • Instruction ID: d60033c73d6d9780912bc30990952b3fcfa6e97750c57618be2fdaa0bdcb079f
                                  • Opcode Fuzzy Hash: 451e58d67e607ed1c6fdd8a6fbe032984eb21c4bdd2fb0bdf70e5aeaea9aa15e
                                  • Instruction Fuzzy Hash: 6A5159FB78C224BDF15285812B54AFB676DE7CA730730A526F407D2926F2982EC96131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 374 4e100de-4e102e8 400 4e102f3-4e10302 GetCurrentHwProfileW 374->400 401 4e10319-4e1059a 400->401
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E102F7
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2972787784.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_4e10000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 98a1b86ffb8a67fb2ce7b2a153d0266b2f7786a7a2c0576a6e820c27b75aedfc
                                  • Instruction ID: 57224705611bad8f1216c285c27d72744c77dffd13838a636827b77961d431f9
                                  • Opcode Fuzzy Hash: 98a1b86ffb8a67fb2ce7b2a153d0266b2f7786a7a2c0576a6e820c27b75aedfc
                                  • Instruction Fuzzy Hash: 29517AFB78C224BDF15285852B54AFB676DE3CA730730A526F807D2926F2942EC97131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 488 4e10103-4e102e8 511 4e102f3-4e10302 GetCurrentHwProfileW 488->511 512 4e10319-4e1059a 511->512
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E102F7
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2972787784.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_4e10000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: c7050835af2d08163fe220f829b89ad7fc3050e8b232cd09ce4c48148b1e630c
                                  • Instruction ID: df3338bd6ceeb92a8c026be4d1a5c27367d9c4db347c717c44169783c8f53660
                                  • Opcode Fuzzy Hash: c7050835af2d08163fe220f829b89ad7fc3050e8b232cd09ce4c48148b1e630c
                                  • Instruction Fuzzy Hash: A051BFFB78C224BEF11285816B54AFB676DE7C6730730A427F807C2962F2942EC96031

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 542 4e100c0-4e100c5 call 4e100d2 545 4e100c7-4e100ce 542->545 546 4e1011d-4e102e8 542->546 545->546 569 4e102f3-4e10302 GetCurrentHwProfileW 546->569 570 4e10319-4e1059a 569->570
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2972787784.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_4e10000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: aee200f04afcfacec8680a726e9fb757a9c43f51bbe40dc42b0f4254e991f9f6
                                  • Instruction ID: b1bcba2b8d0879b3c5e308a7c0b7fcccb05b80fb137d085f70519d8ea4721061
                                  • Opcode Fuzzy Hash: aee200f04afcfacec8680a726e9fb757a9c43f51bbe40dc42b0f4254e991f9f6
                                  • Instruction Fuzzy Hash: 94518BFB78C224BDF15285812B54AFB676DE7C6730730A526F807D2926F6982EC97031

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 600 4e10182-4e1018b 601 4e10126-4e1017d 600->601 602 4e1018d-4e1018f 600->602 603 4e10191-4e102e8 601->603 602->603 624 4e102f3-4e10302 GetCurrentHwProfileW 603->624 625 4e10319-4e1059a 624->625
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2972787784.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_4e10000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 50b178ebb170dc3a1c47c83e048bb6f2619a9618c3ed7ec22c26f75dd0a1f855
                                  • Instruction ID: c43ee4dd63a5bfd6d41dd82240a64bd3f61daf42d24f8a4d8d0701b0e2e4146b
                                  • Opcode Fuzzy Hash: 50b178ebb170dc3a1c47c83e048bb6f2619a9618c3ed7ec22c26f75dd0a1f855
                                  • Instruction Fuzzy Hash: 45517AFB78D224BDF11285822B54AFB676DE7CA730730A527F407C6922F2942EC96131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 655 4e10142-4e10143 656 4e10191-4e102e8 655->656 657 4e10145-4e1017d 655->657 678 4e102f3-4e10302 GetCurrentHwProfileW 656->678 657->656 679 4e10319-4e1059a 678->679
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E102F7
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2972787784.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_4e10000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: a14fed2578ff73ed8ccb3c978e8e67f73f5eeb8962dac14d8ecc4bc5cc39e327
                                  • Instruction ID: 7871ea44235498ac2dc76b73c58c2000386e4171506e9ca5744d2e8c5fde011a
                                  • Opcode Fuzzy Hash: a14fed2578ff73ed8ccb3c978e8e67f73f5eeb8962dac14d8ecc4bc5cc39e327
                                  • Instruction Fuzzy Hash: 05517AFB78C224BDF11285812B54AFB276DE7CA730730A526F407D6966F6942EC97031

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 709 4e1015d-4e1015e 710 4e10160-4e10164 709->710 711 4e10165-4e102e8 709->711 710->711 730 4e102f3-4e10302 GetCurrentHwProfileW 711->730 731 4e10319-4e1059a 730->731
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E102F7
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2972787784.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_4e10000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: a9e1845203bad1145d27afc67b4e0f1c6656a95bcfa3dd19f287d5818bdeb9fc
                                  • Instruction ID: e52e4df47f4846b02139f6fd969a493da13dbecbeff7b4beacda051cc4bc62f5
                                  • Opcode Fuzzy Hash: a9e1845203bad1145d27afc67b4e0f1c6656a95bcfa3dd19f287d5818bdeb9fc
                                  • Instruction Fuzzy Hash: 8F519CFB78C224BDF11285812B54AFB276DE7CA730730A427F807C6962F2942EC96131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 761 4e10152-4e102e8 782 4e102f3-4e10302 GetCurrentHwProfileW 761->782 783 4e10319-4e1059a 782->783
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E102F7
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2972787784.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_4e10000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 872a5bb7350b9b674fb7eaa3596e8eb75731963038e292bbb97b1c2c70440d27
                                  • Instruction ID: cb8a2967977795898226ff56bc1dfcf89fd10aaba55f914bebf996a1e9709feb
                                  • Opcode Fuzzy Hash: 872a5bb7350b9b674fb7eaa3596e8eb75731963038e292bbb97b1c2c70440d27
                                  • Instruction Fuzzy Hash: 1E517BFB78C224BDF15285822B54AFB176DE7C6730730A426F407D1966F6942EC97031
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E102F7
