Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
installer.exe

Overview

General Information

Sample name:installer.exe
Analysis ID:1464451
MD5:a0e213177ee87cbb5ec32bef195bbfa9
SHA1:6265b138b96d83b070ce14cc16e528bdf68aa160
SHA256:141be7789497012b7911cabb1307e25e19f747e2e8fb5375f9cddff7e5f28265
Tags:exe
Infos:

Detection

RisePro Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected RisePro Stealer
AI detected suspicious sample
Connects to many ports of the same IP (likely port scanning)
Found stalling execution ending in API Sleep call
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
Potentially malicious time measurement code found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Uses schtasks.exe or at.exe to add and modify task schedules
Checks for debuggers (devices)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • installer.exe (PID: 4868 cmdline: "C:\Users\user\Desktop\installer.exe" MD5: A0E213177EE87CBB5EC32BEF195BBFA9)
    • schtasks.exe (PID: 2788 cmdline: schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 1664 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 2912 cmdline: schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 4156 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • MPGPH131.exe (PID: 3896 cmdline: C:\ProgramData\MPGPH131\MPGPH131.exe MD5: A0E213177EE87CBB5EC32BEF195BBFA9)
  • MPGPH131.exe (PID: 5040 cmdline: C:\ProgramData\MPGPH131\MPGPH131.exe MD5: A0E213177EE87CBB5EC32BEF195BBFA9)
  • RageMP131.exe (PID: 4828 cmdline: "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe" MD5: A0E213177EE87CBB5EC32BEF195BBFA9)
  • RageMP131.exe (PID: 6108 cmdline: "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe" MD5: A0E213177EE87CBB5EC32BEF195BBFA9)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: installer.exe PID: 4868JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
    Process Memory Space: MPGPH131.exe PID: 3896JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
      Process Memory Space: MPGPH131.exe PID: 5040JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
        Process Memory Space: RageMP131.exe PID: 4828JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
          Process Memory Space: RageMP131.exe PID: 6108JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security

            System Summary

            barindex
            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\installer.exe, ProcessId: 4868, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RageMP131
            Timestamp:06/28/24-21:10:01.833498
            SID:2049060
            Source Port:49712
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeReversingLabs: Detection: 68%
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeReversingLabs: Detection: 68%
            Source: installer.exeReversingLabs: Detection: 68%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeJoe Sandbox ML: detected
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeJoe Sandbox ML: detected
            Source: installer.exeJoe Sandbox ML: detected
            Source: installer.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE

            Networking

            barindex
            Source: TrafficSnort IDS: 2049060 ET TROJAN RisePro TCP Heartbeat Packet 192.168.2.6:49712 -> 77.91.77.66:58709
            Source: global trafficTCP traffic: 77.91.77.66 ports 0,5,7,8,58709,9
            Source: global trafficTCP traffic: 192.168.2.6:49712 -> 77.91.77.66:58709
            Source: Joe Sandbox ViewIP Address: 77.91.77.66 77.91.77.66
            Source: Joe Sandbox ViewASN Name: FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRU FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRU
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: C:\Users\user\Desktop\installer.exeCode function: 0_2_00999280 recv,WSASend,0_2_00999280
            Source: installer.exe, 00000000.00000003.2124792716.0000000005300000.00000004.00001000.00020000.00000000.sdmp, installer.exe, 00000000.00000002.3353671863.0000000000991000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3353733620.0000000000141000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000006.00000003.2190833961.0000000005260000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3353611302.0000000000141000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000007.00000003.2191242486.0000000004A40000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000002.3363611949.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 00000008.00000003.2258761527.0000000004B90000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3363481001.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000C.00000003.2342289255.0000000005080000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.winimage.com/zLibDll
            Source: RageMP131.exeString found in binary or memory: https://ipinfo.io/
            Source: installer.exe, 00000000.00000003.2124792716.0000000005300000.00000004.00001000.00020000.00000000.sdmp, installer.exe, 00000000.00000002.3353671863.0000000000991000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3353733620.0000000000141000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000006.00000003.2190833961.0000000005260000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3353611302.0000000000141000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000007.00000003.2191242486.0000000004A40000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000002.3363611949.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 00000008.00000003.2258761527.0000000004B90000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3363481001.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000C.00000003.2342289255.0000000005080000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
            Source: installer.exe, 00000000.00000002.3366357434.00000000013CE000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.3366350121.000000000160E000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3366635395.0000000000C2B000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000002.3354481282.000000000089E000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3354916992.0000000000D3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORT
            Source: RageMP131.exe, 00000008.00000002.3354481282.000000000089E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORTS
            Source: RageMP131.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address

            System Summary

            barindex
            Source: installer.exeStatic PE information: section name:
            Source: installer.exeStatic PE information: section name: .idata
            Source: installer.exeStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name: .idata
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name: .idata
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: C:\Users\user\Desktop\installer.exeCode function: 0_2_009C71A00_2_009C71A0
            Source: C:\Users\user\Desktop\installer.exeCode function: 0_2_009CA9280_2_009CA928
            Source: C:\Users\user\Desktop\installer.exeCode function: 0_2_009CC9600_2_009CC960
            Source: C:\Users\user\Desktop\installer.exeCode function: 0_2_009DDA860_2_009DDA86
            Source: C:\Users\user\Desktop\installer.exeCode function: 0_2_009E8BB00_2_009E8BB0
            Source: C:\Users\user\Desktop\installer.exeCode function: 0_2_009D036F0_2_009D036F
            Source: C:\Users\user\Desktop\installer.exeCode function: 0_2_00A7FC400_2_00A7FC40
            Source: C:\Users\user\Desktop\installer.exeCode function: 0_2_009BF5800_2_009BF580
            Source: C:\Users\user\Desktop\installer.exeCode function: 0_2_009E26100_2_009E2610
            Source: C:\Users\user\Desktop\installer.exeCode function: 0_2_009E47BF0_2_009E47BF
            Source: C:\Users\user\Desktop\installer.exeCode function: 0_2_00A82FD00_2_00A82FD0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_0017A9286_2_0017A928
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_0017C9606_2_0017C960
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_001771A06_2_001771A0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_0018DA866_2_0018DA86
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_0018036F6_2_0018036F
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00198BB06_2_00198BB0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_0022FC406_2_0022FC40
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_0016F5806_2_0016F580
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_001947BF6_2_001947BF
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00232FD06_2_00232FD0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_0017A9287_2_0017A928
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_0017C9607_2_0017C960
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_001771A07_2_001771A0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_0018DA867_2_0018DA86
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_0018036F7_2_0018036F
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_00198BB07_2_00198BB0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_0022FC407_2_0022FC40
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_0016F5807_2_0016F580
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_001947BF7_2_001947BF
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_00232FD07_2_00232FD0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_00F871A08_2_00F871A0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_00F8C9608_2_00F8C960
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_00F8A9288_2_00F8A928
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_00F9DA868_2_00F9DA86
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_00FA8BB08_2_00FA8BB0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_00F9036F8_2_00F9036F
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_0103FC408_2_0103FC40
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_00F7F5808_2_00F7F580
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_01042FD08_2_01042FD0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_00FA26108_2_00FA2610
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_00FA47BF8_2_00FA47BF
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_00F871A012_2_00F871A0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_00F8C96012_2_00F8C960
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_00F8A92812_2_00F8A928
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_00F9DA8612_2_00F9DA86
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_00FA8BB012_2_00FA8BB0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_00F9036F12_2_00F9036F
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_0103FC4012_2_0103FC40
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_00F7F58012_2_00F7F580
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_01042FD012_2_01042FD0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_00FA261012_2_00FA2610
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_00FA47BF12_2_00FA47BF
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: String function: 00174380 appears 48 times
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: String function: 00F84380 appears 48 times
            Source: installer.exe, 00000000.00000002.3355103090.0000000000B1A000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamedotnet.exe6 vs installer.exe
            Source: installer.exeBinary or memory string: OriginalFilenamedotnet.exe6 vs installer.exe
            Source: installer.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: installer.exeStatic PE information: Section: ZLIB complexity 0.9983676437043796
            Source: installer.exeStatic PE information: Section: iolmakfn ZLIB complexity 0.9944186223712282
            Source: RageMP131.exe.0.drStatic PE information: Section: ZLIB complexity 0.9983676437043796
            Source: RageMP131.exe.0.drStatic PE information: Section: iolmakfn ZLIB complexity 0.9944186223712282
            Source: MPGPH131.exe.0.drStatic PE information: Section: ZLIB complexity 0.9983676437043796
            Source: MPGPH131.exe.0.drStatic PE information: Section: iolmakfn ZLIB complexity 0.9944186223712282
            Source: classification engineClassification label: mal100.troj.evad.winEXE@11/5@0/1
            Source: C:\Users\user\Desktop\installer.exeFile created: C:\Users\user\AppData\Local\RageMP131Jump to behavior
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1664:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4156:120:WilError_03
            Source: C:\Users\user\Desktop\installer.exeFile created: C:\Users\user\AppData\Local\Temp\rage131MP.tmpJump to behavior
            Source: C:\Users\user\Desktop\installer.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: installer.exe, 00000000.00000003.2124792716.0000000005300000.00000004.00001000.00020000.00000000.sdmp, installer.exe, 00000000.00000002.3353671863.0000000000991000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3353733620.0000000000141000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000006.00000003.2190833961.0000000005260000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3353611302.0000000000141000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000007.00000003.2191242486.0000000004A40000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000002.3363611949.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 00000008.00000003.2258761527.0000000004B90000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3363481001.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000C.00000003.2342289255.0000000005080000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
            Source: installer.exe, 00000000.00000003.2124792716.0000000005300000.00000004.00001000.00020000.00000000.sdmp, installer.exe, 00000000.00000002.3353671863.0000000000991000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3353733620.0000000000141000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000006.00000003.2190833961.0000000005260000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3353611302.0000000000141000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000007.00000003.2191242486.0000000004A40000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000002.3363611949.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 00000008.00000003.2258761527.0000000004B90000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3363481001.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000C.00000003.2342289255.0000000005080000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = sqlite_rename_table(sql, %Q), tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
            Source: installer.exeReversingLabs: Detection: 68%
            Source: installer.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: installer.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
            Source: MPGPH131.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: MPGPH131.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
            Source: MPGPH131.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: MPGPH131.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
            Source: RageMP131.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: RageMP131.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
            Source: RageMP131.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: RageMP131.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
            Source: C:\Users\user\Desktop\installer.exeFile read: C:\Users\user\Desktop\installer.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\installer.exe "C:\Users\user\Desktop\installer.exe"
            Source: C:\Users\user\Desktop\installer.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\installer.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\ProgramData\MPGPH131\MPGPH131.exe C:\ProgramData\MPGPH131\MPGPH131.exe
            Source: unknownProcess created: C:\ProgramData\MPGPH131\MPGPH131.exe C:\ProgramData\MPGPH131\MPGPH131.exe
            Source: unknownProcess created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
            Source: unknownProcess created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
            Source: C:\Users\user\Desktop\installer.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHESTJump to behavior
            Source: C:\Users\user\Desktop\installer.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHESTJump to behavior
            Source: C:\Users\user\Desktop\installer.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\installer.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\installer.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\Users\user\Desktop\installer.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\installer.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\installer.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\Users\user\Desktop\installer.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\Users\user\Desktop\installer.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\Users\user\Desktop\installer.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\installer.exeSection loaded: d3d10warp.dllJump to behavior
            Source: C:\Users\user\Desktop\installer.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\installer.exeSection loaded: dxcore.dllJump to behavior
            Source: C:\Users\user\Desktop\installer.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\installer.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\installer.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\installer.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\installer.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\installer.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winmm.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: d3d10warp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: dxcore.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winmm.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: d3d10warp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: dxcore.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: d3d10warp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: dxcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: d3d10warp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: dxcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: devobj.dllJump to behavior
            Source: installer.exeStatic file information: File size 2402816 > 1048576
            Source: installer.exeStatic PE information: Raw size of iolmakfn is bigger than: 0x100000 < 0x19a200

            Data Obfuscation

            barindex
            Source: C:\Users\user\Desktop\installer.exeUnpacked PE file: 0.2.installer.exe.990000.0.unpack :EW;.rsrc:W;.idata :W; :EW;iolmakfn:EW;rrgdmorv:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;iolmakfn:EW;rrgdmorv:EW;.taggant:EW;
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeUnpacked PE file: 6.2.MPGPH131.exe.140000.0.unpack :EW;.rsrc:W;.idata :W; :EW;iolmakfn:EW;rrgdmorv:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;iolmakfn:EW;rrgdmorv:EW;.taggant:EW;
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeUnpacked PE file: 7.2.MPGPH131.exe.140000.0.unpack :EW;.rsrc:W;.idata :W; :EW;iolmakfn:EW;rrgdmorv:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;iolmakfn:EW;rrgdmorv:EW;.taggant:EW;
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeUnpacked PE file: 8.2.RageMP131.exe.f50000.0.unpack :EW;.rsrc:W;.idata :W; :EW;iolmakfn:EW;rrgdmorv:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;iolmakfn:EW;rrgdmorv:EW;.taggant:EW;
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeUnpacked PE file: 12.2.RageMP131.exe.f50000.0.unpack :EW;.rsrc:W;.idata :W; :EW;iolmakfn:EW;rrgdmorv:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;iolmakfn:EW;rrgdmorv:EW;.taggant:EW;
            Source: initial sampleStatic PE information: section where entry point is pointing to: .taggant
            Source: RageMP131.exe.0.drStatic PE information: real checksum: 0x2578f2 should be: 0x25a30a
            Source: installer.exeStatic PE information: real checksum: 0x2578f2 should be: 0x25a30a
            Source: MPGPH131.exe.0.drStatic PE information: real checksum: 0x2578f2 should be: 0x25a30a
            Source: installer.exeStatic PE information: section name:
            Source: installer.exeStatic PE information: section name: .idata
            Source: installer.exeStatic PE information: section name:
            Source: installer.exeStatic PE information: section name: iolmakfn
            Source: installer.exeStatic PE information: section name: rrgdmorv
            Source: installer.exeStatic PE information: section name: .taggant
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name: .idata
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name: iolmakfn
            Source: RageMP131.exe.0.drStatic PE information: section name: rrgdmorv
            Source: RageMP131.exe.0.drStatic PE information: section name: .taggant
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name: .idata
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name: iolmakfn
            Source: MPGPH131.exe.0.drStatic PE information: section name: rrgdmorv
            Source: MPGPH131.exe.0.drStatic PE information: section name: .taggant
            Source: C:\Users\user\Desktop\installer.exeCode function: 0_2_009C3F59 push ecx; ret 0_2_009C3F6C
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00173F59 push ecx; ret 6_2_00173F6C
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_00173F59 push ecx; ret 7_2_00173F6C
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_00F83F59 push ecx; ret 8_2_00F83F6C
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_00F83F59 push ecx; ret 12_2_00F83F6C
            Source: installer.exeStatic PE information: section name: entropy: 7.983217514944371
            Source: installer.exeStatic PE information: section name: iolmakfn entropy: 7.952587985100504
            Source: RageMP131.exe.0.drStatic PE information: section name: entropy: 7.983217514944371
            Source: RageMP131.exe.0.drStatic PE information: section name: iolmakfn entropy: 7.952587985100504
            Source: MPGPH131.exe.0.drStatic PE information: section name: entropy: 7.983217514944371
            Source: MPGPH131.exe.0.drStatic PE information: section name: iolmakfn entropy: 7.952587985100504
            Source: C:\Users\user\Desktop\installer.exeFile created: C:\ProgramData\MPGPH131\MPGPH131.exeJump to dropped file
            Source: C:\Users\user\Desktop\installer.exeFile created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeJump to dropped file
            Source: C:\Users\user\Desktop\installer.exeFile created: C:\ProgramData\MPGPH131\MPGPH131.exeJump to dropped file

            Boot Survival

            barindex
            Source: C:\Users\user\Desktop\installer.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\Users\user\Desktop\installer.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\Desktop\installer.exeWindow searched: window name: RegmonClassJump to behavior
            Source: C:\Users\user\Desktop\installer.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\Users\user\Desktop\installer.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\Desktop\installer.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\Users\user\Desktop\installer.exeWindow searched: window name: FilemonclassJump to behavior
            Source: C:\Users\user\Desktop\installer.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\Desktop\installer.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: RegmonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonclassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: RegmonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonclassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: RegmonClassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: FilemonclassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: RegmonClassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: FilemonclassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\Users\user\Desktop\installer.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
            Source: C:\Users\user\Desktop\installer.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RageMP131Jump to behavior
            Source: C:\Users\user\Desktop\installer.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RageMP131Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\installer.exeStalling execution: Execution stalls by calling Sleepgraph_0-16331
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeStalling execution: Execution stalls by calling Sleep
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeStalling execution: Execution stalls by calling Sleepgraph_6-16105
            Source: C:\Users\user\Desktop\installer.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\Users\user\Desktop\installer.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: C8A71F second address: C8A729 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: C979C5 second address: C979DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FD228B1E7D1h 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: C979DD second address: C979E5 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: C979E5 second address: C979EF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jo 00007FD228B1E7C6h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: C97B78 second address: C97B7D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: C97B7D second address: C97B89 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007FD228B1E7C6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: C97E3E second address: C97E58 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 jg 00007FD22947DF7Eh 0x0000000d push esi 0x0000000e pop esi 0x0000000f jl 00007FD22947DF76h 0x00000015 push eax 0x00000016 push edx 0x00000017 push esi 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: C97E58 second address: C97E5D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: C97E5D second address: C97E73 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD22947DF7Bh 0x00000007 pushad 0x00000008 ja 00007FD22947DF76h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: C97FA0 second address: C97FBB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 jmp 00007FD228B1E7D5h 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: C98290 second address: C982B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 jc 00007FD22947DF7Ah 0x0000000b pushad 0x0000000c popad 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007FD22947DF80h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: C982B3 second address: C982B7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: C9A36A second address: C9A36F instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: C9A45E second address: C9A464 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: C9A464 second address: C9A4E6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b push 00000000h 0x0000000d xor dword ptr [ebp+122D18D3h], edx 0x00000013 movzx esi, di 0x00000016 push CE59CEDCh 0x0000001b push esi 0x0000001c jmp 00007FD22947DF81h 0x00000021 pop esi 0x00000022 add dword ptr [esp], 31A631A4h 0x00000029 push 00000000h 0x0000002b push edx 0x0000002c call 00007FD22947DF78h 0x00000031 pop edx 0x00000032 mov dword ptr [esp+04h], edx 0x00000036 add dword ptr [esp+04h], 00000017h 0x0000003e inc edx 0x0000003f push edx 0x00000040 ret 0x00000041 pop edx 0x00000042 ret 0x00000043 pushad 0x00000044 xor dx, 3CF9h 0x00000049 sub dword ptr [ebp+122D1CF1h], esi 0x0000004f popad 0x00000050 push 00000003h 0x00000052 or ch, FFFFFFCBh 0x00000055 sub dword ptr [ebp+122D1D1Eh], edx 0x0000005b push 00000000h 0x0000005d mov ecx, ebx 0x0000005f push 00000003h 0x00000061 mov dword ptr [ebp+122D1F33h], ecx 0x00000067 push 7A4FCE02h 0x0000006c pushad 0x0000006d push eax 0x0000006e push edx 0x0000006f pushad 0x00000070 popad 0x00000071 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: C9A4E6 second address: C9A4EA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: C9A4EA second address: C9A4F4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: C9A4F4 second address: C9A4F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: C9A708 second address: C9A71D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pop ecx 0x00000006 push eax 0x00000007 jbe 00007FD22947DF82h 0x0000000d jns 00007FD22947DF7Ch 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CABBF5 second address: CABBFB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CABBFB second address: CABC19 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD22947DF7Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f jl 00007FD22947DF76h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CABC19 second address: CABC1E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: C88CBB second address: C88CE7 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007FD22947DF82h 0x0000000a pop ecx 0x0000000b pop edx 0x0000000c pop eax 0x0000000d pushad 0x0000000e jno 00007FD22947DF7Eh 0x00000014 pushad 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CB8353 second address: CB8369 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD228B1E7D2h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CB8369 second address: CB837D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FD22947DF7Bh 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CB837D second address: CB8385 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CB8385 second address: CB8395 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 pushad 0x00000008 js 00007FD22947DF76h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CB8395 second address: CB83A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a je 00007FD228B1E7C6h 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CB83A5 second address: CB83CB instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 jmp 00007FD22947DF7Fh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jmp 00007FD22947DF81h 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CB83CB second address: CB83F1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD228B1E7D6h 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FD228B1E7CCh 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CB83F1 second address: CB83F5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CB867D second address: CB86A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FD228B1E7D9h 0x00000010 jnc 00007FD228B1E7C6h 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CB86A7 second address: CB86B1 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FD22947DF76h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CB884D second address: CB8858 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jnl 00007FD228B1E7C6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CB8858 second address: CB8865 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pushad 0x00000008 push ecx 0x00000009 push edx 0x0000000a pop edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CB8865 second address: CB8874 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 jnp 00007FD228B1E7C6h 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CB8A00 second address: CB8A04 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CB9328 second address: CB932E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CB932E second address: CB9337 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CADF00 second address: CADF1B instructions: 0x00000000 rdtsc 0x00000002 jng 00007FD228B1E7C6h 0x00000008 jmp 00007FD228B1E7D1h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CB94A8 second address: CB94DE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 jmp 00007FD22947DF7Dh 0x0000000c jp 00007FD22947DF7Eh 0x00000012 popad 0x00000013 push edx 0x00000014 push edx 0x00000015 pushad 0x00000016 popad 0x00000017 jo 00007FD22947DF76h 0x0000001d pop edx 0x0000001e jo 00007FD22947DF89h 0x00000024 push eax 0x00000025 push edx 0x00000026 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CB9C11 second address: CB9C1B instructions: 0x00000000 rdtsc 0x00000002 jns 00007FD228B1E7C6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CB9D6F second address: CB9D8F instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 jg 00007FD22947DF76h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop ebx 0x0000000d pushad 0x0000000e push ecx 0x0000000f jnc 00007FD22947DF76h 0x00000015 pushad 0x00000016 popad 0x00000017 pop ecx 0x00000018 push eax 0x00000019 push edx 0x0000001a jng 00007FD22947DF76h 0x00000020 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CB9D8F second address: CB9D9A instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push edi 0x00000008 pop edi 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CB9D9A second address: CB9DA0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CB9EDA second address: CB9EDE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CB9EDE second address: CB9EEA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007FD22947DF76h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CBD1AE second address: CBD1B8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jng 00007FD228B1E7C6h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CBD1B8 second address: CBD1C6 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push esi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CBD1C6 second address: CBD1CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CBD333 second address: CBD33D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edi 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CBD33D second address: CBD343 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CBD343 second address: CBD399 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edi 0x00000006 mov eax, dword ptr [esp+04h] 0x0000000a pushad 0x0000000b jp 00007FD22947DF86h 0x00000011 jg 00007FD22947DF78h 0x00000017 push edx 0x00000018 pop edx 0x00000019 popad 0x0000001a mov eax, dword ptr [eax] 0x0000001c jp 00007FD22947DF90h 0x00000022 mov dword ptr [esp+04h], eax 0x00000026 push eax 0x00000027 push edx 0x00000028 push esi 0x00000029 pushad 0x0000002a popad 0x0000002b pop esi 0x0000002c rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CBD399 second address: CBD3A3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jne 00007FD228B1E7C6h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CBD3A3 second address: CBD3A7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CC0FC0 second address: CC0FC6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CC0FC6 second address: CC0FD4 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FD22947DF76h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CC0FD4 second address: CC0FDA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CC0FDA second address: CC0FFE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FD22947DF84h 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f jns 00007FD22947DF76h 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CC0FFE second address: CC1002 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: C8F712 second address: C8F717 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CC520E second address: CC5212 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CC5212 second address: CC5218 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CC5218 second address: CC5249 instructions: 0x00000000 rdtsc 0x00000002 js 00007FD228B1E7DDh 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FD228B1E7D0h 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CC469B second address: CC46B1 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FD22947DF7Eh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push ebx 0x0000000b push ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CC4814 second address: CC4822 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jg 00007FD228B1E7CCh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CC4822 second address: CC4826 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CC4826 second address: CC4836 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FD228B1E7CAh 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CC4ACE second address: CC4AD6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CC4F17 second address: CC4F1D instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CC4F1D second address: CC4F37 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnc 00007FD22947DF76h 0x00000009 jnl 00007FD22947DF76h 0x0000000f jg 00007FD22947DF76h 0x00000015 popad 0x00000016 push eax 0x00000017 push edx 0x00000018 pushad 0x00000019 popad 0x0000001a rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CC7F03 second address: CC7F22 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FD228B1E7D9h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CC7F22 second address: CC7F26 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CC87CF second address: CC87D3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CC8B2E second address: CC8B33 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CC8C31 second address: CC8C56 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jo 00007FD228B1E7C6h 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f ja 00007FD228B1E7D6h 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CC92B6 second address: CC92D1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pop ecx 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FD22947DF80h 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CC92D1 second address: CC92D7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CC92D7 second address: CC92DC instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CC92DC second address: CC9308 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 xchg eax, ebx 0x00000008 xor di, 6E00h 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jnc 00007FD228B1E7DCh 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CC93BC second address: CC93D7 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FD22947DF7Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f ja 00007FD22947DF76h 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CC93D7 second address: CC93E1 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FD228B1E7C6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CC970D second address: CC9721 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 js 00007FD22947DF76h 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CC9F49 second address: CC9F4D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CC9F4D second address: CC9F56 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CC9F56 second address: CC9FC6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 popad 0x00000008 nop 0x00000009 or di, B100h 0x0000000e push 00000000h 0x00000010 jmp 00007FD228B1E7D9h 0x00000015 push 00000000h 0x00000017 push ebx 0x00000018 movzx esi, bx 0x0000001b pop edi 0x0000001c xchg eax, ebx 0x0000001d pushad 0x0000001e jmp 00007FD228B1E7D4h 0x00000023 jmp 00007FD228B1E7D0h 0x00000028 popad 0x00000029 push eax 0x0000002a push eax 0x0000002b push edx 0x0000002c jmp 00007FD228B1E7D6h 0x00000031 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CC9FC6 second address: CC9FCB instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CCB929 second address: CCB92D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CCB92D second address: CCB971 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD22947DF84h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push ebx 0x0000000a jmp 00007FD22947DF83h 0x0000000f jmp 00007FD22947DF84h 0x00000014 pop ebx 0x00000015 pushad 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CCE4D3 second address: CCE4F0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD228B1E7D9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CCE2D0 second address: CCE2DA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 push esi 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CD0EF9 second address: CD0EFF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CD3A29 second address: CD3A33 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FD22947DF7Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CD8EBE second address: CD8EC4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CDAEBD second address: CDAEC1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CD805F second address: CD8072 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FD228B1E7CFh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CD7039 second address: CD703F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CDBD35 second address: CDBD7A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pop ecx 0x00000006 mov dword ptr [esp], eax 0x00000009 mov dword ptr [ebp+124487C1h], edi 0x0000000f push 00000000h 0x00000011 push edi 0x00000012 movsx edi, di 0x00000015 pop ebx 0x00000016 mov edi, 136CC90Eh 0x0000001b push 00000000h 0x0000001d push 00000000h 0x0000001f push ebx 0x00000020 call 00007FD228B1E7C8h 0x00000025 pop ebx 0x00000026 mov dword ptr [esp+04h], ebx 0x0000002a add dword ptr [esp+04h], 00000019h 0x00000032 inc ebx 0x00000033 push ebx 0x00000034 ret 0x00000035 pop ebx 0x00000036 ret 0x00000037 xchg eax, esi 0x00000038 push eax 0x00000039 push edx 0x0000003a push eax 0x0000003b push edx 0x0000003c pushad 0x0000003d popad 0x0000003e rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CDBD7A second address: CDBD84 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FD22947DF76h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CDBD84 second address: CDBD9F instructions: 0x00000000 rdtsc 0x00000002 js 00007FD228B1E7C8h 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FD228B1E7CCh 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CDC019 second address: CDC01E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CDC01E second address: CDC03A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FD228B1E7D8h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CDC03A second address: CDC04F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a jng 00007FD22947DF78h 0x00000010 pushad 0x00000011 popad 0x00000012 push eax 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CDEB90 second address: CDEC04 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jns 00007FD228B1E7C6h 0x00000009 jmp 00007FD228B1E7D6h 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 nop 0x00000012 push 00000000h 0x00000014 push edx 0x00000015 call 00007FD228B1E7C8h 0x0000001a pop edx 0x0000001b mov dword ptr [esp+04h], edx 0x0000001f add dword ptr [esp+04h], 0000001Ah 0x00000027 inc edx 0x00000028 push edx 0x00000029 ret 0x0000002a pop edx 0x0000002b ret 0x0000002c mov bl, 1Ah 0x0000002e push 00000000h 0x00000030 push 00000000h 0x00000032 push edx 0x00000033 call 00007FD228B1E7C8h 0x00000038 pop edx 0x00000039 mov dword ptr [esp+04h], edx 0x0000003d add dword ptr [esp+04h], 00000016h 0x00000045 inc edx 0x00000046 push edx 0x00000047 ret 0x00000048 pop edx 0x00000049 ret 0x0000004a movsx edi, bx 0x0000004d push 00000000h 0x0000004f mov bx, ax 0x00000052 xchg eax, esi 0x00000053 pushad 0x00000054 push edi 0x00000055 push eax 0x00000056 push edx 0x00000057 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CDEC04 second address: CDEC0C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CDEC0C second address: CDEC12 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CDEC12 second address: CDEC23 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 jl 00007FD22947DF78h 0x0000000f push ebx 0x00000010 pop ebx 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CDFB6E second address: CDFB72 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CE19F4 second address: CE19FA instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CDDDCE second address: CDDDE5 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FD228B1E7CEh 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CE19FA second address: CE1A11 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FD22947DF7Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f push edx 0x00000010 pop edx 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CDFD2B second address: CDFD43 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD228B1E7CEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push esi 0x0000000b push eax 0x0000000c push edx 0x0000000d push ecx 0x0000000e pop ecx 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CE1A11 second address: CE1A1B instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FD22947DF76h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CDDDE5 second address: CDDE4C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD228B1E7CDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a mov di, dx 0x0000000d push dword ptr fs:[00000000h] 0x00000014 mov ebx, dword ptr [ebp+122D1D37h] 0x0000001a mov dword ptr fs:[00000000h], esp 0x00000021 xor bl, 00000036h 0x00000024 mov eax, dword ptr [ebp+122D01E1h] 0x0000002a mov ebx, 60C60267h 0x0000002f push FFFFFFFFh 0x00000031 push 00000000h 0x00000033 push ebp 0x00000034 call 00007FD228B1E7C8h 0x00000039 pop ebp 0x0000003a mov dword ptr [esp+04h], ebp 0x0000003e add dword ptr [esp+04h], 00000014h 0x00000046 inc ebp 0x00000047 push ebp 0x00000048 ret 0x00000049 pop ebp 0x0000004a ret 0x0000004b or edi, dword ptr [ebp+122D2900h] 0x00000051 sub dword ptr [ebp+1247105Dh], ebx 0x00000057 nop 0x00000058 pushad 0x00000059 push eax 0x0000005a push edx 0x0000005b push ebx 0x0000005c pop ebx 0x0000005d rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CDFD43 second address: CDFDDE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD22947DF82h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop esi 0x0000000a nop 0x0000000b push edi 0x0000000c pop ebx 0x0000000d push dword ptr fs:[00000000h] 0x00000014 push 00000000h 0x00000016 push edi 0x00000017 call 00007FD22947DF78h 0x0000001c pop edi 0x0000001d mov dword ptr [esp+04h], edi 0x00000021 add dword ptr [esp+04h], 00000018h 0x00000029 inc edi 0x0000002a push edi 0x0000002b ret 0x0000002c pop edi 0x0000002d ret 0x0000002e movzx edi, ax 0x00000031 mov dword ptr fs:[00000000h], esp 0x00000038 push 00000000h 0x0000003a push esi 0x0000003b call 00007FD22947DF78h 0x00000040 pop esi 0x00000041 mov dword ptr [esp+04h], esi 0x00000045 add dword ptr [esp+04h], 00000017h 0x0000004d inc esi 0x0000004e push esi 0x0000004f ret 0x00000050 pop esi 0x00000051 ret 0x00000052 call 00007FD22947DF82h 0x00000057 pop edi 0x00000058 mov eax, dword ptr [ebp+122D1041h] 0x0000005e sbb ebx, 1A944DFDh 0x00000064 push FFFFFFFFh 0x00000066 mov dword ptr [ebp+122D230Ch], edx 0x0000006c push eax 0x0000006d pushad 0x0000006e push edx 0x0000006f push ebx 0x00000070 pop ebx 0x00000071 pop edx 0x00000072 push eax 0x00000073 push edx 0x00000074 push eax 0x00000075 push edx 0x00000076 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CDDE4C second address: CDDE50 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CDFDDE second address: CDFDE2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CDDE50 second address: CDDE5E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jnc 00007FD228B1E7C6h 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CDDE5E second address: CDDE6B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CDDE6B second address: CDDE6F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CE1C15 second address: CE1C26 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FD22947DF76h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push ebx 0x0000000e pushad 0x0000000f popad 0x00000010 pop ebx 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CE38C5 second address: CE38DD instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FD228B1E7D0h 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CE3B79 second address: CE3B8A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD22947DF7Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CE3B8A second address: CE3B94 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FD228B1E7CCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CECB78 second address: CECB7C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CECB7C second address: CECB9D instructions: 0x00000000 rdtsc 0x00000002 je 00007FD228B1E7C6h 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d jmp 00007FD228B1E7D2h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CEC32F second address: CEC350 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 pushad 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a jmp 00007FD22947DF85h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CEC600 second address: CEC60E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pushad 0x00000006 jbe 00007FD228B1E7C6h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CEC73A second address: CEC74B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop eax 0x00000007 jnp 00007FD22947DF7Eh 0x0000000d push edx 0x0000000e pop edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CEC74B second address: CEC74F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CEC74F second address: CEC757 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push esi 0x00000007 pop esi 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CEC757 second address: CEC75B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CEC75B second address: CEC761 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CF57F5 second address: CF57F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CF5969 second address: CF59A1 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FD22947DF89h 0x00000008 pushad 0x00000009 popad 0x0000000a jmp 00007FD22947DF81h 0x0000000f jmp 00007FD22947DF85h 0x00000014 pop edx 0x00000015 pop eax 0x00000016 pushad 0x00000017 pushad 0x00000018 pushad 0x00000019 popad 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CF59A1 second address: CF59C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 pushad 0x00000008 push edx 0x00000009 pop edx 0x0000000a jmp 00007FD228B1E7D8h 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CF59C8 second address: CF59CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CF5C63 second address: CF5C67 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CF5DBF second address: CF5DC3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CFA378 second address: CFA37D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CFA37D second address: CFA389 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007FD22947DF76h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CFA389 second address: CFA3B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jp 00007FD228B1E7CCh 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FD228B1E7D2h 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CFA3B0 second address: CFA3B8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CFA3B8 second address: CFA3C2 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: C8C14D second address: C8C153 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: C8C153 second address: C8C15E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push edi 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pop edi 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: C8C15E second address: C8C184 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD22947DF7Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jo 00007FD22947DF8Ah 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007FD22947DF7Ah 0x00000016 pushad 0x00000017 popad 0x00000018 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CFE8D6 second address: CFE8F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007FD228B1E7D4h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CFE8F2 second address: CFE908 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FD22947DF81h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CFE908 second address: CFE927 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007FD228B1E7D9h 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CFE927 second address: CFE92B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CFE92B second address: CFE952 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 jnc 00007FD228B1E7C6h 0x0000000d pushad 0x0000000e popad 0x0000000f pop edx 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push eax 0x00000013 push edx 0x00000014 push edx 0x00000015 pushad 0x00000016 popad 0x00000017 pop edx 0x00000018 jmp 00007FD228B1E7CFh 0x0000001d rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CFF28D second address: CFF291 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: C92BFD second address: C92C05 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D024A7 second address: D024C7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push edx 0x0000000a pop edx 0x0000000b jmp 00007FD22947DF83h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D0664D second address: D0667E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD228B1E7D4h 0x00000007 jmp 00007FD228B1E7D1h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pushad 0x0000000f pushad 0x00000010 pushad 0x00000011 popad 0x00000012 pushad 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D0667E second address: D06686 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D06C1D second address: D06C21 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D06C21 second address: D06C2E instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FD22947DF76h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D06C2E second address: D06C37 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 pop eax 0x00000008 popad 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D06C37 second address: D06C57 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FD22947DF7Ah 0x00000008 jmp 00007FD22947DF7Fh 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D07012 second address: D07016 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D07016 second address: D07031 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD22947DF84h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D072BC second address: D072C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D072C2 second address: D072C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D07A6D second address: D07A73 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D07A73 second address: D07A77 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D06365 second address: D06379 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 je 00007FD228B1E7C6h 0x0000000a jmp 00007FD228B1E7CAh 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D06379 second address: D0637F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CD1F29 second address: CD1F64 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 push eax 0x00000008 jl 00007FD228B1E7CEh 0x0000000e jl 00007FD228B1E7C8h 0x00000014 push ecx 0x00000015 pop ecx 0x00000016 xchg eax, esi 0x00000017 adc cx, 7329h 0x0000001c mov cx, 2D94h 0x00000020 nop 0x00000021 push eax 0x00000022 push edx 0x00000023 jmp 00007FD228B1E7D8h 0x00000028 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CD2613 second address: CD2621 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CD2621 second address: CD2625 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CD2625 second address: CD262B instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CD29BE second address: CD29C2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: CD29C2 second address: CD2A19 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FD22947DF7Bh 0x0000000b popad 0x0000000c push eax 0x0000000d pushad 0x0000000e jmp 00007FD22947DF86h 0x00000013 push edx 0x00000014 jg 00007FD22947DF76h 0x0000001a pop edx 0x0000001b popad 0x0000001c mov eax, dword ptr [esp+04h] 0x00000020 jmp 00007FD22947DF84h 0x00000025 mov eax, dword ptr [eax] 0x00000027 jl 00007FD22947DF84h 0x0000002d push eax 0x0000002e push edx 0x0000002f pushad 0x00000030 popad 0x00000031 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D0B65B second address: D0B65F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D0B65F second address: D0B69B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD22947DF7Eh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop edi 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FD22947DF7Ch 0x00000014 jmp 00007FD22947DF88h 0x00000019 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D0B9BA second address: D0B9DD instructions: 0x00000000 rdtsc 0x00000002 ja 00007FD228B1E7C6h 0x00000008 jmp 00007FD228B1E7D5h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D0BF11 second address: D0BF2A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD22947DF85h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D0BF2A second address: D0BF30 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D0BF30 second address: D0BF34 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D0C082 second address: D0C0A7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD228B1E7CFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d jmp 00007FD228B1E7CEh 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D0C0A7 second address: D0C0BC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD22947DF7Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D0C0BC second address: D0C0C0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D0FF92 second address: D0FF96 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D0FF96 second address: D0FF9C instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D11E0D second address: D11E1F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FD22947DF7Eh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D1503E second address: D15042 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D15042 second address: D1504B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D1504B second address: D1506E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD228B1E7CDh 0x00000009 popad 0x0000000a popad 0x0000000b js 00007FD228B1E7DCh 0x00000011 push edi 0x00000012 push edx 0x00000013 pop edx 0x00000014 pop edi 0x00000015 push eax 0x00000016 push edx 0x00000017 pushad 0x00000018 popad 0x00000019 push eax 0x0000001a pop eax 0x0000001b rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D14D57 second address: D14D92 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 push eax 0x0000000a pushad 0x0000000b popad 0x0000000c pushad 0x0000000d popad 0x0000000e pop eax 0x0000000f popad 0x00000010 pushad 0x00000011 jmp 00007FD22947DF84h 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007FD22947DF7Eh 0x0000001d jnc 00007FD22947DF76h 0x00000023 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D1A907 second address: D1A923 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 jmp 00007FD228B1E7D6h 0x0000000a pop eax 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D1A923 second address: D1A93B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FD22947DF84h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D1A93B second address: D1A93F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D1DFA7 second address: D1DFAD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D1DFAD second address: D1DFB1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D1DFB1 second address: D1DFBB instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FD22947DF76h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D1DFBB second address: D1DFCB instructions: 0x00000000 rdtsc 0x00000002 jl 00007FD228B1E7D2h 0x00000008 jne 00007FD228B1E7C6h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D2259D second address: D225AC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007FD22947DF76h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D225AC second address: D225B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D225B0 second address: D225B4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D225B4 second address: D225BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D2271E second address: D22740 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD22947DF80h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jnp 00007FD22947DF82h 0x0000000f jng 00007FD22947DF76h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D228DF second address: D228EA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D234AA second address: D234BC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a ja 00007FD22947DF76h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D234BC second address: D234C0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D234C0 second address: D234D1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD22947DF7Dh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D29539 second address: D2953D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D2953D second address: D29541 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D29541 second address: D29560 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007FD228B1E7C6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jnl 00007FD228B1E7CCh 0x00000012 pushad 0x00000013 push esi 0x00000014 pop esi 0x00000015 push ecx 0x00000016 pop ecx 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D29560 second address: D29566 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D296C7 second address: D296CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D296CB second address: D296DD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ecx 0x00000009 pushad 0x0000000a popad 0x0000000b pop ecx 0x0000000c push eax 0x0000000d push edx 0x0000000e push edi 0x0000000f pop edi 0x00000010 push esi 0x00000011 pop esi 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D2984F second address: D29855 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D2A355 second address: D2A35A instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D2A6B6 second address: D2A6CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007FD228B1E7C6h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d push ebx 0x0000000e jc 00007FD228B1E7C6h 0x00000014 push ebx 0x00000015 pop ebx 0x00000016 pop ebx 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D2AC4B second address: D2AC56 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D2AC56 second address: D2AC60 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FD228B1E7C6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D2AC60 second address: D2AC65 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D30776 second address: D30782 instructions: 0x00000000 rdtsc 0x00000002 js 00007FD228B1E7C6h 0x00000008 push edx 0x00000009 pop edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D34448 second address: D3444C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D3444C second address: D34452 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D34452 second address: D34465 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jns 00007FD22947DF76h 0x00000009 push ebx 0x0000000a pop ebx 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D34465 second address: D3446A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D3446A second address: D3446F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D338CF second address: D338EE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 jp 00007FD228B1E7D6h 0x0000000f jc 00007FD228B1E7C6h 0x00000015 jmp 00007FD228B1E7CAh 0x0000001a rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D33BC7 second address: D33BEB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007FD22947DF90h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D33BEB second address: D33BF2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D33BF2 second address: D33C06 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push ebx 0x0000000a push esi 0x0000000b push eax 0x0000000c pop eax 0x0000000d pushad 0x0000000e popad 0x0000000f pop esi 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D33C06 second address: D33C17 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD228B1E7CDh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D39EB8 second address: D39EC2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007FD22947DF76h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D39EC2 second address: D39ED6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jbe 00007FD228B1E7CEh 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D39ED6 second address: D39EDB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D3A503 second address: D3A516 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD228B1E7CFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D3AC4A second address: D3AC6A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD22947DF7Fh 0x00000009 jnc 00007FD22947DF78h 0x0000000f pushad 0x00000010 pushad 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D3AC6A second address: D3AC70 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D4F35A second address: D4F362 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D4F362 second address: D4F36B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D4F36B second address: D4F36F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D4F36F second address: D4F3C2 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 pushad 0x00000008 pushad 0x00000009 pushad 0x0000000a popad 0x0000000b jmp 00007FD228B1E7D7h 0x00000010 pushad 0x00000011 popad 0x00000012 popad 0x00000013 jmp 00007FD228B1E7D4h 0x00000018 push esi 0x00000019 push eax 0x0000001a pop eax 0x0000001b jmp 00007FD228B1E7D2h 0x00000020 pop esi 0x00000021 push eax 0x00000022 push edx 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D4F3C2 second address: D4F3C6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D4F1DF second address: D4F225 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FD228B1E7DDh 0x00000008 push edi 0x00000009 pushad 0x0000000a popad 0x0000000b js 00007FD228B1E7C6h 0x00000011 pop edi 0x00000012 pop edx 0x00000013 pop eax 0x00000014 pushad 0x00000015 jmp 00007FD228B1E7D3h 0x0000001a pushad 0x0000001b pushad 0x0000001c popad 0x0000001d push esi 0x0000001e pop esi 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D4F225 second address: D4F22F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edx 0x00000006 push edx 0x00000007 pop edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D4F22F second address: D4F243 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 jmp 00007FD228B1E7CBh 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D51771 second address: D51779 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D51779 second address: D5177F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D5177F second address: D51784 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D51784 second address: D517A3 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jnc 00007FD228B1E7C6h 0x00000009 pop edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push ecx 0x0000000d push ebx 0x0000000e ja 00007FD228B1E7C6h 0x00000014 pop ebx 0x00000015 push eax 0x00000016 push edx 0x00000017 jbe 00007FD228B1E7C6h 0x0000001d pushad 0x0000001e popad 0x0000001f rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D517A3 second address: D517AD instructions: 0x00000000 rdtsc 0x00000002 ja 00007FD22947DF76h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D55459 second address: D5545F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D5545F second address: D55467 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D55467 second address: D55483 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007FD228B1E7C6h 0x0000000a jmp 00007FD228B1E7D0h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D555E2 second address: D5561D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FD22947DF83h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jng 00007FD22947DF7Eh 0x00000011 pop eax 0x00000012 push edi 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007FD22947DF7Eh 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D5561D second address: D55621 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D55621 second address: D55625 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D55625 second address: D5562E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D5562E second address: D55636 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D59F92 second address: D59F96 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D59F96 second address: D59F9A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D59F9A second address: D59FC7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007FD228B1E7C6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jnc 00007FD228B1E7C6h 0x00000014 jmp 00007FD228B1E7D9h 0x00000019 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D59FC7 second address: D59FD3 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 jo 00007FD22947DF76h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D60525 second address: D6052B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D6052B second address: D6052F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D6052F second address: D6053F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a je 00007FD228B1E7C6h 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D6034D second address: D60353 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D60353 second address: D60384 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FD228B1E7CBh 0x0000000a jne 00007FD228B1E7D2h 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 ja 00007FD228B1E7C8h 0x00000019 push eax 0x0000001a push edx 0x0000001b push esi 0x0000001c pop esi 0x0000001d rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D60384 second address: D60399 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD22947DF81h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D60399 second address: D603A5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jp 00007FD228B1E7C6h 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D63BCB second address: D63BD7 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FD22947DF76h 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D63BD7 second address: D63BF4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD228B1E7D5h 0x00000007 push eax 0x00000008 push edx 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b push eax 0x0000000c pop eax 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D63BF4 second address: D63C47 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD22947DF80h 0x00000007 jmp 00007FD22947DF84h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pop edx 0x0000000f pop eax 0x00000010 pushad 0x00000011 jns 00007FD22947DF87h 0x00000017 jmp 00007FD22947DF81h 0x0000001c push edi 0x0000001d pushad 0x0000001e popad 0x0000001f pop edi 0x00000020 push eax 0x00000021 push edx 0x00000022 jmp 00007FD22947DF7Bh 0x00000027 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D6B1B0 second address: D6B1BB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pushad 0x00000004 popad 0x00000005 push edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D69B73 second address: D69B7C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D6A03C second address: D6A042 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D6A45E second address: D6A464 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D6A464 second address: D6A487 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FD228B1E7D3h 0x00000008 jmp 00007FD228B1E7CBh 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D6AEB8 second address: D6AEDE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop esi 0x00000009 push eax 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d jmp 00007FD22947DF82h 0x00000012 push eax 0x00000013 pop eax 0x00000014 popad 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 pop eax 0x00000019 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D83F52 second address: D83F56 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D86333 second address: D8634D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FD22947DF81h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D8634D second address: D86353 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D81BE5 second address: D81BE9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D81BE9 second address: D81BFE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnl 00007FD228B1E7C8h 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 push esi 0x00000012 pop esi 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D81BFE second address: D81C02 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D81C02 second address: D81C08 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D81C08 second address: D81C0D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D94FA1 second address: D94FA7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D94FA7 second address: D94FBA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jc 00007FD22947DF7Eh 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D94FBA second address: D94FCC instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 push edx 0x00000006 pop edx 0x00000007 pop edi 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D94FCC second address: D94FD0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D94FD0 second address: D94FD4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D94FD4 second address: D94FED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FD22947DF83h 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D94A9D second address: D94ABA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jc 00007FD228B1E7D8h 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D94ABA second address: D94AF4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jbe 00007FD22947DF76h 0x00000009 pushad 0x0000000a popad 0x0000000b jmp 00007FD22947DF7Dh 0x00000010 popad 0x00000011 pop edx 0x00000012 pop eax 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007FD22947DF86h 0x0000001b jo 00007FD22947DF76h 0x00000021 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D94AF4 second address: D94B12 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FD228B1E7C6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push edx 0x0000000d jg 00007FD228B1E7C6h 0x00000013 pop edx 0x00000014 push eax 0x00000015 push edx 0x00000016 push esi 0x00000017 pop esi 0x00000018 jc 00007FD228B1E7C6h 0x0000001e rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D94B12 second address: D94B16 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: D94B16 second address: D94B26 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jo 00007FD228B1E7CEh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: DBFAF9 second address: DBFAFD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: DBFAFD second address: DBFB14 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FD228B1E7CDh 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: DBEC8E second address: DBEC92 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: DBEC92 second address: DBEC96 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: DBEDE0 second address: DBEDE4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: DBF4E5 second address: DBF4F5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jo 00007FD228B1E7C6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d pushad 0x0000000e popad 0x0000000f pop eax 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: DBF4F5 second address: DBF50F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FD22947DF86h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: DC27DF second address: DC27E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: DC27E3 second address: DC27E7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: DC27E7 second address: DC27ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: DC27ED second address: DC281E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD22947DF7Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a js 00007FD22947DF93h 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007FD22947DF85h 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: DC2A7E second address: DC2AC2 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b sub dx, 7F58h 0x00000010 push dword ptr [ebp+1244DFE4h] 0x00000016 push 00000000h 0x00000018 push esi 0x00000019 call 00007FD228B1E7C8h 0x0000001e pop esi 0x0000001f mov dword ptr [esp+04h], esi 0x00000023 add dword ptr [esp+04h], 00000018h 0x0000002b inc esi 0x0000002c push esi 0x0000002d ret 0x0000002e pop esi 0x0000002f ret 0x00000030 call 00007FD228B1E7C9h 0x00000035 push eax 0x00000036 push edx 0x00000037 push ecx 0x00000038 push eax 0x00000039 push edx 0x0000003a rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: DC2AC2 second address: DC2AC7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: DC2AC7 second address: DC2ACE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: DC2ACE second address: DC2AEF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 jmp 00007FD22947DF7Ch 0x0000000d mov eax, dword ptr [esp+04h] 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 jnc 00007FD22947DF76h 0x0000001a rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: DC2AEF second address: DC2B14 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FD228B1E7C6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jl 00007FD228B1E7C8h 0x00000010 push edx 0x00000011 pop edx 0x00000012 popad 0x00000013 mov eax, dword ptr [eax] 0x00000015 pushad 0x00000016 pushad 0x00000017 jg 00007FD228B1E7C6h 0x0000001d push ecx 0x0000001e pop ecx 0x0000001f popad 0x00000020 pushad 0x00000021 push eax 0x00000022 pop eax 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: DC3D78 second address: DC3D92 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD22947DF86h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: DC3D92 second address: DC3D99 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: DC3D99 second address: DC3DB2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD22947DF80h 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: DC3DB2 second address: DC3DB6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: DC3DB6 second address: DC3DCA instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebx 0x00000009 push ecx 0x0000000a ja 00007FD22947DF76h 0x00000010 pop ecx 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: DC563E second address: DC5644 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: DC5644 second address: DC5649 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: DC5649 second address: DC566F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FD228B1E7D2h 0x00000008 jne 00007FD228B1E7C6h 0x0000000e pushad 0x0000000f popad 0x00000010 popad 0x00000011 pop edx 0x00000012 pop eax 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: DC566F second address: DC5673 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: DC5673 second address: DC568A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b jmp 00007FD228B1E7CAh 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: DC568A second address: DC56A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD22947DF81h 0x00000009 popad 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: DC7615 second address: DC761B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: DC761B second address: DC7621 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: DC7621 second address: DC7632 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jp 00007FD228B1E7C6h 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: DC7632 second address: DC763D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: DC763D second address: DC7648 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007FD228B1E7C6h 0x0000000a pop eax 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 55008F9 second address: 5500916 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD22947DF89h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5500916 second address: 5500938 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ebx, 005D5C02h 0x00000008 mov dx, 364Eh 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f xchg eax, ebp 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007FD228B1E7D0h 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 54D006C second address: 54D0070 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 54D0070 second address: 54D0074 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 54D0074 second address: 54D007A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5540165 second address: 554016C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 554016C second address: 554017B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FD22947DF7Bh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 554017B second address: 55401DB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD228B1E7D9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c jmp 00007FD228B1E7CEh 0x00000011 push eax 0x00000012 pushad 0x00000013 jmp 00007FD228B1E7D1h 0x00000018 mov di, cx 0x0000001b popad 0x0000001c xchg eax, ebp 0x0000001d jmp 00007FD228B1E7CAh 0x00000022 mov ebp, esp 0x00000024 push eax 0x00000025 push edx 0x00000026 push eax 0x00000027 push edx 0x00000028 jmp 00007FD228B1E7CAh 0x0000002d rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 55401DB second address: 55401E1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 54C0C6E second address: 54C0C74 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 54C0C74 second address: 54C0CF5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop ebx 0x00000005 pushfd 0x00000006 jmp 00007FD22947DF88h 0x0000000b and ch, FFFFFFA8h 0x0000000e jmp 00007FD22947DF7Bh 0x00000013 popfd 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 xchg eax, ebp 0x00000018 pushad 0x00000019 mov ax, 1EBBh 0x0000001d pushfd 0x0000001e jmp 00007FD22947DF80h 0x00000023 and ch, 00000008h 0x00000026 jmp 00007FD22947DF7Bh 0x0000002b popfd 0x0000002c popad 0x0000002d push eax 0x0000002e jmp 00007FD22947DF89h 0x00000033 xchg eax, ebp 0x00000034 push eax 0x00000035 push edx 0x00000036 jmp 00007FD22947DF7Dh 0x0000003b rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 54C0CF5 second address: 54C0D22 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD228B1E7D1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b jmp 00007FD228B1E7CEh 0x00000010 push dword ptr [ebp+04h] 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 push ecx 0x00000017 pop edx 0x00000018 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 54C0D22 second address: 54C0D68 instructions: 0x00000000 rdtsc 0x00000002 mov dx, si 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pushfd 0x00000008 jmp 00007FD22947DF84h 0x0000000d sbb esi, 08308958h 0x00000013 jmp 00007FD22947DF7Bh 0x00000018 popfd 0x00000019 popad 0x0000001a push dword ptr [ebp+0Ch] 0x0000001d push eax 0x0000001e push edx 0x0000001f push eax 0x00000020 push edx 0x00000021 jmp 00007FD22947DF80h 0x00000026 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 54C0D68 second address: 54C0D6C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 54C0D6C second address: 54C0D72 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 54C0DE3 second address: 54C0DE7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 54C0DE7 second address: 54C0DED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5530DA0 second address: 5530DC3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD228B1E7D1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a pushad 0x0000000b mov esi, 5A41BA53h 0x00000010 push eax 0x00000011 push edx 0x00000012 mov esi, 6AB38C45h 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5530DC3 second address: 5530DE8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 pushad 0x00000009 mov edx, 52A23CC0h 0x0000000e movsx ebx, si 0x00000011 popad 0x00000012 xchg eax, ebp 0x00000013 pushad 0x00000014 movzx esi, bx 0x00000017 mov bh, B5h 0x00000019 popad 0x0000001a mov ebp, esp 0x0000001c push eax 0x0000001d push edx 0x0000001e pushad 0x0000001f mov dx, 3752h 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5530DE8 second address: 5530DED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5510B7A second address: 5510B97 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FD22947DF89h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5510B97 second address: 5510BBF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD228B1E7D1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov ebp, esp 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FD228B1E7CDh 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5540D84 second address: 5540E51 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD22947DF7Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a pushad 0x0000000b call 00007FD22947DF7Eh 0x00000010 push esi 0x00000011 pop ebx 0x00000012 pop eax 0x00000013 pushfd 0x00000014 jmp 00007FD22947DF87h 0x00000019 sub al, FFFFFFDEh 0x0000001c jmp 00007FD22947DF89h 0x00000021 popfd 0x00000022 popad 0x00000023 push eax 0x00000024 pushad 0x00000025 pushfd 0x00000026 jmp 00007FD22947DF87h 0x0000002b and si, 64EEh 0x00000030 jmp 00007FD22947DF89h 0x00000035 popfd 0x00000036 pushfd 0x00000037 jmp 00007FD22947DF80h 0x0000003c add ax, 4C68h 0x00000041 jmp 00007FD22947DF7Bh 0x00000046 popfd 0x00000047 popad 0x00000048 xchg eax, ebp 0x00000049 push eax 0x0000004a push edx 0x0000004b jmp 00007FD22947DF85h 0x00000050 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 54D05FA second address: 54D0600 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 54D0600 second address: 54D0604 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 54D0604 second address: 54D0696 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a pushfd 0x0000000b jmp 00007FD228B1E7CAh 0x00000010 sub cl, 00000048h 0x00000013 jmp 00007FD228B1E7CBh 0x00000018 popfd 0x00000019 mov si, D5BFh 0x0000001d popad 0x0000001e mov dword ptr [esp], ebp 0x00000021 pushad 0x00000022 mov ah, BDh 0x00000024 pushfd 0x00000025 jmp 00007FD228B1E7CDh 0x0000002a xor esi, 07667F66h 0x00000030 jmp 00007FD228B1E7D1h 0x00000035 popfd 0x00000036 popad 0x00000037 mov ebp, esp 0x00000039 pushad 0x0000003a pushfd 0x0000003b jmp 00007FD228B1E7CCh 0x00000040 xor ch, 00000008h 0x00000043 jmp 00007FD228B1E7CBh 0x00000048 popfd 0x00000049 popad 0x0000004a pop ebp 0x0000004b push eax 0x0000004c push edx 0x0000004d push eax 0x0000004e push edx 0x0000004f jmp 00007FD228B1E7D7h 0x00000054 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 54D0696 second address: 54D06B3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD22947DF89h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5530E24 second address: 5530E80 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx edx, ax 0x00000006 pushfd 0x00000007 jmp 00007FD228B1E7D0h 0x0000000c and cl, FFFFFFF8h 0x0000000f jmp 00007FD228B1E7CBh 0x00000014 popfd 0x00000015 popad 0x00000016 pop edx 0x00000017 pop eax 0x00000018 xchg eax, ebp 0x00000019 pushad 0x0000001a mov eax, 3B33C04Bh 0x0000001f pushfd 0x00000020 jmp 00007FD228B1E7D0h 0x00000025 or si, 2D58h 0x0000002a jmp 00007FD228B1E7CBh 0x0000002f popfd 0x00000030 popad 0x00000031 push eax 0x00000032 pushad 0x00000033 push eax 0x00000034 push edx 0x00000035 mov edi, 653D9C88h 0x0000003a rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5530E80 second address: 5530F23 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD22947DF81h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov edi, ecx 0x0000000b popad 0x0000000c xchg eax, ebp 0x0000000d pushad 0x0000000e movzx ecx, bx 0x00000011 pushfd 0x00000012 jmp 00007FD22947DF85h 0x00000017 xor eax, 0A87D256h 0x0000001d jmp 00007FD22947DF81h 0x00000022 popfd 0x00000023 popad 0x00000024 mov ebp, esp 0x00000026 pushad 0x00000027 movzx ecx, dx 0x0000002a push edx 0x0000002b pushfd 0x0000002c jmp 00007FD22947DF84h 0x00000031 xor ax, D3A8h 0x00000036 jmp 00007FD22947DF7Bh 0x0000003b popfd 0x0000003c pop esi 0x0000003d popad 0x0000003e pop ebp 0x0000003f push eax 0x00000040 push edx 0x00000041 pushad 0x00000042 pushfd 0x00000043 jmp 00007FD22947DF80h 0x00000048 xor eax, 42F34608h 0x0000004e jmp 00007FD22947DF7Bh 0x00000053 popfd 0x00000054 popad 0x00000055 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5540521 second address: 554052A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov bx, 1DFCh 0x00000008 popad 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 554052A second address: 5540551 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD22947DF82h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FD22947DF7Eh 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5540551 second address: 5540557 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5540557 second address: 554055B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 554055B second address: 554055F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 554055F second address: 5540577 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FD22947DF7Bh 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5540577 second address: 554057D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 554057D second address: 55405C1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov esi, 7E0CB1C1h 0x00000008 pushfd 0x00000009 jmp 00007FD22947DF7Eh 0x0000000e and cx, 55D8h 0x00000013 jmp 00007FD22947DF7Bh 0x00000018 popfd 0x00000019 popad 0x0000001a pop edx 0x0000001b pop eax 0x0000001c mov ebp, esp 0x0000001e push eax 0x0000001f push edx 0x00000020 jmp 00007FD22947DF85h 0x00000025 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 55405C1 second address: 55405F3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD228B1E7D1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [ebp+08h] 0x0000000c jmp 00007FD228B1E7CEh 0x00000011 and dword ptr [eax], 00000000h 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 mov dx, 24B0h 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 55405F3 second address: 55405F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 55405F8 second address: 5540621 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FD228B1E7D2h 0x00000009 sbb ax, 44F8h 0x0000000e jmp 00007FD228B1E7CBh 0x00000013 popfd 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5540621 second address: 5540639 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 and dword ptr [eax+04h], 00000000h 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FD22947DF7Bh 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5510A43 second address: 5510A49 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5510A49 second address: 5510A5A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FD22947DF7Dh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5510A5A second address: 5510A7E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FD228B1E7D9h 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5510A7E second address: 5510ABE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov dl, E6h 0x00000005 pushfd 0x00000006 jmp 00007FD22947DF88h 0x0000000b sbb ecx, 711ECFD8h 0x00000011 jmp 00007FD22947DF7Bh 0x00000016 popfd 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a mov dword ptr [esp], ebp 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 mov cx, di 0x00000023 mov si, bx 0x00000026 popad 0x00000027 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 54F0825 second address: 54F082B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 54F082B second address: 54F083C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FD22947DF7Dh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 54F083C second address: 54F084B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ecx 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 54F084B second address: 54F084F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 54F084F second address: 54F0855 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 54F0855 second address: 54F086F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 mov edx, esi 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], ebp 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FD22947DF7Bh 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 54F086F second address: 54F0894 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD228B1E7D9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 54F0894 second address: 54F0898 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 54F0898 second address: 54F089C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 54F089C second address: 54F08A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5550B3B second address: 5550B6F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 popad 0x00000006 xchg eax, ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a jmp 00007FD228B1E7D6h 0x0000000f call 00007FD228B1E7D2h 0x00000014 pop ecx 0x00000015 popad 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5510008 second address: 551000C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 551000C second address: 5510010 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5510010 second address: 5510016 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5510016 second address: 551001C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 551001C second address: 5510020 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 55100FE second address: 5510104 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5510104 second address: 5510108 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5510108 second address: 551012A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebx 0x00000009 jmp 00007FD228B1E7D0h 0x0000000e mov dword ptr [esp], ecx 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 551012A second address: 551012E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 551012E second address: 5510134 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5510134 second address: 5510143 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FD22947DF7Bh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5510143 second address: 551019C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD228B1E7D9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebx 0x0000000c pushad 0x0000000d push eax 0x0000000e mov si, bx 0x00000011 pop edi 0x00000012 mov di, si 0x00000015 popad 0x00000016 push eax 0x00000017 pushad 0x00000018 movsx edx, si 0x0000001b movzx ecx, dx 0x0000001e popad 0x0000001f xchg eax, ebx 0x00000020 pushad 0x00000021 mov ax, di 0x00000024 popad 0x00000025 mov ebx, dword ptr [ebp+10h] 0x00000028 pushad 0x00000029 mov eax, edx 0x0000002b mov bh, 14h 0x0000002d popad 0x0000002e xchg eax, esi 0x0000002f push eax 0x00000030 push edx 0x00000031 push eax 0x00000032 push edx 0x00000033 jmp 00007FD228B1E7D2h 0x00000038 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 551019C second address: 55101A0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 55101A0 second address: 55101A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 55101A6 second address: 55101AC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 55101AC second address: 55101F8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD228B1E7D8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d call 00007FD228B1E7D1h 0x00000012 mov edi, ecx 0x00000014 pop esi 0x00000015 mov eax, edx 0x00000017 popad 0x00000018 xchg eax, esi 0x00000019 push eax 0x0000001a push edx 0x0000001b jmp 00007FD228B1E7D2h 0x00000020 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 55101F8 second address: 551020A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FD22947DF7Eh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 551020A second address: 5510262 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD228B1E7CBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov esi, dword ptr [ebp+08h] 0x0000000e pushad 0x0000000f pushad 0x00000010 pushad 0x00000011 popad 0x00000012 call 00007FD228B1E7D0h 0x00000017 pop ecx 0x00000018 popad 0x00000019 call 00007FD228B1E7CBh 0x0000001e push esi 0x0000001f pop edi 0x00000020 pop ecx 0x00000021 popad 0x00000022 push ebx 0x00000023 pushad 0x00000024 call 00007FD228B1E7CEh 0x00000029 mov edi, ecx 0x0000002b pop eax 0x0000002c mov esi, ebx 0x0000002e popad 0x0000002f mov dword ptr [esp], edi 0x00000032 push eax 0x00000033 push edx 0x00000034 push eax 0x00000035 push edx 0x00000036 pushad 0x00000037 popad 0x00000038 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5510262 second address: 5510274 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD22947DF7Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5510274 second address: 5510286 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FD228B1E7CEh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5510286 second address: 551028A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 551028A second address: 55102B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 test esi, esi 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FD228B1E7D9h 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 55102B1 second address: 55102B7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 55102B7 second address: 55102EF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD228B1E7CCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007FD29A9BCB14h 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 mov ebx, 4839FBA0h 0x00000017 jmp 00007FD228B1E7D9h 0x0000001c popad 0x0000001d rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 55102EF second address: 551031C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FD22947DF87h 0x00000008 pushad 0x00000009 popad 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d cmp dword ptr [esi+08h], DDEEDDEEh 0x00000014 pushad 0x00000015 movzx ecx, bx 0x00000018 pushad 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 551031C second address: 5510322 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5510322 second address: 5510357 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 je 00007FD29B31C279h 0x0000000c jmp 00007FD22947DF7Fh 0x00000011 mov edx, dword ptr [esi+44h] 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007FD22947DF85h 0x0000001b rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5510357 second address: 5510367 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FD228B1E7CCh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5510367 second address: 55103DA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 or edx, dword ptr [ebp+0Ch] 0x0000000b jmp 00007FD22947DF87h 0x00000010 test edx, 61000000h 0x00000016 pushad 0x00000017 mov bx, ax 0x0000001a mov si, EC67h 0x0000001e popad 0x0000001f jne 00007FD29B31C266h 0x00000025 jmp 00007FD22947DF7Ah 0x0000002a test byte ptr [esi+48h], 00000001h 0x0000002e jmp 00007FD22947DF80h 0x00000033 jne 00007FD29B31C25Bh 0x00000039 jmp 00007FD22947DF80h 0x0000003e test bl, 00000007h 0x00000041 push eax 0x00000042 push edx 0x00000043 pushad 0x00000044 push eax 0x00000045 push edx 0x00000046 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 55103DA second address: 55103F3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 call 00007FD228B1E7D3h 0x00000009 pop esi 0x0000000a popad 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 55300F8 second address: 55300FC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 55300FC second address: 553010C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD228B1E7CCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 553010C second address: 553014F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop esi 0x00000005 pushfd 0x00000006 jmp 00007FD22947DF7Dh 0x0000000b xor cx, E7F6h 0x00000010 jmp 00007FD22947DF81h 0x00000015 popfd 0x00000016 popad 0x00000017 pop edx 0x00000018 pop eax 0x00000019 xchg eax, ebp 0x0000001a jmp 00007FD22947DF7Eh 0x0000001f push eax 0x00000020 push eax 0x00000021 push edx 0x00000022 push eax 0x00000023 push edx 0x00000024 push eax 0x00000025 push edx 0x00000026 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 553014F second address: 5530153 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5530153 second address: 5530157 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5530157 second address: 553015D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 553015D second address: 55301AA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD22947DF7Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007FD22947DF86h 0x0000000f mov ebp, esp 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 mov si, dx 0x00000017 call 00007FD22947DF89h 0x0000001c pop eax 0x0000001d popad 0x0000001e rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 55301AA second address: 5530229 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD228B1E7CEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 and esp, FFFFFFF8h 0x0000000c pushad 0x0000000d movzx esi, di 0x00000010 pushad 0x00000011 pushfd 0x00000012 jmp 00007FD228B1E7D9h 0x00000017 adc cx, 3ED6h 0x0000001c jmp 00007FD228B1E7D1h 0x00000021 popfd 0x00000022 jmp 00007FD228B1E7D0h 0x00000027 popad 0x00000028 popad 0x00000029 xchg eax, ebx 0x0000002a jmp 00007FD228B1E7D0h 0x0000002f push eax 0x00000030 push eax 0x00000031 push edx 0x00000032 jmp 00007FD228B1E7CEh 0x00000037 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5530229 second address: 553023F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov dx, 2904h 0x00000007 mov ch, bh 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c xchg eax, ebx 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 push ebx 0x00000011 pop eax 0x00000012 mov si, di 0x00000015 popad 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 553023F second address: 55302AB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ax, 941Bh 0x00000007 pushfd 0x00000008 jmp 00007FD228B1E7D0h 0x0000000d add esi, 0A3FC0E8h 0x00000013 jmp 00007FD228B1E7CBh 0x00000018 popfd 0x00000019 popad 0x0000001a pop edx 0x0000001b pop eax 0x0000001c xchg eax, esi 0x0000001d pushad 0x0000001e movzx eax, di 0x00000021 push eax 0x00000022 push edx 0x00000023 pushfd 0x00000024 jmp 00007FD228B1E7D7h 0x00000029 sbb eax, 12B4F8DEh 0x0000002f jmp 00007FD228B1E7D9h 0x00000034 popfd 0x00000035 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 55302AB second address: 553031D instructions: 0x00000000 rdtsc 0x00000002 mov edi, ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 pushad 0x00000009 pushfd 0x0000000a jmp 00007FD22947DF83h 0x0000000f sub al, FFFFFFEEh 0x00000012 jmp 00007FD22947DF89h 0x00000017 popfd 0x00000018 mov cx, 0E77h 0x0000001c popad 0x0000001d xchg eax, esi 0x0000001e pushad 0x0000001f pushad 0x00000020 pushfd 0x00000021 jmp 00007FD22947DF86h 0x00000026 or eax, 60F2FD98h 0x0000002c jmp 00007FD22947DF7Bh 0x00000031 popfd 0x00000032 mov ax, 374Fh 0x00000036 popad 0x00000037 push eax 0x00000038 push edx 0x00000039 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 553031D second address: 553032E instructions: 0x00000000 rdtsc 0x00000002 mov ax, dx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 popad 0x00000008 mov esi, dword ptr [ebp+08h] 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 553032E second address: 5530334 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5530334 second address: 5530366 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD228B1E7D7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 sub ebx, ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e mov ax, 7017h 0x00000012 call 00007FD228B1E7CCh 0x00000017 pop eax 0x00000018 popad 0x00000019 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5530366 second address: 553037F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov si, 245Dh 0x00000007 mov eax, 75AAA959h 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f test esi, esi 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 push ebx 0x00000015 pop esi 0x00000016 mov esi, edi 0x00000018 popad 0x00000019 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 553037F second address: 5530473 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD228B1E7D6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007FD29A9947BBh 0x0000000f pushad 0x00000010 pushfd 0x00000011 jmp 00007FD228B1E7CEh 0x00000016 xor ch, 00000048h 0x00000019 jmp 00007FD228B1E7CBh 0x0000001e popfd 0x0000001f jmp 00007FD228B1E7D8h 0x00000024 popad 0x00000025 cmp dword ptr [esi+08h], DDEEDDEEh 0x0000002c jmp 00007FD228B1E7D0h 0x00000031 mov ecx, esi 0x00000033 jmp 00007FD228B1E7D0h 0x00000038 je 00007FD29A994769h 0x0000003e jmp 00007FD228B1E7D0h 0x00000043 test byte ptr [77436968h], 00000002h 0x0000004a pushad 0x0000004b mov ax, 224Dh 0x0000004f pushfd 0x00000050 jmp 00007FD228B1E7CAh 0x00000055 sub cx, FD68h 0x0000005a jmp 00007FD228B1E7CBh 0x0000005f popfd 0x00000060 popad 0x00000061 jne 00007FD29A99473Dh 0x00000067 pushad 0x00000068 pushfd 0x00000069 jmp 00007FD228B1E7D4h 0x0000006e jmp 00007FD228B1E7D5h 0x00000073 popfd 0x00000074 push eax 0x00000075 push edx 0x00000076 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5530473 second address: 553049D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov edx, dword ptr [ebp+0Ch] 0x0000000a jmp 00007FD22947DF89h 0x0000000f xchg eax, ebx 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 mov bx, si 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 553049D second address: 55304F7 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007FD228B1E7D6h 0x00000008 and cx, 9FB8h 0x0000000d jmp 00007FD228B1E7CBh 0x00000012 popfd 0x00000013 pop edx 0x00000014 pop eax 0x00000015 mov cx, CBEFh 0x00000019 popad 0x0000001a push eax 0x0000001b pushad 0x0000001c movsx ebx, cx 0x0000001f mov esi, 42139D83h 0x00000024 popad 0x00000025 xchg eax, ebx 0x00000026 jmp 00007FD228B1E7D6h 0x0000002b xchg eax, ebx 0x0000002c push eax 0x0000002d push edx 0x0000002e push eax 0x0000002f push edx 0x00000030 push eax 0x00000031 push edx 0x00000032 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 55304F7 second address: 55304FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 55304FB second address: 5530501 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5530501 second address: 553056E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FD22947DF82h 0x00000009 or ecx, 089E3BA8h 0x0000000f jmp 00007FD22947DF7Bh 0x00000014 popfd 0x00000015 mov dx, si 0x00000018 popad 0x00000019 pop edx 0x0000001a pop eax 0x0000001b push eax 0x0000001c pushad 0x0000001d pushfd 0x0000001e jmp 00007FD22947DF7Bh 0x00000023 add cx, 08EEh 0x00000028 jmp 00007FD22947DF89h 0x0000002d popfd 0x0000002e call 00007FD22947DF80h 0x00000033 push eax 0x00000034 push edx 0x00000035 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 553056E second address: 55305F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 popad 0x00000006 xchg eax, ebx 0x00000007 pushad 0x00000008 push edi 0x00000009 pushfd 0x0000000a jmp 00007FD228B1E7D8h 0x0000000f and al, FFFFFFC8h 0x00000012 jmp 00007FD228B1E7CBh 0x00000017 popfd 0x00000018 pop esi 0x00000019 movsx ebx, ax 0x0000001c popad 0x0000001d push dword ptr [ebp+14h] 0x00000020 pushad 0x00000021 mov edx, ecx 0x00000023 call 00007FD228B1E7CAh 0x00000028 pushfd 0x00000029 jmp 00007FD228B1E7D2h 0x0000002e or si, 2858h 0x00000033 jmp 00007FD228B1E7CBh 0x00000038 popfd 0x00000039 pop eax 0x0000003a popad 0x0000003b push dword ptr [ebp+10h] 0x0000003e push eax 0x0000003f push edx 0x00000040 jmp 00007FD228B1E7D2h 0x00000045 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 55305F1 second address: 55305F7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 55305F7 second address: 55305FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5530631 second address: 5530636 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5530636 second address: 5530656 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov ebx, 0C5FDC60h 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop ebx 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 mov ch, 9Fh 0x00000012 jmp 00007FD228B1E7CDh 0x00000017 popad 0x00000018 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5530656 second address: 553065B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 552000A second address: 552000F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 552000F second address: 5520015 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5520015 second address: 5520019 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5520019 second address: 552003D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FD22947DF89h 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 552003D second address: 55200A1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD228B1E7D1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b mov dx, 9102h 0x0000000f jmp 00007FD228B1E7D3h 0x00000014 popad 0x00000015 xchg eax, ebp 0x00000016 jmp 00007FD228B1E7D6h 0x0000001b mov ebp, esp 0x0000001d pushad 0x0000001e movzx esi, bx 0x00000021 mov di, E95Eh 0x00000025 popad 0x00000026 pop ebp 0x00000027 push eax 0x00000028 push edx 0x00000029 pushad 0x0000002a call 00007FD228B1E7CDh 0x0000002f pop esi 0x00000030 popad 0x00000031 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5571A94 second address: 5571AD7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov eax, 29D87F57h 0x00000008 mov dh, ah 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov ebp, esp 0x0000000f pushad 0x00000010 mov esi, edi 0x00000012 push ebx 0x00000013 pushad 0x00000014 popad 0x00000015 pop ecx 0x00000016 popad 0x00000017 push 0000007Fh 0x00000019 jmp 00007FD22947DF89h 0x0000001e push 00000001h 0x00000020 push eax 0x00000021 push edx 0x00000022 jmp 00007FD22947DF7Dh 0x00000027 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5571AD7 second address: 5571AE7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FD228B1E7CCh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5571AE7 second address: 5571AF8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push dword ptr [ebp+08h] 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5571AF8 second address: 5571AFC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5571AFC second address: 5571B00 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5571B00 second address: 5571B06 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5571B06 second address: 5571B0C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5571B0C second address: 5571B10 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5571B10 second address: 5571B14 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 54D02AD second address: 54D02CA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD228B1E7D9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 54D02CA second address: 54D0344 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov di, 84A2h 0x00000007 jmp 00007FD22947DF83h 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f xchg eax, ecx 0x00000010 jmp 00007FD22947DF86h 0x00000015 push eax 0x00000016 pushad 0x00000017 mov esi, ebx 0x00000019 mov edi, 5A698480h 0x0000001e popad 0x0000001f xchg eax, ecx 0x00000020 pushad 0x00000021 mov ch, dh 0x00000023 mov edx, eax 0x00000025 popad 0x00000026 and dword ptr [ebp-04h], 00000000h 0x0000002a push eax 0x0000002b push edx 0x0000002c pushad 0x0000002d pushfd 0x0000002e jmp 00007FD22947DF85h 0x00000033 and cx, 8136h 0x00000038 jmp 00007FD22947DF81h 0x0000003d popfd 0x0000003e popad 0x0000003f rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 54D0344 second address: 54D035B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FD228B1E7D3h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 54D035B second address: 54D0392 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD22947DF89h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b lea eax, dword ptr [ebp-04h] 0x0000000e jmp 00007FD22947DF7Eh 0x00000013 nop 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 54D0392 second address: 54D0396 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 54D0396 second address: 54D03B3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD22947DF89h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 54D03B3 second address: 54D03B9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 54D03B9 second address: 54D040C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD22947DF83h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d mov dl, 0Dh 0x0000000f pushfd 0x00000010 jmp 00007FD22947DF80h 0x00000015 and al, FFFFFFD8h 0x00000018 jmp 00007FD22947DF7Bh 0x0000001d popfd 0x0000001e popad 0x0000001f nop 0x00000020 push eax 0x00000021 push edx 0x00000022 push eax 0x00000023 push edx 0x00000024 jmp 00007FD22947DF80h 0x00000029 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 54D040C second address: 54D0412 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 54D0412 second address: 54D0418 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 54D0418 second address: 54D041C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 54D041C second address: 54D0420 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 54D045E second address: 54D0464 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 54D0464 second address: 54D0468 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 54D0468 second address: 54D04D1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD228B1E7CBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b test eax, eax 0x0000000d pushad 0x0000000e pushfd 0x0000000f jmp 00007FD228B1E7D4h 0x00000014 adc eax, 23E9FB58h 0x0000001a jmp 00007FD228B1E7CBh 0x0000001f popfd 0x00000020 mov bh, cl 0x00000022 popad 0x00000023 js 00007FD29988A3CDh 0x00000029 jmp 00007FD228B1E7CBh 0x0000002e mov eax, dword ptr [ebp-04h] 0x00000031 push eax 0x00000032 push edx 0x00000033 jmp 00007FD228B1E7D5h 0x00000038 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 54B0B2A second address: 54B0B6F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FD22947DF87h 0x00000008 pushad 0x00000009 popad 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d xchg eax, ebp 0x0000000e jmp 00007FD22947DF84h 0x00000013 push eax 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007FD22947DF7Eh 0x0000001b rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 54B0B6F second address: 54B0B9D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD228B1E7CBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007FD228B1E7D6h 0x0000000f mov ebp, esp 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 mov di, si 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 54B0B9D second address: 54B0BDC instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007FD22947DF88h 0x00000008 add si, 8948h 0x0000000d jmp 00007FD22947DF7Bh 0x00000012 popfd 0x00000013 pop edx 0x00000014 pop eax 0x00000015 mov cx, 38BFh 0x00000019 popad 0x0000001a pop ebp 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e mov esi, ebx 0x00000020 mov edx, 7A2E3B8Eh 0x00000025 popad 0x00000026 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 55600BB second address: 556012D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD228B1E7D9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a pushad 0x0000000b pushfd 0x0000000c jmp 00007FD228B1E7CCh 0x00000011 adc cl, 00000058h 0x00000014 jmp 00007FD228B1E7CBh 0x00000019 popfd 0x0000001a popad 0x0000001b mov ebp, esp 0x0000001d pushad 0x0000001e pushfd 0x0000001f jmp 00007FD228B1E7CBh 0x00000024 and ax, E01Eh 0x00000029 jmp 00007FD228B1E7D9h 0x0000002e popfd 0x0000002f popad 0x00000030 pop ebp 0x00000031 push eax 0x00000032 push edx 0x00000033 push eax 0x00000034 push edx 0x00000035 push eax 0x00000036 push edx 0x00000037 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 556012D second address: 5560131 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5560131 second address: 5560135 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5560135 second address: 556013B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 556013B second address: 556014B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FD228B1E7CCh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 556014B second address: 556014F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5510D1C second address: 5510D3C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 mov dl, F5h 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a xchg eax, ebp 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FD228B1E7D3h 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5510D3C second address: 5510D90 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edx, 2EC1A0AAh 0x00000008 pushfd 0x00000009 jmp 00007FD22947DF7Bh 0x0000000e add esi, 7CBA654Eh 0x00000014 jmp 00007FD22947DF89h 0x00000019 popfd 0x0000001a popad 0x0000001b pop edx 0x0000001c pop eax 0x0000001d push eax 0x0000001e pushad 0x0000001f jmp 00007FD22947DF87h 0x00000024 push eax 0x00000025 push edx 0x00000026 mov edi, eax 0x00000028 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5510D90 second address: 5510DAD instructions: 0x00000000 rdtsc 0x00000002 mov bx, cx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 popad 0x00000008 xchg eax, ebp 0x00000009 jmp 00007FD228B1E7CCh 0x0000000e mov ebp, esp 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 popad 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5510DAD second address: 5510DB1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5510DB1 second address: 5510DB7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5510DB7 second address: 5510DC6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FD22947DF7Bh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5590923 second address: 5590975 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov esi, ebx 0x00000005 jmp 00007FD228B1E7CDh 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d xchg eax, ebp 0x0000000e jmp 00007FD228B1E7CEh 0x00000013 mov ebp, esp 0x00000015 jmp 00007FD228B1E7D0h 0x0000001a push dword ptr [ebp+0Ch] 0x0000001d push eax 0x0000001e push edx 0x0000001f jmp 00007FD228B1E7D7h 0x00000024 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 55909CD second address: 55909E9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FD22947DF88h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 55909E9 second address: 55909ED instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 55909ED second address: 5590A06 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 movzx eax, al 0x0000000b pushad 0x0000000c mov esi, 7F5D493Fh 0x00000011 popad 0x00000012 pop ebp 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 pushad 0x00000018 popad 0x00000019 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5590A06 second address: 5590A1D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD228B1E7D3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5550563 second address: 5550582 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD22947DF84h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5550582 second address: 5550586 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5550586 second address: 555058C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 555058C second address: 5550593 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov dl, 3Eh 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5550593 second address: 55505AD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 xchg eax, ebp 0x00000008 jmp 00007FD22947DF7Ah 0x0000000d mov ebp, esp 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 55505AD second address: 55505B3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 55505B3 second address: 55505EA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007FD22947DF82h 0x00000008 pop ecx 0x00000009 mov ecx, edi 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e and esp, FFFFFFF0h 0x00000011 pushad 0x00000012 movsx edi, ax 0x00000015 mov ebx, ecx 0x00000017 popad 0x00000018 sub esp, 44h 0x0000001b push eax 0x0000001c push edx 0x0000001d jmp 00007FD22947DF7Dh 0x00000022 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 55505EA second address: 55505FA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FD228B1E7CCh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 55505FA second address: 5550612 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD22947DF7Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\installer.exeRDTSC instruction interceptor: First address: 5550612 second address: 5550616 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\installer.exeSpecial instruction interceptor: First address: CBD25E instructions caused by: Self-modifying code
            Source: C:\Users\user\Desktop\installer.exeSpecial instruction interceptor: First address: CD199E instructions caused by: Self-modifying code
            Source: C:\Users\user\Desktop\installer.exeSpecial instruction interceptor: First address: D48510 instructions caused by: Self-modifying code
            Source: C:\Users\user\Desktop\installer.exeSpecial instruction interceptor: First address: CBBB23 instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: 46D25E instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: 48199E instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: 4F8510 instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: 46BB23 instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: 127D25E instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: 129199E instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: 1308510 instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: 127BB23 instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
            Source: C:\Users\user\Desktop\installer.exeCode function: 0_2_0559088A rdtsc 0_2_0559088A
            Source: C:\Users\user\Desktop\installer.exeWindow / User API: threadDelayed 1023Jump to behavior
            Source: C:\Users\user\Desktop\installer.exeWindow / User API: threadDelayed 990Jump to behavior
            Source: C:\Users\user\Desktop\installer.exeWindow / User API: threadDelayed 391Jump to behavior
            Source: C:\Users\user\Desktop\installer.exeWindow / User API: threadDelayed 1068Jump to behavior
            Source: C:\Users\user\Desktop\installer.exeWindow / User API: threadDelayed 1105Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 1163Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 403Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 1103Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 1067Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 1191Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 1080Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 374Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 1104Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 1180Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 1154Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 400Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 1107Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 1109Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 1113Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 401Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 1110Jump to behavior
            Source: C:\Users\user\Desktop\installer.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_0-16331
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_6-16125
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)
            Source: C:\Users\user\Desktop\installer.exe TID: 5724Thread sleep time: -44022s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\installer.exe TID: 3460Thread sleep count: 1023 > 30Jump to behavior
            Source: C:\Users\user\Desktop\installer.exe TID: 3460Thread sleep time: -2047023s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\installer.exe TID: 4620Thread sleep count: 102 > 30Jump to behavior
            Source: C:\Users\user\Desktop\installer.exe TID: 5712Thread sleep count: 990 > 30Jump to behavior
            Source: C:\Users\user\Desktop\installer.exe TID: 5712Thread sleep time: -1980990s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\installer.exe TID: 4620Thread sleep count: 123 > 30Jump to behavior
            Source: C:\Users\user\Desktop\installer.exe TID: 6252Thread sleep count: 391 > 30Jump to behavior
            Source: C:\Users\user\Desktop\installer.exe TID: 3108Thread sleep count: 1068 > 30Jump to behavior
            Source: C:\Users\user\Desktop\installer.exe TID: 3108Thread sleep time: -2137068s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\installer.exe TID: 1012Thread sleep count: 1105 > 30Jump to behavior
            Source: C:\Users\user\Desktop\installer.exe TID: 1012Thread sleep time: -2211105s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 6960Thread sleep count: 36 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 6960Thread sleep time: -72036s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 4972Thread sleep count: 1163 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 4972Thread sleep time: -2327163s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 2496Thread sleep count: 51 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 2496Thread sleep count: 137 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 2748Thread sleep count: 403 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 4304Thread sleep count: 1103 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 4304Thread sleep time: -2207103s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 6184Thread sleep count: 1067 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 6184Thread sleep time: -2135067s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 6684Thread sleep count: 1191 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 6684Thread sleep time: -2383191s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 3268Thread sleep count: 51 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 4988Thread sleep count: 1080 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 4988Thread sleep time: -2161080s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 3268Thread sleep count: 122 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 4568Thread sleep count: 374 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 3504Thread sleep count: 1104 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 3504Thread sleep time: -2209104s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 4000Thread sleep count: 1180 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 4000Thread sleep time: -2361180s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 4196Thread sleep count: 33 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 4196Thread sleep time: -66033s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 1428Thread sleep count: 1154 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 1428Thread sleep time: -2309154s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7024Thread sleep count: 168 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 3820Thread sleep count: 400 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 2404Thread sleep count: 1107 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 2404Thread sleep time: -2215107s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 4052Thread sleep count: 1109 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 4052Thread sleep time: -2219109s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 6316Thread sleep time: -54027s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 5668Thread sleep count: 1113 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 5668Thread sleep time: -2227113s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 4368Thread sleep count: 149 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 6780Thread sleep count: 401 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 5840Thread sleep count: 1110 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 5840Thread sleep time: -2221110s >= -30000sJump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: RageMP131.exe, RageMP131.exe, 0000000C.00000002.3364831991.000000000125F000.00000040.00000001.01000000.00000006.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__
            Source: MPGPH131.exe, 00000007.00000002.3366635395.0000000000C96000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 3c7340-61ca-11ee-8c18-806e6f6e6963}_\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}_80A358DA2
            Source: MPGPH131.exe, 00000007.00000003.2212616312.0000000000C96000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}G
            Source: installer.exe, 00000000.00000002.3366357434.00000000013F7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}D
            Source: RageMP131.exe, 0000000C.00000002.3354916992.0000000000D65000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: installer.exe, 00000000.00000002.3366357434.0000000001448000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}A
            Source: RageMP131.exe, 00000008.00000002.3354481282.00000000008CF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}\5
            Source: RageMP131.exe, 0000000C.00000002.3354916992.0000000000D65000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}8
            Source: RageMP131.exe, 0000000C.00000002.3354916992.0000000000DA8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 3c7340-61ca-11ee-8c18-806e6f6e6963}_\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}_80A358DA
            Source: RageMP131.exe, 0000000C.00000002.3354916992.0000000000D8D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&#
            Source: RageMP131.exe, 0000000C.00000003.2359805794.0000000000DA6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: installer.exe, 00000000.00000002.3366357434.0000000001434000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.3366350121.0000000001675000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3366635395.0000000000C7E000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3354916992.0000000000D8D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: installer.exe, 00000000.00000002.3366357434.0000000001434000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&X
            Source: installer.exe, 00000000.00000002.3366357434.00000000013CE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}+
            Source: RageMP131.exe, 00000008.00000002.3354481282.0000000000904000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&
            Source: RageMP131.exe, 0000000C.00000002.3354916992.0000000000D5C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}*
            Source: installer.exe, 00000000.00000002.3366247638.000000000135B000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}d
            Source: installer.exe, 00000000.00000002.3366357434.000000000143F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&165
            Source: MPGPH131.exe, 00000006.00000002.3366350121.0000000001640000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}^1{v
            Source: RageMP131.exe, 00000008.00000002.3354481282.0000000000904000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllF
            Source: RageMP131.exe, 00000008.00000002.3353547935.00000000003FC000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}X
            Source: MPGPH131.exe, 00000007.00000002.3366317336.0000000000AFC000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}T
            Source: installer.exe, 00000000.00000002.3357876371.0000000000C9F000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3357879539.000000000044F000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000007.00000002.3357930710.000000000044F000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 00000008.00000002.3364829451.000000000125F000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000C.00000002.3364831991.000000000125F000.00000040.00000001.01000000.00000006.sdmpBinary or memory string: Restart now?\\.\Oreans.vxd%s\Oreans.vxdXprotEventHARDWARE\ACPI\DSDT\VBOX__SeShutdownPrivilegeSoftware\WinLicenseCreateEvent API Error while extraction the driverGetEnvironmentVariable API Error while extraction the driverOpenSCManager API Error while extraction the driverCreateService API Error while extraction the driverCloseServiceHandle API Error while extraction the driverOpenService API Error while extraction the driverStartService API Error while extraction the driverAPIC error: Cannot find Processors Control Blocks. Please,
            Source: MPGPH131.exe, 00000007.00000002.3366635395.0000000000C2B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
            Source: C:\Users\user\Desktop\installer.exeSystem information queried: ModuleInformationJump to behavior
            Source: C:\Users\user\Desktop\installer.exeProcess information queried: ProcessInformationJump to behavior