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2972787784.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_4e10000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: d58bd1950469a43bcb6984c3babb9091c770d3795c58f98e7e292c112768da00
                                  • Instruction ID: 81cb9983bcf165b14e8d72ec7a26f801b2c4f79088a2e0d58cb69c096ad5575b
                                  • Opcode Fuzzy Hash: d58bd1950469a43bcb6984c3babb9091c770d3795c58f98e7e292c112768da00
                                  • Instruction Fuzzy Hash: 3E418BBB7CC124BEF15281812B54AFB276DE7CA730730A426F807D5966F6942EC9B131
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E102F7
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2972787784.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_4e10000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 3425cd349cab6a0bc7e35526796019afa5ab0deb53973775938e9ef9a3dc7df4
                                  • Instruction ID: beb6a315d74458f5e27b5bd750487223de7c74f9164d139bdbce96017f4b3e79
                                  • Opcode Fuzzy Hash: 3425cd349cab6a0bc7e35526796019afa5ab0deb53973775938e9ef9a3dc7df4
                                  • Instruction Fuzzy Hash: B1419CBB7CC125BEF11281412B54AFB276DE7CA730730A467F807C2962F6942AC9A131
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E102F7
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2972787784.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_4e10000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 92bec4a8790932cf30d992177552c9ecb662f3bec46d2ca905213b6b88f9aecb
                                  • Instruction ID: 25f83545562ccd78e5cc620eee9882de4764d644654ceaf2602f8aa78cd7209e
                                  • Opcode Fuzzy Hash: 92bec4a8790932cf30d992177552c9ecb662f3bec46d2ca905213b6b88f9aecb
                                  • Instruction Fuzzy Hash: 6041ACBB78C125BEF11281812B54AFB276DE7DA730330A467F407D6962F6942EC9A131
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E102F7
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2972787784.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_4e10000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: a5ce0cb78752c059e53d16b762151f692c9d39b329061c54809f3e6d34642c24
                                  • Instruction ID: 0dbea4378d591cfe07c1e00deca158271018296f5f80236084fbd9b78f8ded7a
                                  • Opcode Fuzzy Hash: a5ce0cb78752c059e53d16b762151f692c9d39b329061c54809f3e6d34642c24
                                  • Instruction Fuzzy Hash: C2416CBB78D225BDF11281412B64AFB176DE7CA730330A427F407D5962F6942AC96171
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E102F7
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2972787784.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_4e10000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 4365bc3257c9f0e01d0a24a585ae21b5197afd3141571bc10b0a2142ea4b4ae8
                                  • Instruction ID: af9073b423f29b7ac462dfb73fcedc1a25e26e62c18f7301b1aecc382fae65f7
                                  • Opcode Fuzzy Hash: 4365bc3257c9f0e01d0a24a585ae21b5197afd3141571bc10b0a2142ea4b4ae8
                                  • Instruction Fuzzy Hash: B74159FB78C125BEF15281812B54AFB276DE7CA730730A427F807D1966F6946EC9A031
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E102F7
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2972787784.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_4e10000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: f77200e5cddcd33f9774d8fd4694941fd1440b89183fb5d6e219d0b00ce9cd63
                                  • Instruction ID: 8b5740b71b906443ec6831e0378f9ccfa62f8b9c57586d74a12dc195c7f4db74
                                  • Opcode Fuzzy Hash: f77200e5cddcd33f9774d8fd4694941fd1440b89183fb5d6e219d0b00ce9cd63
                                  • Instruction Fuzzy Hash: 794188FB78C125BEF16281812B54AFB176DE7CA730730A427F803D5962F6942EC9A131
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E102F7
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2972787784.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_4e10000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 1ad8dc8a4405c718c0b98481b36610070897f69cd622bba15007c43f48371e4f
                                  • Instruction ID: 77c46a08bc9e200139667dcb814d62e9750302b5e784e9c086f0d0008e8e193b
                                  • Opcode Fuzzy Hash: 1ad8dc8a4405c718c0b98481b36610070897f69cd622bba15007c43f48371e4f
                                  • Instruction Fuzzy Hash: 8A4188BB78C124BEF15281422B54AFB176DE7DA730330A427F803D2962F6942EC9A131
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E102F7
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2972787784.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_4e10000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: ce979cd6e7ec88396967d18dd8e5ccf0abb9f0440c870c40cd91e2c0a5b9b6e3
                                  • Instruction ID: 942ab738311fb1162b5b46eac7be90659dc4efb4533b6704b90ebf0a1be03f8e
                                  • Opcode Fuzzy Hash: ce979cd6e7ec88396967d18dd8e5ccf0abb9f0440c870c40cd91e2c0a5b9b6e3
                                  • Instruction Fuzzy Hash: 28417CFB78C225BEF15281812B54AFB176DE7CA730330A427F803D6966F6942EC96131
                                  APIs
                                  • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0042990E
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2960668282.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, Offset: 003E0000, based on PE: true
                                  • Associated: 00000009.00000002.2960639491.00000000003E0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2960668282.0000000000565000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2960949617.000000000056A000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000056D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.00000000006F4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.00000000007D4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.0000000000814000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000081C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000082A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2962813085.000000000082B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2964301087.00000000009CB000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2964349504.00000000009CD000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_3e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: FileWrite