            Anti Debugging

            barindex
            Source: C:\Users\user\Desktop\installer.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_054E010D Start: 054E014C End: 054E01506_2_054E010D
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_04CA0E07 Start: 04CA0ED7 End: 04CA0E8C7_2_04CA0E07
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_052E0235 Start: 052E0323 End: 052E031F12_2_052E0235
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: regmonclass
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: gbdyllo
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: procmon_window_class
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: ollydbg
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: filemonclass
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: NTICE
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: SICE
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: SIWVID
            Source: C:\Users\user\Desktop\installer.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\installer.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\installer.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\installer.exeCode function: 0_2_0559088A rdtsc 0_2_0559088A
            Source: installer.exe, 00000000.00000002.3357876371.0000000000C9F000.00000040.00000001.01000000.00000003.sdmp, RageMP131.exe, 0000000C.00000002.3364831991.000000000125F000.00000040.00000001.01000000.00000006.sdmpBinary or memory string: o(c}>Program Manager
            Source: installer.exe, installer.exe, 00000000.00000002.3357876371.0000000000C9F000.00000040.00000001.01000000.00000003.sdmp, RageMP131.exe, RageMP131.exe, 0000000C.00000002.3364831991.000000000125F000.00000040.00000001.01000000.00000006.sdmpBinary or memory string: (c}>Program Manager
            Source: C:\Users\user\Desktop\installer.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\installer.exeCode function: 0_2_009C361D GetSystemTimePreciseAsFileTime,GetSystemTimePreciseAsFileTime,0_2_009C361D
            Source: C:\Users\user\Desktop\installer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: Process Memory Space: installer.exe PID: 4868, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 3896, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 5040, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 4828, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 6108, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: Process Memory Space: installer.exe PID: 4868, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 3896, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 5040, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 4828, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 6108, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
            Command and Scripting Interpreter
            1
            Scheduled Task/Job
            2
            Process Injection
            1
            Masquerading
            OS Credential Dumping1
            System Time Discovery
            Remote Services1
            Archive Collected Data
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts1
            Scheduled Task/Job
            1
            Registry Run Keys / Startup Folder
            1
            Scheduled Task/Job
            24
            Virtualization/Sandbox Evasion
            LSASS Memory741
            Security Software Discovery
            Remote Desktop ProtocolData from Removable Media1
            Non-Standard Port
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAt1
            DLL Side-Loading
            1
            Registry Run Keys / Startup Folder
            2
            Process Injection
            Security Account Manager24
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared Drive1
            Ingress Tool Transfer
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
            DLL Side-Loading
            1
            Deobfuscate/Decode Files or Information
            NTDS2
            Process Discovery
            Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
            Obfuscated Files or Information
            LSA Secrets1
            Application Window Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts12
            Software Packing
            Cached Domain Credentials214
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            DLL Side-Loading
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 1464451 Sample: installer.exe Startdate: 28/06/2024 Architecture: WINDOWS Score: 100 36 Snort IDS alert for network traffic 2->36 38 Multi AV Scanner detection for submitted file 2->38 40 Yara detected RisePro Stealer 2->40 42 4 other signatures 2->42 7 installer.exe 1 9 2->7         started        12 RageMP131.exe 2 2->12         started        14 MPGPH131.exe 2 2->14         started        16 2 other processes 2->16 process3 dnsIp4 34 77.91.77.66, 49712, 49713, 49714 FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRU Russian Federation 7->34 26 C:\Users\user\AppData\Local\...\RageMP131.exe, PE32 7->26 dropped 28 C:\ProgramData\MPGPH131\MPGPH131.exe, PE32 7->28 dropped 30 C:\Users\...\RageMP131.exe:Zone.Identifier, ASCII 7->30 dropped 32 C:\...\MPGPH131.exe:Zone.Identifier, ASCII 7->32 dropped 44 Detected unpacking (changes PE section rights) 7->44 46 Found stalling execution ending in API Sleep call 7->46 48 Uses schtasks.exe or at.exe to add and modify task schedules 7->48 50 Tries to detect virtualization through RDTSC time measurements 7->50 18 schtasks.exe 1 7->18         started        20 schtasks.exe 1 7->20         started        52 Multi AV Scanner detection for dropped file 12->52 54 Tries to detect sandboxes and other dynamic analysis tools (window names) 12->54 56 Machine Learning detection for dropped file 12->56 58 Tries to evade debugger and weak emulator (self modifying code) 14->58 60 Hides threads from debuggers 14->60 62 Potentially malicious time measurement code found 14->62 64 Tries to detect sandboxes / dynamic malware analysis system (registry check) 16->64 66 Tries to detect process monitoring tools (Task Manager, Process Explorer etc.) 16->66 file5 signatures6 process7 process8 22 conhost.exe 18->22         started        24 conhost.exe 20->24         started       

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            installer.exe68%ReversingLabsWin32.Trojan.RisePro
            installer.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\RageMP131\RageMP131.exe100%Joe Sandbox ML
            C:\ProgramData\MPGPH131\MPGPH131.exe100%Joe Sandbox ML
            C:\ProgramData\MPGPH131\MPGPH131.exe68%ReversingLabsWin32.Trojan.RisePro
            C:\Users\user\AppData\Local\RageMP131\RageMP131.exe68%ReversingLabsWin32.Trojan.RisePro
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://www.winimage.com/zLibDll0%URL Reputationsafe
            https://ipinfo.io/0%URL Reputationsafe
            https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll0%Avira URL Cloudsafe
            https://t.me/RiseProSUPPORTS0%Avira URL Cloudsafe
            https://t.me/RiseProSUPPORT0%Avira URL Cloudsafe
            https://www.maxmind.com/en/locate-my-ip-address0%Avira URL Cloudsafe
            No contacted domains info
            NameSourceMaliciousAntivirus DetectionReputation
            https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dllinstaller.exe, 00000000.00000003.2124792716.0000000005300000.00000004.00001000.00020000.00000000.sdmp, installer.exe, 00000000.00000002.3353671863.0000000000991000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3353733620.0000000000141000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000006.00000003.2190833961.0000000005260000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3353611302.0000000000141000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000007.00000003.2191242486.0000000004A40000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000002.3363611949.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 00000008.00000003.2258761527.0000000004B90000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3363481001.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000C.00000003.2342289255.0000000005080000.00000004.00001000.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.winimage.com/zLibDllinstaller.exe, 00000000.00000003.2124792716.0000000005300000.00000004.00001000.00020000.00000000.sdmp, installer.exe, 00000000.00000002.3353671863.0000000000991000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3353733620.0000000000141000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000006.00000003.2190833961.0000000005260000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3353611302.0000000000141000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000007.00000003.2191242486.0000000004A40000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000002.3363611949.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 00000008.00000003.2258761527.0000000004B90000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3363481001.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000C.00000003.2342289255.0000000005080000.00000004.00001000.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://t.me/RiseProSUPPORTinstaller.exe, 00000000.00000002.3366357434.00000000013CE000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.3366350121.000000000160E000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3366635395.0000000000C2B000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000002.3354481282.000000000089E000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3354916992.0000000000D3B000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://t.me/RiseProSUPPORTSRageMP131.exe, 00000008.00000002.3354481282.000000000089E000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://ipinfo.io/RageMP131.exefalse
            • URL Reputation: safe
            unknown
            https://www.maxmind.com/en/locate-my-ip-addressRageMP131.exefalse
            • Avira URL Cloud: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            77.91.77.66
            unknownRussian Federation
            42861FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRUtrue
            Joe Sandbox version:40.0.0 Tourmaline
            Analysis ID:1464451
            Start date and time:2024-06-28 21:09:07 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 8m 23s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:14
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:installer.exe
            Detection:MAL
            Classification:mal100.troj.evad.winEXE@11/5@0/1
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:Failed
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
            • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            • VT rate limit hit for: installer.exe
            TimeTypeDescription
            15:10:26API Interceptor1151821x Sleep call for process: installer.exe modified
            15:10:33API Interceptor1338018x Sleep call for process: MPGPH131.exe modified
            15:10:40API Interceptor856147x Sleep call for process: RageMP131.exe modified
            21:10:01AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run RageMP131 C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
            21:10:02Task SchedulerRun new task: MPGPH131 HR path: C:\ProgramData\MPGPH131\MPGPH131.exe
            21:10:02Task SchedulerRun new task: MPGPH131 LG path: C:\ProgramData\MPGPH131\MPGPH131.exe
            21:10:09AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run RageMP131 C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            77.91.77.66file.exeGet hashmaliciousRisePro StealerBrowse
              90ZF1EDs9h.exeGet hashmaliciousRisePro StealerBrowse
                Ke5ufWcgxp.exeGet hashmaliciousRisePro StealerBrowse
                  BqqQh4Jr7L.exeGet hashmaliciousRisePro StealerBrowse
                    file.exeGet hashmaliciousRisePro StealerBrowse
                      file.exeGet hashmaliciousRisePro StealerBrowse
                        plTAoSCew2.exeGet hashmaliciousRisePro StealerBrowse
                          7rA1iX60wh.exeGet hashmaliciousRisePro StealerBrowse
                            PNO3otPYOa.exeGet hashmaliciousRisePro StealerBrowse
                              YnsEArPlqx.exeGet hashmaliciousRisePro StealerBrowse
                                No context
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRUjYXfxdLoiV.pdfGet hashmaliciousGRQ ScamBrowse
                                • 77.91.77.34
                                j7iUba2bki.exeGet hashmaliciousAmadey, Mars Stealer, Stealc, VidarBrowse
                                • 77.91.77.82
                                1Cvd8TyYPm.exeGet hashmaliciousLummaC, Mars Stealer, PureLog Stealer, Stealc, Vidar, Xmrig, zgRATBrowse
                                • 77.91.77.80
                                ukuWaeRgPR.exeGet hashmaliciousAmadey, Mars Stealer, Stealc, VidarBrowse
                                • 77.91.77.82
                                tAa6xNsucX.exeGet hashmaliciousAmadey, Mars Stealer, Stealc, VidarBrowse
                                • 77.91.77.81
                                1Vkf7silOj.exeGet hashmaliciousLummaC, Amadey, Mars Stealer, PureLog Stealer, RedLine, SmokeLoader, StealcBrowse
                                • 77.91.77.81
                                wqmnYoVbHr.exeGet hashmaliciousAmadey, Mars Stealer, Stealc, VidarBrowse
                                • 77.91.77.81
                                EZrw1nNIpG.exeGet hashmaliciousAmadey, Mars Stealer, Stealc, VidarBrowse
                                • 77.91.77.81
                                file.exeGet hashmaliciousRisePro StealerBrowse
                                • 77.91.77.66
                                hsRju5CPK2.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, PureLog Stealer, RedLine, zgRATBrowse
                                • 77.91.77.81
                                No context
                                No context
                                Process:C:\Users\user\Desktop\installer.exe
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):2402816
                                Entropy (8bit):7.963073123261248
                                Encrypted:false
                                SSDEEP:49152:n6CEHkNJDeZ2sZb3l+8R9lko90cf423IC/bVAvOe8HPPRgnda6cv3mVQdw:nikuZB13l+87lko90cf423z6vOeg2d86
                                MD5:A0E213177EE87CBB5EC32BEF195BBFA9
                                SHA1:6265B138B96D83B070CE14CC16E528BDF68AA160
                                SHA-256:141BE7789497012B7911CABB1307E25E19F747E2E8FB5375F9CDDFF7E5F28265
                                SHA-512:421A34499B2C6B74DB08C527CC9FC11C0D590E0572FE8CB4FD8A4BF857E396F3FAC892FDF944DC8A9E63AA3B57A0C2585EF8BE2CF5F36F897110890540A4B54F
                                Malicious:true
                                Antivirus:
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: ReversingLabs, Detection: 68%
                                Reputation:low
                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......j.....s...s...s.e.p.%.s.e.v...s.e.t./.s..y..*.s..yw.=.s..yp.4.s..yv.u.s.e.w.6.s.e.u./.s.e.r.5.s...r...s..zz.2.s..z../.s..../.s..zq./.s.Rich..s.................PE..L....iLf...............'.....|........]...........@...........................^......x%...@.................................^...r.......8.....................].............................P.]..............................6..@................... . ............................@....rsrc...8...........................@....idata ............................@... .@+.........................@...iolmakfn......D.....................@...rrgdmorv......].......$.............@....taggant.0....].."....$.............@...........................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\installer.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):26
                                Entropy (8bit):3.95006375643621
                                Encrypted:false
                                SSDEEP:3:ggPYV:rPYV
                                MD5:187F488E27DB4AF347237FE461A079AD
                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                Malicious:true
                                Reputation:high, very likely benign file
                                Preview:[ZoneTransfer]....ZoneId=0
                                Process:C:\Users\user\Desktop\installer.exe
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):2402816
                                Entropy (8bit):7.963073123261248
                                Encrypted:false
                                SSDEEP:49152:n6CEHkNJDeZ2sZb3l+8R9lko90cf423IC/bVAvOe8HPPRgnda6cv3mVQdw:nikuZB13l+87lko90cf423z6vOeg2d86
                                MD5:A0E213177EE87CBB5EC32BEF195BBFA9
                                SHA1:6265B138B96D83B070CE14CC16E528BDF68AA160
                                SHA-256:141BE7789497012B7911CABB1307E25E19F747E2E8FB5375F9CDDFF7E5F28265
                                SHA-512:421A34499B2C6B74DB08C527CC9FC11C0D590E0572FE8CB4FD8A4BF857E396F3FAC892FDF944DC8A9E63AA3B57A0C2585EF8BE2CF5F36F897110890540A4B54F
                                Malicious:true
                                Antivirus:
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: ReversingLabs, Detection: 68%
                                Reputation:low
                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......j.....s...s...s.e.p.%.s.e.v...s.e.t./.s..y..*.s..yw.=.s..yp.4.s..yv.u.s.e.w.6.s.e.u./.s.e.r.5.s...r...s..zz.2.s..z../.s..../.s..zq./.s.Rich..s.................PE..L....iLf...............'.....|........]...........@...........................^......x%...@.................................^...r.......8.....................].............................P.]..............................6..@................... . ............................@....rsrc...8...........................@....idata ............................@... .@+.........................@...iolmakfn......D.....................@...rrgdmorv......].......$.............@....taggant.0....].."....$.............@...........................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\installer.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):26
                                Entropy (8bit):3.95006375643621
                                Encrypted:false
                                SSDEEP:3:ggPYV:rPYV
                                MD5:187F488E27DB4AF347237FE461A079AD
                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                Malicious:true
                                Reputation:high, very likely benign file
                                Preview:[ZoneTransfer]....ZoneId=0
                                Process:C:\Users\user\Desktop\installer.exe
                                File Type:ASCII text, with no line terminators
                                Category:modified
                                Size (bytes):13
                                Entropy (8bit):2.7192945256669794
                                Encrypted:false
                                SSDEEP:3:L7XS6W:X/W
                                MD5:B7FD846280A7C3D53B785A393A4EC861
                                SHA1:8F62D2C8C2E8CA6CB9A2D8AE1B6B41DF69937C8F
                                SHA-256:31E9906EC844DBC68CC70B72497B71705E75585BEC6E12C76FD12DB73374459B
                                SHA-512:4E620FB78E04DD0264F10594AFD7547EC8EBB5A8280ECA13C1F9A9DB7261633F954C19A8DE0B8FAC93D4D187F4B7D77729758C4D5061BB48FF7D3F58AF324902
                                Malicious:false
                                Reputation:low
                                Preview:1719608074981
                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Entropy (8bit):7.963073123261248
                                TrID:
                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                • Generic Win/DOS Executable (2004/3) 0.02%
                                • DOS Executable Generic (2002/1) 0.02%
                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                File name:installer.exe
                                File size:2'402'816 bytes
                                MD5:a0e213177ee87cbb5ec32bef195bbfa9
                                SHA1:6265b138b96d83b070ce14cc16e528bdf68aa160
                                SHA256:141be7789497012b7911cabb1307e25e19f747e2e8fb5375f9cddff7e5f28265
                                SHA512:421a34499b2c6b74db08c527cc9fc11c0d590e0572fe8cb4fd8a4bf857e396f3fac892fdf944dc8a9e63aa3b57a0c2585ef8be2cf5f36f897110890540a4b54f
                                SSDEEP:49152:n6CEHkNJDeZ2sZb3l+8R9lko90cf423IC/bVAvOe8HPPRgnda6cv3mVQdw:nikuZB13l+87lko90cf423z6vOeg2d86
                                TLSH:FBB5337D6AE04A2BCD196EB1D0735B0067E6747858C01F31EB980D261E5B3D0B2BEB5B
                                File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......j.....s...s...s.e.p.%.s.e.v...s.e.t./.s..y..*.s..yw.=.s..yp.4.s..yv.u.s.e.w.6.s.e.u./.s.e.r.5.s...r...s..zz.2.s..z../.s...../.s
                                Icon Hash:8596a1a0a1a1b171
                                Entrypoint:0x9dd000
                                Entrypoint Section:.taggant
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                Time Stamp:0x664C6914 [Tue May 21 09:27:48 2024 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:6
                                OS Version Minor:0
                                File Version Major:6
                                File Version Minor:0
                                Subsystem Version Major:6
                                Subsystem Version Minor:0
                                Import Hash:2eabe9054cad5152567f0699947a2c5b
                                Instruction
                                jmp 00007FD22909E22Ah
                                js 00007FD22909E24Ah
                                add byte ptr [eax], al
                                jmp 00007FD2290A0225h
                                add byte ptr [edx+ecx], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                xor byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                push es
                                add byte ptr [eax], 00000000h
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                adc byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add eax, 0000000Ah
                                add byte ptr [eax], al
                                add byte ptr [eax], dh
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], ah
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [ecx], ah
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [ecx], al
                                add byte ptr [eax], 00000000h
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                adc byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add ecx, dword ptr [edx]
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                inc eax
                                or al, byte ptr [eax]
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [ecx], al
                                add byte ptr [eax], 00000000h
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                adc byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add cl, byte ptr [edx]
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                inc eax
                                or al, byte ptr [eax]
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [esi], al
                                add byte ptr [eax], 00000000h
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x18c05e0x72.idata
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x18a0000x1638.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x5db0a00x10iolmakfn
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x5db0500x18iolmakfn
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x18369c0x40
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                0x10000x1890000xab400c701a85cecf3b3f22a78ad90707dd02fFalse0.9983676437043796data7.983217514944371IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .rsrc0x18a0000x16380x1800fe6f3fdb9e7e97cba92d8ce4e4fcc95bFalse0.7220052083333334data6.54017046361188IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .idata 0x18c0000x10000x2000e14477ce436cc9ebd87f17a92173639False0.1640625data1.180504109820196IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                0x18d0000x2b40000x2002b1e4d974d2a744f1ad1e8f8a9813fb3unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                iolmakfn0x4410000x19b0000x19a2001b1ea038225ab9e28bd80c96a1b0f863False0.9944186223712282data7.952587985100504IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                rrgdmorv0x5dc0000x10000x6008c23be9ee6595eb32eadfb5a3f1a2003False0.5963541666666666data5.138385364628414IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .taggant0x5dd0000x30000x2200fbede7870e45c66f6df0ff589c9c41e5False0.04607077205882353DOS executable (COM)0.46755545145268296IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                RT_ICON0x18a4400x1060PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedRussianRussia0.8838263358778626
                                RT_GROUP_ICON0x18b4a00x14dataRussianRussia1.05
                                RT_VERSION0x18a1300x310dataRussianRussia0.45408163265306123
                                RT_MANIFEST0x18b4b80x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                                DLLImport
                                kernel32.dlllstrcpy
                                Language of compilation systemCountry where language is spokenMap
                                RussianRussia
                                EnglishUnited States
                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                06/28/24-21:10:01.833498TCP2049060ET TROJAN RisePro TCP Heartbeat Packet4971258709192.168.2.677.91.77.66
                                TimestampSource PortDest PortSource IPDest IP
                                Jun 28, 2024 21:10:01.800635099 CEST4971258709192.168.2.677.91.77.66
                                Jun 28, 2024 21:10:01.805669069 CEST587094971277.91.77.66192.168.2.6
                                Jun 28, 2024 21:10:01.805752039 CEST4971258709192.168.2.677.91.77.66
                                Jun 28, 2024 21:10:01.833498001 CEST4971258709192.168.2.677.91.77.66
                                Jun 28, 2024 21:10:01.838398933 CEST587094971277.91.77.66192.168.2.6
                                Jun 28, 2024 21:10:03.543785095 CEST587094971277.91.77.66192.168.2.6
                                Jun 28, 2024 21:10:03.543842077 CEST4971258709192.168.2.677.91.77.66
                                Jun 28, 2024 21:10:07.376029015 CEST4971358709192.168.2.677.91.77.66
                                Jun 28, 2024 21:10:07.378325939 CEST4971458709192.168.2.677.91.77.66
                                Jun 28, 2024 21:10:07.380923986 CEST587094971377.91.77.66192.168.2.6
                                Jun 28, 2024 21:10:07.381010056 CEST4971358709192.168.2.677.91.77.66
                                Jun 28, 2024 21:10:07.383158922 CEST587094971477.91.77.66192.168.2.6
                                Jun 28, 2024 21:10:07.383228064 CEST4971458709192.168.2.677.91.77.66
                                Jun 28, 2024 21:10:07.408123016 CEST4971358709192.168.2.677.91.77.66
                                Jun 28, 2024 21:10:07.412668943 CEST4971458709192.168.2.677.91.77.66
                                Jun 28, 2024 21:10:07.413063049 CEST587094971377.91.77.66192.168.2.6
                                Jun 28, 2024 21:10:07.417433023 CEST587094971477.91.77.66192.168.2.6
                                Jun 28, 2024 21:10:09.146461010 CEST587094971477.91.77.66192.168.2.6
                                Jun 28, 2024 21:10:09.146630049 CEST4971458709192.168.2.677.91.77.66
                                Jun 28, 2024 21:10:09.147983074 CEST587094971377.91.77.66192.168.2.6
                                Jun 28, 2024 21:10:09.148058891 CEST4971358709192.168.2.677.91.77.66
                                Jun 28, 2024 21:10:13.325586081 CEST4971658709192.168.2.677.91.77.66
                                Jun 28, 2024 21:10:13.419960976 CEST587094971677.91.77.66192.168.2.6
                                Jun 28, 2024 21:10:13.420197010 CEST4971658709192.168.2.677.91.77.66
                                Jun 28, 2024 21:10:13.438668966 CEST4971658709192.168.2.677.91.77.66
                                Jun 28, 2024 21:10:13.443630934 CEST587094971677.91.77.66192.168.2.6
                                Jun 28, 2024 21:10:15.259150982 CEST587094971677.91.77.66192.168.2.6
                                Jun 28, 2024 21:10:15.259269953 CEST4971658709192.168.2.677.91.77.66
                                Jun 28, 2024 21:10:22.090804100 CEST4972258709192.168.2.677.91.77.66
                                Jun 28, 2024 21:10:22.095841885 CEST587094972277.91.77.66192.168.2.6
                                Jun 28, 2024 21:10:22.096249104 CEST4972258709192.168.2.677.91.77.66
                                Jun 28, 2024 21:10:22.126061916 CEST4972258709192.168.2.677.91.77.66
                                Jun 28, 2024 21:10:22.130995989 CEST587094972277.91.77.66192.168.2.6
                                Jun 28, 2024 21:10:23.821499109 CEST587094972277.91.77.66192.168.2.6
                                Jun 28, 2024 21:10:23.821680069 CEST4972258709192.168.2.677.91.77.66

                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:15:09:55
                                Start date:28/06/2024
                                Path:C:\Users\user\Desktop\installer.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\installer.exe"
                                Imagebase:0x990000
                                File size:2'402'816 bytes
                                MD5 hash:A0E213177EE87CBB5EC32BEF195BBFA9
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low
                                Has exited:false

                                Target ID:2
                                Start time:15:10:00
                                Start date:28/06/2024
                                Path:C:\Windows\SysWOW64\schtasks.exe
                                Wow64 process (32bit):true
                                Commandline:schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
                                Imagebase:0x560000
                                File size:187'904 bytes
                                MD5 hash:48C2FE20575769DE916F48EF0676A965
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:3
                                Start time:15:10:00
                                Start date:28/06/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff66e660000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:4
                                Start time:15:10:00
                                Start date:28/06/2024
                                Path:C:\Windows\SysWOW64\schtasks.exe
                                Wow64 process (32bit):true
                                Commandline:schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
                                Imagebase:0x560000
                                File size:187'904 bytes
                                MD5 hash:48C2FE20575769DE916F48EF0676A965
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:5
                                Start time:15:10:00
                                Start date:28/06/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff66e660000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:6
                                Start time:15:10:02
                                Start date:28/06/2024
                                Path:C:\ProgramData\MPGPH131\MPGPH131.exe
                                Wow64 process (32bit):true
                                Commandline:C:\ProgramData\MPGPH131\MPGPH131.exe
                                Imagebase:0x140000
                                File size:2'402'816 bytes
                                MD5 hash:A0E213177EE87CBB5EC32BEF195BBFA9
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Antivirus matches:
                                • Detection: 100%, Joe Sandbox ML
                                • Detection: 68%, ReversingLabs
                                Reputation:low
                                Has exited:false

                                Target ID:7
                                Start time:15:10:02
                                Start date:28/06/2024
                                Path:C:\ProgramData\MPGPH131\MPGPH131.exe
                                Wow64 process (32bit):true
                                Commandline:C:\ProgramData\MPGPH131\MPGPH131.exe
                                Imagebase:0x140000
                                File size:2'402'816 bytes
                                MD5 hash:A0E213177EE87CBB5EC32BEF195BBFA9
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low
                                Has exited:false

                                Target ID:8
                                Start time:15:10:09
                                Start date:28/06/2024
                                Path:C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
                                Imagebase:0xf50000
                                File size:2'402'816 bytes
                                MD5 hash:A0E213177EE87CBB5EC32BEF195BBFA9
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Antivirus matches:
                                • Detection: 100%, Joe Sandbox ML
                                • Detection: 68%, ReversingLabs
                                Reputation:low
                                Has exited:false

                                Target ID:12
                                Start time:15:10:17
                                Start date:28/06/2024
                                Path:C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
                                Imagebase:0xf50000
                                File size:2'402'816 bytes
                                MD5 hash:A0E213177EE87CBB5EC32BEF195BBFA9
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Reputation:low
                                Has exited:false

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:3.5%
                                  Dynamic/Decrypted Code Coverage:1.4%
                                  Signature Coverage:2.4%
                                  Total number of Nodes:1839
                                  Total number of Limit Nodes:28
                                  execution_graph 18684 559001b 18685 5590028 18684->18685 18686 55902d7 GetCurrentHwProfileW 18685->18686 18687 55902d2 GetCurrentHwProfileW 18685->18687 18686->18685 18689 5590328 18687->18689 18436 559025c 18437 55902d2 GetCurrentHwProfileW 18436->18437 18439 5590264 18436->18439 18441 5590328 18437->18441 18439->18437 18440 55902d7 GetCurrentHwProfileW 18439->18440 18440->18439 18236 559014c 18238 5590153 18236->18238 18239 55902d2 GetCurrentHwProfileW 18238->18239 18242 55902d7 18238->18242 18241 5590328 18239->18241 18243 55902e7 GetCurrentHwProfileW 18242->18243 18245 5590328 18243->18245 18710 5590000 18713 5590009 18710->18713 18715 5590028 18713->18715 18714 55902d7 GetCurrentHwProfileW 18714->18715 18715->18714 18716 55902d2 GetCurrentHwProfileW 18715->18716 18718 5590328 18716->18718 16327 a57b00 16328 a57ecc 16327->16328 16344 a57b3e std::ios_base::_Ios_base_dtor __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 16327->16344 16329 a57b87 setsockopt recv 16329->16344 16331 a57eb7 Sleep 16331->16328 16331->16344 16332 a57e15 recv 16334 a57eaf Sleep 16332->16334 16334->16331 16336 a57c2d recv 16337 a57c4e recv 16336->16337 16336->16344 16337->16344 16338 a57ee1 16437 9c8c70 16338->16437 16340 a57cb3 16343 9a8dc0 2 API calls 16340->16343 16346 a57d05 recv 16340->16346 16343->16340 16344->16328 16344->16329 16344->16331 16344->16332 16344->16334 16344->16338 16344->16340 16348 a58590 WSAStartup 16344->16348 16354 9a8dc0 16344->16354 16363 9a63b0 16344->16363 16368 a57ef0 16344->16368 16424 9c3069 16344->16424 16427 999280 16344->16427 16346->16344 16349 a585c8 16348->16349 16350 a58686 16348->16350 16349->16350 16351 a58654 socket 16349->16351 16350->16344 16351->16350 16352 a5866a connect 16351->16352 16352->16350 16353 a5867c closesocket 16352->16353 16353->16350 16353->16351 16356 9a8de2 std::locale::_Setgloballocale 16354->16356 16357 9a8e11 16354->16357 16355 9a8ef8 16356->16336 16357->16355 16440 9932d0 16357->16440 16359 9a8e66 std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 16360 9a8ecb std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 16359->16360 16454 992fe0 16359->16454 16360->16336 16362 9a8eb8 16362->16336 16365 9a63d8 16363->16365 16364 9a63e7 16364->16344 16365->16364 16366 9932d0 std::_Throw_Cpp_error 2 API calls 16365->16366 16367 9a642a std::_Locinfo::_Locinfo_ctor 16366->16367 16367->16344 16369 a57f6c 16368->16369 16370 a57f3e 16368->16370 16372 a57f74 16369->16372 16373 a57f8e 16369->16373 16371 992cf0 std::_Throw_Cpp_error 2 API calls 16370->16371 16374 a57f50 16371->16374 16646 9a6290 16372->16646 16376 a57f96 16373->16376 16377 a57fb0 16373->16377 16381 999280 3 API calls 16374->16381 16378 9a6290 2 API calls 16376->16378 16379 a57fd5 16377->16379 16380 a57fb8 16377->16380 16386 a57f64 16378->16386 16382 a57fdd 16379->16382 16383 a57ffb 16379->16383 16384 9a6290 2 API calls 16380->16384 16380->16386 16381->16386 16650 9d12b7 16382->16650 16383->16386 16387 a582c0 16383->16387 16388 a5801b 16383->16388 16384->16386 16386->16344 16389 a582c8 16387->16389 16390 a5831b 16387->16390 16609 995400 16388->16609 16679 9ab430 16389->16679 16393 a58376 16390->16393 16394 a58323 16390->16394 16395 a583d1 16393->16395 16396 a5837e 16393->16396 16397 9ab430 3 API calls 16394->16397 16399 a5842c 16395->16399 16400 a583d9 16395->16400 16398 9ab430 3 API calls 16396->16398 16397->16386 16398->16386 16403 a58484 16399->16403 16404 a58434 16399->16404 16402 9ab430 3 API calls 16400->16402 16402->16386 16403->16386 16686 9e8b00 16403->16686 16405 9ab430 3 API calls 16404->16405 16405->16386 16408 a58040 16408->16386 16409 a5810b 16408->16409 16619 992cf0 16408->16619 16623 9aace0 16408->16623 16626 992d30 16409->16626 16413 a58140 16414 a581b2 16413->16414 16415 a581e5 16413->16415 16416 9a63b0 std::_Throw_Cpp_error 2 API calls 16414->16416 16643 9c9820 16415->16643 16418 a581ce 16416->16418 16656 a5f280 16418->16656 18230 9c361d 16424->18230 16428 9a63b0 std::_Throw_Cpp_error 2 API calls 16427->16428 16429 9992d4 16428->16429 16430 9a8dc0 2 API calls 16429->16430 16431 999523 std::_Locinfo::_Locinfo_ctor 16429->16431 16430->16431 16432 9996e2 std::ios_base::_Ios_base_dtor 16431->16432 16434 9996b6 WSASend 16431->16434 16433 99975d std::ios_base::_Ios_base_dtor 16432->16433 16435 9c8c70 std::_Throw_Cpp_error RtlAllocateHeap 16432->16435 16433->16344 16434->16431 16434->16432 16436 99979c 16435->16436 16436->16344 16438 9c8bac ___std_exception_copy RtlAllocateHeap 16437->16438 16439 9c8c7f __Getctype 16438->16439 16441 9932e2 16440->16441 16442 993306 16440->16442 16443 9932e9 16441->16443 16444 99331f 16441->16444 16445 993318 16442->16445 16448 9c3672 std::_Facet_Register 2 API calls 16442->16448 16459 9c3672 16443->16459 16467 992b50 16444->16467 16445->16359 16450 993310 16448->16450 16449 9932ef 16451 9c8c70 std::_Throw_Cpp_error RtlAllocateHeap 16449->16451 16452 9932f8 16449->16452 16450->16359 16453 993329 16451->16453 16452->16359 16455 993017 std::ios_base::_Ios_base_dtor 16454->16455 16456 993007 16454->16456 16455->16362 16456->16455 16457 9c8c70 std::_Throw_Cpp_error RtlAllocateHeap 16456->16457 16458 993036 16457->16458 16461 9c3677 std::_Facet_Register 16459->16461 16462 9c3691 16461->16462 16464 992b50 Concurrency::cancel_current_task 16461->16464 16471 9d23ec 16461->16471 16462->16449 16463 9c369d 16463->16463 16464->16463 16477 9c4b15 16464->16477 16468 992b5e Concurrency::cancel_current_task 16467->16468 16469 9c4b15 ___std_exception_copy 2 API calls 16468->16469 16470 992bac 16469->16470 16470->16449 16476 9db094 __Getctype std::_Facet_Register 16471->16476 16472 9db0d2 16485 9d16ff 16472->16485 16474 9db0bd RtlAllocateHeap 16475 9db0d0 16474->16475 16474->16476 16475->16461 16476->16472 16476->16474 16478 9c4b22 16477->16478 16484 992bac 16477->16484 16479 9d23ec ___std_exception_copy 2 API calls 16478->16479 16478->16484 16480 9c4b3f 16479->16480 16481 9c4b4f 16480->16481 16547 9d99a5 16480->16547 16556 9d1c96 16481->16556 16484->16449 16488 9d9f93 16485->16488 16489 9d9f9c __Getctype 16488->16489 16496 9d1704 16489->16496 16499 9da65a 16489->16499 16491 9d9fe0 __Getctype 16492 9d9fe8 __Getctype 16491->16492 16493 9da020 16491->16493 16503 9db01a 16492->16503 16507 9d9c70 16493->16507 16496->16475 16498 9db01a ___std_exception_copy RtlAllocateHeap 16498->16496 16502 9da667 __Getctype std::_Facet_Register 16499->16502 16500 9da692 RtlAllocateHeap 16501 9da6a5 ___std_exception_copy 16500->16501 16500->16502 16501->16491 16502->16500 16502->16501 16504 9db04f 16503->16504 16505 9db025 ___std_exception_copy 16503->16505 16504->16496 16505->16504 16506 9d16ff ___std_exception_copy RtlAllocateHeap 16505->16506 16506->16504 16508 9d9cde __Getctype 16507->16508 16511 9d9c16 16508->16511 16510 9d9d07 16510->16498 16512 9d9c22 std::_Lockit::_Lockit std::locale::_Setgloballocale 16511->16512 16515 9d9df7 16512->16515 16514 9d9c44 __Getctype 16514->16510 16516 9d9e06 __Getctype 16515->16516 16518 9d9e2d __Getctype 16515->16518 16516->16518 16519 9e2146 16516->16519 16518->16514 16521 9e21c6 16519->16521 16522 9e215c 16519->16522 16520 9e22b7 __Getctype RtlAllocateHeap 16523 9e2222 16520->16523 16524 9db01a ___std_exception_copy RtlAllocateHeap 16521->16524 16545 9e2214 16521->16545 16522->16521 16528 9db01a ___std_exception_copy RtlAllocateHeap 16522->16528 16529 9e218f 16522->16529 16534 9e2282 16523->16534 16546 9db01a RtlAllocateHeap ___std_exception_copy 16523->16546 16525 9e21e8 16524->16525 16526 9db01a ___std_exception_copy RtlAllocateHeap 16525->16526 16530 9e21fb 16526->16530 16527 9db01a ___std_exception_copy RtlAllocateHeap 16533 9e21bb 16527->16533 16535 9e2184 16528->16535 16531 9db01a ___std_exception_copy RtlAllocateHeap 16529->16531 16544 9e21b1 16529->16544 16532 9db01a ___std_exception_copy RtlAllocateHeap 16530->16532 16536 9e21a6 16531->16536 16537 9e2209 16532->16537 16538 9db01a ___std_exception_copy RtlAllocateHeap 16533->16538 16539 9db01a ___std_exception_copy RtlAllocateHeap 16534->16539 16540 9e144a __Getctype RtlAllocateHeap 16535->16540 16541 9e18a9 __Getctype RtlAllocateHeap 16536->16541 16542 9db01a ___std_exception_copy RtlAllocateHeap 16537->16542 16538->16521 16543 9e2288 16539->16543 16540->16529 16541->16544 16542->16545 16543->16518 16544->16527 16545->16520 16546->16523 16548 9d99b3 16547->16548 16550 9d99c1 16547->16550 16548->16550 16554 9d99d9 16548->16554 16549 9d16ff ___std_exception_copy RtlAllocateHeap 16551 9d99c9 16549->16551 16550->16549 16559 9c8c60 16551->16559 16552 9d99d3 16552->16481 16554->16552 16555 9d16ff ___std_exception_copy RtlAllocateHeap 16554->16555 16555->16551 16557 9db01a ___std_exception_copy RtlAllocateHeap 16556->16557 16558 9d1cae 16557->16558 16558->16484 16562 9c8bac 16559->16562 16563 9c8bbe ___std_exception_copy 16562->16563 16568 9c8be3 16563->16568 16565 9c8bd6 16575 9c899c 16565->16575 16569 9c8bf3 16568->16569 16572 9c8bfa ___std_exception_copy __Getctype 16568->16572 16581 9c8a01 16569->16581 16571 9c8c08 16571->16565 16572->16571 16573 9c8bac ___std_exception_copy RtlAllocateHeap 16572->16573 16574 9c8c6c 16573->16574 16574->16565 16576 9c89a8 16575->16576 16579 9c89bf 16576->16579 16596 9c8a47 16576->16596 16578 9c89d2 16578->16552 16579->16578 16580 9c8a47 ___std_exception_copy RtlAllocateHeap 16579->16580 16580->16578 16582 9c8a10 16581->16582 16585 9da044 16582->16585 16586 9da057 __Getctype 16585->16586 16587 9da65a __Getctype RtlAllocateHeap 16586->16587 16588 9c8a32 16586->16588 16589 9da087 __Getctype 16587->16589 16588->16572 16590 9da0c3 16589->16590 16591 9da08f __Getctype 16589->16591 16592 9d9c70 __Getctype RtlAllocateHeap 16590->16592 16593 9db01a ___std_exception_copy RtlAllocateHeap 16591->16593 16594 9da0ce 16592->16594 16593->16588 16595 9db01a ___std_exception_copy RtlAllocateHeap 16594->16595 16595->16588 16597 9c8a5a 16596->16597 16598 9c8a51 16596->16598 16597->16579 16599 9c8a01 ___std_exception_copy RtlAllocateHeap 16598->16599 16600 9c8a56 16599->16600 16600->16597 16603 9d41c6 16600->16603 16602 9c8a63 16604 9d41cb std::locale::_Setgloballocale 16603->16604 16605 9df665 std::locale::_Setgloballocale RtlAllocateHeap 16604->16605 16607 9d41d6 std::locale::_Setgloballocale 16604->16607 16605->16607 16606 9d36e2 std::locale::_Setgloballocale RtlAllocateHeap 16608 9d4209 __Getctype std::locale::_Setgloballocale 16606->16608 16607->16606 16608->16602 16691 9c2b99 16609->16691 16612 995410 16613 995419 16612->16613 16615 9c2534 std::_Throw_Cpp_error 3 API calls 16612->16615 16613->16408 16616 995430 16615->16616 16700 9c953c 16616->16700 16620 992d13 16619->16620 16620->16620 16621 993040 std::_Throw_Cpp_error 2 API calls 16620->16621 16622 992d25 16621->16622 16622->16408 16624 9aad10 16623->16624 16624->16624 17017 9afbf0 16624->17017 16627 993040 std::_Throw_Cpp_error 2 API calls 16626->16627 16628 992d55 16627->16628 16629 a662c0 16628->16629 16630 a66358 16629->16630 16642 a66361 std::locale::_Setgloballocale 16629->16642 17026 9ae4b0 16630->17026 16633 a6654f 16635 a66553 16633->16635 17128 9a6130 16633->17128 16637 a66580 std::ios_base::_Ios_base_dtor 16635->16637 16638 9c8c70 std::_Throw_Cpp_error RtlAllocateHeap 16635->16638 16637->16413 16639 a665ce 16638->16639 16640 9c3069 __Xtime_get_ticks GetSystemTimePreciseAsFileTime 16639->16640 16641 a665d6 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 16640->16641 16641->16413 16642->16633 16642->16635 17049 a84760 16642->17049 17060 9b4160 16642->17060 17215 9c975e 16643->17215 16645 9c9832 16645->16386 16667 9d1628 16645->16667 16647 9a629d 16646->16647 16648 9a62b1 16646->16648 16649 9a6130 2 API calls 16647->16649 16648->16386 16649->16648 16651 9d12ca ___std_exception_copy 16650->16651 17239 9cd6a5 16651->17239 16653 9d12e4 16654 9c899c ___std_exception_copy RtlAllocateHeap 16653->16654 16655 9d12f1 16654->16655 16655->16386 16657 a5f2f6 std::locale::_Setgloballocale 16656->16657 17398 9aab20 16657->17398 16660 9a8f00 std::_Throw_Cpp_error 2 API calls 16661 a5f47f 16660->16661 17403 993440 16661->17403 16663 a5f58b std::ios_base::_Ios_base_dtor 16663->16386 16665 9c8c70 std::_Throw_Cpp_error RtlAllocateHeap 16666 a5f5ce 16665->16666 16666->16386 16668 9d163b ___std_exception_copy 16667->16668 17644 9d140a 16668->17644 16670 9d1650 16671 9c899c ___std_exception_copy RtlAllocateHeap 16670->16671 16672 9d165d 16671->16672 16673 9cd0a8 16672->16673 16674 9cd0bb ___std_exception_copy 16673->16674 17745 9ccf83 16674->17745 16676 9cd0c7 16677 9c899c ___std_exception_copy RtlAllocateHeap 16676->16677 16678 9cd0d3 16677->16678 16678->16386 17815 9a7ef0 16679->17815 16681 9ab48d 17832 9b2100 16681->17832 16685 9ab503 16685->16386 18199 9e8bb0 16686->18199 16688 9e8b31 std::_Locinfo::_Locinfo_ctor 16689 993040 std::_Throw_Cpp_error 2 API calls 16688->16689 16690 9e8b7c 16689->16690 16690->16386 16706 9c2bc8 16691->16706 16693 995409 16693->16612 16694 9c2534 16693->16694 16695 9c254a std::_Throw_Cpp_error 16694->16695 16713 9c24e7 16695->16713 16697 9c255a __EH_prolog3 std::_Throw_Cpp_error Concurrency::cancel_current_task 16719 9a9cb0 16697->16719 16699 9c25c7 std::_Throw_Cpp_error 16699->16612 16701 9c954f ___std_exception_copy 16700->16701 17001 9c93db 16701->17001 16703 9c955e 16704 9c899c ___std_exception_copy RtlAllocateHeap 16703->16704 16705 995450 16704->16705 16705->16408 16709 9c2be2 16706->16709 16707 9c2bf2 _ValidateLocalCookies 16707->16693 16709->16707 16710 9c302b 16709->16710 16711 9c3069 __Xtime_get_ticks GetSystemTimePreciseAsFileTime 16710->16711 16712 9c3036 __aulldiv __aullrem 16711->16712 16712->16709 16714 9c24f3 __EH_prolog3_GS 16713->16714 16715 992cf0 std::_Throw_Cpp_error 2 API calls 16714->16715 16716 9c2507 16715->16716 16730 9936e0 16716->16730 16718 9c251c std::_Throw_Cpp_error 16718->16697 16757 994900 16719->16757 16721 9a9d26 16722 9c3672 std::_Facet_Register 2 API calls 16721->16722 16723 9a9d2d 16722->16723 16762 9c2729 16723->16762 16725 9a9d39 16770 9aa060 16725->16770 16727 9a9d76 16728 9a9dc7 std::_Throw_Cpp_error 16727->16728 16729 994900 std::_Throw_Cpp_error 2 API calls 16727->16729 16728->16699 16729->16728 16731 9a63b0 std::_Throw_Cpp_error 2 API calls 16730->16731 16732 993731 16731->16732 16733 99375a 16732->16733 16744 9a8f00 16732->16744 16735 9a8f00 std::_Throw_Cpp_error 2 API calls 16733->16735 16736 99378a 16735->16736 16737 9c4b15 ___std_exception_copy 2 API calls 16736->16737 16739 99381e 16737->16739 16738 99385f std::ios_base::_Ios_base_dtor 16738->16718 16739->16738 16740 9c8c70 std::_Throw_Cpp_error RtlAllocateHeap 16739->16740 16741 9938b0 16740->16741 16753 9c4b78 16741->16753 16743 9938f5 std::ios_base::_Ios_base_dtor 16743->16718 16745 9a8f22 std::_Locinfo::_Locinfo_ctor 16744->16745 16746 9a8f4f 16744->16746 16745->16733 16747 9932d0 std::_Throw_Cpp_error 2 API calls 16746->16747 16748 9a902f std::ios_base::_Ios_base_dtor 16746->16748 16749 9a8fa4 std::_Locinfo::_Locinfo_ctor 16747->16749 16748->16733 16750 9a9002 std::_Locinfo::_Locinfo_ctor 16749->16750 16751 992fe0 std::_Throw_Cpp_error RtlAllocateHeap 16749->16751 16750->16733 16752 9a8fef 16751->16752 16752->16733 16754 9c4b8c 16753->16754 16755 9c4b85 16753->16755 16754->16743 16756 9d1c96 ___std_exception_copy RtlAllocateHeap 16755->16756 16756->16754 16758 994922 16757->16758 16759 99491a std::_Throw_Cpp_error Concurrency::cancel_current_task 16757->16759 16758->16721 16782 9947f0 16759->16782 16761 994968 std::ios_base::_Ios_base_dtor Concurrency::cancel_current_task 16761->16721 16763 9c2735 __EH_prolog3 std::_Lockit::_Lockit 16762->16763 16766 9c2771 std::_Throw_Cpp_error std::_Lockit::~_Lockit 16763->16766 16800 9c288c 16763->16800 16765 9c2753 16806 9c28af 16765->16806 16766->16725 16772 9aa0a2 std::_Throw_Cpp_error std::_Lockit::~_Lockit std::_Lockit::_Lockit 16770->16772 16771 9aa144 std::_Lockit::~_Lockit 16771->16727 16772->16771 16773 9c3672 std::_Facet_Register 2 API calls 16772->16773 16774 9aa152 16773->16774 16871 994040 16774->16871 16780 9aa1f1 16906 9c26f7 16780->16906 16783 994851 16782->16783 16783->16783 16794 993040 16783->16794 16785 994865 16786 9936e0 std::_Throw_Cpp_error 2 API calls 16785->16786 16788 99487b 16786->16788 16787 9948a5 std::ios_base::_Ios_base_dtor 16787->16761 16788->16787 16789 9c8c70 std::_Throw_Cpp_error RtlAllocateHeap 16788->16789 16791 9948f7 std::_Throw_Cpp_error Concurrency::cancel_current_task 16789->16791 16790 994922 16790->16761 16791->16790 16792 9947f0 std::_Throw_Cpp_error 2 API calls 16791->16792 16793 994968 std::ios_base::_Ios_base_dtor Concurrency::cancel_current_task 16792->16793 16793->16761 16795 9930c8 16794->16795 16796 993052 16794->16796 16795->16785 16797 993057 std::_Locinfo::_Locinfo_ctor 16796->16797 16798 9932d0 std::_Throw_Cpp_error 2 API calls 16796->16798 16797->16785 16799 9930a3 std::_Locinfo::_Locinfo_ctor 16798->16799 16799->16785 16801 9c3672 std::_Facet_Register 2 API calls 16800->16801 16802 9c2897 16801->16802 16803 9c28ab 16802->16803 16816 9c2611 16802->16816 16803->16765 16807 9c275b 16806->16807 16808 9c28bb 16806->16808 16810 9a5a60 16807->16810 16819 9c333a 16808->16819 16811 9a5a86 16810->16811 16815 9a5ab3 std::_Locinfo::_Locinfo_ctor 16810->16815 16812 9d1c96 ___std_exception_copy RtlAllocateHeap 16811->16812 16813 9a5a90 16811->16813 16812->16813 16814 9d23ec ___std_exception_copy 2 API calls 16813->16814 16813->16815 16814->16815 16815->16766 16817 9a5a60 std::_Locinfo::_Locinfo_ctor 2 API calls 16816->16817 16818 9c264b 16817->16818 16818->16765 16820 9c334a std::locale::_Setgloballocale 16819->16820 16820->16807 16823 9d41d6 std::locale::_Setgloballocale 16820->16823 16825 9df665 16820->16825 16846 9d36e2 16823->16846 16824 9d4209 __Getctype std::locale::_Setgloballocale 16824->16807 16826 9df671 std::locale::_Setgloballocale 16825->16826 16827 9d9f93 std::locale::_Setgloballocale RtlAllocateHeap 16826->16827 16828 9df6c1 16826->16828 16832 9df6a2 std::locale::_Setgloballocale 16826->16832 16833 9df6d3 std::_Lockit::_Lockit std::locale::_Setgloballocale 16826->16833 16827->16832 16829 9d16ff ___std_exception_copy RtlAllocateHeap 16828->16829 16830 9df6c6 16829->16830 16831 9c8c60 ___std_exception_copy RtlAllocateHeap 16830->16831 16845 9df6ab 16831->16845 16832->16828 16832->16833 16832->16845 16834 9df746 16833->16834 16835 9df843 std::_Lockit::~_Lockit 16833->16835 16837 9df774 std::locale::_Setgloballocale 16833->16837 16834->16837 16849 9d9e42 16834->16849 16836 9d36e2 std::locale::_Setgloballocale RtlAllocateHeap 16835->16836 16838 9df856 16836->16838 16840 9d9e42 __Getctype RtlAllocateHeap 16837->16840 16843 9df7c9 16837->16843 16837->16845 16840->16843 16842 9d9e42 __Getctype RtlAllocateHeap 16842->16837 16844 9d9e42 __Getctype RtlAllocateHeap 16843->16844 16843->16845 16844->16845 16845->16823 16863 9d3552 16846->16863 16848 9d36f3 16848->16824 16850 9d9e4b __Getctype 16849->16850 16851 9da65a __Getctype RtlAllocateHeap 16850->16851 16852 9d9e62 16850->16852 16854 9d9e8f __Getctype 16851->16854 16853 9d9ef2 16852->16853 16855 9d41c6 __Getctype RtlAllocateHeap 16852->16855 16853->16842 16856 9d9ecf 16854->16856 16857 9d9e97 __Getctype 16854->16857 16858 9d9efc 16855->16858 16860 9d9c70 __Getctype RtlAllocateHeap 16856->16860 16859 9db01a ___std_exception_copy RtlAllocateHeap 16857->16859 16859->16852 16861 9d9eda 16860->16861 16862 9db01a ___std_exception_copy RtlAllocateHeap 16861->16862 16862->16852 16864 9d357f std::locale::_Setgloballocale 16863->16864 16867 9d33e3 16864->16867 16866 9d35c8 std::locale::_Setgloballocale 16866->16848 16868 9d33ef std::_Lockit::_Lockit std::locale::_Setgloballocale 16867->16868 16869 9d346a std::locale::_Setgloballocale RtlAllocateHeap 16868->16869 16870 9d3406 std::locale::_Setgloballocale 16869->16870 16870->16866 16872 994066 std::_Lockit::_Lockit 16871->16872 16873 9940c2 16872->16873 16874 9940e6 16872->16874 16909 9c2827 16873->16909 16918 9c1d4a 16874->16918 16878 9940f0 16879 9c2cf4 16950 9d3cf8 16879->16950 16881 9c2cfd __Getctype 16882 9c2d35 16881->16882 16883 9c2d17 16881->16883 16884 9d454e __Getctype RtlAllocateHeap 16882->16884 16955 9d454e 16883->16955 16886 9c2d1e 16884->16886 16960 9d3d42 16886->16960 16888 9aa1ca 16891 994100 16888->16891 16997 9c2872 16891->16997 16894 994140 16896 99415b 16894->16896 16897 9d1c96 ___std_exception_copy RtlAllocateHeap 16894->16897 16895 9d1c96 ___std_exception_copy RtlAllocateHeap 16895->16894 16898 994176 16896->16898 16899 9d1c96 ___std_exception_copy RtlAllocateHeap 16896->16899 16897->16896 16900 994191 16898->16900 16901 9d1c96 ___std_exception_copy RtlAllocateHeap 16898->16901 16899->16898 16902 9941ac 16900->16902 16903 9d1c96 ___std_exception_copy RtlAllocateHeap 16900->16903 16901->16900 16904 9d1c96 ___std_exception_copy RtlAllocateHeap 16902->16904 16905 9941c7 std::_Lockit::~_Lockit 16902->16905 16903->16902 16904->16905 16905->16780 16907 9c3672 std::_Facet_Register 2 API calls 16906->16907 16908 9c2702 16907->16908 16908->16771 16921 9d4516 16909->16921 16912 9a5a60 std::_Locinfo::_Locinfo_ctor 2 API calls 16913 9c284b 16912->16913 16914 9c285b 16913->16914 16915 9d4516 std::_Locinfo::_Locinfo_ctor 2 API calls 16913->16915 16916 9a5a60 std::_Locinfo::_Locinfo_ctor 2 API calls 16914->16916 16915->16914 16917 9940c9 16916->16917 16917->16879 16947 993540 16918->16947 16920 9c1d5b Concurrency::cancel_current_task 16920->16878 16922 9d4523 std::_Lockit::_Lockit 16921->16922 16925 9d42c1 16922->16925 16924 9c2833 16924->16912 16926 9d42cd std::_Lockit::_Lockit std::locale::_Setgloballocale 16925->16926 16929 9d431c 16926->16929 16928 9d42e8 std::_Locinfo::_Locinfo_ctor 16928->16924 16930 9d447b std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 16929->16930 16931 9d4337 16930->16931 16932 9d9e42 __Getctype RtlAllocateHeap 16931->16932 16938 9d4370 __Getctype 16931->16938 16933 9d4344 16932->16933 16934 9d3379 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 16933->16934 16935 9d4369 16934->16935 16936 9db094 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 16935->16936 16935->16938 16937 9d4395 16936->16937 16937->16938 16939 9d3379 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 16937->16939 16938->16928 16940 9d43b1 16939->16940 16941 9d43b8 16940->16941 16942 9d43d3 16940->16942 16941->16938 16943 9db01a ___std_exception_copy RtlAllocateHeap 16941->16943 16944 9db01a ___std_exception_copy RtlAllocateHeap 16942->16944 16945 9d43fe 16942->16945 16943->16938 16944->16945 16945->16938 16946 9db01a ___std_exception_copy RtlAllocateHeap 16945->16946 16946->16938 16948 9c4b15 ___std_exception_copy 2 API calls 16947->16948 16949 993585 16948->16949 16949->16920 16951 9d9e42 __Getctype RtlAllocateHeap 16950->16951 16952 9d3d03 16951->16952 16971 9da12d 16952->16971 16956 9d9e42 __Getctype RtlAllocateHeap 16955->16956 16957 9d4559 16956->16957 16958 9da12d __Getctype RtlAllocateHeap 16957->16958 16959 9d4569 16958->16959 16959->16886 16961 9d9e42 __Getctype RtlAllocateHeap 16960->16961 16962 9d3d4d 16961->16962 16963 9da12d __Getctype RtlAllocateHeap 16962->16963 16964 9c2d46 16963->16964 16964->16888 16965 9d4572 16964->16965 16966 9d457f 16965->16966 16970 9d45b3 __Getctype 16965->16970 16967 9d23ec ___std_exception_copy 2 API calls 16966->16967 16968 9d45a2 16967->16968 16968->16970 16988 9de2f4 16968->16988 16970->16888 16972 9d3d13 16971->16972 16973 9da140 16971->16973 16972->16881 16973->16972 16975 9e2392 16973->16975 16976 9e239e std::locale::_Setgloballocale 16975->16976 16977 9d9e42 __Getctype RtlAllocateHeap 16976->16977 16978 9e23a7 std::_Lockit::_Lockit 16977->16978 16981 9e23ed 16978->16981 16984 9e2413 16978->16984 16980 9e23d6 __Getctype 16980->16981 16982 9d41c6 __Getctype RtlAllocateHeap 16980->16982 16981->16972 16983 9e2412 16982->16983 16985 9e2421 __Getctype 16984->16985 16987 9e242e 16984->16987 16986 9e2146 __Getctype RtlAllocateHeap 16985->16986 16985->16987 16986->16987 16987->16980 16989 9de310 16988->16989 16990 9de302 16988->16990 16991 9d16ff ___std_exception_copy RtlAllocateHeap 16989->16991 16990->16989 16995 9de32a 16990->16995 16992 9de31a 16991->16992 16993 9c8c60 ___std_exception_copy RtlAllocateHeap 16992->16993 16994 9de324 16993->16994 16994->16970 16995->16994 16996 9d16ff ___std_exception_copy RtlAllocateHeap 16995->16996 16996->16992 16998 9c287e 16997->16998 16999 99412c 16997->16999 17000 9d4516 std::_Locinfo::_Locinfo_ctor 2 API calls 16998->17000 16999->16894 16999->16895 17000->16999 17002 9c93e7 std::locale::_Setgloballocale 17001->17002 17003 9c93f0 17002->17003 17005 9c9414 17002->17005 17004 9c8be3 ___std_exception_copy RtlAllocateHeap 17003->17004 17009 9c9409 17004->17009 17006 9c9432 17005->17006 17010 9da1e9 17005->17010 17008 9c8be3 ___std_exception_copy RtlAllocateHeap 17006->17008 17006->17009 17008->17009 17009->16703 17011 9da20a 17010->17011 17012 9da1f5 17010->17012 17011->17006 17013 9d16ff ___std_exception_copy RtlAllocateHeap 17012->17013 17014 9da1fa 17013->17014 17015 9c8c60 ___std_exception_copy RtlAllocateHeap 17014->17015 17016 9da205 17015->17016 17016->17006 17018 9afc8d 17017->17018 17021 9afc12 std::_Locinfo::_Locinfo_ctor 17017->17021 17019 9afd5e 17018->17019 17020 9932d0 std::_Throw_Cpp_error 2 API calls 17018->17020 17022 9afce1 std::_Locinfo::_Locinfo_ctor 17020->17022 17023 9afd3a std::_Locinfo::_Locinfo_ctor 17022->17023 17024 992fe0 std::_Throw_Cpp_error RtlAllocateHeap 17022->17024 17025 9afd27 17024->17025 17027 9ae528 17026->17027 17028 9ae4c2 17026->17028 17139 993330 17027->17139 17030 9ae4ca 17028->17030 17031 9ae4f9 17028->17031 17032 9ae52d 17030->17032 17033 9ae4d1 17030->17033 17034 9ae516 17031->17034 17037 9c3672 std::_Facet_Register 2 API calls 17031->17037 17035 992b50 Concurrency::cancel_current_task 2 API calls 17032->17035 17036 9c3672 std::_Facet_Register 2 API calls 17033->17036 17034->16642 17038 9ae4d7 17035->17038 17036->17038 17039 9ae503 17037->17039 17040 9c8c70 std::_Throw_Cpp_error RtlAllocateHeap 17038->17040 17041 9ae4e0 17038->17041 17039->16642 17042 9ae537 17040->17042 17041->16642 17142 9a6ad0 17042->17142 17044 9ae574 17045 994900 std::_Throw_Cpp_error 2 API calls 17044->17045 17046 9ae5fb 17045->17046 17047 9ae613 17046->17047 17146 9a9b60 17046->17146 17047->16642 17050 a84767 17049->17050 17051 a8476c 17049->17051 17050->16642 17052 9d23ec ___std_exception_copy 2 API calls 17051->17052 17058 a847af 17051->17058 17052->17058 17053 a847c2 17053->16642 17054 a84877 17054->16642 17055 9d1c96 ___std_exception_copy RtlAllocateHeap 17056 a84867 17055->17056 17056->16642 17057 a84821 17057->17054 17057->17055 17058->17053 17058->17057 17059 9d1c96 ___std_exception_copy RtlAllocateHeap 17058->17059 17059->17057 17061 9b4288 17060->17061 17062 9b4195 17060->17062 17064 993330 2 API calls 17061->17064 17063 9b41b1 17062->17063 17065 9b4202 17062->17065 17066 9b41f2 17062->17066 17068 9c3672 std::_Facet_Register 2 API calls 17063->17068 17067 9b428d 17064->17067 17070 9c3672 std::_Facet_Register 2 API calls 17065->17070 17077 9b41cf std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 17065->17077 17066->17063 17066->17067 17069 992b50 Concurrency::cancel_current_task 2 API calls 17067->17069 17071 9b41c4 17068->17071 17072 9b4292 17069->17072 17070->17077 17071->17072 17071->17077 17073 9c8c70 std::_Throw_Cpp_error RtlAllocateHeap 17072->17073 17074 9b4297 17073->17074 17075 9b42fa 17074->17075 17076 9b43e9 17074->17076 17186 9b6ff0 17075->17186 17078 993330 2 API calls 17076->17078 17181 9b77d0 17077->17181 17079 9b43ee 17078->17079 17081 9b445a 17079->17081 17082 9b4549 17079->17082 17086 9b6ff0 2 API calls 17081->17086 17084 993330 2 API calls 17082->17084 17094 9b454e 17084->17094 17085 9b425e 17085->16642 17088 9b4496 17086->17088 17087 9b470b 17090 993330 2 API calls 17087->17090 17093 9a63b0 std::_Throw_Cpp_error 2 API calls 17088->17093 17089 9b4706 17095 992b50 Concurrency::cancel_current_task 2 API calls 17089->17095 17091 9b46af 17090->17091 17096 9c8c70 std::_Throw_Cpp_error RtlAllocateHeap 17091->17096 17118 9b46d1 std::ios_base::_Ios_base_dtor 17091->17118 17092 9b4336 17194 9b7830 17092->17194 17107 9b44c4 17093->17107 17094->17087 17094->17089 17097 9b45ee 17094->17097 17098 9b4615 17094->17098 17095->17087 17099 9b4715 17096->17099 17097->17089 17100 9b45f9 17097->17100 17103 9c3672 std::_Facet_Register 2 API calls 17098->17103 17110 9b45ff 17098->17110 17206 9ad010 17099->17206 17104 9c3672 std::_Facet_Register 2 API calls 17100->17104 17103->17110 17104->17110 17105 9b43b0 17105->16642 17109 9b7830 RtlAllocateHeap 17107->17109 17111 9b4510 17109->17111 17110->17091 17110->17118 17199 9c1f9c 17110->17199 17111->16642 17112 9b4798 17114 992b50 Concurrency::cancel_current_task 2 API calls 17112->17114 17113 9b472f Concurrency::cancel_current_task 17113->17112 17115 9b475b 17113->17115 17116 9b477f 17113->17116 17119 9b4768 17114->17119 17115->17112 17120 9b4762 17115->17120 17117 9b4791 17116->17117 17121 9c3672 std::_Facet_Register 2 API calls 17116->17121 17117->16642 17118->16642 17123 9c8c70 std::_Throw_Cpp_error RtlAllocateHeap 17119->17123 17127 9b4771 17119->17127 17124 9c3672 std::_Facet_Register 2 API calls 17120->17124 17125 9b4789 17121->17125 17126 9b47a2 17123->17126 17124->17119 17125->16642 17127->16642 17129 9a6174 17128->17129 17131 9a6143 std::_Locinfo::_Locinfo_ctor 17128->17131 17130 9a6180 17129->17130 17132 9a6200 17129->17132 17133 9932d0 std::_Throw_Cpp_error 2 API calls 17130->17133 17131->16635 17132->17132 17134 9a8f00 std::_Throw_Cpp_error 2 API calls 17132->17134 17136 9a61bf std::_Locinfo::_Locinfo_ctor 17133->17136 17135 9a6232 17134->17135 17135->16635 17137 9a61ed 17136->17137 17138 992fe0 std::_Throw_Cpp_error RtlAllocateHeap 17136->17138 17137->16635 17138->17137 17150 9c1cea 17139->17150 17144 9a6b02 17142->17144 17143 9a6b1d 17143->17044 17144->17143 17170 9a50e0 17144->17170 17147 9a9bbb 17146->17147 17148 9a9b96 17146->17148 17147->17047 17148->17147 17178 9a88a0 17148->17178 17157 9c1a9f 17150->17157 17152 9c1cfb Concurrency::cancel_current_task 17160 9c1af4 17152->17160 17154 9c1d1b Concurrency::cancel_current_task 17163 9c1b37 17154->17163 17156 9c1d3b Concurrency::cancel_current_task 17167 9934e0 17157->17167 17161 9934e0 std::invalid_argument::invalid_argument 2 API calls 17160->17161 17162 9c1b06 17161->17162 17162->17154 17164 9c1b4b std::regex_error::regex_error 17163->17164 17165 9934e0 std::invalid_argument::invalid_argument 2 API calls 17164->17165 17166 9c1b54 17165->17166 17166->17156 17168 9c4b15 ___std_exception_copy 2 API calls 17167->17168 17169 993522 17168->17169 17169->17152 17171 9a5117 17170->17171 17175 9a51b5 17170->17175 17172 9a6ad0 2 API calls 17171->17172 17173 9a5120 17172->17173 17174 9a519d 17173->17174 17176 994900 std::_Throw_Cpp_error 2 API calls 17173->17176 17174->17175 17177 9a9b60 2 API calls 17174->17177 17175->17143 17176->17174 17177->17175 17179 994900 std::_Throw_Cpp_error 2 API calls 17178->17179 17180 9a88bf 17179->17180 17180->17147 17182 9b77dc 17181->17182 17183 9b77f9 std::ios_base::_Ios_base_dtor 17181->17183 17182->17183 17184 9c8c70 std::_Throw_Cpp_error RtlAllocateHeap 17182->17184 17183->17085 17185 9b7824 17184->17185 17187 9b6ff9 17186->17187 17188 9b703c 17186->17188 17187->17188 17189 9b7013 17187->17189 17191 9c3672 std::_Facet_Register 2 API calls 17187->17191 17188->17188 17190 9b701c 17189->17190 17192 9c3672 std::_Facet_Register 2 API calls 17189->17192 17190->17092 17191->17189 17193 9b7035 17192->17193 17193->17092 17195 9b783d 17194->17195 17196 9b7882 std::ios_base::_Ios_base_dtor 17194->17196 17195->17196 17197 9c8c70 std::_Throw_Cpp_error RtlAllocateHeap 17195->17197 17196->17105 17198 9b78b6 17197->17198 17200 9c1fa5 17199->17200 17201 9c1fb2 17199->17201 17200->17201 17202 9d41c6 __Getctype RtlAllocateHeap 17200->17202 17201->17110 17203 9c1fbb 17202->17203 17204 9c1f9c RtlAllocateHeap 17203->17204 17205 9c1fca 17204->17205 17205->17110 17207 9ad01a 17206->17207 17208 9ad02e 17206->17208 17207->17208 17209 9c1f9c RtlAllocateHeap 17207->17209 17210 9a9910 17208->17210 17209->17207 17211 9a9938 std::ios_base::_Ios_base_dtor 17210->17211 17212 9a9928 17210->17212 17211->17113 17212->17211 17213 9c8c70 std::_Throw_Cpp_error RtlAllocateHeap 17212->17213 17214 9a994d 17213->17214 17217 9c976a std::locale::_Setgloballocale 17215->17217 17216 9c9771 17218 9d16ff ___std_exception_copy RtlAllocateHeap 17216->17218 17217->17216 17220 9c9791 17217->17220 17219 9c9776 17218->17219 17221 9c8c60 ___std_exception_copy RtlAllocateHeap 17219->17221 17222 9c9796 17220->17222 17223 9c97a3 17220->17223 17228 9c9781 17221->17228 17224 9d16ff ___std_exception_copy RtlAllocateHeap 17222->17224 17229 9da8ef 17223->17229 17224->17228 17226 9c97ac 17227 9d16ff ___std_exception_copy RtlAllocateHeap 17226->17227 17226->17228 17227->17228 17228->16645 17230 9da8fb std::_Lockit::_Lockit std::locale::_Setgloballocale 17229->17230 17233 9da993 17230->17233 17232 9da916 17232->17226 17237 9da9b6 17233->17237 17234 9da65a __Getctype RtlAllocateHeap 17235 9daa17 17234->17235 17236 9db01a ___std_exception_copy RtlAllocateHeap 17235->17236 17238 9da9fc std::locale::_Setgloballocale 17236->17238 17237->17234 17237->17237 17237->17238 17238->17232 17253 9cce79 17239->17253 17241 9cd6ff 17247 9cd723 17241->17247 17260 9ce1d0 17241->17260 17242 9cd6cc 17245 9c8be3 ___std_exception_copy RtlAllocateHeap 17242->17245 17243 9cd6b7 17243->17241 17243->17242 17252 9cd6e7 std::_Locinfo::_Locinfo_ctor 17243->17252 17245->17252 17249 9cd747 17247->17249 17267 9cce94 17247->17267 17248 9cd7cf 17250 9cce22 RtlAllocateHeap 17248->17250 17249->17248 17274 9cce22 17249->17274 17250->17252 17252->16653 17254 9cce7e 17253->17254 17255 9cce91 17253->17255 17256 9d16ff ___std_exception_copy RtlAllocateHeap 17254->17256 17255->17243 17257 9cce83 17256->17257 17258 9c8c60 ___std_exception_copy RtlAllocateHeap 17257->17258 17259 9cce8e 17258->17259 17259->17243 17261 9c8a47 ___std_exception_copy RtlAllocateHeap 17260->17261 17262 9ce1e0 17261->17262 17280 9da15a 17262->17280 17268 9cceb6 17267->17268 17269 9ccea0 17267->17269 17272 9ccec6 17268->17272 17382 9d9a39 17268->17382 17270 9d454e __Getctype RtlAllocateHeap 17269->17270 17273 9cceab std::_Locinfo::_Locinfo_ctor 17270->17273 17272->17247 17273->17247 17275 9cce47 17274->17275 17276 9cce33 17274->17276 17275->17248 17276->17275 17277 9d16ff ___std_exception_copy RtlAllocateHeap 17276->17277 17278 9cce3c 17277->17278 17279 9c8c60 ___std_exception_copy RtlAllocateHeap 17278->17279 17279->17275 17281 9ce1fd 17280->17281 17282 9da171 17280->17282 17284 9da1b8 17281->17284 17282->17281 17283 9e2392 __Getctype RtlAllocateHeap 17282->17283 17283->17281 17285 9da1cf 17284->17285 17286 9ce20a 17284->17286 17285->17286 17288 9e06bd 17285->17288 17286->17247 17289 9d9e42 __Getctype RtlAllocateHeap 17288->17289 17290 9e06c2 17289->17290 17293 9e05d5 17290->17293 17292 9e06cd 17292->17286 17297 9e05e1 std::_Lockit::_Lockit std::locale::_Setgloballocale 17293->17297 17294 9e0602 17294->17292 17295 9e05fb std::_Locinfo::_Locinfo_ctor 17295->17294 17296 9d41c6 __Getctype RtlAllocateHeap 17295->17296 17298 9e0674 17296->17298 17297->17295 17301 9db01a ___std_exception_copy RtlAllocateHeap 17297->17301 17299 9e06b0 17298->17299 17304 9d9efd 17298->17304 17299->17292 17301->17295 17305 9d9f08 __Getctype 17304->17305 17306 9d9f14 17305->17306 17307 9da65a __Getctype RtlAllocateHeap 17305->17307 17308 9d41c6 __Getctype RtlAllocateHeap 17306->17308 17309 9d9f19 17306->17309 17311 9d9f38 __Getctype 17307->17311 17310 9d9f92 17308->17310 17318 9e0480 17309->17318 17312 9d9f40 __Getctype 17311->17312 17313 9d9f74 17311->17313 17315 9db01a ___std_exception_copy RtlAllocateHeap 17312->17315 17314 9d9c70 __Getctype RtlAllocateHeap 17313->17314 17316 9d9f7f 17314->17316 17315->17306 17317 9db01a ___std_exception_copy RtlAllocateHeap 17316->17317 17317->17309 17319 9e05d5 std::_Locinfo::_Locinfo_ctor 2 API calls 17318->17319 17320 9e04aa 17319->17320 17341 9e0207 17320->17341 17325 9e04dc 17327 9db01a ___std_exception_copy RtlAllocateHeap 17325->17327 17326 9e04ea 17350 9e06d0 17326->17350 17329 9e04c3 17327->17329 17329->17299 17330 9e0517 17331 9e0522 17330->17331 17336 9e053d std::_Locinfo::_Locinfo_ctor 17330->17336 17332 9d16ff ___std_exception_copy RtlAllocateHeap 17331->17332 17333 9e0527 17332->17333 17335 9db01a ___std_exception_copy RtlAllocateHeap 17333->17335 17334 9e0569 17337 9e05b2 17334->17337 17355 9e00f9 17334->17355 17335->17329 17336->17334 17339 9db01a ___std_exception_copy RtlAllocateHeap 17336->17339 17338 9db01a ___std_exception_copy RtlAllocateHeap 17337->17338 17338->17329 17339->17334 17359 9c95ae 17341->17359 17344 9db094 17345 9db0d2 17344->17345 17349 9db0a2 __Getctype std::_Facet_Register 17344->17349 17346 9d16ff ___std_exception_copy RtlAllocateHeap 17345->17346 17348 9db0d0 17346->17348 17347 9db0bd RtlAllocateHeap 17347->17348 17347->17349 17348->17325 17348->17326 17349->17345 17349->17347 17351 9e0207 std::_Locinfo::_Locinfo_ctor 2 API calls 17350->17351 17354 9e06f0 std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 17351->17354 17352 9e07f5 std::_Locinfo::_Locinfo_ctor _ValidateLocalCookies 17352->17330 17354->17352 17367 9e02db 17354->17367 17356 9e0105 std::_Lockit::_Lockit std::locale::_Setgloballocale 17355->17356 17375 9e0146 17356->17375 17358 9e011c std::_Locinfo::_Locinfo_ctor 17358->17337 17360 9c95cc 17359->17360 17361 9c95c5 17359->17361 17360->17361 17362 9d9e42 __Getctype RtlAllocateHeap 17360->17362 17361->17329 17361->17344 17363 9c95ed 17362->17363 17364 9da12d __Getctype RtlAllocateHeap 17363->17364 17365 9c9603 17364->17365 17366 9da18b std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 17365->17366 17366->17361 17368 9e0303 17367->17368 