                                  • String ID:
                                  • API String ID: 3934441357-0
                                  • Opcode ID: 426f5bcca505643b634d6c75f5bcd01c36a796f9bcfc9b687adff8b5369fb866
                                  • Instruction ID: 07c072895464535d2565700ff311bbcf89ad355805c55a50dd4d6002a87abeac
                                  • Opcode Fuzzy Hash: 426f5bcca505643b634d6c75f5bcd01c36a796f9bcfc9b687adff8b5369fb866
                                  • Instruction Fuzzy Hash: 9161D7B1E04129BEDF11DFA8E840AEF7BB9AF49314F58014AE900A7302D739DD41CB69
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E102F7
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2972787784.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_4e10000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 3889c54a8e42021d57c981ad31cfcbc5e566a02db59401615b2438a2344ba3be
                                  • Instruction ID: 582a460b4cc9e08cf151fc4ee4168231c534cd4fa3e3dd91b594c4cf4361295b
                                  • Opcode Fuzzy Hash: 3889c54a8e42021d57c981ad31cfcbc5e566a02db59401615b2438a2344ba3be
                                  • Instruction Fuzzy Hash: 75316BFB78C224BEF11281422B64AFB1B6DE7DA730330A467F407D1962F6942EC96131
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E102F7
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2972787784.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_4e10000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: badf0006c82efd41452898b24120d3213629b437feaa37c64cd97ff8c15a29d3
                                  • Instruction ID: ea1e87891579365a4a6e6cd1b3d7e79e38fc2353de9806eec53c7f3ebaf782e7
                                  • Opcode Fuzzy Hash: badf0006c82efd41452898b24120d3213629b437feaa37c64cd97ff8c15a29d3
                                  • Instruction Fuzzy Hash: 493180FB78C124AEF11281416B64AFB176DE7CA730330A467F407D5966F6942EC96131
                                  APIs
                                  • FindCloseChangeNotification.KERNELBASE(00000000,00000000,?,?,00428CE6,00000000,?,0055A178,0000000C,00428DA2,?,?,?), ref: 00428E55
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2960668282.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, Offset: 003E0000, based on PE: true
                                  • Associated: 00000009.00000002.2960639491.00000000003E0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2960668282.0000000000565000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2960949617.000000000056A000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000056D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.00000000006F4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.00000000007D4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.0000000000814000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000081C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000082A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2962813085.000000000082B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2964301087.00000000009CB000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2964349504.00000000009CD000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_3e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: ChangeCloseFindNotification
                                  • String ID:
                                  • API String ID: 2591292051-0
                                  • Opcode ID: bdd6e7b4d17db7ab205fd2ff36d0e7de70277785690340f189acfb71b434147f
                                  • Instruction ID: fe661e84b01a9775aa8a946cf413190c4d8361a221f602fd489e10813ef4653f
                                  • Opcode Fuzzy Hash: bdd6e7b4d17db7ab205fd2ff36d0e7de70277785690340f189acfb71b434147f
                                  • Instruction Fuzzy Hash: A8116B3370313015D62522367846B7F27498F9273CFAA061FF918CB2C2DE6C9C81415D
                                  APIs
                                  • SetFilePointerEx.KERNELBASE(00000000,?,?,?,?,?,00000000,?,?,?,00422626,?,?,?,?,?), ref: 00422558
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2960668282.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, Offset: 003E0000, based on PE: true
                                  • Associated: 00000009.00000002.2960639491.00000000003E0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2960668282.0000000000565000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2960949617.000000000056A000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000056D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.00000000006F4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.00000000007D4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.0000000000814000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000081C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000082A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2962813085.000000000082B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2964301087.00000000009CB000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2964349504.00000000009CD000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_3e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: FilePointer
                                  • String ID:
                                  • API String ID: 973152223-0
                                  • Opcode ID: a33d3a796ab2693b5a47cc11c5a39c12157ca7cc49802967bdb5a26846f32b19
                                  • Instruction ID: 7a4265a9108302f734fe490bc3423e0c8a63fc739c8ccf158aef261cda05f29e
                                  • Opcode Fuzzy Hash: a33d3a796ab2693b5a47cc11c5a39c12157ca7cc49802967bdb5a26846f32b19
                                  • Instruction Fuzzy Hash: 00010432700624BFDF098F19EC15C9E3B59DB85324B64420AF8119B2A0E6B5ED81CBA4
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 003E331F
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2960668282.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, Offset: 003E0000, based on PE: true