17374 9e03cc _ValidateLocalCookies 17367->17374 17369 9df44d std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 17368->17369 17368->17374 17370 9e0383 17369->17370 17371 9da8a6 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 17370->17371 17372 9e03a4 17371->17372 17373 9da8a6 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 17372->17373 17373->17374 17374->17352 17376 9cceeb std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 17375->17376 17377 9e0168 17376->17377 17378 9cceeb std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 17377->17378 17379 9e0187 17378->17379 17380 9db01a ___std_exception_copy RtlAllocateHeap 17379->17380 17381 9e01ae 17379->17381 17380->17381 17381->17358 17383 9c95ae std::_Locinfo::_Locinfo_ctor 2 API calls 17382->17383 17384 9d9a56 17383->17384 17386 9d9a66 _ValidateLocalCookies 17384->17386 17387 9df44d 17384->17387 17386->17272 17388 9c95ae std::_Locinfo::_Locinfo_ctor 2 API calls 17387->17388 17389 9df46d std::_Locinfo::_Locinfo_ctor 17388->17389 17391 9db094 std::_Locinfo::_Locinfo_ctor 2 API calls 17389->17391 17392 9df529 _ValidateLocalCookies 17389->17392 17393 9df4bf std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 17389->17393 17391->17393 17392->17386 17394 9c3275 17393->17394 17395 9c3290 17394->17395 17396 9c327f 17394->17396 17395->17392 17396->17395 17397 9d1c96 ___std_exception_copy RtlAllocateHeap 17396->17397 17397->17395 17400 9aab55 17398->17400 17399 9aaba3 17400->17399 17407 9ae8a0 17400->17407 17402 9aab83 17402->16660 17404 993459 17403->17404 17411 9d0dd7 17404->17411 17408 9ae8ce 17407->17408 17410 9ae8f8 std::_Locinfo::_Locinfo_ctor 17407->17410 17409 9932d0 std::_Throw_Cpp_error 2 API calls 17408->17409 17409->17410 17410->17402 17412 9d0deb ___std_exception_copy 17411->17412 17417 9ce565 17412->17417 17414 9d0e06 17415 9c899c ___std_exception_copy RtlAllocateHeap 17414->17415 17416 993467 17415->17416 17416->16663 17416->16665 17418 9ce5b4 17417->17418 17419 9ce591 17417->17419 17418->17419 17421 9ce5bc 17418->17421 17420 9c8be3 ___std_exception_copy RtlAllocateHeap 17419->17420 17422 9ce5a9 _ValidateLocalCookies 17420->17422 17426 9cfaa7 17421->17426 17422->17414 17444 9d0b0d 17426->17444 17429 9cfacc 17431 9c8be3 ___std_exception_copy RtlAllocateHeap 17429->17431 17430 9cfaf4 std::_Locinfo::_Locinfo_ctor 17432 9ce63d 17430->17432 17435 9ce1d0 std::_Locinfo::_Locinfo_ctor 2 API calls 17430->17435 17437 9cfbd0 17430->17437 17448 9cf49b 17430->17448 17451 9cfed4 17430->17451 17483 9d036f 17430->17483 17431->17432 17441 9cf28d 17432->17441 17435->17430 17438 9c8be3 ___std_exception_copy RtlAllocateHeap 17437->17438 17439 9cfbea 17438->17439 17440 9c8be3 ___std_exception_copy RtlAllocateHeap 17439->17440 17440->17432 17442 9db01a ___std_exception_copy RtlAllocateHeap 17441->17442 17443 9cf29d 17442->17443 17443->17422 17445 9cfac1 17444->17445 17446 9d0b18 17444->17446 17445->17429 17445->17430 17445->17432 17447 9c8be3 ___std_exception_copy RtlAllocateHeap 17446->17447 17447->17445 17510 9ce842 17448->17510 17450 9cf4d6 17450->17430 17452 9cfedb 17451->17452 17453 9cfef2 17451->17453 17455 9d03f4 17452->17455 17456 9d0394 17452->17456 17477 9cff31 17452->17477 17454 9c8be3 ___std_exception_copy RtlAllocateHeap 17453->17454 17453->17477 17459 9cff26 17454->17459 17457 9d042d 17455->17457 17458 9d03f9 17455->17458 17460 9d041a 17456->17460 17464 9d039a 17456->17464 17461 9d044a 17457->17461 17468 9d0432 17457->17468 17462 9d03fb 17458->17462 17463 9d0426 17458->17463 17459->17430 17545 9cebfc 17460->17545 17556 9d0a4d 17461->17556 17465 9d03ae 17462->17465 17474 9d040a 17462->17474 17552 9d0a30 17463->17552 17469 9d039f 17464->17469 17472 9d03eb 17464->17472 17481 9d0453 _ValidateLocalCookies 17465->17481 17520 9d0785 17465->17520 17468->17460 17468->17472 17482 9d03c5 17468->17482 17469->17465 17475 9d03d8 17469->17475 17469->17482 17472->17481 17534 9ced89 17472->17534 17474->17460 17476 9d040e 17474->17476 17475->17481 17530 9d0916 17475->17530 17476->17481 17541 9d09ab 17476->17541 17477->17430 17481->17430 17482->17481 17559 9dc5ba 17482->17559 17484 9d03f4 17483->17484 17485 9d0394 17483->17485 17486 9d042d 17484->17486 17487 9d03f9 17484->17487 17488 9d041a 17485->17488 17489 9d039a 17485->17489 17490 9d044a 17486->17490 17491 9d0432 17486->17491 17492 9d03fb 17487->17492 17493 9d0426 17487->17493 17494 9cebfc 2 API calls 17488->17494 17499 9d03eb 17489->17499 17500 9d039f 17489->17500 17497 9d0a4d 2 API calls 17490->17497 17491->17488 17491->17499 17504 9d03c5 17491->17504 17496 9d03ae 17492->17496 17503 9d040a 17492->17503 17495 9d0a30 2 API calls 17493->17495 17494->17504 17495->17504 17498 9d0785 2 API calls 17496->17498 17509 9d0453 _ValidateLocalCookies 17496->17509 17497->17504 17498->17504 17502 9ced89 2 API calls 17499->17502 17499->17509 17500->17496 17501 9d03d8 17500->17501 17500->17504 17506 9d0916 2 API calls 17501->17506 17501->17509 17502->17504 17503->17488 17505 9d040e 17503->17505 17508 9dc5ba 2 API calls 17504->17508 17504->17509 17507 9d09ab RtlAllocateHeap 17505->17507 17505->17509 17506->17504 17507->17504 17508->17504 17509->17430 17511 9cce79 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 17510->17511 17513 9ce854 17511->17513 17512 9ce869 17514 9c8be3 ___std_exception_copy RtlAllocateHeap 17512->17514 17513->17512 17515 9ce89c 17513->17515 17519 9ce884 std::_Locinfo::_Locinfo_ctor 17513->17519 17514->17519 17517 9cce22 RtlAllocateHeap 17515->17517 17518 9ce933 17515->17518 17516 9cce22 RtlAllocateHeap 17516->17519 17517->17518 17518->17516 17519->17450 17521 9d079f 17520->17521 17565 9ce790 17521->17565 17523 9d07de 17576 9dc439 17523->17576 17526 9d0895 17528 9ce1d0 std::_Locinfo::_Locinfo_ctor 2 API calls 17526->17528 17529 9d08c8 17526->17529 17527 9ce1d0 std::_Locinfo::_Locinfo_ctor 2 API calls 17527->17526 17528->17529 17529->17482 17529->17529 17531 9d0931 17530->17531 17532 9d0967 17531->17532 17533 9dc5ba 2 API calls 17531->17533 17532->17482 17533->17532 17535 9ced9e 17534->17535 17536 9cedc0 17535->17536 17538 9cede7 17535->17538 17537 9c8be3 ___std_exception_copy RtlAllocateHeap 17536->17537 17540 9ceddd 17537->17540 17539 9ce790 2 API calls 17538->17539 17538->17540 17539->17540 17540->17482 17544 9d09c1 17541->17544 17542 9c8be3 ___std_exception_copy RtlAllocateHeap 17543 9d09e2 17542->17543 17543->17482 17544->17542 17544->17543 17546 9cec11 17545->17546 17547 9cec5a 17546->17547 17548 9cec33 17546->17548 17550 9ce790 2 API calls 17547->17550 17551 9cec50 17547->17551 17549 9c8be3 ___std_exception_copy RtlAllocateHeap 17548->17549 17549->17551 17550->17551 17551->17482 17553 9d0a3c 17552->17553 17637 9cea6f 17553->17637 17555 9d0a4c 17555->17482 17557 9ced89 2 API calls 17556->17557 17558 9d0a62 17557->17558 17558->17482 17560 9dc5cf 17559->17560 17561 9dc5fc std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 17560->17561 17562 9ce1d0 std::_Locinfo::_Locinfo_ctor 2 API calls 17560->17562 17564 9dc5d3 std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 17560->17564 17563 9c8be3 ___std_exception_copy RtlAllocateHeap 17561->17563 17561->17564 17562->17561 17563->17564 17564->17482 17566 9ce7b7 17565->17566 17575 9ce7a5 17565->17575 17567 9db094 std::_Locinfo::_Locinfo_ctor 2 API calls 17566->17567 17566->17575 17568 9ce7db 17567->17568 17569 9ce7ee 17568->17569 17570 9ce7e3 17568->17570 17595 9cf2a7 17569->17595 17571 9db01a ___std_exception_copy RtlAllocateHeap 17570->17571 17571->17575 17574 9db01a ___std_exception_copy RtlAllocateHeap 17574->17575 17575->17523 17577 9dc46e 17576->17577 17579 9dc44a 17576->17579 17578 9dc4a1 17577->17578 17577->17579 17581 9dc4da 17578->17581 17582 9dc509 17578->17582 17580 9c8be3 ___std_exception_copy RtlAllocateHeap 17579->17580 17589 9d0871 17580->17589 17598 9dc2dd 17581->17598 17583 9dc532 17582->17583 17584 9dc537 17582->17584 17587 9dc55f 17583->17587 17588 9dc599 17583->17588 17603 9dbb66 17584->17603 17590 9dc57f 17587->17590 17591 9dc564 17587->17591 17630 9dbe93 17588->17630 17589->17526 17589->17527 17623 9dc08a 17590->17623 17613 9dc20e 17591->17613 17596 9db01a ___std_exception_copy RtlAllocateHeap 17595->17596 17597 9ce7f9 17596->17597 17597->17574 17599 9dc2fe 17598->17599 17600 9dc2f3 17598->17600 17601 9d99a5 ___std_exception_copy RtlAllocateHeap 17599->17601 17600->17589 17602 9dc359 __Getctype 17601->17602 17602->17589 17604 9dbb79 17603->17604 17605 9dbb88 17604->17605 17606 9dbbaa 17604->17606 17607 9c8be3 ___std_exception_copy RtlAllocateHeap 17605->17607 17608 9dbbbf 17606->17608 17611 9dbc12 17606->17611 17609 9dbba0 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z std::locale::_Setgloballocale __allrem _strrchr 17607->17609 17610 9dbe93 RtlAllocateHeap RtlAllocateHeap 17608->17610 17609->17589 17610->17609 17611->17609 17612 9ce1d0 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 17611->17612 17612->17609 17614 9e47bf RtlAllocateHeap 17613->17614 17615 9dc23e 17614->17615 17616 9e46c5 RtlAllocateHeap 17615->17616 17617 9dc27c 17616->17617 17618 9dc2bc 17617->17618 17620 9dc295 17617->17620 17622 9dc283 17617->17622 17619 9dbf37 RtlAllocateHeap RtlAllocateHeap 17618->17619 17619->17622 17620->17620 17621 9dc120 RtlAllocateHeap RtlAllocateHeap 17620->17621 17621->17622 17622->17589 17624 9e47bf RtlAllocateHeap 17623->17624 17625 9dc0b9 17624->17625 17626 9e46c5 RtlAllocateHeap 17625->17626 17627 9dc0fa 17626->17627 17628 9dc101 17627->17628 17629 9dc120 RtlAllocateHeap RtlAllocateHeap 17627->17629 17628->17589 17629->17628 17631 9e47bf RtlAllocateHeap 17630->17631 17632 9dbebd 17631->17632 17633 9e46c5 RtlAllocateHeap 17632->17633 17634 9dbf0b 17633->17634 17635 9dbf12 17634->17635 17636 9dbf37 RtlAllocateHeap RtlAllocateHeap 17634->17636 17635->17589 17636->17635 17638 9cea84 17637->17638 17639 9ceaa6 17638->17639 17641 9ceacd 17638->17641 17640 9c8be3 ___std_exception_copy RtlAllocateHeap 17639->17640 17643 9ceac3 17640->17643 17642 9ce790 2 API calls 17641->17642 17641->17643 17642->17643 17643->17555 17645 9d1418 17644->17645 17651 9d1440 17644->17651 17646 9d1425 17645->17646 17647 9d1447 17645->17647 17645->17651 17648 9c8be3 ___std_exception_copy RtlAllocateHeap 17646->17648 17652 9d1363 17647->17652 17648->17651 17650 9d147f 17650->16670 17651->16670 17653 9d136f std::locale::_Setgloballocale 17652->17653 17656 9d13be 17653->17656 17655 9d138a 17655->17650 17663 9dc8aa 17656->17663 17683 9dc86c 17663->17683 17665 9d13d6 17670 9d1481 17665->17670 17666 9dc8bb 17666->17665 17667 9db094 std::_Locinfo::_Locinfo_ctor 2 API calls 17666->17667 17668 9dc914 17667->17668 17669 9db01a ___std_exception_copy RtlAllocateHeap 17668->17669 17669->17665 17671 9d13f4 17670->17671 17673 9d1493 17670->17673 17679 9dc955 17671->17679 17672 9d14a1 17674 9c8be3 ___std_exception_copy RtlAllocateHeap 17672->17674 17673->17671 17673->17672 17675 9d14d7 std::_Locinfo::_Locinfo_ctor 17673->17675 17674->17671 17675->17671 17677 9da1e9 RtlAllocateHeap 17675->17677 17699 9c9a91 17675->17699 17705 9d9678 17675->17705 17677->17675 17680 9dc960 17679->17680 17682 9d1400 17679->17682 17681 9c9a91 4 API calls 17680->17681 17680->17682 17681->17682 17682->17655 17684 9dc878 17683->17684 17685 9dc8a2 17684->17685 17686 9da1e9 RtlAllocateHeap 17684->17686 17685->17666 17687 9dc893 17686->17687 17690 9e3be3 17687->17690 17689 9dc899 17689->17666 17691 9e3bfd 17690->17691 17692 9e3bf0 17690->17692 17695 9e3c09 17691->17695 17696 9d16ff ___std_exception_copy RtlAllocateHeap 17691->17696 17693 9d16ff ___std_exception_copy RtlAllocateHeap 17692->17693 17694 9e3bf5 17693->17694 17694->17689 17695->17689 17697 9e3c2a 17696->17697 17698 9c8c60 ___std_exception_copy RtlAllocateHeap 17697->17698 17698->17694 17700 9c9aaa 17699->17700 17704 9c9ad1 17699->17704 17701 9da1e9 RtlAllocateHeap 17700->17701 17700->17704 17702 9c9ac6 17701->17702 17703 9d9678 4 API calls 17702->17703 17703->17704 17704->17675 17706 9d9684 std::locale::_Setgloballocale 17705->17706 17707 9d96c5 17706->17707 17709 9d970b 17706->17709 17711 9d968c 17706->17711 17708 9c8be3 ___std_exception_copy RtlAllocateHeap 17707->17708 17708->17711 17709->17711 17712 9d9789 17709->17712 17711->17675 17713 9d97b1 17712->17713 17725 9d97d4 17712->17725 17714 9d97b5 17713->17714 17716 9d9810 17713->17716 17715 9c8be3 ___std_exception_copy RtlAllocateHeap 17714->17715 17715->17725 17717 9d982e 17716->17717 17731 9d263d 17716->17731 17726 9d92ce 17717->17726 17721 9d988d 17723 9d98f6 WriteFile 17721->17723 17721->17725 17722 9d9846 17722->17725 17734 9d8e9f 17722->17734 17723->17725 17725->17711 17727 9e3be3 RtlAllocateHeap 17726->17727 17729 9d92e0 17727->17729 17728 9d930e 17728->17721 17728->17722 17729->17728 17730 9ce1d0 std::_Locinfo::_Locinfo_ctor 2 API calls 17729->17730 17730->17728 17740 9d251c 17731->17740 17733 9d2656 17733->17717 17735 9d8f07 17734->17735 17736 9ce1d0 std::_Locinfo::_Locinfo_ctor 2 API calls 17735->17736 17737 9d8f18 std::_Locinfo::_Locinfo_ctor 17735->17737 17736->17737 17738 9dc724 RtlAllocateHeap RtlAllocateHeap 17737->17738 17739 9d91ce _ValidateLocalCookies 17737->17739 17738->17737 17739->17725 17741 9de940 RtlAllocateHeap 17740->17741 17742 9d252e 17741->17742 17743 9d254a SetFilePointerEx 17742->17743 17744 9d2536 17742->17744 17743->17744 17744->17733 17746 9ccf8f std::locale::_Setgloballocale 17745->17746 17747 9ccf99 17746->17747 17749 9ccfbc 17746->17749 17748 9c8be3 ___std_exception_copy RtlAllocateHeap 17747->17748 17751 9ccfb4 17748->17751 17749->17751 17752 9cd01a 17749->17752 17751->16676 17753 9cd04a 17752->17753 17754 9cd027 17752->17754 17756 9c9a91 4 API calls 17753->17756 17764 9cd042 17753->17764 17755 9c8be3 ___std_exception_copy RtlAllocateHeap 17754->17755 17755->17764 17757 9cd062 17756->17757 17766 9db054 17757->17766 17760 9da1e9 RtlAllocateHeap 17761 9cd076 17760->17761 17770 9d8d2c 17761->17770 17764->17751 17765 9db01a ___std_exception_copy RtlAllocateHeap 17765->17764 17767 9db06b 17766->17767 17768 9cd06a 17766->17768 17767->17768 17769 9db01a ___std_exception_copy RtlAllocateHeap 17767->17769 17768->17760 17769->17768 17772 9d8d55 17770->17772 17774 9cd07d 17770->17774 17771 9d8da4 17773 9c8be3 ___std_exception_copy RtlAllocateHeap 17771->17773 17772->17771 17775 9d8d7c 17772->17775 17773->17774 17774->17764 17774->17765 17777 9d8c9b 17775->17777 17778 9d8ca7 std::locale::_Setgloballocale 17777->17778 17780 9d8ce6 17778->17780 17781 9d8dff 17778->17781 17780->17774 17793 9de940 17781->17793 17784 9d8e0f 17785 9de940 RtlAllocateHeap 17784->17785 17791 9d8e15 17784->17791 17792 9d8e47 17784->17792 17787 9d8e3e 17785->17787 17786 9de940 RtlAllocateHeap 17788 9d8e53 FindCloseChangeNotification 17786->17788 17790 9de940 RtlAllocateHeap 17787->17790 17788->17791 17789 9d8e6d 17789->17780 17790->17792 17806 9de8af 17791->17806 17792->17786 17792->17791 17794 9de94d 17793->17794 17795 9de962 17793->17795 17812 9d16ec 17794->17812 17797 9d16ec RtlAllocateHeap 17795->17797 17799 9de987 17795->17799 17800 9de992 17797->17800 17799->17784 17803 9d16ff ___std_exception_copy RtlAllocateHeap 17800->17803 17801 9d16ff ___std_exception_copy RtlAllocateHeap 17802 9de95a 17801->17802 17802->17784 17804 9de99a 17803->17804 17805 9c8c60 ___std_exception_copy RtlAllocateHeap 17804->17805 17805->17802 17807 9de8be 17806->17807 17808 9d16ff ___std_exception_copy RtlAllocateHeap 17807->17808 17811 9de8e8 17807->17811 17809 9de92a 17808->17809 17810 9d16ec RtlAllocateHeap 17809->17810 17810->17811 17811->17789 17813 9d9f93 std::locale::_Setgloballocale RtlAllocateHeap 17812->17813 17814 9d16f1 17813->17814 17814->17801 17816 9a7f1d 17815->17816 17817 9a8034 17815->17817 17818 9a7fcb 17816->17818 17819 9a7f2b 17816->17819 17820 9a7f7c 17816->17820 17821 9a7f83 17816->17821 17822 9a7f24 17816->17822 17826 992cf0 std::_Throw_Cpp_error 2 API calls 17817->17826 17828 9a7f29 17817->17828 17818->16681 17825 9c3672 std::_Facet_Register 2 API calls 17819->17825 17895 9acf80 17820->17895 17823 9c3672 std::_Facet_Register 2 API calls 17821->17823 17890 9ac3a0 17822->17890 17823->17828 17825->17828 17829 9a804f 17826->17829 17828->16681 17900 997f90 17829->17900 17831 9a8062 Concurrency::cancel_current_task 17833 9b215f 17832->17833 17957 9d133b 17833->17957 17837 9ab4f0 17838 9adb10 17837->17838 17839 9ade3d 17838->17839 17840 9adb56 17838->17840 17842 9afd70 2 API calls 17839->17842 18009 9aebb0 17840->18009 17844 9ade87 17842->17844 17843 9adba4 17845 9afd70 2 API calls 17843->17845 17846 9aeda0 3 API calls 17844->17846 17880 9adf4f std::ios_base::_Ios_base_dtor 17844->17880 17847 9adbc1 17845->17847 17850 9adee2 17846->17850 17851 9adcc3 std::ios_base::_Ios_base_dtor 17847->17851 18015 9aeda0 17847->18015 17848 9a7ef0 2 API calls 17857 9adfc7 17848->17857 17849 9ade38 std::ios_base::_Ios_base_dtor 17849->16685 17852 9975c0 2 API calls 17850->17852 17855 9adcec 17851->17855 17856 9add82 17851->17856 17853 9adf06 17852->17853 17859 9af440 3 API calls 17853->17859 17861 9a7ef0 2 API calls 17855->17861 17864 9a7ef0 2 API calls 17856->17864 17871 9add9f 17856->17871 17857->17849 17858 9c8c70 std::_Throw_Cpp_error RtlAllocateHeap 17857->17858 17862 9ae06f 17858->17862 17873 9adf1f 17859->17873 17860 9adc1c 18062 9975c0 17860->18062 17884 9add01 17861->17884 18111 9a90b0 17862->18111 17864->17871 17866 9ae093 17870 9a90b0 2 API calls 17866->17870 17867 9adc40 18092 9af440 17867->18092 17868 9ae07d Concurrency::cancel_current_task 17879 9c8c70 std::_Throw_Cpp_error RtlAllocateHeap 17868->17879 17875 9ae0a1 Concurrency::cancel_current_task 17870->17875 17872 9a35b0 RtlAllocateHeap 17871->17872 17876 9add6c 17872->17876 17873->17866 17877 997a20 RtlAllocateHeap 17873->17877 17874 9adc56 17874->17862 17878 9adc6b 17874->17878 17883 9c8c70 std::_Throw_Cpp_error RtlAllocateHeap 17875->17883 17882 9a35b0 RtlAllocateHeap 17876->17882 17877->17880 18101 997a20 17878->18101 17879->17866 17880->17848 17880->17857 17880->17875 17885 9ade26 17882->17885 17887 9ae0b7 17883->17887 18106 9a35b0 17884->18106 17888 9a35b0 RtlAllocateHeap 17885->17888 17888->17849 17889 9adc86 17889->17851 17889->17868 17891 9c3672 std::_Facet_Register 2 API calls 17890->17891 17892 9ac3c3 17891->17892 17893 9c3672 std::_Facet_Register 2 API calls 17892->17893 17894 9ac3ec 17893->17894 17894->17828 17896 9c3672 std::_Facet_Register 2 API calls 17895->17896 17897 9acfb7 17896->17897 17898 993040 std::_Throw_Cpp_error 2 API calls 17897->17898 17899 9acfee 17898->17899 17899->17828 17911 997350 17900->17911 17902 998029 17929 9aad80 17902->17929 17904 99803d 17905 998076 std::ios_base::_Ios_base_dtor 17904->17905 17907 9980df 17904->17907 17933 9972b0 17905->17933 17909 9c8c70 std::_Throw_Cpp_error RtlAllocateHeap 17907->17909 17908 9980aa 17908->17831 17910 9980e4 17909->17910 17910->17831 17936 994d70 17911->17936 17920 9a8f00 std::_Throw_Cpp_error 2 API calls 17921 9973e6 17920->17921 17922 997476 std::ios_base::_Ios_base_dtor 17921->17922 17923 9c8c70 std::_Throw_Cpp_error RtlAllocateHeap 17921->17923 17922->17902 17924 9974c4 17923->17924 17925 9c4b78 ___std_exception_destroy RtlAllocateHeap 17924->17925 17926 997511 17925->17926 17927 9c4b78 ___std_exception_destroy RtlAllocateHeap 17926->17927 17928 997527 std::ios_base::_Ios_base_dtor 17927->17928 17928->17902 17930 9aadb4 17929->17930 17931 9a8f00 std::_Throw_Cpp_error 2 API calls 17930->17931 17932 9aadbf 17931->17932 17932->17904 17934 9c4b15 ___std_exception_copy 2 API calls 17933->17934 17935 99731a 17934->17935 17935->17908 17938 994da6 17936->17938 17937 994dd8 17940 9aac50 17937->17940 17938->17937 17939 993040 std::_Throw_Cpp_error 2 API calls 17938->17939 17939->17937 17942 9aac81 17940->17942 17941 9aacd3 17942->17941 17943 9ae8a0 2 API calls 17942->17943 17944 9973af 17943->17944 17945 9aabb0 17944->17945 17946 9aabe1 17945->17946 17946->17946 17947 9a8f00 std::_Throw_Cpp_error 2 API calls 17946->17947 17948 9973c2 17947->17948 17949 9aae20 17948->17949 17952 9ae710 17949->17952 17951 9973d1 17951->17920 17953 9ae753 17952->17953 17954 9932d0 std::_Throw_Cpp_error 2 API calls 17953->17954 17955 9ae758 std::_Locinfo::_Locinfo_ctor 17953->17955 17956 9ae843 std::_Locinfo::_Locinfo_ctor 17954->17956 17955->17951 17956->17951 17958 9d9e42 __Getctype RtlAllocateHeap 17957->17958 17959 9d1346 17958->17959 17960 9da12d __Getctype RtlAllocateHeap 17959->17960 17961 9b225f 17960->17961 17962 9afd70 17961->17962 17965 9afd84 17962->17965 17966 9afde4 17962->17966 17964 9aff6c 17964->17837 17969 9afdc2 17965->17969 17976 9b9e20 17965->17976 17971 9afe74 17966->17971 17998 9b01e0 17966->17998 17969->17966 17970 9b9e20 2 API calls 17969->17970 17973 9afe58 17969->17973 17970->17973 17971->17837 17972 9afecc 17972->17964 17975 9b9e20 2 API calls 17972->17975 18002 9b08f0 17972->18002 17973->17971 17994 9b1430 17973->17994 17975->17972 17977 9b9e62 17976->17977 17978 9b9f76 17976->17978 17979 9b9e7c 17977->17979 17981 9b9eca 17977->17981 17982 9b9eba 17977->17982 17980 993330 2 API calls 17978->17980 17984 9c3672 std::_Facet_Register 2 API calls 17979->17984 17983 9b9f7b 17980->17983 17987 9c3672 std::_Facet_Register 2 API calls 17981->17987 17991 9b9e9a std::_Locinfo::_Locinfo_ctor 17981->17991 17982->17979 17982->17983 17985 992b50 Concurrency::cancel_current_task 2 API calls 17983->17985 17986 9b9e8f 17984->17986 17988 9b9f80 17985->17988 17986->17988 17986->17991 17987->17991 17989 9c8c70 std::_Throw_Cpp_error RtlAllocateHeap 17988->17989 17990 9b9f85 17989->17990 17992 9b77d0 RtlAllocateHeap 17991->17992 17993 9b9f47 17992->17993 17993->17969 17995 9b1443 17994->17995 17996 9b1471 17995->17996 17997 9b9e20 2 API calls 17995->17997 17996->17966 17997->17996 17999 9b01f0 17998->17999 18000 9b9e20 2 API calls 17999->18000 18001 9b0260 17999->18001 18000->17999 18001->17972 18003 9b1430 2 API calls 18002->18003 18006 9b08fc 18003->18006 18004 9b9e20 RtlAllocateHeap RtlAllocateHeap 18008 9b0995 18004->18008 18005 9b090a 18005->17972 18006->18005 18007 9b9e20 2 API calls 18006->18007 18006->18008 18007->18006 18008->18004 18008->18005 18010 9aec6d 18009->18010 18011 9a7ef0 2 API calls 18010->18011 18012 9aec8d 18011->18012 18114 9b16c0 18012->18114 18014 9aecdf 18014->17843 18016 9aee46 18015->18016 18039 9aef1f std::ios_base::_Ios_base_dtor 18015->18039 18017 9af425 18016->18017 18020 9ae8a0 2 API calls 18016->18020 18024 9c8c70 std::_Throw_Cpp_error RtlAllocateHeap 18017->18024 18018 9a8f00 std::_Throw_Cpp_error 2 API calls 18019 9aef5b 18018->18019 18021 9aef6a 18019->18021 18029 9af191 18019->18029 18022 9aee79 18020->18022 18023 9af440 3 API calls 18021->18023 18025 9a8f00 std::_Throw_Cpp_error 2 API calls 18022->18025 18026 9aef79 18023->18026 18027 9af42f 18024->18027 18028 9aee93 18025->18028 18034 993040 std::_Throw_Cpp_error 2 API calls 18026->18034 18030 9c8c70 std::_Throw_Cpp_error RtlAllocateHeap 18027->18030 18031 9a8f00 std::_Throw_Cpp_error 2 API calls 18028->18031 18029->18029 18035 993040 std::_Throw_Cpp_error 2 API calls 18029->18035 18032 9af434 18030->18032 18033 9aeee3 18031->18033 18036 9c8c70 std::_Throw_Cpp_error RtlAllocateHeap 18032->18036 18033->18017 18033->18039 18037 9aefba 18034->18037 18038 9af1c9 18035->18038 18061 9af375 std::ios_base::_Ios_base_dtor 18036->18061 18040 9a8f00 std::_Throw_Cpp_error 2 API calls 18037->18040 18041 9afbf0 2 API calls 18038->18041 18039->18018 18043 9aefcd 18040->18043 18044 9af1e0 18041->18044 18042 9c8c70 std::_Throw_Cpp_error RtlAllocateHeap 18045 9af43e 18042->18045 18046 9ae710 2 API calls 18043->18046 18047 9a8f00 std::_Throw_Cpp_error 2 API calls 18044->18047 18048 9af019 18046->18048 18051 9af22f std::ios_base::_Ios_base_dtor 18047->18051 18049 9a8f00 std::_Throw_Cpp_error 2 API calls 18048->18049 18050 9af032 18049->18050 18052 9a8f00 std::_Throw_Cpp_error 2 API calls 18050->18052 18051->18032 18053 9af161 std::ios_base::_Ios_base_dtor 18051->18053 18055 9af081 std::ios_base::_Ios_base_dtor 18052->18055 18054 993040 std::_Throw_Cpp_error 2 API calls 18053->18054 18060 9af3f2 std::ios_base::_Ios_base_dtor 18053->18060 18056 9af30c 18054->18056 18055->18027 18055->18053 18057 9afbf0 2 API calls 18056->18057 18058 9af323 18057->18058 18059 9a8f00 std::_Throw_Cpp_error 2 API calls 18058->18059 18059->18061 18060->17860 18061->18042 18061->18060 18183 994e30 18062->18183 18065 994e30 2 API calls 18066 99762b 18065->18066 18067 9aace0 2 API calls 18066->18067 18068 997640 18067->18068 18069 9aabb0 2 API calls 18068->18069 18070 997656 18069->18070 18071 9ae710 2 API calls 18070->18071 18073 99766d std::ios_base::_Ios_base_dtor 18071->18073 18072 997a09 18074 9c8c70 std::_Throw_Cpp_error RtlAllocateHeap 18072->18074 18073->18072 18075 99770a std::ios_base::_Ios_base_dtor 18073->18075 18076 997a0e 18074->18076 18078 997350 2 API calls 18075->18078 18077 9c8c70 std::_Throw_Cpp_error RtlAllocateHeap 18076->18077 18079 997a13 18077->18079 18080 9977a4 18078->18080 18081 9a8f00 std::_Throw_Cpp_error 2 API calls 18080->18081 18082 9977b9 18081->18082 18083 9ae710 2 API calls 18082->18083 18084 99780c 18083->18084 18085 9a8f00 std::_Throw_Cpp_error 2 API calls 18084->18085 18086 997828 18085->18086 18087 9aad80 2 API calls 18086->18087 18089 997879 std::ios_base::_Ios_base_dtor 18087->18089 18088 997975 std::ios_base::_Ios_base_dtor 18090 9972b0 2 API calls 18088->18090 18089->18076 18089->18088 18091 9979ca 18090->18091 18091->17867 18093 9af630 18092->18093 18096 9af4c9 std::ios_base::_Ios_base_dtor std::_Locinfo::_Locinfo_ctor 18092->18096 18093->17874 18095 9af647 18097 9c8c70 std::_Throw_Cpp_error RtlAllocateHeap 18095->18097 18096->18093 18096->18095 18098 9a8f00 std::_Throw_Cpp_error 2 API calls 18096->18098 18099 9932d0 std::_Throw_Cpp_error 2 API calls 18096->18099 18187 9934a0 18096->18187 18100 9af651 18097->18100 18098->18096 18099->18096 18100->17874 18102 9c4b78 ___std_exception_destroy RtlAllocateHeap 18101->18102 18103 997a61 18102->18103 18104 9c4b78 ___std_exception_destroy RtlAllocateHeap 18103->18104 18105 997a77 18104->18105 18105->17889 18107 9a35d1 18106->18107 18108 9a35f1 std::ios_base::_Ios_base_dtor 18106->18108 18107->18108 18109 9c8c70 std::_Throw_Cpp_error RtlAllocateHeap 18107->18109 18108->17876 18110 9a3625 18109->18110 18110->17876 18194 9a6590 18111->18194 18117 9b17d0 18114->18117 18116 9b16da std::locale::_Setgloballocale 18116->18014 18118 9b1809 18117->18118 18124 9b1838 18117->18124 18119 9b1923 18118->18119 18122 9b181b 18118->18122 18134 9b1990 18119->18134 18122->18124 18125 9b9f90 18122->18125 18124->18116 18126 9ba0a3 18125->18126 18128 9b9fc2 18125->18128 18127 993330 2 API calls 18126->18127 18132 9ba000 std::_Locinfo::_Locinfo_ctor 18127->18132 18144 9bd190 18128->18144 18130 9c8c70 std::_Throw_Cpp_error RtlAllocateHeap 18131 9ba0ad 18130->18131 18132->18130 18133 9ba05f std::ios_base::_Ios_base_dtor 18132->18133 18133->18124 18135 9c1cea 2 API calls 18134->18135 18137 9b199a 18135->18137 18136 9b1928 18137->18136 18138 992cf0 std::_Throw_Cpp_error 2 API calls 18137->18138 18139 9b1a03 18138->18139 18140 9aace0 2 API calls 18139->18140 18141 9b1a18 18140->18141 18152 997cf0 18141->18152 18143 9b1a2d Concurrency::cancel_current_task 18145 9bd1d9 18144->18145 18146 9bd199 18144->18146 18145->18145 18146->18145 18147 9bd1b0 18146->18147 18150 9c3672 std::_Facet_Register 2 API calls 18146->18150 18148 9bd1b9 18147->18148 18149 9c3672 std::_Facet_Register 2 API calls 18147->18149 18148->18132 18151 9bd1d2 18149->18151 18150->18147 18151->18132 18153 997350 2 API calls 18152->18153 18154 997d80 18153->18154 18155 9aad80 2 API calls 18154->18155 18156 997d94 18155->18156 18157 997dcd std::ios_base::_Ios_base_dtor 18156->18157 18159 997e33 18156->18159 18158 9972b0 2 API calls 18157->18158 18160 997dfd 18158->18160 18161 9c8c70 std::_Throw_Cpp_error RtlAllocateHeap 18159->18161 18160->18143 18162 997e38 18161->18162 18163 997350 2 API calls 18162->18163 18164 997ece 18163->18164 18165 9aad80 2 API calls 18164->18165 18166 997ee2 18165->18166 18167 997f1b std::ios_base::_Ios_base_dtor 18166->18167 18169 997f81 18166->18169 18168 9972b0 2 API calls 18167->18168 18170 997f4b 18168->18170 18171 9c8c70 std::_Throw_Cpp_error RtlAllocateHeap 18169->18171 18170->18143 18172 997f86 18171->18172 18173 997350 2 API calls 18172->18173 18174 998029 18173->18174 18175 9aad80 2 API calls 18174->18175 18176 99803d 18175->18176 18177 998076 std::ios_base::_Ios_base_dtor 18176->18177 18179 9980df 18176->18179 18178 9972b0 2 API calls 18177->18178 18180 9980aa 18178->18180 18181 9c8c70 std::_Throw_Cpp_error RtlAllocateHeap 18179->18181 18180->18143 18182 9980e4 18181->18182 18182->18143 18184 994e66 18183->18184 18184->18184 18185 994ea8 18184->18185 18186 993040 std::_Throw_Cpp_error 2 API calls 18184->18186 18185->18065 18186->18185 18190 993380 18187->18190 18191 993399 18190->18191 18192 9d0dd7 2 API calls 18191->18192 18193 9933a7 18192->18193 18193->18096 18195 9c4b15 ___std_exception_copy 2 API calls 18194->18195 18196 9a65ce 18195->18196 18197 9c4b15 ___std_exception_copy 2 API calls 18196->18197 18198 9a6601 18197->18198 18198->17868 18200 9e8e17 18199->18200 18203 9e8c08 18199->18203 18200->16688 18202 9e8d38 std::locale::_Setgloballocale 18202->18200 18204 993130 2 API calls 18202->18204 18203->18202 18206 9c87b0 18203->18206 18215 993130 18203->18215 18204->18202 18207 9c87e3 18206->18207 18212 9c87c7 18206->18212 18208 9d9e42 __Getctype RtlAllocateHeap 18207->18208 18209 9c87e8 18208->18209 18210 9da12d __Getctype RtlAllocateHeap 18209->18210 18211 9c87f8 18210->18211 18211->18212 18213 9d9a39 2 API calls 18211->18213 18212->18203 18214 9c882a 18213->18214 18214->18203 18216 99316f 18215->18216 18217 9932b3 18215->18217 18219 993189 18216->18219 18221 9931d7 18216->18221 18222 9931c7 18216->18222 18218 993330 2 API calls 18217->18218 18220 9932b8 18218->18220 18224 9c3672 std::_Facet_Register 2 API calls 18219->18224 18223 992b50 Concurrency::cancel_current_task 2 API calls 18220->18223 18225 9c3672 std::_Facet_Register 2 API calls 18221->18225 18226 99319c std::_Locinfo::_Locinfo_ctor 18221->18226 18222->18219 18222->18220 18223->18226 18224->18226 18225->18226 18227 9c8c70 std::_Throw_Cpp_error RtlAllocateHeap 18226->18227 18229 99326b std::ios_base::_Ios_base_dtor 18226->18229 18228 9932c2 18227->18228 18229->18203 18231 9c364d GetSystemTimePreciseAsFileTime 18230->18231 18232 9c3077 18230->18232 18231->18232 18232->16344 18466 9b47b0 18467 9b48ed 18466->18467 18469 9b47ed 18466->18469 18468 993330 2 API calls 18467->18468 18470 9b48f2 18468->18470 18471 9b4a30 2 API calls 18469->18471 18472 9b493d 18470->18472 18473 9b4a23 18470->18473 18479 9b4827 18471->18479 18476 9b4a30 2 API calls 18472->18476 18474 993330 2 API calls 18473->18474 18475 9b4a28 18474->18475 18477 9b4977 18476->18477 18485 9a3d50 18477->18485 18480 9ae1e0 RtlAllocateHeap 18479->18480 18481 9b48b4 18480->18481 18482 9b499f 18483 9ae1e0 RtlAllocateHeap 18482->18483 18484 9b49ea 18483->18484 18486 9a3d8f 18485->18486 18517 9a3df7 std::_Locinfo::_Locinfo_ctor 18485->18517 18487 9a3e69 18486->18487 18488 9a3f1e 18486->18488 18489 9a3f7d 18486->18489 18490 9a3d96 18486->18490 18486->18517 18492 9c3672 std::_Facet_Register 2 API calls 18487->18492 18557 9a7e80 18488->18557 18494 9c3672 std::_Facet_Register 2 API calls 18489->18494 18493 9c3672 std::_Facet_Register 2 API calls 18490->18493 18495 9a3e73 18492->18495 18496 9a3da0 18493->18496 18497 9a3f8a 18494->18497 18495->18517 18518 9bbf30 18495->18518 18498 9c3672 std::_Facet_Register 2 API calls 18496->18498 18501 9a408e 18497->18501 18502 9a3fd3 18497->18502 18497->18517 18500 9a3dd2 18498->18500 18545 9bf460 18500->18545 18506 993330 2 API calls 18501->18506 18503 9a3fdb 18502->18503 18504 9a4004 18502->18504 18507 9a4093 18503->18507 18508 9a3fe6 18503->18508 18509 9c3672 std::_Facet_Register 2 API calls 18504->18509 18506->18507 18511 992b50 Concurrency::cancel_current_task 2 API calls 18507->18511 18512 9c3672 std::_Facet_Register 2 API calls 18508->18512 18509->18517 18510 9a3eb1 18513 9a3d50 6 API calls 18510->18513 18510->18517 18514 9a3fec 18511->18514 18512->18514 18513->18510 18515 9c8c70 std::_Throw_Cpp_error RtlAllocateHeap 18514->18515 18514->18517 18516 9a409d 18515->18516 18517->18482 18519 9bbfab 18518->18519 18520 9bbf42 18518->18520 18521 993330 2 API calls 18519->18521 18522 9bbf4d 18520->18522 18523 9bbf7c 18520->18523 18525 9bbfb0 18521->18525 18522->18525 18526 9bbf54 18522->18526 18524 9bbf99 18523->18524 18527 9c3672 std::_Facet_Register 2 API calls 18523->18527 18524->18510 18528 992b50 Concurrency::cancel_current_task 2 API calls 18525->18528 18529 9c3672 std::_Facet_Register 2 API calls 18526->18529 18530 9bbf86 18527->18530 18531 9bbf5a 18528->18531 18529->18531 18530->18510 18532 9c8c70 std::_Throw_Cpp_error RtlAllocateHeap 18531->18532 18533 9bbf63 18531->18533 18534 9bbfba 18532->18534 18533->18510 18535 9bc00c 18534->18535 18536 9bc077 18534->18536 18540 9bc013 std::_Locinfo::_Locinfo_ctor 18534->18540 18562 9afab0 18535->18562 18537 993330 2 API calls 18536->18537 18539 9bc07c 18537->18539 18541 9c3672 std::_Facet_Register 2 API calls 18539->18541 18540->18510 18542 9bc0ae 18541->18542 18543 993040 std::_Throw_Cpp_error 2 API calls 18542->18543 18544 9bc0f2 18543->18544 18544->18510 18546 9bf498 18545->18546 18547 9bf53f 18545->18547 18548 9c3672 std::_Facet_Register 2 API calls 18546->18548 18547->18517 18549 9bf4ba 18548->18549 18550 9a63b0 std::_Throw_Cpp_error 2 API calls 18549->18550 18551 9bf4d0 18550->18551 18552 9a3d50 6 API calls 18551->18552 18553 9bf4e0 18552->18553 18554 9bf460 6 API calls 18553->18554 18555 9bf531 18554->18555 18556 9bf460 6 API calls 18555->18556 18556->18547 18558 9c3672 std::_Facet_Register 2 API calls 18557->18558 18559 9a7ea6 18558->18559 18560 9a63b0 std::_Throw_Cpp_error 2 API calls 18559->18560 18561 9a7ec5 18560->18561 18561->18517 18563 9afb2b 18562->18563 18564 9afac2 18562->18564 18565 992b50 Concurrency::cancel_current_task 2 API calls 18563->18565 18566 9afacd 18564->18566 18569 9afafc 18564->18569 18574 9afada 18565->18574 18566->18563 18567 9afad4 18566->18567 18571 9c3672 std::_Facet_Register 2 API calls 18567->18571 18568 9afb19 18568->18540 18569->18568 18572 9c3672 std::_Facet_Register 2 API calls 18569->18572 18570 9c8c70 std::_Throw_Cpp_error RtlAllocateHeap 18576 9afb35 18570->18576 18571->18574 18573 9afb06 18572->18573 18573->18540 18574->18570 18575 9afae3 18574->18575 18575->18540 18578 9afb5b std::locale::_Setgloballocale 18576->18578 18580 9b9c70 18576->18580 18578->18540 18579 9afb7f 18579->18540 18581 9b9dc4 18580->18581 18586 9b9ca2 18580->18586 18582 993330 2 API calls 18581->18582 18595 9b9d04 std::_Locinfo::_Locinfo_ctor 18582->18595 18583 9b9dbf 18584 992b50 Concurrency::cancel_current_task 2 API calls 18583->18584 18584->18581 18585 9c8c70 std::_Throw_Cpp_error RtlAllocateHeap 18587 9b9dce 18585->18587 18586->18583 18588 9b9d1d 18586->18588 18589 9b9cf3 18586->18589 18597 9a9950 18587->18597 18592 9c3672 std::_Facet_Register 2 API calls 18588->18592 18588->18595 18589->18583 18591 9b9cfe 18589->18591 18594 9c3672 std::_Facet_Register 2 API calls 18591->18594 18592->18595 18593 9b9dd9 Concurrency::cancel_current_task 18594->18595 18595->18585 18596 9b9d8f std::ios_base::_Ios_base_dtor 18595->18596 18596->18579 18598 9a9978 std::ios_base::_Ios_base_dtor 18597->18598 18599 9a9968 18597->18599 18598->18593 18599->18598 18600 9c8c70 std::_Throw_Cpp_error RtlAllocateHeap 18599->18600 18601 9a998d 18600->18601 18602 9a9a4f 18601->18602 18609 9c2b74 18601->18609 18602->18593 18608 9a9a04 18608->18593 18610 9c2af7 18609->18610 18613 9a99cc 18610->18613 18631 9c9815 18610->18631 18612 9c2b43 18612->18613 18645 9cd5f6 18612->18645 18613->18602 18617 9a83b0 18613->18617 18616 9cd0a8 5 API calls 18616->18613 18618 9a843c 18617->18618 18619 9a8463 18617->18619 18671 9d120a 18618->18671 18621 9ac430 18619->18621 18623 9ac45f std::_Throw_Cpp_error std::_Lockit::~_Lockit std::_Lockit::_Lockit 18621->18623 18622 9ac4f8 std::_Lockit::~_Lockit 18622->18608 18623->18622 18624 9c3672 std::_Facet_Register 2 API calls 18623->18624 18625 9ac506 18624->18625 18626 994040 std::_Throw_Cpp_error 3 API calls 18625->18626 18627 9ac536 18626->18627 18628 994100 std::_Throw_Cpp_error 2 API calls 18627->18628 18629 9ac592 18628->18629 18630 9c26f7 std::_Facet_Register 2 API calls 18629->18630 18630->18622 18632 9c975e std::locale::_Setgloballocale 18631->18632 18633 9c9771 18632->18633 18636 9c9791 18632->18636 18634 9d16ff ___std_exception_copy RtlAllocateHeap 18633->18634 18635 9c9776 18634->18635 18637 9c8c60 ___std_exception_copy RtlAllocateHeap 18635->18637 18638 9c9796 18636->18638 18639 9c97a3 18636->18639 18644 9c9781 18637->18644 18640 9d16ff ___std_exception_copy RtlAllocateHeap 18638->18640 18641 9da8ef RtlAllocateHeap 18639->18641 18640->18644 18642 9c97ac 18641->18642 18643 9d16ff ___std_exception_copy RtlAllocateHeap 18642->18643 18642->18644 18643->18644 18644->18612 18646 9cd609 ___std_exception_copy 18645->18646 18651 9cd34d 18646->18651 18648 9cd61e 18649 9c899c ___std_exception_copy RtlAllocateHeap 18648->18649 18650 9c2b5e 18649->18650 18650->18613 18650->18616 18653 9cd359 std::locale::_Setgloballocale 18651->18653 18652 9cd35f 18654 9c8be3 ___std_exception_copy RtlAllocateHeap 18652->18654 18653->18652 18655 9cd3a2 18653->18655 18657 9cd37a 18654->18657 18658 9cd4d0 18655->18658 18657->18648 18659 9cd4f6 18658->18659 18660 9cd4e3 18658->18660 18667 9cd3f7 18659->18667 18660->18657 18662 9cd5a7 18662->18657 18663 9cd519 18663->18662 18664 9c9a91 4 API calls 18663->18664 18665 9cd547 18664->18665 18666 9d263d 2 API calls 18665->18666 18666->18662 18668 9cd460 18667->18668 18669 9cd408 18667->18669 18668->18663 18669->18668 18670 9d25fd SetFilePointerEx RtlAllocateHeap 18669->18670 18670->18668 18672 9d1216 18671->18672 18675 9d122b 18671->18675 18673 9d16ff ___std_exception_copy RtlAllocateHeap 18672->18673 18674 9d121b 18673->18674 18676 9c8c60 ___std_exception_copy RtlAllocateHeap 18674->18676 18675->18619 18677 9d1226 18676->18677 18677->18619 18234 55902f6 GetCurrentHwProfileW 18235 5590328 18234->18235

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 79 999280-9992dd call 9a63b0 82 999413-999521 call 992df0 call a7a420 79->82 83 9992e3-9992e9 79->83 97 999523-999535 82->97 98 999537-99953f call 9a8dc0 82->98 84 9992f0-999313 83->84 86 999315-99931f 84->86 87 999324-999331 84->87 89 999403-999406 86->89 90 999333-99933d 87->90 91 999342-99934f 87->91 93 999409-99940d 89->93 90->89 94 999351-99935b 91->94 95 999360-99936d 91->95 93->82 93->84 94->89 99 99936f-999379 95->99 100 99937e-99938b 95->100 103 999544-999597 call a7a420 * 2 97->103 98->103 99->89 101 999399-9993a6 100->101 102 99938d-999397 100->102 105 9993a8-9993b2 101->105 106 9993b4-9993c1 101->106 102->89 116 999599-9995c8 call a7a420 call 9c5270 103->116 117 9995cb-9995e1 call a7a420 103->117 105->89 108 9993cf-9993dc 106->108 109 9993c3-9993cd 106->109 111 9993ea-9993f4 108->111 112 9993de-9993e8 108->112 109->89 111->93 115 9993f6-9993ff 111->115 112->89 115->89 116->117 122 9996e2 117->122 123 9995e7-9995ed 117->123 126 9996e6-9996f0 122->126 125 9995f0-9996ce WSASend 123->125 145 99975f-999763 125->145 146 9996d4-9996dc 125->146 128 99971e-99973d 126->128 129 9996f2-9996fe 126->129 133 99976f-999796 128->133 134 99973f-99974b 128->134 131 999700-99970e 129->131 132 999714-99971b call 9c38f3 129->132 131->132 137 999797-9997fe call 9c8c70 call 992df0 * 2 131->137 132->128 135 99974d-99975b 134->135 136 999765-99976c call 9c38f3 134->136 135->137 139 99975d 135->139 136->133 139->136 145->126 146->122 146->125
                                  APIs
                                  • WSASend.WS2_32(?,?,00000001,00000000,00000000,00000000,00000000,?,?,?,?,00ADD15C,00000000,761B23A0,-00B19880), ref: 009996C9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3353671863.0000000000991000.00000040.00000001.01000000.00000003.sdmp, Offset: 00990000, based on PE: true
                                  • Associated: 00000000.00000002.3353383320.0000000000990000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3353671863.0000000000B15000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3355103090.0000000000B1A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000B1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000C9F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000D7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DC2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DD1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3364298408.0000000000DD2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365076516.0000000000F6B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365925569.0000000000F6D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_990000_installer.jbxd
                                  Similarity
                                  • API ID: Send
                                  • String ID: Ws2_32.dll
                                  • API String ID: 121738739-3093949381
                                  • Opcode ID: 204b4cfd6fe731efa467850a350f48472a989abd59e28528ef11dd80a7586fbf
                                  • Instruction ID: 22b8c0a3b6346a43e9936d5a70d233772f845444dab924895600bcdc14615830
                                  • Opcode Fuzzy Hash: 204b4cfd6fe731efa467850a350f48472a989abd59e28528ef11dd80a7586fbf
                                  • Instruction Fuzzy Hash: 4002C070D04298EFDF25CFA8C8907ADBBB0EF59314F24428DE4856B686D7741986CF92
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3376234565.0000000005590000.00000040.00001000.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5590000_installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 502f5161555a2e4ba77503f0fd93e5590be017f8a973701229207daf3e22d542
                                  • Instruction ID: 2c6d98c40cecfea483c2aa53eb9aa45064b432fc4f11108387f665ca6598ae45
                                  • Opcode Fuzzy Hash: 502f5161555a2e4ba77503f0fd93e5590be017f8a973701229207daf3e22d542
                                  • Instruction Fuzzy Hash: E82138BB20D022BD7A09C541271CABA7B6FF6C62313308C37F407CB4A2D6890A4D51F1