                                  • Associated: 00000009.00000002.2960639491.00000000003E0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2960668282.0000000000565000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2960949617.000000000056A000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000056D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.00000000006F4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.00000000007D4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.0000000000814000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000081C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000082A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2962813085.000000000082B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2964301087.00000000009CB000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2964349504.00000000009CD000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_3e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID:
                                  • API String ID: 118556049-0
                                  • Opcode ID: 0fd589d96c9d07b1efa01aec19e4ff46bb0766daf2056f60d33bc81ca57302d3
                                  • Instruction ID: f8b98b88075d2d4b5673de16b9d3de2ea707dd53297a1e11f4916432b4237e84
                                  • Opcode Fuzzy Hash: 0fd589d96c9d07b1efa01aec19e4ff46bb0766daf2056f60d33bc81ca57302d3
                                  • Instruction Fuzzy Hash: B7F059361001109BCB246F62D4099EAB3E8DF243627500A7FE88CC7292EF2ADA80C7C0
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000008,?,00000001,?,00429FE0,00000001,00000364,00000001,00000006,000000FF,?,00414B3F,?,?,74D723A0,?), ref: 0042A69C
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2960668282.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, Offset: 003E0000, based on PE: true
                                  • Associated: 00000009.00000002.2960639491.00000000003E0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2960668282.0000000000565000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2960949617.000000000056A000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000056D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.00000000006F4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.00000000007D4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.0000000000814000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000081C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000082A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2962813085.000000000082B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2964301087.00000000009CB000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2964349504.00000000009CD000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_3e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 961134410aadd9023261633af3efdd71335e8b5201d597a460d13ff4cb0ec11f
                                  • Instruction ID: bba0306345b16a82201a1b9da46095f14fdedf695064dca0d2cddc4583974d13
                                  • Opcode Fuzzy Hash: 961134410aadd9023261633af3efdd71335e8b5201d597a460d13ff4cb0ec11f
                                  • Instruction Fuzzy Hash: D8F02431310131ABDB216A62BC15B2B334CAF41360F8C8157EC84EA280CB38D82045EE
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000000,00000001,?,?,00414B3F,?,?,74D723A0,?,?,003E3522,?,?), ref: 0042B0C6
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2960668282.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, Offset: 003E0000, based on PE: true
                                  • Associated: 00000009.00000002.2960639491.00000000003E0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2960668282.0000000000565000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2960949617.000000000056A000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000056D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.00000000006F4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.00000000007D4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.0000000000814000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000081C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000082A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2962813085.000000000082B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2964301087.00000000009CB000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2964349504.00000000009CD000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_3e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 4188188d59a9ea47c06a11e59bf05cf63632fbc880d500b6543e11181be31c7b
                                  • Instruction ID: b764fde551ee01fc5d23abb7fc7f5f74b96341de92a900efc748e28de272d5df
                                  • Opcode Fuzzy Hash: 4188188d59a9ea47c06a11e59bf05cf63632fbc880d500b6543e11181be31c7b
                                  • Instruction Fuzzy Hash: 6AE0E5313012315ADA232666BC01B5B7748DF413A0FD50217EC60E22D0CB6CCC0081EE
                                  APIs
                                  • RtlFreeHeap.NTDLL(00000000,00000000,?,00431B48,?,00000000,?,?,00431DE9,?,00000007,?,?,004322DD,?,?), ref: 0042B030
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2960668282.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, Offset: 003E0000, based on PE: true
                                  • Associated: 00000009.00000002.2960639491.00000000003E0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2960668282.0000000000565000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2960949617.000000000056A000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000056D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.00000000006F4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.00000000007D4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.0000000000814000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000081C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000082A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2962813085.000000000082B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2964301087.00000000009CB000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2964349504.00000000009CD000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_3e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: FreeHeap
                                  • String ID:
                                  • API String ID: 3298025750-0