                                  Control-flow Graph

                                  APIs
                                  • setsockopt.WS2_32(00000430,0000FFFF,00001006,?,00000008), ref: 00A57BA7
                                  • recv.WS2_32(?,00000004,00000002), ref: 00A57BC1
                                  • recv.WS2_32(00000000,0000000C,00000002,00000000), ref: 00A57C43
                                  • recv.WS2_32(00000000,0000000C,00000008), ref: 00A57C64
                                    • Part of subcall function 00A58590: WSAStartup.WS2_32 ref: 00A585BB
                                    • Part of subcall function 00A58590: socket.WS2_32(?,?,?,?,?,?,00B19328,?,?), ref: 00A5865E
                                    • Part of subcall function 00A58590: connect.WS2_32(00000000,00AE9BFC,?,?,?,?,00B19328,?,?), ref: 00A58672
                                    • Part of subcall function 00A58590: closesocket.WS2_32(00000000), ref: 00A5867D
                                  • recv.WS2_32(00000000,?,00000008), ref: 00A57D1B
                                  • recv.WS2_32(?,00000004,00000008), ref: 00A57E23
                                  • __Xtime_get_ticks.LIBCPMT ref: 00A57E2A
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00A57E38
                                  • Sleep.KERNELBASE(00000001,00000000,?,00002710,00000000), ref: 00A57EB1
                                  • Sleep.KERNELBASE(00000064,?,00002710,00000000), ref: 00A57EB9
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3353671863.0000000000991000.00000040.00000001.01000000.00000003.sdmp, Offset: 00990000, based on PE: true
                                  • Associated: 00000000.00000002.3353383320.0000000000990000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3353671863.0000000000B15000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3355103090.0000000000B1A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000B1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000C9F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000D7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DC2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DD1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3364298408.0000000000DD2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365076516.0000000000F6B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365925569.0000000000F6D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_990000_installer.jbxd
                                  Similarity
                                  • API ID: recv$Sleep$StartupUnothrow_t@std@@@Xtime_get_ticks__ehfuncinfo$??2@closesocketconnectsetsockoptsocket
                                  • String ID:
                                  • API String ID: 56803616-0
                                  • Opcode ID: 181453efcbed2701102cb820406689215eb9fcd0376c7e5a03d6586ce0c397e6
                                  • Instruction ID: 406309810862a8135fa329fcdc70177cacbb1e6b18c2539bd24e2ff206261f99
                                  • Opcode Fuzzy Hash: 181453efcbed2701102cb820406689215eb9fcd0376c7e5a03d6586ce0c397e6
                                  • Instruction Fuzzy Hash: ECB18DB1D04348DBEB10DFA8DC8ABAEBBB5BB45300F604259E854BB2D2D7745D48CB91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 58 a58590-a585c2 WSAStartup 59 a58696-a5869f 58->59 60 a585c8-a585f2 call a7a420 * 2 58->60 65 a585f4-a585f8 60->65 66 a585fe-a58644 60->66 65->59 65->66 68 a58646-a5864c 66->68 69 a58690 66->69 70 a586a4-a586ae 68->70 71 a5864e 68->71 69->59 70->69 75 a586b0-a586b8 70->75 72 a58654-a58668 socket 71->72 72->69 74 a5866a-a5867a connect 72->74 76 a586a0 74->76 77 a5867c-a58684 closesocket 74->77 76->70 77->72 78 a58686-a5868a 77->78 78->69
                                  APIs
                                  • WSAStartup.WS2_32 ref: 00A585BB
                                  • socket.WS2_32(?,?,?,?,?,?,00B19328,?,?), ref: 00A5865E
                                  • connect.WS2_32(00000000,00AE9BFC,?,?,?,?,00B19328,?,?), ref: 00A58672
                                  • closesocket.WS2_32(00000000), ref: 00A5867D
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3353671863.0000000000991000.00000040.00000001.01000000.00000003.sdmp, Offset: 00990000, based on PE: true
                                  • Associated: 00000000.00000002.3353383320.0000000000990000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3353671863.0000000000B15000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3355103090.0000000000B1A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000B1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000C9F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000D7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DC2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DD1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3364298408.0000000000DD2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365076516.0000000000F6B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365925569.0000000000F6D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_990000_installer.jbxd
                                  Similarity
                                  • API ID: Startupclosesocketconnectsocket
                                  • String ID:
                                  • API String ID: 3098855095-0
                                  • Opcode ID: 2c2cdffabe530f1122fe5deb5f15b34c0d4b7f94aefad302786e318d2266d2e9
                                  • Instruction ID: 609f74abbd1417f287132c3d58eefe6e5d55870f3d0814c5bc0ef194267889c1
                                  • Opcode Fuzzy Hash: 2c2cdffabe530f1122fe5deb5f15b34c0d4b7f94aefad302786e318d2266d2e9
                                  • Instruction Fuzzy Hash: 9E3104765043406BC7208F288C8962FB7E4FFC9335F015F19FEA8A22D0E77498088796

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 152 5590009-5590288 180 5590293-55902cd call 55902d7 152->180 185 55902cf-55902d0 180->185 186 5590292 180->186 187 5590290 185->187 188 55902d2-55902f1 185->188 186->180 187->186 191 5590309-559031d GetCurrentHwProfileW 188->191 192 5590328-55905a8 191->192
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3376234565.0000000005590000.00000040.00001000.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5590000_installer.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 83047a2311aea779f2b1873989b76502466a9f2b2d3acdc889a69f9acafb9f37
                                  • Instruction ID: 7b82016f9a0ef028e4b852831b1193ea000aff8197a919fdbbc4bfbee133b8a2
                                  • Opcode Fuzzy Hash: 83047a2311aea779f2b1873989b76502466a9f2b2d3acdc889a69f9acafb9f37
                                  • Instruction Fuzzy Hash: F5717DEB10C120BDBE49C0856F68AFB576FF6D67307318C26F807D65A2E29C5A4D21B1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 292 5590057-559005b 293 559005d-5590288 292->293 294 5590020-5590052 292->294 321 5590293-55902cd call 55902d7 293->321 294->293 326 55902cf-55902d0 321->326 327 5590292 321->327 328 5590290 326->328 329 55902d2-55902f1 326->329 327->321 328->327 332 5590309-559031d GetCurrentHwProfileW 329->332 333 5590328-55905a8 332->333
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3376234565.0000000005590000.00000040.00001000.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5590000_installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6dd9f9f120c9a12ba3a6cca2db910cf274cf9eed086ddc9f25baad259eb16017
                                  • Instruction ID: da12ea726781d80673c0b0bf3b46805234e66e87af6b18928e807d6494ac0407
                                  • Opcode Fuzzy Hash: 6dd9f9f120c9a12ba3a6cca2db910cf274cf9eed086ddc9f25baad259eb16017
                                  • Instruction Fuzzy Hash: FF718EEB20C120BDBE09C4856F58AFA576FF6C67307318C27F807D61A2E29C5A4D21B1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 222 559001b-5590288 250 5590293-55902cd call 55902d7 222->250 255 55902cf-55902d0 250->255 256 5590292 250->256 257 5590290 255->257 258 55902d2-55902f1 255->258 256->250 257->256 261 5590309-559031d GetCurrentHwProfileW 258->261 262 5590328-55905a8 261->262
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3376234565.0000000005590000.00000040.00001000.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5590000_installer.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: fe7a778a25db773bb38240c07fde28c1749380fc8ab29e5714d2ca97a8063308
                                  • Instruction ID: 93b4c16f5b62379762e6c213c8cb539d465b39c9cdc590d9dd1feb17a1d66aea
                                  • Opcode Fuzzy Hash: fe7a778a25db773bb38240c07fde28c1749380fc8ab29e5714d2ca97a8063308
                                  • Instruction Fuzzy Hash: 23717EEB20C120BDBE49C0956F58AFB576FF6C67307318C27F807D65A2E29C5A4921B1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 363 5590031-5590288 390 5590293-55902cd call 55902d7 363->390 395 55902cf-55902d0 390->395 396 5590292 390->396 397 5590290 395->397 398 55902d2-55902f1 395->398 396->390 397->396 401 5590309-559031d GetCurrentHwProfileW 398->401 402 5590328-55905a8 401->402
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3376234565.0000000005590000.00000040.00001000.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5590000_installer.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 97c3b3f4f7cf6dbe2b7b3c514b1bb453f2daca842835248f58f626c9db1d7b0f
                                  • Instruction ID: f934aa09fdebb3508555a333c719d88dedb51b1c48b2079acfbf68e492c5c8be
                                  • Opcode Fuzzy Hash: 97c3b3f4f7cf6dbe2b7b3c514b1bb453f2daca842835248f58f626c9db1d7b0f
                                  • Instruction Fuzzy Hash: C7717DEB10C120BDBE49C0856B68AFA576FF6C67307318C27F807D65A2E29C5A4D21B1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 432 5590043-5590288 458 5590293-55902cd call 55902d7 432->458 463 55902cf-55902d0 458->463 464 5590292 458->464 465 5590290 463->465 466 55902d2-55902f1 463->466 464->458 465->464 469 5590309-559031d GetCurrentHwProfileW 466->469 470 5590328-55905a8 469->470
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3376234565.0000000005590000.00000040.00001000.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5590000_installer.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 82c78ced0b96ea9371c84813735394df312e5171d3e5c7b24c80556993d1b282
                                  • Instruction ID: 0161c7c18da34f2874d6b56f252486e38c3748bf9081c553192145bb3da03f56
                                  • Opcode Fuzzy Hash: 82c78ced0b96ea9371c84813735394df312e5171d3e5c7b24c80556993d1b282
                                  • Instruction Fuzzy Hash: 54717FEB20C120BDBE09C0956F58AFA576FF6D67307318C27F807D65A2E29C5A4D21B1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 500 5590066-5590288 524 5590293-55902cd call 55902d7 500->524 529 55902cf-55902d0 524->529 530 5590292 524->530 531 5590290 529->531 532 55902d2-55902f1 529->532 530->524 531->530 535 5590309-559031d GetCurrentHwProfileW 532->535 536 5590328-55905a8 535->536
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3376234565.0000000005590000.00000040.00001000.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5590000_installer.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 7091926c8e2fb340a97bedada7314a931ec416a3af2e875f0e266760dd237814
                                  • Instruction ID: 10e65c9fd620557dcd3bc49e3e7e125ef45454fc95eb87ddc5af0bf9cdbc5088
                                  • Opcode Fuzzy Hash: 7091926c8e2fb340a97bedada7314a931ec416a3af2e875f0e266760dd237814
                                  • Instruction Fuzzy Hash: 177181EB10C120BDBE09C5956F68AFA576FF6D67307318C26F807D61A2E29C4A4D21B1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 566 559008f-5590288 587 5590293-55902cd call 55902d7 566->587 592 55902cf-55902d0 587->592 593 5590292 587->593 594 5590290 592->594 595 55902d2-55902f1 592->595 593->587 594->593 598 5590309-559031d GetCurrentHwProfileW 595->598 599 5590328-55905a8 598->599
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3376234565.0000000005590000.00000040.00001000.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5590000_installer.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 67b9843f7d1367a2340ff55f27ad44abbda043f1d1e04d3ed406b950b6347fae
                                  • Instruction ID: d0b9ad85590e3325ae1dddbe9973828c131ecb9274e234bc6356af0f7172c4bf
                                  • Opcode Fuzzy Hash: 67b9843f7d1367a2340ff55f27ad44abbda043f1d1e04d3ed406b950b6347fae
                                  • Instruction Fuzzy Hash: 7C6180EB20C120BDBA09C5956B58AFA576FF6C67307318C27F807D65A2E39C4A4D21B1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 629 559007d-5590288 651 5590293-55902cd call 55902d7 629->651 656 55902cf-55902d0 651->656 657 5590292 651->657 658 5590290 656->658 659 55902d2-55902f1 656->659 657->651 658->657 662 5590309-559031d GetCurrentHwProfileW 659->662 663 5590328-55905a8 662->663
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3376234565.0000000005590000.00000040.00001000.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5590000_installer.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 4fdcb523459ce00dbfcb559e9ad66dfd057b8ebe7c0c085789d5c16663d4fd9f
                                  • Instruction ID: 8e948bd4a0d00e54b58345dac8a7504a32f21c765824faaa5ad338056efde431
                                  • Opcode Fuzzy Hash: 4fdcb523459ce00dbfcb559e9ad66dfd057b8ebe7c0c085789d5c16663d4fd9f
                                  • Instruction Fuzzy Hash: 33617FEB20C120BDBE09C1956B58AFA576FF6C67307318C27F807D65A2E29C4A4D21B1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 693 55900d9-5590288 712 5590293-55902cd call 55902d7 693->712 717 55902cf-55902d0 712->717 718 5590292 712->718 719 5590290 717->719 720 55902d2-55902f1 717->720 718->712 719->718 723 5590309-559031d GetCurrentHwProfileW 720->723 724 5590328-55905a8 723->724
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3376234565.0000000005590000.00000040.00001000.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5590000_installer.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 2da6b2ceb0af1b0d9d35e1d6d1c1ff48fa0384444adc6af3da33045725ee169f
                                  • Instruction ID: 9b5e65598509b49c14e6dea5a2b33efd57bc3ee4e810cfa69ddbb91a2df4d911
                                  • Opcode Fuzzy Hash: 2da6b2ceb0af1b0d9d35e1d6d1c1ff48fa0384444adc6af3da33045725ee169f
                                  • Instruction Fuzzy Hash: 0C617FEB20C120BDBE09C1916B68AFB576FF6C67307318C66F807D65A2E39C5A4D11B1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 754 55900c1-5590288 776 5590293-55902cd call 55902d7 754->776 781 55902cf-55902d0 776->781 782 5590292 776->782 783 5590290 781->783 784 55902d2-55902f1 781->784 782->776 783->782 787 5590309-559031d GetCurrentHwProfileW 784->787 788 5590328-55905a8 787->788
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3376234565.0000000005590000.00000040.00001000.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5590000_installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ab33e59af47cbf9da98143a944d2569a89f8c058189c24518ff079f8b0501b75
                                  • Instruction ID: 8118254c3b39b706a298aafffcf3e70f7ec1345fe0b7954d8c11319fcbafb990
                                  • Opcode Fuzzy Hash: ab33e59af47cbf9da98143a944d2569a89f8c058189c24518ff079f8b0501b75
                                  • Instruction Fuzzy Hash: FB616EEB20C120BDBE09C1856F58AFA576FF6C67307318C26F807D65A2E29C4A4D21B1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 818 55900c6-5590288 839 5590293-55902cd call 55902d7 818->839 844 55902cf-55902d0 839->844 845 5590292 839->845 846 5590290 844->846 847 55902d2-55902f1 844->847 845->839 846->845 850 5590309-559031d GetCurrentHwProfileW 847->850 851 5590328-55905a8 850->851
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3376234565.0000000005590000.00000040.00001000.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5590000_installer.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 827bdb44ea7300be2c9fc24b366adea72813b18031ec10629807f33d287edafb
                                  • Instruction ID: 7212e6c9ded09143956def76253875c58ba9c6e2a90db68db58d1ea7db62b9eb
                                  • Opcode Fuzzy Hash: 827bdb44ea7300be2c9fc24b366adea72813b18031ec10629807f33d287edafb
                                  • Instruction Fuzzy Hash: 22617AEB20C120BDBE09C5856B68AFA576FF6D67307318C26F807D55A2E39C4A4D21B1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 881 5590106-5590288 899 5590293-55902cd call 55902d7 881->899 904 55902cf-55902d0 899->904 905 5590292 899->905 906 5590290 904->906 907 55902d2-55902f1 904->907 905->899 906->905 910 5590309-559031d GetCurrentHwProfileW 907->910 911 5590328-55905a8 910->911
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3376234565.0000000005590000.00000040.00001000.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5590000_installer.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 6daa7c00eabc26f4cd888dae24f8a9220fe978f0d1ce40ec0b3d66da8796b85e
                                  • Instruction ID: addfd03019a4789ceecc5d9243cdb23c1a1f8404db82794a5a48377e42d4ad74
                                  • Opcode Fuzzy Hash: 6daa7c00eabc26f4cd888dae24f8a9220fe978f0d1ce40ec0b3d66da8796b85e
                                  • Instruction Fuzzy Hash: CD515CEB20C120BDBE09C1856B58AFA576FF6C67307318C27F807D55A2E39C4A8D21B1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3376234565.0000000005590000.00000040.00001000.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5590000_installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6b73172e807f12162527af7807109cc757fdb7fad1cefe11d8c66eec98acbd17
                                  • Instruction ID: e3b65691fd55b4cbee2c1fd50472eab716d35b6c324ab06639a9ea811eb4c9b9
                                  • Opcode Fuzzy Hash: 6b73172e807f12162527af7807109cc757fdb7fad1cefe11d8c66eec98acbd17
                                  • Instruction Fuzzy Hash: 4B516DEB20C120BDBE49C1956B68AFB576FF6C67307318C26F807D55A2E39C4A4D11B1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3376234565.0000000005590000.00000040.00001000.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5590000_installer.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 1b2009eb7fee692456dfdf6f49c1ac8c6de8629188caeb204d1537c562c8e847
                                  • Instruction ID: 48369ff4065e16a8fba0190a6647687810466621ad6c7c76a7e17d6a13744f7a
                                  • Opcode Fuzzy Hash: 1b2009eb7fee692456dfdf6f49c1ac8c6de8629188caeb204d1537c562c8e847
                                  • Instruction Fuzzy Hash: FE516CEB20C120BDBE49C1856B68AFB576FF6C67307318C26F807D55A2E39C4A4D21B1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3376234565.0000000005590000.00000040.00001000.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5590000_installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6b44454bc301d89c624bee03b05d7c5cda10ea3f67f7531873d7e0c5625ecd2e
                                  • Instruction ID: f4449e4dfc8519f2e2f01beabee2110bc3ac11318b0121d426e048eea9f70ef6
                                  • Opcode Fuzzy Hash: 6b44454bc301d89c624bee03b05d7c5cda10ea3f67f7531873d7e0c5625ecd2e
                                  • Instruction Fuzzy Hash: 00516DEB20C120BDBE09C1956B58AFA576FF6C67307318C27F807D55A2E39C4A4D21B1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3376234565.0000000005590000.00000040.00001000.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5590000_installer.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: a4ab33dc6495a5eeebeaf343c241b82a93e6300953f97b7b693de1dcffb0203e
                                  • Instruction ID: 5172f983550a9c723ac21471cad210812d726304c01cd6caae930e9ac5b4029e
                                  • Opcode Fuzzy Hash: a4ab33dc6495a5eeebeaf343c241b82a93e6300953f97b7b693de1dcffb0203e
                                  • Instruction Fuzzy Hash: 00514BEB20C120BDBE09C1956B58AFA576FF6D67307318C27F807D55A2E39C4A8D11B1
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 05590314
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3376234565.0000000005590000.00000040.00001000.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5590000_installer.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 47639ee7b092140a04e098d69068217e13f11e820d34b82739c61a9e4ef799d5
                                  • Instruction ID: 88f2149b6dce46d4ef6e503df67a43a3e67b3629306deee713c736998ac6e20a
                                  • Opcode Fuzzy Hash: 47639ee7b092140a04e098d69068217e13f11e820d34b82739c61a9e4ef799d5
                                  • Instruction Fuzzy Hash: 6451C3E760C220BDBE0AC1916B58AFB576FF6C26303308C67F807C65A6E39D5A4D51B1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3376234565.0000000005590000.00000040.00001000.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5590000_installer.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 3e4e227a7bda48ca293a0942c784de89d81cbd2fcc9c87824977b65c4a30fc07
                                  • Instruction ID: 16e81169003051b258196541bb698d09e74ffbefb5df2926b46c65e7a96cfde1
                                  • Opcode Fuzzy Hash: 3e4e227a7bda48ca293a0942c784de89d81cbd2fcc9c87824977b65c4a30fc07
                                  • Instruction Fuzzy Hash: 74517CEB20C224BDBE0AC5916B58AFB572FF6C67303318C66F807D55A2E39C4A4D11B1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3376234565.0000000005590000.00000040.00001000.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5590000_installer.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: fa977efa2274c458942f274ab0861eaf428cd6600d6a7fb0813d7fbd003dfa80
                                  • Instruction ID: b4ecd8a5717d6dd07892ab5fb680b1c00f53848d4ce92469a65fde4804af5c38
                                  • Opcode Fuzzy Hash: fa977efa2274c458942f274ab0861eaf428cd6600d6a7fb0813d7fbd003dfa80
                                  • Instruction Fuzzy Hash: 8B417BEB20C120BDBE0AC1916B58AFA576FF6C27303318C67F807D55A2E39C5A8D11B1
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 05590314
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3376234565.0000000005590000.00000040.00001000.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5590000_installer.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 36b517d00dd1b4efbc69e9edcb52c51baab1e5902dd46787ba3aa3c2fa4d1fbd
                                  • Instruction ID: 600d28e5d53a6b27ecdb0b97fda9edf6e9e7a070bae6991e61f8dad5acddbbd3
                                  • Opcode Fuzzy Hash: 36b517d00dd1b4efbc69e9edcb52c51baab1e5902dd46787ba3aa3c2fa4d1fbd
                                  • Instruction Fuzzy Hash: 7B41D5E720C250BDFE0AC1912B58AF6676EF6C67303318C67F407CA1A2E39C4A4E51B1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3376234565.0000000005590000.00000040.00001000.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5590000_installer.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 988be7de3bf953a421c8c9d1894ba51bd8decce360d334ea78c2fca6155e6bdf
                                  • Instruction ID: da7ed5162d491d133a5d48a256589e65426f6f59b09e307bdd27de13dc6c9338
                                  • Opcode Fuzzy Hash: 988be7de3bf953a421c8c9d1894ba51bd8decce360d334ea78c2fca6155e6bdf
                                  • Instruction Fuzzy Hash: A141B1E710C261ADBE0AC1916B58AFB576FF6C27307318C67F80BD61A2E39C4A4D11B1
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 05590314
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3376234565.0000000005590000.00000040.00001000.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5590000_installer.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: e9e48b1933511eac265c549a937a10870a628b09c742426bc8bb983191263b85
                                  • Instruction ID: 1d20757b6af6fd494190026cf74d34f216618fd3feb2aea75262a268d20b7231
                                  • Opcode Fuzzy Hash: e9e48b1933511eac265c549a937a10870a628b09c742426bc8bb983191263b85
                                  • Instruction Fuzzy Hash: 2A419FE724C110BDBE09C1916B58AF66B6FF6C67303318C67F407C51A6E39C4A4D51B1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3376234565.0000000005590000.00000040.00001000.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5590000_installer.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: d3750207f872a899f49eeb05e63f3ab7971e71bdf1ec4e0f1597c79891e11de7
                                  • Instruction ID: 724725c338728eff3381914e18835f39075b2360173190cd76f2c76f9d232ba2
                                  • Opcode Fuzzy Hash: d3750207f872a899f49eeb05e63f3ab7971e71bdf1ec4e0f1597c79891e11de7
                                  • Instruction Fuzzy Hash: 85418DEB20C120BDBE09C1916B58AF6676FF6C67303318C67F807D51A6E39C4A4D51B1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3376234565.0000000005590000.00000040.00001000.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5590000_installer.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 7311385b4aeff5c676dae332e1412004df642a0304484aefac9bc46608d1100f
                                  • Instruction ID: 93523949de5cb1b4b7600807e586a588f1d09e9302acd6f25e90d33c4615a7b7
                                  • Opcode Fuzzy Hash: 7311385b4aeff5c676dae332e1412004df642a0304484aefac9bc46608d1100f
                                  • Instruction Fuzzy Hash: ED418FEB20C220BDBA09C1912B58AF7576FF6C67303318C66F807D51A6E39C4A4D51B1
                                  APIs
                                  • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,?,?,?,?,?,?,?,00000000,?), ref: 009D990E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3353671863.0000000000991000.00000040.00000001.01000000.00000003.sdmp, Offset: 00990000, based on PE: true
                                  • Associated: 00000000.00000002.3353383320.0000000000990000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3353671863.0000000000B15000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3355103090.0000000000B1A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000B1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000C9F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000D7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DC2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DD1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3364298408.0000000000DD2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365076516.0000000000F6B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365925569.0000000000F6D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_990000_installer.jbxd
                                  Similarity
                                  • API ID: FileWrite
                                  • String ID:
                                  • API String ID: 3934441357-0
                                  • Opcode ID: 98d04d375976e5d23f9374b9dc03c7f863c26bf792a204d3e563dcc928f3ebd5
                                  • Instruction ID: 8bcb95a30dee7a86918f31d4db9ae617c8f19bac36053ea873055a4d4ca1c2fa
                                  • Opcode Fuzzy Hash: 98d04d375976e5d23f9374b9dc03c7f863c26bf792a204d3e563dcc928f3ebd5
                                  • Instruction Fuzzy Hash: 3C61E571D44119BFDF11EFA8C884EEEBBB9AF49304F14854AE904A7346D736D901DBA0
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 05590314
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3376234565.0000000005590000.00000040.00001000.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5590000_installer.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 3eac281a89de8f355e9cc44d0b9a0e6576242e280a95af906ca7fee6e142a33b
                                  • Instruction ID: a640be3af47f3eb1221a75e6ef43c5d631e8ff5b948e3d393797642eb29ade3c
                                  • Opcode Fuzzy Hash: 3eac281a89de8f355e9cc44d0b9a0e6576242e280a95af906ca7fee6e142a33b
                                  • Instruction Fuzzy Hash: 52315FF720C225FEBA19C5952B18AFB676FF6C17307318C26F807C61A6E3984A4D50B1
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 05590314
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3376234565.0000000005590000.00000040.00001000.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5590000_installer.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: b4d44827cecfc9dec36629ae80418a66d8e352c7df1cb6e8d62323fde8a703b4
                                  • Instruction ID: c082e3f2fe6d53dad4537b43923174e786e9c3ff0bb6ebe85c85aedd3282e1e8
                                  • Opcode Fuzzy Hash: b4d44827cecfc9dec36629ae80418a66d8e352c7df1cb6e8d62323fde8a703b4
                                  • Instruction Fuzzy Hash: C1313DEB24C120FDBA19C5952B18AFB576FF6C57307318C66F807D61A6E39C4A4D10B1
                                  APIs
                                  • FindCloseChangeNotification.KERNELBASE(00000000,00000000,?,?,009D8CE6,00000000,?,00B0A178,0000000C,009D8DA2,?,?,?), ref: 009D8E55
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3353671863.0000000000991000.00000040.00000001.01000000.00000003.sdmp, Offset: 00990000, based on PE: true
                                  • Associated: 00000000.00000002.3353383320.0000000000990000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3353671863.0000000000B15000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3355103090.0000000000B1A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000B1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000C9F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000D7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DC2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DD1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3364298408.0000000000DD2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365076516.0000000000F6B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365925569.0000000000F6D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_990000_installer.jbxd
                                  Similarity
                                  • API ID: ChangeCloseFindNotification
                                  • String ID:
                                  • API String ID: 2591292051-0
                                  • Opcode ID: 215933630944fb5b963a8d88c0b44e4f038e15fc5f332a40a8cfe2eced0512ec
                                  • Instruction ID: 94bb3dfbb2ce822271fd39278a52b141694730746955cc92ab4f403cbdb62a2d
                                  • Opcode Fuzzy Hash: 215933630944fb5b963a8d88c0b44e4f038e15fc5f332a40a8cfe2eced0512ec
                                  • Instruction Fuzzy Hash: 8911483368612056D6253235A845BBF278D4BC2734F298A5FF91C8B3C3DE61CC8145B5
                                  APIs
                                  • SetFilePointerEx.KERNELBASE(00000000,?,?,?,?,?,00000000,?,?,?,009D2626,?,?,?,?,?), ref: 009D2558
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3353671863.0000000000991000.00000040.00000001.01000000.00000003.sdmp, Offset: 00990000, based on PE: true
                                  • Associated: 00000000.00000002.3353383320.0000000000990000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3353671863.0000000000B15000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3355103090.0000000000B1A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000B1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000C9F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000D7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DC2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DD1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3364298408.0000000000DD2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365076516.0000000000F6B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365925569.0000000000F6D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_990000_installer.jbxd
                                  Similarity
                                  • API ID: FilePointer
                                  • String ID:
                                  • API String ID: 973152223-0
                                  • Opcode ID: eca2109980bf72766961a1291373f20fc7a9e6436f2e7c5283f1cc5b5345ad96
                                  • Instruction ID: a2c4d08bf22535ffe2f5afa17488b88f6a499ea7a91ba706b1243dce30490b41
                                  • Opcode Fuzzy Hash: eca2109980bf72766961a1291373f20fc7a9e6436f2e7c5283f1cc5b5345ad96
                                  • Instruction Fuzzy Hash: C0014932644109AFCF09CF19DC15D9E3B59DB95330B34414AF8009B3E0EA71ED428BA0
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0099331F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3353671863.0000000000991000.00000040.00000001.01000000.00000003.sdmp, Offset: 00990000, based on PE: true
                                  • Associated: 00000000.00000002.3353383320.0000000000990000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3353671863.0000000000B15000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3355103090.0000000000B1A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000B1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000C9F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000D7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DC2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DD1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3364298408.0000000000DD2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365076516.0000000000F6B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365925569.0000000000F6D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_990000_installer.jbxd
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID:
                                  • API String ID: 118556049-0
                                  • Opcode ID: 0fd589d96c9d07b1efa01aec19e4ff46bb0766daf2056f60d33bc81ca57302d3
                                  • Instruction ID: b5d719ddacb418be146bd26da37115ea9ac59d2df76206a46f8fbcbb5b5a1da5
                                  • Opcode Fuzzy Hash: 0fd589d96c9d07b1efa01aec19e4ff46bb0766daf2056f60d33bc81ca57302d3
                                  • Instruction Fuzzy Hash: 28F0BB715401045BDF146F68D416AEAB3ECDF55351790857EE88DC7212DF26DA408791
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000008,?,00000001,?,009D9FE0,00000001,00000364,00000001,00000006,000000FF,?,009C4B3F,?,?,761B23A0,?), ref: 009DA69C
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3353671863.0000000000991000.00000040.00000001.01000000.00000003.sdmp, Offset: 00990000, based on PE: true
                                  • Associated: 00000000.00000002.3353383320.0000000000990000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3353671863.0000000000B15000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3355103090.0000000000B1A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000B1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000C9F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000D7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DC2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DD1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3364298408.0000000000DD2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365076516.0000000000F6B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365925569.0000000000F6D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_990000_installer.jbxd
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 1fca750eeb406278d7aed6a7f5aff4d19aafee86bfd429cfadeec8412620ef14
                                  • Instruction ID: dd33859416f3e56c385a67bca40c3019aa12a77207e7954005f7530fb9c3dc25
                                  • Opcode Fuzzy Hash: 1fca750eeb406278d7aed6a7f5aff4d19aafee86bfd429cfadeec8412620ef14
                                  • Instruction Fuzzy Hash: C0F0B4321D0521AA9B215E729805B6A374D9F81760F9CC513E804E7380CB34DC2046E6
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000000,00000001,?,?,009C4B3F,?,?,761B23A0,?,?,00993522,?,?), ref: 009DB0C6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3353671863.0000000000991000.00000040.00000001.01000000.00000003.sdmp, Offset: 00990000, based on PE: true
                                  • Associated: 00000000.00000002.3353383320.0000000000990000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3353671863.0000000000B15000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3355103090.0000000000B1A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000B1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000C9F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000D7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DC2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DD1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3364298408.0000000000DD2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365076516.0000000000F6B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365925569.0000000000F6D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_990000_installer.jbxd
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: ed2332d919758ce6298243d4240577443c35eb342bc9ef48631a9cb14af0a6a9
                                  • Instruction ID: 49afc595495595f4c02db34993b567c8ef49ce6045059458884dff86a766b218
                                  • Opcode Fuzzy Hash: ed2332d919758ce6298243d4240577443c35eb342bc9ef48631a9cb14af0a6a9
                                  • Instruction Fuzzy Hash: A2E065322C1660A6EA212665DC10B5B764D9F813A0F57C613EC24A67D5DB34DC1082E5
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3353671863.0000000000991000.00000040.00000001.01000000.00000003.sdmp, Offset: 00990000, based on PE: true
                                  • Associated: 00000000.00000002.3353383320.0000000000990000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3353671863.0000000000B15000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3355103090.0000000000B1A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000B1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000C9F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000D7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DC2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DD1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3364298408.0000000000DD2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365076516.0000000000F6B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365925569.0000000000F6D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_990000_installer.jbxd
                                  Similarity
                                  • API ID: __floor_pentium4
                                  • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                  • API String ID: 4168288129-2761157908
                                  • Opcode ID: 2da18c6c5db764f9222e2b75d08f3f5d0455ce3ae92597a2fda81cbae48416ac
                                  • Instruction ID: 646d99b06877b1266b6540a67301fd0e1a0ea4e2ffbc693244e476db335d59f0
                                  • Opcode Fuzzy Hash: 2da18c6c5db764f9222e2b75d08f3f5d0455ce3ae92597a2fda81cbae48416ac
                                  • Instruction Fuzzy Hash: 40D26B71E086688FDB66CE29CC407EAB7B9FB44345F1545EAD40DE7240EB78AE818F41
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3353671863.0000000000991000.00000040.00000001.01000000.00000003.sdmp, Offset: 00990000, based on PE: true
                                  • Associated: 00000000.00000002.3353383320.0000000000990000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3353671863.0000000000B15000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3355103090.0000000000B1A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000B1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000C9F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000D7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DC2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DD1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3364298408.0000000000DD2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365076516.0000000000F6B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365925569.0000000000F6D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_990000_installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 333d4b6d5425d6f9d03797ee82114c3711da98524c03317fffdb5ec62fb2b380
                                  • Instruction ID: 6e88c8eb84ac91f2bdc89f81ebb7f5fd421ab4ae803baab874444b1b69ddc3a6
                                  • Opcode Fuzzy Hash: 333d4b6d5425d6f9d03797ee82114c3711da98524c03317fffdb5ec62fb2b380
                                  • Instruction Fuzzy Hash: A70219B1E012199BDF14CFA9C880BAEBBB5FF48314F24866DD919A7380D731AD41CB91
                                  APIs
                                  • GetSystemTimePreciseAsFileTime.KERNEL32(?,009C3077,?,?,?,?,00A57E2F), ref: 009C3655
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3353671863.0000000000991000.00000040.00000001.01000000.00000003.sdmp, Offset: 00990000, based on PE: true
                                  • Associated: 00000000.00000002.3353383320.0000000000990000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3353671863.0000000000B15000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3355103090.0000000000B1A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000B1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000C9F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000D7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DC2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DD1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3364298408.0000000000DD2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365076516.0000000000F6B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365925569.0000000000F6D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_990000_installer.jbxd
                                  Similarity
                                  • API ID: Time$FilePreciseSystem
                                  • String ID:
                                  • API String ID: 1802150274-0
                                  • Opcode ID: e34e5aaa084e8e398029aa94e7d4901bd6a981b2ee36182ec42c37ba7417a17f
                                  • Instruction ID: 51e91d6087d14a2a7d1d0f9505be657c46587bbee2be42670710d86ef8a3bed6
                                  • Opcode Fuzzy Hash: e34e5aaa084e8e398029aa94e7d4901bd6a981b2ee36182ec42c37ba7417a17f
                                  • Instruction Fuzzy Hash: 69F0E532A04594EFCB11CF94DC05F99B7A8F708B10F00852AE8129B7D0CB34AA008FC0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3353671863.0000000000991000.00000040.00000001.01000000.00000003.sdmp, Offset: 00990000, based on PE: true
                                  • Associated: 00000000.00000002.3353383320.0000000000990000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3353671863.0000000000B15000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3355103090.0000000000B1A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000B1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000C9F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000D7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DC2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DD1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3364298408.0000000000DD2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365076516.0000000000F6B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365925569.0000000000F6D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_990000_installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7b2321322825c713d1db7277d96f9f6abc91b36fff322b7cac637aaa79c551fa
                                  • Instruction ID: 3fa4457402dbb26cf86caad965dbf8d710aba24711d1e8127a1fc5571aa77219
                                  • Opcode Fuzzy Hash: 7b2321322825c713d1db7277d96f9f6abc91b36fff322b7cac637aaa79c551fa
                                  • Instruction Fuzzy Hash: 77627BB1E002159FDF18DF99C5846AEBBB1BF48708F2881ADD814AB342D775DA46CF90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3353671863.0000000000991000.00000040.00000001.01000000.00000003.sdmp, Offset: 00990000, based on PE: true
                                  • Associated: 00000000.00000002.3353383320.0000000000990000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3353671863.0000000000B15000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3355103090.0000000000B1A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000B1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000C9F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000D7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DC2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DD1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3364298408.0000000000DD2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365076516.0000000000F6B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365925569.0000000000F6D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_990000_installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 80b9970b4e61b3a89387c81d03852b8640c12f30169ca405eadcc1892538b820
                                  • Instruction ID: ca4ae2a9fb8444fbb8e6c4c966ffada3f095d104528ca9b2d6a6c3758ce9be5b
                                  • Opcode Fuzzy Hash: 80b9970b4e61b3a89387c81d03852b8640c12f30169ca405eadcc1892538b820
                                  • Instruction Fuzzy Hash: 29E10376E1022A9FCB05CFA8D9916EDFBF1BF88320F1942A9D815B7340D670AD55CB90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3353671863.0000000000991000.00000040.00000001.01000000.00000003.sdmp, Offset: 00990000, based on PE: true
                                  • Associated: 00000000.00000002.3353383320.0000000000990000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3353671863.0000000000B15000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3355103090.0000000000B1A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000B1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000C9F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000D7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DC2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DD1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3364298408.0000000000DD2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365076516.0000000000F6B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365925569.0000000000F6D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_990000_installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 967f25fd6bd37da77e2eeca87d2d22f8495f9455976f7b2c87c3ed7e52a9cec0
                                  • Instruction ID: 024cd5d89a326ce6a3ef2fb81bf1973a70e0be4d648d289c4182abccac522ab7
                                  • Opcode Fuzzy Hash: 967f25fd6bd37da77e2eeca87d2d22f8495f9455976f7b2c87c3ed7e52a9cec0
                                  • Instruction Fuzzy Hash: 5EC1E0709806068FCB24CF69C494B7ABBB9AFC5300F14CA1BE996977A1E330ED45CB51
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3353671863.0000000000991000.00000040.00000001.01000000.00000003.sdmp, Offset: 00990000, based on PE: true
                                  • Associated: 00000000.00000002.3353383320.0000000000990000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3353671863.0000000000B15000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3355103090.0000000000B1A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000B1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000C9F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000D7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DC2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DD1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3364298408.0000000000DD2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365076516.0000000000F6B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365925569.0000000000F6D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_990000_installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 18ec590b116a6aaa3d64a48e4011fc9a647a32bb34cc32551f30ff109a2b13b3
                                  • Instruction ID: e8141cf9fdd98df5e92d1c8dd156d19f2e1248ca3791fe2f4824543a05c2c795
                                  • Opcode Fuzzy Hash: 18ec590b116a6aaa3d64a48e4011fc9a647a32bb34cc32551f30ff109a2b13b3
                                  • Instruction Fuzzy Hash: E5B128356007819BDB39AB66CC92BB7B3ACEF44308F14482DE947C6681EA75FD81CB10
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3353671863.0000000000991000.00000040.00000001.01000000.00000003.sdmp, Offset: 00990000, based on PE: true
                                  • Associated: 00000000.00000002.3353383320.0000000000990000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3353671863.0000000000B15000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3355103090.0000000000B1A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000B1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000C9F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000D7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DC2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DD1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3364298408.0000000000DD2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365076516.0000000000F6B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365925569.0000000000F6D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_990000_installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7a290d9439586d40e8a8db221ffa0b78ba20087ab26a3c0c9e8e80709fb1e07c
                                  • Instruction ID: 81152ff40fed3c4f4767009a1798e9be06fe41076a64637ddcc1d24aa448daa0
                                  • Opcode Fuzzy Hash: 7a290d9439586d40e8a8db221ffa0b78ba20087ab26a3c0c9e8e80709fb1e07c
                                  • Instruction Fuzzy Hash: EBB14B351616089FDB15CF28C486B657BE1FF45364F25C65AE89ACF3A1C339E981CB40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3353671863.0000000000991000.00000040.00000001.01000000.00000003.sdmp, Offset: 00990000, based on PE: true
                                  • Associated: 00000000.00000002.3353383320.0000000000990000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3353671863.0000000000B15000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3355103090.0000000000B1A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000B1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000C9F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000D7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DC2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DD1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3364298408.0000000000DD2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365076516.0000000000F6B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365925569.0000000000F6D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_990000_installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2c5077d72c8b53aaaf3308efcc952fefdef86bf8ff7e67709d5e740f17ec07dc
                                  • Instruction ID: 502a3be964bb13fb02bc225b9be7b9454d7133a12c0e086f3ae8a418a10cdc92
                                  • Opcode Fuzzy Hash: 2c5077d72c8b53aaaf3308efcc952fefdef86bf8ff7e67709d5e740f17ec07dc
                                  • Instruction Fuzzy Hash: D181E2B1E042859FDB128F99D8917FFBBB9EB1A300F544169D85897382CB349D45C7A0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3353671863.0000000000991000.00000040.00000001.01000000.00000003.sdmp, Offset: 00990000, based on PE: true
                                  • Associated: 00000000.00000002.3353383320.0000000000990000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3353671863.0000000000B15000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3355103090.0000000000B1A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000B1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000C9F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000D7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DC2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DD1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3364298408.0000000000DD2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365076516.0000000000F6B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365925569.0000000000F6D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_990000_installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4b23ff19fc3ec6e198d05c2047f4e2f74f8bf93716d365229be4352b3610add2
                                  • Instruction ID: 67770a6bca0843958a8a5214e23d11dafe05c51f25d81c1619eea5603f43565d
                                  • Opcode Fuzzy Hash: 4b23ff19fc3ec6e198d05c2047f4e2f74f8bf93716d365229be4352b3610add2
                                  • Instruction Fuzzy Hash: 916156716245644FEB18CFDEECC047A3B52E38A381385866AEA81C7395C535FA27D7E0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3353671863.0000000000991000.00000040.00000001.01000000.00000003.sdmp, Offset: 00990000, based on PE: true
                                  • Associated: 00000000.00000002.3353383320.0000000000990000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3353671863.0000000000B15000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3355103090.0000000000B1A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000B1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000C9F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000D7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DC2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DD1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3364298408.0000000000DD2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365076516.0000000000F6B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365925569.0000000000F6D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_990000_installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 46680d0314554fd398ed7fd020ff60bee8df1d437ae882661bd78aeb1168d151
                                  • Instruction ID: d6c43c826ec8cd2765fec8d89e4ac48a19be7386c8522986bcf0ad6375337a92
                                  • Opcode Fuzzy Hash: 46680d0314554fd398ed7fd020ff60bee8df1d437ae882661bd78aeb1168d151
                                  • Instruction Fuzzy Hash: 32515B72D00219AFDF04CF99C941BEEBBB6EF88304F19845DE955AB201D735AE40CB92
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3353671863.0000000000991000.00000040.00000001.01000000.00000003.sdmp, Offset: 00990000, based on PE: true
                                  • Associated: 00000000.00000002.3353383320.0000000000990000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3353671863.0000000000B15000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3355103090.0000000000B1A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000B1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000C9F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000D7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DC2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DD1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3364298408.0000000000DD2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365076516.0000000000F6B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365925569.0000000000F6D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_990000_installer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                  • Instruction ID: 7176cf93b29c198157ec306e6410edfd320f1ff870e00af4bfc5f1213233e130
                                  • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                  • Instruction Fuzzy Hash: 8A112E77A0D08243D61486BDC8B4FB7E79DEBD933072D437ED0914BB58D122A5459F12
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3353671863.0000000000991000.00000040.00000001.01000000.00000003.sdmp, Offset: 00990000, based on PE: true
                                  • Associated: 00000000.00000002.3353383320.0000000000990000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3353671863.0000000000B15000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3355103090.0000000000B1A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000B1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000C9F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000D7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DC2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DD1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3364298408.0000000000DD2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365076516.0000000000F6B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365925569.0000000000F6D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_990000_installer.jbxd
                                  Similarity
                                  • API ID: _strrchr
                                  • String ID:
                                  • API String ID: 3213747228-0
                                  • Opcode ID: 785c90e8ff89e0f1a3d98e37725974d6f6ea20f06d45e48120c47f1ca5a82ffe
                                  • Instruction ID: 018194a72749c1de3395512de3dde15099a36030f9c9b8774c8894a1b98a5152
                                  • Opcode Fuzzy Hash: 785c90e8ff89e0f1a3d98e37725974d6f6ea20f06d45e48120c47f1ca5a82ffe
                                  • Instruction Fuzzy Hash: C2B15672A40255DFDB128F68CC81BEE7BA9EF95310F168157E944AB382D774DD01CBA0
                                  APIs
                                  • _ValidateLocalCookies.LIBCMT ref: 009C7307
                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 009C730F
                                  • _ValidateLocalCookies.LIBCMT ref: 009C7398
                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 009C73C3
                                  • _ValidateLocalCookies.LIBCMT ref: 009C7418
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3353671863.0000000000991000.00000040.00000001.01000000.00000003.sdmp, Offset: 00990000, based on PE: true
                                  • Associated: 00000000.00000002.3353383320.0000000000990000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3353671863.0000000000B15000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3355103090.0000000000B1A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000B1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000C9F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000D7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DC2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DD1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3364298408.0000000000DD2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365076516.0000000000F6B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365925569.0000000000F6D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_990000_installer.jbxd
                                  Similarity
                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                  • String ID: csm
                                  • API String ID: 1170836740-1018135373
                                  • Opcode ID: 8cc3409fd66394164e067eb12b743db99c7827951ed08e3a9f2537c82580e500
                                  • Instruction ID: 4e901060d5bd71cc2d0319f2750712063c623c2a3bd90c6d8e7535200ba8f50a
                                  • Opcode Fuzzy Hash: 8cc3409fd66394164e067eb12b743db99c7827951ed08e3a9f2537c82580e500
                                  • Instruction Fuzzy Hash: 7A418334E04249ABCF14DFA8D885F9EBBA9AF44314F148159EC149B351DB35DA01DF92
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 009AA09D
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 009AA0BF
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 009AA0E7
                                  • __Getctype.LIBCPMT ref: 009AA1C5
                                  • std::_Facet_Register.LIBCPMT ref: 009AA1F9
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 009AA223
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3353671863.0000000000991000.00000040.00000001.01000000.00000003.sdmp, Offset: 00990000, based on PE: true
                                  • Associated: 00000000.00000002.3353383320.0000000000990000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3353671863.0000000000B15000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3355103090.0000000000B1A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000B1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000C9F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000D7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DC2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DD1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3364298408.0000000000DD2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365076516.0000000000F6B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365925569.0000000000F6D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_990000_installer.jbxd
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetctypeRegister
                                  • String ID:
                                  • API String ID: 1102183713-0
                                  • Opcode ID: e0919415812dc852378fa85ddaf053081d572da1b98e4130b8d70e4e4f031ab0
                                  • Instruction ID: 62d995e8a4b2b3993100ac9cab98b56a900a41077bc46e0c957b1ddac8b52656
                                  • Opcode Fuzzy Hash: e0919415812dc852378fa85ddaf053081d572da1b98e4130b8d70e4e4f031ab0
                                  • Instruction Fuzzy Hash: 7251C8B0D00249DFCB11CF98C941BAEBBB4BB12714F24815CE854AB391DB75AE04CBD2
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 009AC45A
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 009AC47C
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 009AC4A4
                                  • std::_Facet_Register.LIBCPMT ref: 009AC59A
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 009AC5C4
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3353671863.0000000000991000.00000040.00000001.01000000.00000003.sdmp, Offset: 00990000, based on PE: true
                                  • Associated: 00000000.00000002.3353383320.0000000000990000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3353671863.0000000000B15000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3355103090.0000000000B1A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000B1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000C9F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000D7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DC2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DD1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3364298408.0000000000DD2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365076516.0000000000F6B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365925569.0000000000F6D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_990000_installer.jbxd
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                  • String ID:
                                  • API String ID: 459529453-0
                                  • Opcode ID: 5730d2ce8094d0c1c9aa73b98653d768c6a52b02bc140c7728339a3a26c18e55
                                  • Instruction ID: fbfd08e5754741123077a47f40e8b567721028c7298fb05d6bea10eb1cdf0cb1
                                  • Opcode Fuzzy Hash: 5730d2ce8094d0c1c9aa73b98653d768c6a52b02bc140c7728339a3a26c18e55
                                  • Instruction Fuzzy Hash: 1B51B9B0900288DBDB11CF98C854BAEBBF4FB02754F24815DE846AF391DB75AA01CBD1
                                  APIs
                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 0099499F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3353671863.0000000000991000.00000040.00000001.01000000.00000003.sdmp, Offset: 00990000, based on PE: true
                                  • Associated: 00000000.00000002.3353383320.0000000000990000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3353671863.0000000000B15000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3355103090.0000000000B1A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000B1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000C9F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000D7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DC2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DD1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3364298408.0000000000DD2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365076516.0000000000F6B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365925569.0000000000F6D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_990000_installer.jbxd
                                  Similarity
                                  • API ID: Ios_base_dtorstd::ios_base::_
                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                  • API String ID: 323602529-1866435925
                                  • Opcode ID: 4b0794e233199d952d597b5778c20effe731443cbf7c65062d625b48dfd100d9
                                  • Instruction ID: 3e8b7a56e719fbcf7ebe661e59a0b1c743465df9e17652975e4a24d1663dc2b4
                                  • Opcode Fuzzy Hash: 4b0794e233199d952d597b5778c20effe731443cbf7c65062d625b48dfd100d9
                                  • Instruction Fuzzy Hash: 0D112C72D04A48ABCB15DF6C8C47F6673DCD745B10F04466DFA54872C1EB75A901C792
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 009C2730
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 009C273B
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 009C27A9
                                    • Part of subcall function 009C288C: std::locale::_Locimp::_Locimp.LIBCPMT ref: 009C28A4
                                  • std::locale::_Setgloballocale.LIBCPMT ref: 009C2756
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3353671863.0000000000991000.00000040.00000001.01000000.00000003.sdmp, Offset: 00990000, based on PE: true
                                  • Associated: 00000000.00000002.3353383320.0000000000990000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3353671863.0000000000B15000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3355103090.0000000000B1A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000B1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000C9F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000D7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DC2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DD1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3364298408.0000000000DD2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365076516.0000000000F6B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365925569.0000000000F6D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_990000_installer.jbxd
                                  Similarity
                                  • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                                  • String ID:
                                  • API String ID: 677527491-0
                                  • Opcode ID: 7719195eedc4118ebd124755c6eb94ad32166ad730c1b05b2ce8bcb132dfdaa0
                                  • Instruction ID: 934da4bfde5eb9a03e1007908a67223be1cf9d623394050566d21e95d3195078
                                  • Opcode Fuzzy Hash: 7719195eedc4118ebd124755c6eb94ad32166ad730c1b05b2ce8bcb132dfdaa0
                                  • Instruction Fuzzy Hash: DC01BC75E002119BC70AEB60D891B7D7BB1BFC4750B18800DE8111B391CF34AE02CBC6
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 0099750C
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00997522
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3353671863.0000000000991000.00000040.00000001.01000000.00000003.sdmp, Offset: 00990000, based on PE: true
                                  • Associated: 00000000.00000002.3353383320.0000000000990000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3353671863.0000000000B15000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3355103090.0000000000B1A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000B1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000C9F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000D7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DC2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DD1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3364298408.0000000000DD2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365076516.0000000000F6B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365925569.0000000000F6D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_990000_installer.jbxd
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: [json.exception.
                                  • API String ID: 4194217158-791563284
                                  • Opcode ID: 08dab8892d963d36d99beac1a307d9b20161fd4da1af500000fe968c2914c6ad
                                  • Instruction ID: afbd20281fbc39a6848ee62c7c2acfdbc3616296656dfdf8c6b67d70b02c09b6
                                  • Opcode Fuzzy Hash: 08dab8892d963d36d99beac1a307d9b20161fd4da1af500000fe968c2914c6ad
                                  • Instruction Fuzzy Hash: FE51D1B0D04648AFDB00DFA8C905BAEFBB4EF55314F148269E850A7392E7B45A44C7E2
                                  APIs
                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 0099499F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3353671863.0000000000991000.00000040.00000001.01000000.00000003.sdmp, Offset: 00990000, based on PE: true
                                  • Associated: 00000000.00000002.3353383320.0000000000990000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3353671863.0000000000B15000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3355103090.0000000000B1A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000B1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000C9F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000D7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DC2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DD1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3364298408.0000000000DD2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365076516.0000000000F6B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365925569.0000000000F6D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_990000_installer.jbxd
                                  Similarity
                                  • API ID: Ios_base_dtorstd::ios_base::_
                                  • String ID: ios_base::badbit set$ios_base::failbit set
                                  • API String ID: 323602529-1240500531
                                  • Opcode ID: ef465c964d6bce59b1b4dbc1014ab1162f395c708527762505d69ca99530462a
                                  • Instruction ID: ccfe706f8798d29b961b408adacf1361fcf41662a0a930d342e3ebd09681b1d1
                                  • Opcode Fuzzy Hash: ef465c964d6bce59b1b4dbc1014ab1162f395c708527762505d69ca99530462a
                                  • Instruction Fuzzy Hash: F841F4B1D04248ABCB05DF5CCC46FAEBBB8EB49720F14825DF554AB381D775AA01CBA1
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00994061
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 009940C4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3353671863.0000000000991000.00000040.00000001.01000000.00000003.sdmp, Offset: 00990000, based on PE: true
                                  • Associated: 00000000.00000002.3353383320.0000000000990000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3353671863.0000000000B15000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3355103090.0000000000B1A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000B1D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000C9F000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000D7C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DC2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3357876371.0000000000DD1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3364298408.0000000000DD2000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365076516.0000000000F6B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3365925569.0000000000F6D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_990000_installer.jbxd
                                  Similarity
                                  • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                  • String ID: bad locale name
                                  • API String ID: 3988782225-1405518554
                                  • Opcode ID: 8996a589f30cd3f8593063f6a58847a45fc7ddf0cfab2e3007fddcffee4fbac9
                                  • Instruction ID: 0deee7feb27f25386d80656e12230f982fa087268eaab6f969de176eb3af1d0f
                                  • Opcode Fuzzy Hash: 8996a589f30cd3f8593063f6a58847a45fc7ddf0cfab2e3007fddcffee4fbac9
                                  • Instruction Fuzzy Hash: 6C11D370805B84EED721CFA8C504B4BBFF4AF15714F148A9DE09597782D3B55604C7A2