                                  • Opcode ID: 9b565035e5bcc02477966bfe576f5bb1e39e0ee6e213240f4a2d014e063ab1b1
                                  • Instruction ID: 9d114694fcdd0351bfe53d5a0f7eb68e84bc9a5808f6fb6d62ee3ec84bdc6046
                                  • Opcode Fuzzy Hash: 9b565035e5bcc02477966bfe576f5bb1e39e0ee6e213240f4a2d014e063ab1b1
                                  • Instruction Fuzzy Hash: 2FE0CD31341234A6DB223B69BC04B9B3759FF55794FE4802AF718575A0CB7C8C5083D8
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2960668282.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, Offset: 003E0000, based on PE: true
                                  • Associated: 00000009.00000002.2960639491.00000000003E0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2960668282.0000000000565000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2960949617.000000000056A000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000056D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.00000000006F4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.00000000007D4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.0000000000814000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000081C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000082A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2962813085.000000000082B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2964301087.00000000009CB000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2964349504.00000000009CD000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_3e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 333d4b6d5425d6f9d03797ee82114c3711da98524c03317fffdb5ec62fb2b380
                                  • Instruction ID: cbfc449cf2442b255de6347451e99f1171a3ad121806e747b8cfe1b614e3fe9e
                                  • Opcode Fuzzy Hash: 333d4b6d5425d6f9d03797ee82114c3711da98524c03317fffdb5ec62fb2b380
                                  • Instruction Fuzzy Hash: F0022A71E402199BDF14CFA9D9C06EEBBB1FF48314F24826AD919E7340D735A981CB98
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 003FA09D
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 003FA0BF
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 003FA0E7
                                  • __Getctype.LIBCPMT ref: 003FA1C5
                                  • std::_Facet_Register.LIBCPMT ref: 003FA1F9
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 003FA223
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2960668282.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, Offset: 003E0000, based on PE: true
                                  • Associated: 00000009.00000002.2960639491.00000000003E0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2960668282.0000000000565000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2960949617.000000000056A000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000056D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.00000000006F4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.00000000007D4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.0000000000814000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000081C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000082A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2962813085.000000000082B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2964301087.00000000009CB000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2964349504.00000000009CD000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_3e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetctypeRegister
                                  • String ID: PD>$PG>$E>
                                  • API String ID: 1102183713-1378281483
                                  • Opcode ID: bb082c7adb6b919f928da73c6886a4ec8593b44cc1c70a810303630e8f89d76f
                                  • Instruction ID: c69e4e7eb98d8ab7040c3b558b6887cf82765893059b6bbc8365cfeac07f6639
                                  • Opcode Fuzzy Hash: bb082c7adb6b919f928da73c6886a4ec8593b44cc1c70a810303630e8f89d76f
                                  • Instruction Fuzzy Hash: AC51CBB0D00649CFCB12CF58D9417AEBBF4BB10314F14825DD849AB381DBB4AE88CB92
                                  APIs
                                  • _ValidateLocalCookies.LIBCMT ref: 00417307
                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 0041730F
                                  • _ValidateLocalCookies.LIBCMT ref: 00417398
                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 004173C3
                                  • _ValidateLocalCookies.LIBCMT ref: 00417418
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2960668282.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, Offset: 003E0000, based on PE: true
                                  • Associated: 00000009.00000002.2960639491.00000000003E0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2960668282.0000000000565000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2960949617.000000000056A000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000056D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.00000000006F4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.00000000007D4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.0000000000814000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000081C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000082A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2962813085.000000000082B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2964301087.00000000009CB000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2964349504.00000000009CD000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_3e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                  • String ID: `->$csm
                                  • API String ID: 1170836740-1728804828
                                  • Opcode ID: c043c6fa2de01198bbc9f8f779a7a4b850e7f1dba340b1e38ef72583e3d0986f
                                  • Instruction ID: 07c8c52506078abc0b61489e1dd418abcac4bafb1d930278b6d6b388f7018ef8
                                  • Opcode Fuzzy Hash: c043c6fa2de01198bbc9f8f779a7a4b850e7f1dba340b1e38ef72583e3d0986f
                                  • Instruction Fuzzy Hash: F941C634A042199BCF10DF59C885ADEBBB5AF04318F14815AFC149B392DB39DA81DB95
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 003FC45A
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 003FC47C
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 003FC4A4
                                  • std::_Facet_Register.LIBCPMT ref: 003FC59A
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 003FC5C4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2960668282.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, Offset: 003E0000, based on PE: true
                                  • Associated: 00000009.00000002.2960639491.00000000003E0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2960668282.0000000000565000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2960949617.000000000056A000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000056D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.00000000006F4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.00000000007D4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.0000000000814000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000081C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000082A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2962813085.000000000082B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2964301087.00000000009CB000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2964349504.00000000009CD000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_3e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                  • String ID: E>$PD>
                                  • API String ID: 459529453-97385129
                                  • Opcode ID: 7f6e8b4fe99ced46bc85cf5e4686343daf684767a82e194e9167e3f44a36bf6b
                                  • Instruction ID: 3492fd7c7d05926ade36f58f1ad398ba38e993e82426c6f0a77ece471c9ea8a9
                                  • Opcode Fuzzy Hash: 7f6e8b4fe99ced46bc85cf5e4686343daf684767a82e194e9167e3f44a36bf6b
                                  • Instruction Fuzzy Hash: 1A51DB70900248DBDB12CF99DA50BAEBBF4FB11314F24815DE845AB381D7B5AE09CB90
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2960668282.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, Offset: 003E0000, based on PE: true
                                  • Associated: 00000009.00000002.2960639491.00000000003E0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2960668282.0000000000565000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2960949617.000000000056A000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000056D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.00000000006F4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.00000000007D4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.0000000000814000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000081C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000082A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2962813085.000000000082B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2964301087.00000000009CB000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2964349504.00000000009CD000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_3e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: _strrchr
                                  • String ID:
                                  • API String ID: 3213747228-0
                                  • Opcode ID: 785c90e8ff89e0f1a3d98e37725974d6f6ea20f06d45e48120c47f1ca5a82ffe
                                  • Instruction ID: b72e321d3f6d5d67aeeb02919d18be7adf54166526bfe91b0a390d3b9fe8f9f4
                                  • Opcode Fuzzy Hash: 785c90e8ff89e0f1a3d98e37725974d6f6ea20f06d45e48120c47f1ca5a82ffe
                                  • Instruction Fuzzy Hash: F3B14532B003659FDB118E24DC82BEFBBA5EF59310F55416BE944AB382D7789801C7E9
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 00412730
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0041273B
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 004127A9
                                    • Part of subcall function 0041288C: std::locale::_Locimp::_Locimp.LIBCPMT ref: 004128A4
                                  • std::locale::_Setgloballocale.LIBCPMT ref: 00412756
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2960668282.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, Offset: 003E0000, based on PE: true
                                  • Associated: 00000009.00000002.2960639491.00000000003E0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2960668282.0000000000565000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2960949617.000000000056A000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000056D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.00000000006F4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.00000000007D4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.0000000000814000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000081C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000082A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2962813085.000000000082B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2964301087.00000000009CB000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2964349504.00000000009CD000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_3e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                                  • String ID: `->
                                  • API String ID: 677527491-1457345910
                                  • Opcode ID: 24b659bd5b82bbeca5c7cd7a25cfabecdc0d9f5a5629cf3319d47b4afc8bfd7c
                                  • Instruction ID: 3dec5aab2ac03ce3e4c2badf16e5a16401bf6cb26a9454d6adc833208091372b
                                  • Opcode Fuzzy Hash: 24b659bd5b82bbeca5c7cd7a25cfabecdc0d9f5a5629cf3319d47b4afc8bfd7c
                                  • Instruction Fuzzy Hash: 2001FC35A002109BCB0AAB24D8415BE7BB0BF94754B08050EE81197381CFB8AE96DB89
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 003E750C
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 003E7522
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2960668282.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, Offset: 003E0000, based on PE: true
                                  • Associated: 00000009.00000002.2960639491.00000000003E0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2960668282.0000000000565000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2960949617.000000000056A000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000056D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.00000000006F4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.00000000007D4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.0000000000814000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000081C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000082A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2962813085.000000000082B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2964301087.00000000009CB000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2964349504.00000000009CD000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_3e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: )>$[json.exception.
                                  • API String ID: 4194217158-421053594
                                  • Opcode ID: e2e65987962b18ba3fca9558b646c86db83a578528f70abfc285e14e87bf1a4f
                                  • Instruction ID: 6599f1a14fed2dffd2668f3631baacfcb63c0901fbfbd920b410a0fe4885ea4d
                                  • Opcode Fuzzy Hash: e2e65987962b18ba3fca9558b646c86db83a578528f70abfc285e14e87bf1a4f
                                  • Instruction Fuzzy Hash: 0C51DFB1D046889FDB01DFA8C905BAEBBF4EF15314F144259E854AB3C2E7B85A44CBE1
                                  APIs
                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 003E499F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2960668282.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, Offset: 003E0000, based on PE: true
                                  • Associated: 00000009.00000002.2960639491.00000000003E0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2960668282.0000000000565000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2960949617.000000000056A000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000056D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.00000000006F4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.00000000007D4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.0000000000814000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000081C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000082A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2962813085.000000000082B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2964301087.00000000009CB000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2964349504.00000000009CD000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_3e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: Ios_base_dtorstd::ios_base::_
                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                  • API String ID: 323602529-1866435925
                                  • Opcode ID: 022f27686ebb0bea830665f8ca77e2b8b728ef1fdf5e7cfb9f430f6a3de66036
                                  • Instruction ID: e0108155942b1716ecbb9a595a2b0022be2a256d6f5becc1a78b776f59b38de4
                                  • Opcode Fuzzy Hash: 022f27686ebb0bea830665f8ca77e2b8b728ef1fdf5e7cfb9f430f6a3de66036
                                  • Instruction Fuzzy Hash: CC119C72804694ABC711DE299C02BE637DCF709710F04472AFD549B2C2FB35A800C796
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 003E3819
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 003E38F0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2960668282.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, Offset: 003E0000, based on PE: true
                                  • Associated: 00000009.00000002.2960639491.00000000003E0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2960668282.0000000000565000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2960949617.000000000056A000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000056D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.00000000006F4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.00000000007D4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.0000000000814000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000081C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000082A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2962813085.000000000082B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2964301087.00000000009CB000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2964349504.00000000009CD000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_3e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: ___std_exception_copy___std_exception_destroy
                                  • String ID: )>
                                  • API String ID: 2970364248-1110121906
                                  • Opcode ID: d9f0258fa5bd954dc455b523ed24be46ef2f7ad09c5de7b37d6ca442460ee6bf
                                  • Instruction ID: 9e735ac2627b2f6f304f5a277481f85841809954c683130283dc3d6c93ec116a
                                  • Opcode Fuzzy Hash: d9f0258fa5bd954dc455b523ed24be46ef2f7ad09c5de7b37d6ca442460ee6bf
                                  • Instruction Fuzzy Hash: B06169B1C04258EFDB11CF98C849B9DFFB4FF19324F14825AE814AB282D7B55A44CBA1
                                  APIs
                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 003E499F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2960668282.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, Offset: 003E0000, based on PE: true
                                  • Associated: 00000009.00000002.2960639491.00000000003E0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2960668282.0000000000565000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2960949617.000000000056A000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000056D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.00000000006F4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.00000000007D4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.0000000000814000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000081C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000082A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2962813085.000000000082B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2964301087.00000000009CB000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2964349504.00000000009CD000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_3e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: Ios_base_dtorstd::ios_base::_
                                  • String ID: ios_base::badbit set$ios_base::failbit set
                                  • API String ID: 323602529-1240500531
                                  • Opcode ID: b54619c6dca8bf9560081ff4ad1d0735ae528e9700e772fc3a79760dd2ce834f
                                  • Instruction ID: 55db3f0f3a41efbec10717cf1fa0cb2fbc18634589536c41fc7c78681de11789
                                  • Opcode Fuzzy Hash: b54619c6dca8bf9560081ff4ad1d0735ae528e9700e772fc3a79760dd2ce834f
                                  • Instruction Fuzzy Hash: FB4123B1C00298ABCB05DF69D845BAEBBB8FB09710F14835DF454AB2C2D7756A00CBA1
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 003E4061
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 003E40C4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2960668282.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, Offset: 003E0000, based on PE: true
                                  • Associated: 00000009.00000002.2960639491.00000000003E0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2960668282.0000000000565000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2960949617.000000000056A000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000056D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.00000000006F4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.00000000007D4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.0000000000814000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000081C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000082A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2962813085.000000000082B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2964301087.00000000009CB000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2964349504.00000000009CD000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_3e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                  • String ID: bad locale name
                                  • API String ID: 3988782225-1405518554
                                  • Opcode ID: 72ac13644fce9f1e7c2e17a66e90edf1d3fe0d9c7e3650a2b2b324a6ce242b57
                                  • Instruction ID: a189d638d45b9a71b0debd529c327e43c9e462032541aa667d8b6f46390d2de3
                                  • Opcode Fuzzy Hash: 72ac13644fce9f1e7c2e17a66e90edf1d3fe0d9c7e3650a2b2b324a6ce242b57
                                  • Instruction Fuzzy Hash: 7D110370805B84EED721CF69C50478BBFF0AF15714F10868DD09597B82D3B96A04C791
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 003F65C9
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 003F65FC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2960668282.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, Offset: 003E0000, based on PE: true
                                  • Associated: 00000009.00000002.2960639491.00000000003E0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2960668282.0000000000565000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2960949617.000000000056A000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000056D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.00000000006F4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.00000000007D4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.0000000000814000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000081C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000082A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2962813085.000000000082B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2964301087.00000000009CB000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2964349504.00000000009CD000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_3e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: )>
                                  • API String ID: 2659868963-1110121906
                                  • Opcode ID: 8cf3c359dce0db1a9b4cc3a92e756038ac4fa383c77791c670c42fec0b9abf73
                                  • Instruction ID: a15d27ecf778d78b18a7bcead0eaf6feeb653572dd4362e5035b282136e9ccb8
                                  • Opcode Fuzzy Hash: 8cf3c359dce0db1a9b4cc3a92e756038ac4fa383c77791c670c42fec0b9abf73
                                  • Instruction Fuzzy Hash: B11130B5904748EBCB11DF99D980B86FBF8FF09724F10876AF81497641E774A5408BA0
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 003E7A5C
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 003E7A72
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2960668282.00000000003E1000.00000040.00000001.01000000.00000006.sdmp, Offset: 003E0000, based on PE: true
                                  • Associated: 00000009.00000002.2960639491.00000000003E0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2960668282.0000000000565000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2960949617.000000000056A000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000056D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.00000000006F4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.00000000007D4000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.0000000000814000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000081C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2961012549.000000000082A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2962813085.000000000082B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2964301087.00000000009CB000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000009.00000002.2964349504.00000000009CD000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_3e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: )>
                                  • API String ID: 4194217158-1110121906
                                  • Opcode ID: 6d5944d71b9cbe39469e1dd18e5ad17861c5d33586b31f30fb978a6eea7596a6
                                  • Instruction ID: 6a645197ac80297d8d2e281e4e9c9141b3013f91c5cdd7d51eb5076eaa305aca
                                  • Opcode Fuzzy Hash: 6d5944d71b9cbe39469e1dd18e5ad17861c5d33586b31f30fb978a6eea7596a6
                                  • Instruction Fuzzy Hash: 99F06DB1804748EFC710DF98D90178DBBF8FB06729F50066AE824A3780D3B566048BA1