                                  Execution Graph

                                  Execution Coverage:3.6%
                                  Dynamic/Decrypted Code Coverage:1.3%
                                  Signature Coverage:0%
                                  Total number of Nodes:1843
                                  Total number of Limit Nodes:26
                                  execution_graph 18011 15e710 18012 15e753 18011->18012 18013 1432d0 std::_Throw_Cpp_error 2 API calls 18012->18013 18014 15e758 std::_Locinfo::_Locinfo_ctor 18012->18014 18015 15e843 std::_Locinfo::_Locinfo_ctor 18013->18015 18023 54d0945 18024 54d094d 18023->18024 18027 54d099f 18024->18027 18028 54d09cb 18027->18028 18033 54d0a11 18028->18033 18030 54d0a02 GetCurrentHwProfileW 18032 54d0ab6 18030->18032 18034 54d0a32 GetCurrentHwProfileW 18033->18034 18036 54d0ab6 18034->18036 18019 54d0ac1 18020 54d0a5f 18019->18020 18021 54d0ab6 18019->18021 18020->18021 18022 54d0ab1 GetCurrentHwProfileW 18020->18022 18022->18021 18170 54d09c1 18171 54d09e5 18170->18171 18172 54d0a11 GetCurrentHwProfileW 18171->18172 18173 54d0a02 GetCurrentHwProfileW 18172->18173 18175 54d0ab6 18173->18175 16101 207b00 16102 207ecc 16101->16102 16121 207b3e std::ios_base::_Ios_base_dtor __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 16101->16121 16103 207b87 setsockopt recv 16103->16121 16105 207eb7 Sleep 16105->16102 16105->16121 16106 207e15 recv 16108 207eaf Sleep 16106->16108 16108->16105 16110 207c2d recv 16111 207c4e recv 16110->16111 16110->16121 16111->16121 16112 207cb3 16117 158dc0 2 API calls 16112->16117 16119 207d06 recv 16112->16119 16114 207ee1 16211 178c70 16114->16211 16117->16112 16119->16121 16121->16102 16121->16103 16121->16105 16121->16106 16121->16108 16121->16112 16121->16114 16122 208590 WSAStartup 16121->16122 16128 158dc0 16121->16128 16137 1563b0 16121->16137 16142 207ef0 16121->16142 16198 173069 16121->16198 16201 149280 16121->16201 16123 2085c8 16122->16123 16126 208686 16122->16126 16124 208654 socket 16123->16124 16123->16126 16125 20866a connect 16124->16125 16124->16126 16125->16126 16127 20867c closesocket 16125->16127 16126->16121 16127->16124 16127->16126 16130 158de2 std::locale::_Setgloballocale 16128->16130 16131 158e11 16128->16131 16129 158ef8 16130->16110 16131->16129 16214 1432d0 16131->16214 16133 158e66 std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 16134 158ecb std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 16133->16134 16228 142fe0 16133->16228 16134->16110 16136 158eb8 16136->16110 16139 1563d8 16137->16139 16138 1563e7 16138->16121 16139->16138 16140 1432d0 std::_Throw_Cpp_error 2 API calls 16139->16140 16141 15642a std::_Locinfo::_Locinfo_ctor 16140->16141 16141->16121 16143 207f6c 16142->16143 16144 207f3e 16142->16144 16145 207f74 16143->16145 16146 207f8e 16143->16146 16147 142cf0 std::_Throw_Cpp_error 2 API calls 16144->16147 16420 156290 16145->16420 16149 207fb0 16146->16149 16150 207f96 16146->16150 16151 207f50 16147->16151 16153 207fd5 16149->16153 16154 207fb8 16149->16154 16152 156290 2 API calls 16150->16152 16155 149280 3 API calls 16151->16155 16195 207f64 16152->16195 16156 207ffb 16153->16156 16157 207fdd 16153->16157 16158 156290 2 API calls 16154->16158 16154->16195 16155->16195 16160 2082c0 16156->16160 16161 20801b 16156->16161 16156->16195 16424 1812b7 16157->16424 16158->16195 16163 2082c8 16160->16163 16164 20831b 16160->16164 16383 145400 16161->16383 16453 15b430 16163->16453 16165 208323 16164->16165 16166 208376 16164->16166 16168 15b430 3 API calls 16165->16168 16169 2083d1 16166->16169 16170 20837e 16166->16170 16168->16195 16172 2083d9 16169->16172 16173 20842c 16169->16173 16171 15b430 3 API calls 16170->16171 16171->16195 16177 15b430 3 API calls 16172->16177 16174 208484 16173->16174 16175 208434 16173->16175 16174->16195 16460 198b00 16174->16460 16178 15b430 3 API calls 16175->16178 16177->16195 16178->16195 16181 208040 16182 20810b 16181->16182 16181->16195 16393 142cf0 16181->16393 16397 15ace0 16181->16397 16400 142d30 16182->16400 16186 208140 16187 2081b2 16186->16187 16189 2081e5 16186->16189 16188 1563b0 std::_Throw_Cpp_error 2 API calls 16187->16188 16190 2081ce 16188->16190 16417 179820 16189->16417 16430 20f280 16190->16430 16195->16121 18004 17361d 16198->18004 16202 1563b0 std::_Throw_Cpp_error 2 API calls 16201->16202 16203 1492d4 16202->16203 16204 158dc0 2 API calls 16203->16204 16205 149523 std::_Locinfo::_Locinfo_ctor 16203->16205 16204->16205 16207 1496e2 std::ios_base::_Ios_base_dtor 16205->16207 16208 1496b6 WSASend 16205->16208 16206 14975d std::ios_base::_Ios_base_dtor 16206->16121 16207->16206 16209 178c70 std::_Throw_Cpp_error RtlAllocateHeap 16207->16209 16208->16205 16208->16207 16210 14979c 16209->16210 16210->16121 16212 178bac ___std_exception_copy RtlAllocateHeap 16211->16212 16213 178c7f __Getctype 16212->16213 16215 1432e2 16214->16215 16219 143306 16214->16219 16216 14331f 16215->16216 16217 1432e9 16215->16217 16241 142b50 16216->16241 16233 173672 16217->16233 16218 143318 16218->16133 16219->16218 16220 173672 std::_Facet_Register 2 API calls 16219->16220 16223 143310 16220->16223 16223->16133 16224 1432ef 16225 178c70 std::_Throw_Cpp_error RtlAllocateHeap 16224->16225 16226 1432f8 16224->16226 16227 143329 16225->16227 16226->16133 16229 143007 16228->16229 16230 143017 std::ios_base::_Ios_base_dtor 16228->16230 16229->16230 16231 178c70 std::_Throw_Cpp_error RtlAllocateHeap 16229->16231 16230->16136 16232 143036 16231->16232 16235 173677 std::_Facet_Register 16233->16235 16236 173691 16235->16236 16238 142b50 Concurrency::cancel_current_task std::_Throw_Cpp_error 16235->16238 16245 1823ec 16235->16245 16236->16224 16237 17369d 16237->16237 16238->16237 16251 174b15 16238->16251 16242 142b5e Concurrency::cancel_current_task std::_Throw_Cpp_error 16241->16242 16243 174b15 ___std_exception_copy 2 API calls 16242->16243 16244 142bac 16243->16244 16244->16224 16249 18b094 __Getctype std::_Facet_Register 16245->16249 16246 18b0d2 16259 1816ff 16246->16259 16247 18b0bd RtlAllocateHeap 16247->16249 16250 18b0d0 16247->16250 16249->16246 16249->16247 16250->16235 16252 142bac 16251->16252 16253 174b22 16251->16253 16252->16224 16253->16252 16254 1823ec ___std_exception_copy 2 API calls 16253->16254 16255 174b3f 16254->16255 16256 174b4f 16255->16256 16321 1899a5 16255->16321 16330 181c96 16256->16330 16262 189f93 16259->16262 16263 189f9c __Getctype 16262->16263 16270 181704 16263->16270 16273 18a65a 16263->16273 16265 189fe0 __Getctype 16266 189fe8 __Getctype 16265->16266 16267 18a020 16265->16267 16277 18b01a 16266->16277 16281 189c70 16267->16281 16270->16250 16272 18b01a __freea RtlAllocateHeap 16272->16270 16274 18a667 __Getctype std::_Facet_Register 16273->16274 16275 18a692 RtlAllocateHeap 16274->16275 16276 18a6a5 __floor_pentium4 16274->16276 16275->16274 16275->16276 16276->16265 16278 18b04f 16277->16278 16279 18b025 __freea 16277->16279 16278->16270 16279->16278 16280 1816ff __floor_pentium4 RtlAllocateHeap 16279->16280 16280->16278 16282 189cde __Getctype 16281->16282 16285 189c16 16282->16285 16284 189d07 16284->16272 16286 189c22 std::_Lockit::_Lockit std::_Locinfo::_Locinfo_ctor 16285->16286 16289 189df7 16286->16289 16288 189c44 __Getctype 16288->16284 16290 189e2d __Getctype 16289->16290 16291 189e06 __Getctype 16289->16291 16290->16288 16291->16290 16293 192146 16291->16293 16294 1921c6 16293->16294 16297 19215c 16293->16297 16296 18b01a __freea RtlAllocateHeap 16294->16296 16319 192214 16294->16319 16295 1922b7 __Getctype RtlAllocateHeap 16300 192222 16295->16300 16298 1921e8 16296->16298 16297->16294 16301 18b01a __freea RtlAllocateHeap 16297->16301 16303 19218f 16297->16303 16299 18b01a __freea RtlAllocateHeap 16298->16299 16302 1921fb 16299->16302 16309 192282 16300->16309 16318 18b01a RtlAllocateHeap __freea 16300->16318 16305 192184 16301->16305 16306 18b01a __freea RtlAllocateHeap 16302->16306 16307 18b01a __freea RtlAllocateHeap 16303->16307 16320 1921b1 16303->16320 16304 18b01a __freea RtlAllocateHeap 16308 1921bb 16304->16308 16311 19144a __Getctype RtlAllocateHeap 16305->16311 16312 192209 16306->16312 16313 1921a6 16307->16313 16314 18b01a __freea RtlAllocateHeap 16308->16314 16310 18b01a __freea RtlAllocateHeap 16309->16310 16315 192288 16310->16315 16311->16303 16316 18b01a __freea RtlAllocateHeap 16312->16316 16317 1918a9 __Getctype RtlAllocateHeap 16313->16317 16314->16294 16315->16290 16316->16319 16317->16320 16318->16300 16319->16295 16320->16304 16322 1899b3 16321->16322 16323 1899c1 16321->16323 16322->16323 16328 1899d9 16322->16328 16324 1816ff __floor_pentium4 RtlAllocateHeap 16323->16324 16325 1899c9 16324->16325 16333 178c60 16325->16333 16326 1899d3 16326->16256 16328->16326 16329 1816ff __floor_pentium4 RtlAllocateHeap 16328->16329 16329->16325 16331 18b01a __freea RtlAllocateHeap 16330->16331 16332 181cae 16331->16332 16332->16252 16336 178bac 16333->16336 16337 178bbe ___std_exception_copy 16336->16337 16342 178be3 16337->16342 16339 178bd6 16349 17899c 16339->16349 16343 178bf3 16342->16343 16346 178bfa ___std_exception_copy __Getctype 16342->16346 16355 178a01 16343->16355 16345 178c08 16345->16339 16346->16345 16347 178bac ___std_exception_copy RtlAllocateHeap 16346->16347 16348 178c6c 16347->16348 16348->16339 16350 1789a8 16349->16350 16351 1789bf 16350->16351 16370 178a47 16350->16370 16353 178a47 ___std_exception_copy RtlAllocateHeap 16351->16353 16354 1789d2 16351->16354 16353->16354 16354->16326 16356 178a10 16355->16356 16359 18a044 16356->16359 16360 18a057 __Getctype 16359->16360 16361 178a32 16360->16361 16362 18a65a __Getctype RtlAllocateHeap 16360->16362 16361->16346 16363 18a087 __Getctype 16362->16363 16364 18a0c3 16363->16364 16365 18a08f __Getctype 16363->16365 16366 189c70 __Getctype RtlAllocateHeap 16364->16366 16367 18b01a __freea RtlAllocateHeap 16365->16367 16368 18a0ce 16366->16368 16367->16361 16369 18b01a __freea RtlAllocateHeap 16368->16369 16369->16361 16371 178a51 16370->16371 16372 178a5a 16370->16372 16373 178a01 ___std_exception_copy RtlAllocateHeap 16371->16373 16372->16351 16374 178a56 16373->16374 16374->16372 16377 1841c6 16374->16377 16376 178a63 16378 1841cb std::locale::_Setgloballocale 16377->16378 16379 18f665 std::locale::_Setgloballocale RtlAllocateHeap 16378->16379 16381 1841d6 std::locale::_Setgloballocale 16378->16381 16379->16381 16380 1836e2 std::locale::_Setgloballocale RtlAllocateHeap 16382 184209 __Getctype std::locale::_Setgloballocale 16380->16382 16381->16380 16382->16376 16465 172b99 16383->16465 16386 145410 16387 145419 16386->16387 16389 172534 std::_Throw_Cpp_error 3 API calls 16386->16389 16387->16181 16390 145430 16389->16390 16474 17953c 16390->16474 16394 142d13 16393->16394 16394->16394 16395 143040 std::_Throw_Cpp_error 2 API calls 16394->16395 16396 142d25 16395->16396 16396->16181 16398 15ad10 16397->16398 16791 15fbf0 16398->16791 16401 143040 std::_Throw_Cpp_error 2 API calls 16400->16401 16402 142d55 16401->16402 16403 2162c0 16402->16403 16404 216358 16403->16404 16416 216361 std::locale::_Setgloballocale 16403->16416 16800 15e4b0 16404->16800 16407 21654f 16410 216553 16407->16410 16902 156130 16407->16902 16411 216580 std::ios_base::_Ios_base_dtor 16410->16411 16412 178c70 std::_Throw_Cpp_error RtlAllocateHeap 16410->16412 16411->16186 16413 2165ce 16412->16413 16414 173069 __Xtime_get_ticks GetSystemTimePreciseAsFileTime 16413->16414 16415 2165d6 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 16414->16415 16415->16186 16416->16407 16416->16410 16823 234760 16416->16823 16834 164160 16416->16834 16989 17975e 16417->16989 16419 179832 16419->16195 16441 181628 16419->16441 16421 1562b1 16420->16421 16422 15629d 16420->16422 16421->16195 16423 156130 2 API calls 16422->16423 16423->16421 16425 1812ca ___std_exception_copy 16424->16425 17013 17d6a5 16425->17013 16427 1812e4 16428 17899c ___std_exception_copy RtlAllocateHeap 16427->16428 16429 1812f1 16428->16429 16429->16195 16431 20f2f6 std::locale::_Setgloballocale 16430->16431 17172 15ab20 16431->17172 16434 158f00 std::_Throw_Cpp_error 2 API calls 16435 20f47f 16434->16435 17177 143440 16435->17177 16437 20f58b std::ios_base::_Ios_base_dtor 16437->16195 16439 178c70 std::_Throw_Cpp_error RtlAllocateHeap 16440 20f5ce 16439->16440 16440->16195 16442 18163b ___std_exception_copy 16441->16442 17418 18140a 16442->17418 16444 181650 16445 17899c ___std_exception_copy RtlAllocateHeap 16444->16445 16446 18165d 16445->16446 16447 17d0a8 16446->16447 16448 17d0bb ___std_exception_copy 16447->16448 17519 17cf83 16448->17519 16450 17d0c7 16451 17899c ___std_exception_copy RtlAllocateHeap 16450->16451 16452 17d0d3 16451->16452 16452->16195 17589 157ef0 16453->17589 16455 15b48d 17606 162100 16455->17606 16459 15b503 16459->16195 17973 198bb0 16460->17973 16462 198b31 std::_Locinfo::_Locinfo_ctor 16463 143040 std::_Throw_Cpp_error 2 API calls 16462->16463 16464 198b7c 16463->16464 16464->16195 16480 172bc8 16465->16480 16467 145409 16467->16386 16468 172534 16467->16468 16469 17254a std::_Throw_Cpp_error 16468->16469 16487 1724e7 16469->16487 16471 17255a __EH_prolog3 std::_Throw_Cpp_error 16493 159cb0 16471->16493 16473 1725c7 std::_Throw_Cpp_error 16473->16386 16475 17954f ___std_exception_copy 16474->16475 16775 1793db 16475->16775 16477 17955e 16478 17899c ___std_exception_copy RtlAllocateHeap 16477->16478 16479 145450 16478->16479 16479->16181 16483 172be2 16480->16483 16481 172bf2 _ValidateLocalCookies 16481->16467 16483->16481 16484 17302b 16483->16484 16485 173069 __Xtime_get_ticks GetSystemTimePreciseAsFileTime 16484->16485 16486 173036 __aulldiv __aullrem 16485->16486 16486->16483 16488 1724f3 __EH_prolog3_GS 16487->16488 16489 142cf0 std::_Throw_Cpp_error 2 API calls 16488->16489 16490 172507 16489->16490 16504 1436e0 16490->16504 16492 17251c std::_Throw_Cpp_error 16492->16471 16531 144900 16493->16531 16495 159d26 16496 173672 std::_Facet_Register 2 API calls 16495->16496 16497 159d2d 16496->16497 16536 172729 16497->16536 16499 159d39 16544 15a060 16499->16544 16501 159d76 16502 159dc7 std::_Throw_Cpp_error 16501->16502 16503 144900 std::_Throw_Cpp_error 2 API calls 16501->16503 16502->16473 16503->16502 16505 1563b0 std::_Throw_Cpp_error 2 API calls 16504->16505 16506 143731 16505->16506 16507 14375a 16506->16507 16518 158f00 16506->16518 16509 158f00 std::_Throw_Cpp_error 2 API calls 16507->16509 16510 14378a 16509->16510 16511 174b15 ___std_exception_copy 2 API calls 16510->16511 16512 14381e 16511->16512 16513 14385f std::ios_base::_Ios_base_dtor 16512->16513 16514 178c70 std::_Throw_Cpp_error RtlAllocateHeap 16512->16514 16513->16492 16515 1438b0 16514->16515 16527 174b78 16515->16527 16517 1438f5 std::ios_base::_Ios_base_dtor 16517->16492 16519 158f22 std::_Locinfo::_Locinfo_ctor 16518->16519 16520 158f4f 16518->16520 16519->16507 16521 1432d0 std::_Throw_Cpp_error 2 API calls 16520->16521 16522 15902f std::ios_base::_Ios_base_dtor 16520->16522 16523 158fa4 std::_Locinfo::_Locinfo_ctor 16521->16523 16522->16507 16524 159002 std::_Locinfo::_Locinfo_ctor 16523->16524 16525 142fe0 std::_Throw_Cpp_error RtlAllocateHeap 16523->16525 16524->16507 16526 158fef 16525->16526 16526->16507 16528 174b85 16527->16528 16529 174b8c 16527->16529 16530 181c96 __freea RtlAllocateHeap 16528->16530 16529->16517 16530->16529 16532 144922 16531->16532 16533 14491a std::_Throw_Cpp_error 16531->16533 16532->16495 16556 1447f0 16533->16556 16535 144968 std::ios_base::_Ios_base_dtor std::_Throw_Cpp_error 16535->16495 16537 172735 __EH_prolog3 std::_Lockit::_Lockit 16536->16537 16540 172771 std::_Throw_Cpp_error std::_Lockit::~_Lockit 16537->16540 16574 17288c 16537->16574 16539 172753 16580 1728af 16539->16580 16540->16499 16545 15a0a2 std::_Throw_Cpp_error std::_Lockit::~_Lockit std::_Lockit::_Lockit 16544->16545 16546 173672 std::_Facet_Register 2 API calls 16545->16546 16555 15a144 std::_Lockit::~_Lockit 16545->16555 16547 15a152 16546->16547 16645 144040 16547->16645 16553 15a1f1 16680 1726f7 16553->16680 16555->16501 16557 144851 16556->16557 16557->16557 16568 143040 16557->16568 16559 144865 16560 1436e0 std::_Throw_Cpp_error 2 API calls 16559->16560 16562 14487b 16560->16562 16561 1448a5 std::ios_base::_Ios_base_dtor 16561->16535 16562->16561 16563 178c70 std::_Throw_Cpp_error RtlAllocateHeap 16562->16563 16564 1448f7 std::_Throw_Cpp_error 16563->16564 16565 144922 16564->16565 16566 1447f0 std::_Throw_Cpp_error 2 API calls 16564->16566 16565->16535 16567 144968 std::ios_base::_Ios_base_dtor std::_Throw_Cpp_error 16566->16567 16567->16535 16570 143052 16568->16570 16571 1430c8 16568->16571 16569 143057 std::_Locinfo::_Locinfo_ctor 16569->16559 16570->16569 16572 1432d0 std::_Throw_Cpp_error 2 API calls 16570->16572 16571->16559 16573 1430a3 std::_Locinfo::_Locinfo_ctor 16572->16573 16573->16559 16575 173672 std::_Facet_Register 2 API calls 16574->16575 16576 172897 16575->16576 16577 1728ab 16576->16577 16590 172611 16576->16590 16577->16539 16581 17275b 16580->16581 16582 1728bb 16580->16582 16584 155a60 16581->16584 16593 17333a 16582->16593 16585 155ab3 std::_Locinfo::_Locinfo_ctor 16584->16585 16586 155a86 16584->16586 16585->16540 16587 155a90 16586->16587 16588 181c96 __freea RtlAllocateHeap 16586->16588 16587->16585 16589 1823ec ___std_exception_copy 2 API calls 16587->16589 16588->16587 16589->16585 16591 155a60 std::_Locinfo::_Locinfo_ctor 2 API calls 16590->16591 16592 17264b 16591->16592 16592->16539 16594 17334a std::locale::_Setgloballocale 16593->16594 16594->16581 16597 1841d6 std::locale::_Setgloballocale 16594->16597 16599 18f665 16594->16599 16620 1836e2 16597->16620 16598 184209 __Getctype std::locale::_Setgloballocale 16598->16581 16600 18f671 std::_Locinfo::_Locinfo_ctor 16599->16600 16601 189f93 __floor_pentium4 RtlAllocateHeap 16600->16601 16602 18f6c1 16600->16602 16605 18f6a2 std::locale::_Setgloballocale 16600->16605 16607 18f6d3 std::_Lockit::_Lockit std::locale::_Setgloballocale 16600->16607 16601->16605 16603 1816ff __floor_pentium4 RtlAllocateHeap 16602->16603 16604 18f6c6 16603->16604 16606 178c60 ___std_exception_copy RtlAllocateHeap 16604->16606 16605->16602 16605->16607 16619 18f6ab 16605->16619 16606->16619 16608 18f843 std::_Lockit::~_Lockit 16607->16608 16609 18f746 16607->16609 16610 18f774 std::locale::_Setgloballocale 16607->16610 16611 1836e2 std::locale::_Setgloballocale RtlAllocateHeap 16608->16611 16609->16610 16623 189e42 16609->16623 16614 189e42 __Getctype RtlAllocateHeap 16610->16614 16617 18f7c9 16610->16617 16610->16619 16613 18f856 16611->16613 16614->16617 16616 189e42 __Getctype RtlAllocateHeap 16616->16610 16618 189e42 __Getctype RtlAllocateHeap 16617->16618 16617->16619 16618->16619 16619->16597 16637 183552 16620->16637 16622 1836f3 16622->16598 16624 189e4b __Getctype 16623->16624 16625 18a65a __Getctype RtlAllocateHeap 16624->16625 16628 189e62 16624->16628 16626 189e8f __Getctype 16625->16626 16630 189e97 __Getctype 16626->16630 16631 189ecf 16626->16631 16627 189ef2 16627->16616 16628->16627 16629 1841c6 __Getctype RtlAllocateHeap 16628->16629 16632 189efc 16629->16632 16633 18b01a __freea RtlAllocateHeap 16630->16633 16634 189c70 __Getctype RtlAllocateHeap 16631->16634 16633->16628 16635 189eda 16634->16635 16636 18b01a __freea RtlAllocateHeap 16635->16636 16636->16628 16638 18357f std::locale::_Setgloballocale 16637->16638 16641 1833e3 16638->16641 16640 1835c8 std::locale::_Setgloballocale 16640->16622 16642 1833ef std::_Lockit::_Lockit std::_Locinfo::_Locinfo_ctor 16641->16642 16643 18346a std::locale::_Setgloballocale RtlAllocateHeap 16642->16643 16644 183406 std::locale::_Setgloballocale 16643->16644 16644->16640 16646 144066 std::_Lockit::_Lockit 16645->16646 16647 1440e6 16646->16647 16648 1440c2 16646->16648 16692 171d4a 16647->16692 16683 172827 16648->16683 16652 1440f0 16653 172cf4 16724 183cf8 16653->16724 16655 172cfd __Getctype 16656 172d17 16655->16656 16657 172d35 16655->16657 16729 18454e 16656->16729 16659 18454e __Getctype RtlAllocateHeap 16657->16659 16660 172d1e 16659->16660 16734 183d42 16660->16734 16663 15a1ca 16665 144100 16663->16665 16771 172872 16665->16771 16668 144140 16669 14415b 16668->16669 16671 181c96 __freea RtlAllocateHeap 16668->16671 16672 144176 16669->16672 16673 181c96 __freea RtlAllocateHeap 16669->16673 16670 181c96 __freea RtlAllocateHeap 16670->16668 16671->16669 16674 181c96 __freea RtlAllocateHeap 16672->16674 16676 144191 16672->16676 16673->16672 16674->16676 16675 1441c7 std::_Lockit::~_Lockit 16675->16553 16677 181c96 __freea RtlAllocateHeap 16676->16677 16679 1441ac 16676->16679 16677->16679 16678 181c96 __freea RtlAllocateHeap 16678->16675 16679->16675 16679->16678 16681 173672 std::_Facet_Register 2 API calls 16680->16681 16682 172702 16681->16682 16682->16555 16695 184516 16683->16695 16686 155a60 std::_Locinfo::_Locinfo_ctor 2 API calls 16687 17284b 16686->16687 16688 184516 std::_Locinfo::_Locinfo_ctor 2 API calls 16687->16688 16689 17285b 16687->16689 16688->16689 16690 155a60 std::_Locinfo::_Locinfo_ctor 2 API calls 16689->16690 16691 1440c9 16690->16691 16691->16653 16721 143540 16692->16721 16694 171d5b std::_Throw_Cpp_error 16694->16652 16696 184523 std::_Locinfo::_Locinfo_ctor 16695->16696 16699 1842c1 16696->16699 16698 172833 16698->16686 16700 1842cd std::_Lockit::_Lockit std::_Locinfo::_Locinfo_ctor 16699->16700 16703 18431c 16700->16703 16702 1842e8 std::_Locinfo::_Locinfo_ctor 16702->16698 16704 18447b std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 16703->16704 16705 184337 16704->16705 16706 189e42 __Getctype RtlAllocateHeap 16705->16706 16712 184370 __Getctype 16705->16712 16707 184344 16706->16707 16708 183379 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 16707->16708 16709 184369 16708->16709 16710 18b094 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 16709->16710 16709->16712 16711 184395 16710->16711 16711->16712 16713 183379 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 16711->16713 16712->16702 16714 1843b1 16713->16714 16715 1843b8 16714->16715 16716 1843d3 16714->16716 16715->16712 16718 18b01a __freea RtlAllocateHeap 16715->16718 16717 18b01a __freea RtlAllocateHeap 16716->16717 16719 1843fe 16716->16719 16717->16719 16718->16712 16719->16712 16720 18b01a __freea RtlAllocateHeap 16719->16720 16720->16712 16722 174b15 ___std_exception_copy 2 API calls 16721->16722 16723 143585 16722->16723 16723->16694 16725 189e42 __Getctype RtlAllocateHeap 16724->16725 16726 183d03 16725->16726 16745 18a12d 16726->16745 16730 189e42 __Getctype RtlAllocateHeap 16729->16730 16731 184559 16730->16731 16732 18a12d __Getctype RtlAllocateHeap 16731->16732 16733 184569 16732->16733 16733->16660 16735 189e42 __Getctype RtlAllocateHeap 16734->16735 16736 183d4d 16735->16736 16737 18a12d __Getctype RtlAllocateHeap 16736->16737 16738 172d46 16737->16738 16738->16663 16739 184572 16738->16739 16740 18457f 16739->16740 16744 1845b3 __Getctype 16739->16744 16741 1823ec ___std_exception_copy 2 API calls 16740->16741 16742 1845a2 16741->16742 16742->16744 16762 18e2f4 16742->16762 16744->16663 16746 18a140 16745->16746 16747 183d13 16745->16747 16746->16747 16749 192392 16746->16749 16747->16655 16750 19239e std::_Locinfo::_Locinfo_ctor 16749->16750 16751 189e42 __Getctype RtlAllocateHeap 16750->16751 16753 1923a7 std::_Lockit::_Lockit 16751->16753 16752 1923ed 16752->16747 16753->16752 16758 192413 16753->16758 16755 1923d6 __Getctype 16755->16752 16756 1841c6 __Getctype RtlAllocateHeap 16755->16756 16757 192412 16756->16757 16759 192421 __Getctype 16758->16759 16761 19242e 16758->16761 16760 192146 __Getctype RtlAllocateHeap 16759->16760 16759->16761 16760->16761 16761->16755 16763 18e302 16762->16763 16764 18e310 16762->16764 16763->16764 16769 18e32a 16763->16769 16765 1816ff __floor_pentium4 RtlAllocateHeap 16764->16765 16766 18e31a 16765->16766 16768 178c60 ___std_exception_copy RtlAllocateHeap 16766->16768 16767 18e324 16767->16744 16768->16767 16769->16767 16770 1816ff __floor_pentium4 RtlAllocateHeap 16769->16770 16770->16766 16772 17287e 16771->16772 16773 14412c 16771->16773 16774 184516 std::_Locinfo::_Locinfo_ctor 2 API calls 16772->16774 16773->16668 16773->16670 16774->16773 16776 1793e7 std::_Locinfo::_Locinfo_ctor 16775->16776 16777 1793f0 16776->16777 16780 179414 16776->16780 16778 178be3 ___std_exception_copy RtlAllocateHeap 16777->16778 16783 179409 16778->16783 16779 179432 16782 178be3 ___std_exception_copy RtlAllocateHeap 16779->16782 16779->16783 16780->16779 16784 18a1e9 16780->16784 16782->16783 16783->16477 16785 18a20a 16784->16785 16786 18a1f5 16784->16786 16785->16779 16787 1816ff __floor_pentium4 RtlAllocateHeap 16786->16787 16788 18a1fa 16787->16788 16789 178c60 ___std_exception_copy RtlAllocateHeap 16788->16789 16790 18a205 16789->16790 16790->16779 16793 15fc8d 16791->16793 16794 15fc12 std::_Locinfo::_Locinfo_ctor 16791->16794 16792 15fd5e 16793->16792 16795 1432d0 std::_Throw_Cpp_error 2 API calls 16793->16795 16796 15fce1 std::_Locinfo::_Locinfo_ctor 16795->16796 16797 15fd3a std::_Locinfo::_Locinfo_ctor 16796->16797 16798 142fe0 std::_Throw_Cpp_error RtlAllocateHeap 16796->16798 16799 15fd27 16798->16799 16801 15e4c2 16800->16801 16802 15e528 16800->16802 16804 15e4f9 16801->16804 16805 15e4ca 16801->16805 16913 143330 16802->16913 16806 15e516 16804->16806 16809 173672 std::_Facet_Register 2 API calls 16804->16809 16807 15e52d 16805->16807 16808 15e4d1 16805->16808 16806->16416 16810 142b50 Concurrency::cancel_current_task 2 API calls 16807->16810 16811 173672 std::_Facet_Register 2 API calls 16808->16811 16812 15e503 16809->16812 16813 15e4d7 16810->16813 16811->16813 16812->16416 16814 178c70 std::_Throw_Cpp_error RtlAllocateHeap 16813->16814 16815 15e4e0 16813->16815 16816 15e537 16814->16816 16815->16416 16916 156ad0 16816->16916 16818 15e574 16819 144900 std::_Throw_Cpp_error 2 API calls 16818->16819 16821 15e5fb 16819->16821 16820 15e613 16820->16416 16821->16820 16920 159b60 16821->16920 16824 234767 16823->16824 16825 23476c 16823->16825 16824->16416 16826 1823ec ___std_exception_copy 2 API calls 16825->16826 16832 2347af 16825->16832 16826->16832 16827 2347c2 16827->16416 16828 234877 16828->16416 16829 181c96 __freea RtlAllocateHeap 16830 234867 16829->16830 16830->16416 16831 234821 16831->16828 16831->16829 16832->16827 16832->16831 16833 181c96 __freea RtlAllocateHeap 16832->16833 16833->16831 16835 164195 16834->16835 16836 164288 16834->16836 16837 1641b1 16835->16837 16839 164202 16835->16839 16840 1641f2 16835->16840 16838 143330 2 API calls 16836->16838 16842 173672 std::_Facet_Register 2 API calls 16837->16842 16841 16428d 16838->16841 16846 173672 std::_Facet_Register 2 API calls 16839->16846 16851 1641cf std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 16839->16851 16840->16837 16840->16841 16843 142b50 Concurrency::cancel_current_task 2 API calls 16841->16843 16844 1641c4 16842->16844 16845 164292 16843->16845 16844->16845 16844->16851 16847 178c70 std::_Throw_Cpp_error RtlAllocateHeap 16845->16847 16846->16851 16848 164297 16847->16848 16849 1642fa 16848->16849 16850 1643e9 16848->16850 16960 166ff0 16849->16960 16852 143330 2 API calls 16850->16852 16955 1677d0 16851->16955 16853 1643ee 16852->16853 16855 16445a 16853->16855 16856 164549 16853->16856 16860 166ff0 2 API calls 16855->16860 16858 143330 2 API calls 16856->16858 16867 16454e 16858->16867 16859 16425e 16859->16416 16862 164496 16860->16862 16861 16470b 16864 143330 2 API calls 16861->16864 16866 1563b0 std::_Throw_Cpp_error 2 API calls 16862->16866 16863 164706 16868 142b50 Concurrency::cancel_current_task 2 API calls 16863->16868 16869 1646af 16864->16869 16865 164336 16968 167830 16865->16968 16880 1644c4 16866->16880 16867->16861 16867->16863 16870 164615 16867->16870 16871 1645ee 16867->16871 16868->16861 16872 178c70 std::_Throw_Cpp_error RtlAllocateHeap 16869->16872 16892 1646d1 std::ios_base::_Ios_base_dtor 16869->16892 16876 173672 std::_Facet_Register 2 API calls 16870->16876 16884 1645ff 16870->16884 16871->16863 16874 1645f9 16871->16874 16873 164715 16872->16873 16980 15d010 16873->16980 16877 173672 std::_Facet_Register 2 API calls 16874->16877 16876->16884 16877->16884 16879 1643b0 16879->16416 16883 167830 RtlAllocateHeap 16880->16883 16885 164510 16883->16885 16884->16869 16884->16892 16973 171f9c 16884->16973 16885->16416 16886 16472f std::_Throw_Cpp_error 16887 164798 16886->16887 16889 16477f 16886->16889 16890 16475b 16886->16890 16888 142b50 Concurrency::cancel_current_task 2 API calls 16887->16888 16891 164768 16888->16891 16894 164791 16889->16894 16898 173672 std::_Facet_Register 2 API calls 16889->16898 16890->16887 16893 164762 16890->16893 16896 178c70 std::_Throw_Cpp_error RtlAllocateHeap 16891->16896 16901 164771 16891->16901 16892->16416 16897 173672 std::_Facet_Register 2 API calls 16893->16897 16894->16416 16900 1647a2 16896->16900 16897->16891 16899 164789 16898->16899 16899->16416 16901->16416 16903 156174 16902->16903 16905 156143 std::_Locinfo::_Locinfo_ctor 16902->16905 16904 156180 16903->16904 16907 156200 16903->16907 16906 1432d0 std::_Throw_Cpp_error 2 API calls 16904->16906 16905->16410 16910 1561bf std::_Locinfo::_Locinfo_ctor 16906->16910 16907->16907 16908 158f00 std::_Throw_Cpp_error 2 API calls 16907->16908 16909 156232 16908->16909 16909->16410 16911 1561ed 16910->16911 16912 142fe0 std::_Throw_Cpp_error RtlAllocateHeap 16910->16912 16911->16410 16912->16911 16924 171cea 16913->16924 16918 156b02 16916->16918 16917 156b1d 16917->16818 16918->16917 16944 1550e0 16918->16944 16921 159bbb 16920->16921 16922 159b96 16920->16922 16921->16820 16922->16921 16952 1588a0 16922->16952 16931 171a9f 16924->16931 16926 171cfb std::_Throw_Cpp_error 16934 171af4 16926->16934 16928 171d1b std::_Throw_Cpp_error 16937 171b37 16928->16937 16930 171d3b std::_Throw_Cpp_error 16941 1434e0 16931->16941 16935 1434e0 std::invalid_argument::invalid_argument 2 API calls 16934->16935 16936 171b06 16935->16936 16936->16928 16938 171b4b std::regex_error::regex_error 16937->16938 16939 1434e0 std::invalid_argument::invalid_argument 2 API calls 16938->16939 16940 171b54 16939->16940 16940->16930 16942 174b15 ___std_exception_copy 2 API calls 16941->16942 16943 143522 16942->16943 16943->16926 16945 155117 16944->16945 16949 1551b5 16944->16949 16946 156ad0 2 API calls 16945->16946 16947 155120 16946->16947 16948 15519d 16947->16948 16951 144900 std::_Throw_Cpp_error 2 API calls 16947->16951 16948->16949 16950 159b60 2 API calls 16948->16950 16949->16917 16950->16949 16951->16948 16953 144900 std::_Throw_Cpp_error 2 API calls 16952->16953 16954 1588bf 16953->16954 16954->16921 16956 1677dc 16955->16956 16957 1677f9 std::ios_base::_Ios_base_dtor 16955->16957 16956->16957 16958 178c70 std::_Throw_Cpp_error RtlAllocateHeap 16956->16958 16957->16859 16959 167824 16958->16959 16961 16703c 16960->16961 16962 166ff9 16960->16962 16961->16961 16962->16961 16964 173672 std::_Facet_Register 2 API calls 16962->16964 16966 167013 16962->16966 16963 173672 std::_Facet_Register 2 API calls 16965 167035 16963->16965 16964->16966 16965->16865 16966->16963 16967 16701c 16966->16967 16967->16865 16969 167882 std::ios_base::_Ios_base_dtor 16968->16969 16970 16783d 16968->16970 16969->16879 16970->16969 16971 178c70 std::_Throw_Cpp_error RtlAllocateHeap 16970->16971 16972 1678b6 16971->16972 16974 171fb2 16973->16974 16975 171fa5 16973->16975 16974->16884 16975->16974 16976 1841c6 __Getctype RtlAllocateHeap 16975->16976 16977 171fbb 16976->16977 16978 171f9c RtlAllocateHeap 16977->16978 16979 171fca 16978->16979 16979->16884 16981 15d02e 16980->16981 16982 15d01a 16980->16982 16984 159910 16981->16984 16982->16981 16983 171f9c RtlAllocateHeap 16982->16983 16983->16982 16985 159928 16984->16985 16986 159938 std::ios_base::_Ios_base_dtor 16984->16986 16985->16986 16987 178c70 std::_Throw_Cpp_error RtlAllocateHeap 16985->16987 16986->16886 16988 15994d 16987->16988 16990 17976a std::_Locinfo::_Locinfo_ctor 16989->16990 16991 179771 16990->16991 16993 179791 16990->16993 16992 1816ff __floor_pentium4 RtlAllocateHeap 16991->16992 16994 179776 16992->16994 16996 179796 16993->16996 16997 1797a3 16993->16997 16995 178c60 ___std_exception_copy RtlAllocateHeap 16994->16995 17002 179781 16995->17002 16998 1816ff __floor_pentium4 RtlAllocateHeap 16996->16998 17003 18a8ef 16997->17003 16998->17002 17000 1797ac 17001 1816ff __floor_pentium4 RtlAllocateHeap 17000->17001 17000->17002 17001->17002 17002->16419 17004 18a8fb std::_Lockit::_Lockit std::_Locinfo::_Locinfo_ctor 17003->17004 17007 18a993 17004->17007 17006 18a916 17006->17000 17011 18a9b6 17007->17011 17008 18a65a __Getctype RtlAllocateHeap 17009 18aa17 17008->17009 17010 18b01a __freea RtlAllocateHeap 17009->17010 17012 18a9fc std::locale::_Setgloballocale 17010->17012 17011->17008 17011->17011 17011->17012 17012->17006 17027 17ce79 17013->17027 17015 17d6ff 17020 17d723 17015->17020 17034 17e1d0 17015->17034 17016 17d6b7 17016->17015 17017 17d6cc 17016->17017 17026 17d6e7 std::_Locinfo::_Locinfo_ctor 17016->17026 17018 178be3 ___std_exception_copy RtlAllocateHeap 17017->17018 17018->17026 17023 17d747 17020->17023 17041 17ce94 17020->17041 17022 17d7cf 17024 17ce22 RtlAllocateHeap 17022->17024 17023->17022 17048 17ce22 17023->17048 17024->17026 17026->16427 17028 17ce91 17027->17028 17029 17ce7e 17027->17029 17028->17016 17030 1816ff __floor_pentium4 RtlAllocateHeap 17029->17030 17031 17ce83 17030->17031 17032 178c60 ___std_exception_copy RtlAllocateHeap 17031->17032 17033 17ce8e 17032->17033 17033->17016 17035 178a47 ___std_exception_copy RtlAllocateHeap 17034->17035 17036 17e1e0 17035->17036 17054 18a15a 17036->17054 17042 17cea0 17041->17042 17045 17ceb6 17041->17045 17043 18454e __Getctype RtlAllocateHeap 17042->17043 17046 17ceab std::_Locinfo::_Locinfo_ctor 17043->17046 17044 17cec6 17044->17020 17045->17044 17156 189a39 17045->17156 17046->17020 17049 17ce47 17048->17049 17050 17ce33 17048->17050 17049->17022 17050->17049 17051 1816ff __floor_pentium4 RtlAllocateHeap 17050->17051 17052 17ce3c 17051->17052 17053 178c60 ___std_exception_copy RtlAllocateHeap 17052->17053 17053->17049 17055 17e1fd 17054->17055 17056 18a171 17054->17056 17058 18a1b8 17055->17058 17056->17055 17057 192392 __Getctype RtlAllocateHeap 17056->17057 17057->17055 17059 18a1cf 17058->17059 17060 17e20a 17058->17060 17059->17060 17062 1906bd 17059->17062 17060->17020 17063 189e42 __Getctype RtlAllocateHeap 17062->17063 17064 1906c2 17063->17064 17067 1905d5 17064->17067 17066 1906cd 17066->17060 17070 1905e1 std::_Lockit::_Lockit std::_Locinfo::_Locinfo_ctor 17067->17070 17068 1905fb std::_Locinfo::_Locinfo_ctor 17069 190602 17068->17069 17071 1841c6 __Getctype RtlAllocateHeap 17068->17071 17069->17066 17070->17068 17075 18b01a __freea RtlAllocateHeap 17070->17075 17072 190674 17071->17072 17073 1906b0 17072->17073 17078 189efd 17072->17078 17073->17066 17075->17068 17079 189f08 __Getctype 17078->17079 17080 189f14 17079->17080 17082 18a65a __Getctype RtlAllocateHeap 17079->17082 17081 189f19 17080->17081 17083 1841c6 __Getctype RtlAllocateHeap 17080->17083 17092 190480 17081->17092 17085 189f38 __Getctype 17082->17085 17084 189f92 17083->17084 17086 189f74 17085->17086 17087 189f40 __Getctype 17085->17087 17088 189c70 __Getctype RtlAllocateHeap 17086->17088 17089 18b01a __freea RtlAllocateHeap 17087->17089 17090 189f7f 17088->17090 17089->17080 17091 18b01a __freea RtlAllocateHeap 17090->17091 17091->17081 17093 1905d5 std::_Locinfo::_Locinfo_ctor 2 API calls 17092->17093 17094 1904aa 17093->17094 17115 190207 17094->17115 17097 1904c3 17097->17073 17100 1904ea 17124 1906d0 17100->17124 17101 1904dc 17102 18b01a __freea RtlAllocateHeap 17101->17102 17102->17097 17104 190517 17105 190522 17104->17105 17109 19053d std::_Locinfo::_Locinfo_ctor 17104->17109 17106 1816ff __floor_pentium4 RtlAllocateHeap 17105->17106 17108 190527 17106->17108 17107 190569 17114 1905b2 17107->17114 17129 1900f9 17107->17129 17110 18b01a __freea RtlAllocateHeap 17108->17110 17109->17107 17111 18b01a __freea RtlAllocateHeap 17109->17111 17110->17097 17111->17107 17113 18b01a __freea RtlAllocateHeap 17113->17097 17114->17113 17133 1795ae 17115->17133 17118 18b094 17119 18b0d2 17118->17119 17123 18b0a2 __Getctype std::_Facet_Register 17118->17123 17121 1816ff __floor_pentium4 RtlAllocateHeap 17119->17121 17120 18b0bd RtlAllocateHeap 17122 18b0d0 17120->17122 17120->17123 17121->17122 17122->17100 17122->17101 17123->17119 17123->17120 17125 190207 std::_Locinfo::_Locinfo_ctor 2 API calls 17124->17125 17127 1906f0 std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 17125->17127 17126 1907f5 std::_Locinfo::_Locinfo_ctor _ValidateLocalCookies 17126->17104 17127->17126 17141 1902db 17127->17141 17130 190105 std::_Lockit::_Lockit std::_Locinfo::_Locinfo_ctor 17129->17130 17149 190146 17130->17149 17132 19011c std::_Locinfo::_Locinfo_ctor 17132->17114 17134 1795cc 17133->17134 17140 1795c5 17133->17140 17135 189e42 __Getctype RtlAllocateHeap 17134->17135 17134->17140 17136 1795ed 17135->17136 17137 18a12d __Getctype RtlAllocateHeap 17136->17137 17138 179603 17137->17138 17139 18a18b std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 17138->17139 17139->17140 17140->17097 17140->17118 17142 1903cc _ValidateLocalCookies 17141->17142 17144 190303 17141->17144 17142->17126 17143 18f44d std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 17145 190383 17143->17145 17144->17142 17144->17143 17146 18a8a6 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 17145->17146 17147 1903a4 17146->17147 17148 18a8a6 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 17147->17148 17148->17142 17150 17ceeb std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 17149->17150 17151 190168 17150->17151 17152 17ceeb std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 17151->17152 17153 190187 17152->17153 17154 1901ae 17153->17154 17155 18b01a __freea RtlAllocateHeap 17153->17155 17154->17132 17155->17154 17157 1795ae std::_Locinfo::_Locinfo_ctor 2 API calls 17156->17157 17158 189a56 17157->17158 17160 189a66 _ValidateLocalCookies 17158->17160 17161 18f44d 17158->17161 17160->17044 17162 1795ae std::_Locinfo::_Locinfo_ctor 2 API calls 17161->17162 17163 18f46d std::_Locinfo::_Locinfo_ctor 17162->17163 17164 18f529 _ValidateLocalCookies 17163->17164 17165 18f4bf std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 17163->17165 17167 18b094 std::_Locinfo::_Locinfo_ctor 2 API calls 17163->17167 17164->17160 17168 173275 17165->17168 17167->17165 17169 17327f 17168->17169 17171 173290 17168->17171 17170 181c96 __freea RtlAllocateHeap 17169->17170 17169->17171 17170->17171 17171->17164 17173 15ab55 17172->17173 17173->17173 17175 15aba3 17173->17175 17181 15e8a0 17173->17181 17176 15ab83 17176->16434 17178 143459 17177->17178 17185 180dd7 17178->17185 17182 15e8f8 std::_Locinfo::_Locinfo_ctor 17181->17182 17183 15e8ce 17181->17183 17182->17176 17184 1432d0 std::_Throw_Cpp_error 2 API calls 17183->17184 17184->17182 17186 180deb ___std_exception_copy 17185->17186 17191 17e565 17186->17191 17188 180e06 17189 17899c ___std_exception_copy RtlAllocateHeap 17188->17189 17190 143467 17189->17190 17190->16437 17190->16439 17192 17e5b4 17191->17192 17193 17e591 17191->17193 17192->17193 17195 17e5bc 17192->17195 17194 178be3 ___std_exception_copy RtlAllocateHeap 17193->17194 17196 17e5a9 _ValidateLocalCookies 17194->17196 17200 17faa7 17195->17200 17196->17188 17218 180b0d 17200->17218 17203 17facc 17204 178be3 ___std_exception_copy RtlAllocateHeap 17203->17204 17205 17e63d 17204->17205 17215 17f28d 17205->17215 17206 17faf4 std::_Locinfo::_Locinfo_ctor 17206->17205 17209 17e1d0 std::_Locinfo::_Locinfo_ctor 2 API calls 17206->17209 17211 17fbd0 17206->17211 17222 17f49b 17206->17222 17225 17fed4 17206->17225 17257 18036f 17206->17257 17209->17206 17212 178be3 ___std_exception_copy RtlAllocateHeap 17211->17212 17213 17fbea 17212->17213 17214 178be3 ___std_exception_copy RtlAllocateHeap 17213->17214 17214->17205 17216 18b01a __freea RtlAllocateHeap 17215->17216 17217 17f29d 17216->17217 17217->17196 17219 180b18 17218->17219 17221 17fac1 17218->17221 17220 178be3 ___std_exception_copy RtlAllocateHeap 17219->17220 17220->17221 17221->17203 17221->17205 17221->17206 17284 17e842 17222->17284 17224 17f4d6 17224->17206 17226 17fef2 17225->17226 17227 17fedb 17225->17227 17228 178be3 ___std_exception_copy RtlAllocateHeap 17226->17228 17236 17ff31 17226->17236 17229 1803f4 17227->17229 17230 180394 17227->17230 17227->17236 17231 17ff26 17228->17231 17232 1803f9 17229->17232 17233 18042d 17229->17233 17234 18041a 17230->17234 17235 18039a 17230->17235 17231->17206 17237 1803fb 17232->17237 17238 180426 17232->17238 17239 18044a 17233->17239 17240 180432 17233->17240 17319 17ebfc 17234->17319 17246 1803eb 17235->17246 17247 18039f 17235->17247 17236->17206 17241 1803ae 17237->17241 17249 18040a 17237->17249 17326 180a30 17238->17326 17330 180a4d 17239->17330 17240->17234 17240->17246 17256 1803c5 17240->17256 17255 180453 _ValidateLocalCookies 17241->17255 17294 180785 17241->17294 17246->17255 17308 17ed89 17246->17308 17247->17241 17250 1803d8 17247->17250 17247->17256 17249->17234 17251 18040e 17249->17251 17250->17255 17304 180916 17250->17304 17251->17255 17315 1809ab 17251->17315 17255->17206 17256->17255 17333 18c5ba 17256->17333 17258 1803f4 17257->17258 17259 180394 17257->17259 17260 1803f9 17258->17260 17261 18042d 17258->17261 17262 18041a 17259->17262 17263 18039a 17259->17263 17264 1803fb 17260->17264 17265 180426 17260->17265 17266 18044a 17261->17266 17267 180432 17261->17267 17268 17ebfc 2 API calls 17262->17268 17273 1803eb 17263->17273 17274 18039f 17263->17274 17270 1803ae 17264->17270 17277 18040a 17264->17277 17269 180a30 2 API calls 17265->17269 17271 180a4d 2 API calls 17266->17271 17267->17262 17267->17273 17282 1803c5 17267->17282 17268->17282 17269->17282 17272 180785 2 API calls 17270->17272 17283 180453 _ValidateLocalCookies 17270->17283 17271->17282 17272->17282 17276 17ed89 2 API calls 17273->17276 17273->17283 17274->17270 17275 1803d8 17274->17275 17274->17282 17279 180916 2 API calls 17275->17279 17275->17283 17276->17282 17277->17262 17278 18040e 17277->17278 17280 1809ab RtlAllocateHeap 17278->17280 17278->17283 17279->17282 17280->17282 17281 18c5ba 2 API calls 17281->17282 17282->17281 17282->17283 17283->17206 17285 17ce79 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 17284->17285 17286 17e854 17285->17286 17287 17e869 17286->17287 17290 17e89c 17286->17290 17293 17e884 std::_Locinfo::_Locinfo_ctor 17286->17293 17288 178be3 ___std_exception_copy RtlAllocateHeap 17287->17288 17288->17293 17289 17e933 17291 17ce22 RtlAllocateHeap 17289->17291 17290->17289 17292 17ce22 RtlAllocateHeap 17290->17292 17291->17293 17292->17289 17293->17224 17295 18079f 17294->17295 17339 17e790 17295->17339 17297 1807de 17350 18c439 17297->17350 17300 17e1d0 std::_Locinfo::_Locinfo_ctor 2 API calls 17301 180895 17300->17301 17302 17e1d0 std::_Locinfo::_Locinfo_ctor 2 API calls 17301->17302 17303 1808c8 17301->17303 17302->17303 17303->17256 17303->17303 17305 180931 17304->17305 17306 180967 17305->17306 17307 18c5ba 2 API calls 17305->17307 17306->17256 17307->17306 17309 17ed9e 17308->17309 17310 17edc0 17309->17310 17312 17ede7 17309->17312 17311 178be3 ___std_exception_copy RtlAllocateHeap 17310->17311 17314 17eddd 17311->17314 17313 17e790 2 API calls 17312->17313 17312->17314 17313->17314 17314->17256 17318 1809c1 17315->17318 17316 178be3 ___std_exception_copy RtlAllocateHeap 17317 1809e2 17316->17317 17317->17256 17318->17316 17318->17317 17320 17ec11 17319->17320 17321 17ec33 17320->17321 17323 17ec5a 17320->17323 17322 178be3 ___std_exception_copy RtlAllocateHeap 17321->17322 17324 17ec50 17322->17324 17323->17324 17325 17e790 2 API calls 17323->17325 17324->17256 17325->17324 17327 180a3c 17326->17327 17411 17ea6f 17327->17411 17329 180a4c 17329->17256 17331 17ed89 2 API calls 17330->17331 17332 180a62 17331->17332 17332->17256 17334 18c5cf 17333->17334 17336 17e1d0 std::_Locinfo::_Locinfo_ctor 2 API calls 17334->17336 17337 18c5d3 std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 17334->17337 17338 18c5fc std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 17334->17338 17335 178be3 ___std_exception_copy RtlAllocateHeap 17335->17337 17336->17338 17337->17256 17338->17335 17338->17337 17340 17e7b7 17339->17340 17341 17e7a5 17339->17341 17340->17341 17342 18b094 std::_Locinfo::_Locinfo_ctor 2 API calls 17340->17342 17341->17297 17343 17e7db 17342->17343 17344 17e7e3 17343->17344 17345 17e7ee 17343->17345 17347 18b01a __freea RtlAllocateHeap 17344->17347 17369 17f2a7 17345->17369 17347->17341 17349 18b01a __freea RtlAllocateHeap 17349->17341 17351 18c46e 17350->17351 17352 18c44a 17350->17352 17351->17352 17354 18c4a1 17351->17354 17353 178be3 ___std_exception_copy RtlAllocateHeap 17352->17353 17364 180871 17353->17364 17355 18c4da 17354->17355 17357 18c509 17354->17357 17372 18c2dd 17355->17372 17356 18c532 17361 18c599 17356->17361 17362 18c55f 17356->17362 17357->17356 17358 18c537 17357->17358 17377 18bb66 17358->17377 17404 18be93 17361->17404 17365 18c57f 17362->17365 17366 18c564 17362->17366 17364->17300 17364->17301 17397 18c08a 17365->17397 17387 18c20e 17366->17387 17370 18b01a __freea RtlAllocateHeap 17369->17370 17371 17e7f9 17370->17371 17371->17349 17373 18c2f3 17372->17373 17374 18c2fe 17372->17374 17373->17364 17375 1899a5 ___std_exception_copy RtlAllocateHeap 17374->17375 17376 18c359 __Getctype 17375->17376 17376->17364 17378 18bb79 17377->17378 17379 18bb88 17378->17379 17380 18bbaa 17378->17380 17382 178be3 ___std_exception_copy RtlAllocateHeap 17379->17382 17381 18bbbf 17380->17381 17384 18bc12 17380->17384 17383 18be93 RtlAllocateHeap RtlAllocateHeap 17381->17383 17386 18bba0 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z std::locale::_Setgloballocale __allrem _strrchr 17382->17386 17383->17386 17385 17e1d0 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 17384->17385 17384->17386 17385->17386 17386->17364 17388 1947bf RtlAllocateHeap 17387->17388 17389 18c23e 17388->17389 17390 1946c5 RtlAllocateHeap 17389->17390 17391 18c27c 17390->17391 17392 18c283 17391->17392 17393 18c2bc 17391->17393 17394 18c295 17391->17394 17392->17364 17395 18bf37 RtlAllocateHeap RtlAllocateHeap 17393->17395 17396 18c120 RtlAllocateHeap RtlAllocateHeap 17394->17396 17395->17392 17396->17392 17398 1947bf RtlAllocateHeap 17397->17398 17399 18c0b9 17398->17399 17400 1946c5 RtlAllocateHeap 17399->17400 17401 18c0fa 17400->17401 17402 18c120 RtlAllocateHeap RtlAllocateHeap 17401->17402 17403 18c101 17401->17403 17402->17403 17403->17364 17405 1947bf RtlAllocateHeap 17404->17405 17406 18bebd 17405->17406 17407 1946c5 RtlAllocateHeap 17406->17407 17408 18bf0b 17407->17408 17409 18bf12 17408->17409 17410 18bf37 RtlAllocateHeap RtlAllocateHeap 17408->17410 17409->17364 17410->17409 17412 17ea84 17411->17412 17413 17eaa6 17412->17413 17415 17eacd 17412->17415 17414 178be3 ___std_exception_copy RtlAllocateHeap 17413->17414 17417 17eac3 17414->17417 17416 17e790 2 API calls 17415->17416 17415->17417 17416->17417 17417->17329 17419 181418 17418->17419 17425 181440 17418->17425 17420 181425 17419->17420 17421 181447 17419->17421 17419->17425 17423 178be3 ___std_exception_copy RtlAllocateHeap 17420->17423 17426 181363 17421->17426 17423->17425 17424 18147f 17424->16444 17425->16444 17427 18136f std::_Locinfo::_Locinfo_ctor 17426->17427 17430 1813be 17427->17430 17429 18138a 17429->17424 17437 18c8aa 17430->17437 17457 18c86c 17437->17457 17439 18c8bb 17440 1813d6 17439->17440 17441 18b094 std::_Locinfo::_Locinfo_ctor 2 API calls 17439->17441 17444 181481 17440->17444 17442 18c914 17441->17442 17443 18b01a __freea RtlAllocateHeap 17442->17443 17443->17440 17447 181493 17444->17447 17448 1813f4 17444->17448 17445 1814a1 17446 178be3 ___std_exception_copy RtlAllocateHeap 17445->17446 17446->17448 17447->17445 17447->17448 17451 1814d7 std::_Locinfo::_Locinfo_ctor 17447->17451 17453 18c955 17448->17453 17450 18a1e9 RtlAllocateHeap 17450->17451 17451->17448 17451->17450 17473 179a91 17451->17473 17479 189678 17451->17479 17454 18c960 17453->17454 17455 181400 17453->17455 17454->17455 17456 179a91 4 API calls 17454->17456 17455->17429 17456->17455 17458 18c878 17457->17458 17459 18c8a2 17458->17459 17460 18a1e9 RtlAllocateHeap 17458->17460 17459->17439 17461 18c893 17460->17461 17464 193be3 17461->17464 17463 18c899 17463->17439 17465 193bfd 17464->17465 17466 193bf0 17464->17466 17469 193c09 17465->17469 17470 1816ff __floor_pentium4 RtlAllocateHeap 17465->17470 17467 1816ff __floor_pentium4 RtlAllocateHeap 17466->17467 17468 193bf5 17467->17468 17468->17463 17469->17463 17471 193c2a 17470->17471 17472 178c60 ___std_exception_copy RtlAllocateHeap 17471->17472 17472->17468 17474 179aaa 17473->17474 17478 179ad1 17473->17478 17475 18a1e9 RtlAllocateHeap 17474->17475 17474->17478 17476 179ac6 17475->17476 17477 189678 4 API calls 17476->17477 17477->17478 17478->17451 17480 189684 std::_Locinfo::_Locinfo_ctor 17479->17480 17481 1896c5 17480->17481 17483 18968c 17480->17483 17484 18970b 17480->17484 17482 178be3 ___std_exception_copy RtlAllocateHeap 17481->17482 17482->17483 17483->17451 17484->17483 17486 189789 17484->17486 17487 1897b1 17486->17487 17499 1897d4 17486->17499 17488 1897b5 17487->17488 17490 189810 17487->17490 17489 178be3 ___std_exception_copy RtlAllocateHeap 17488->17489 17489->17499 17491 18982e 17490->17491 17505 18263d 17490->17505 17500 1892ce 17491->17500 17495 18988d 17497 1898f6 WriteFile 17495->17497 17495->17499 17496 189846 17496->17499 17508 188e9f 17496->17508 17497->17499 17499->17483 17501 193be3 RtlAllocateHeap 17500->17501 17502 1892e0 17501->17502 17503 17e1d0 std::_Locinfo::_Locinfo_ctor 2 API calls 17502->17503 17504 18930e 17502->17504 17503->17504 17504->17495 17504->17496 17514 18251c 17505->17514 17507 182656 17507->17491 17509 188f07 17508->17509 17510 17e1d0 std::_Locinfo::_Locinfo_ctor 2 API calls 17509->17510 17513 188f18 std::_Locinfo::_Locinfo_ctor 17509->17513 17510->17513 17511 18c724 RtlAllocateHeap RtlAllocateHeap 17511->17513 17512 1891ce _ValidateLocalCookies 17512->17499 17513->17511 17513->17512 17515 18e940 RtlAllocateHeap 17514->17515 17516 18252e 17515->17516 17517 18254a SetFilePointerEx 17516->17517 17518 182536 17516->17518 17517->17518 17518->17507 17520 17cf8f std::_Locinfo::_Locinfo_ctor 17519->17520 17521 17cf99 17520->17521 17523 17cfbc 17520->17523 17522 178be3 ___std_exception_copy RtlAllocateHeap 17521->17522 17525 17cfb4 17522->17525 17523->17525 17526 17d01a 17523->17526 17525->16450 17527 17d027 17526->17527 17528 17d04a 17526->17528 17529 178be3 ___std_exception_copy RtlAllocateHeap 17527->17529 17530 17d042 17528->17530 17531 179a91 4 API calls 17528->17531 17529->17530 17530->17525 17532 17d062 17531->17532 17540 18b054 17532->17540 17535 18a1e9 RtlAllocateHeap 17536 17d076 17535->17536 17544 188d2c 17536->17544 17539 18b01a __freea RtlAllocateHeap 17539->17530 17541 18b06b 17540->17541 17542 17d06a 17540->17542 17541->17542 17543 18b01a __freea RtlAllocateHeap 17541->17543 17542->17535 17543->17542 17545 188d55 17544->17545 17550 17d07d 17544->17550 17546 188da4 17545->17546 17548 188d7c 17545->17548 17547 178be3 ___std_exception_copy RtlAllocateHeap 17546->17547 17547->17550 17551 188c9b 17548->17551 17550->17530 17550->17539 17552 188ca7 std::_Locinfo::_Locinfo_ctor 17551->17552 17553 188ce6 17552->17553 17555 188dff 17552->17555 17553->17550 17567 18e940 17555->17567 17557 188e15 17580 18e8af 17557->17580 17558 188e0f 17558->17557 17559 188e47 17558->17559 17561 18e940 RtlAllocateHeap 17558->17561 17559->17557 17562 18e940 RtlAllocateHeap 17559->17562 17563 188e3e 17561->17563 17564 188e53 FindCloseChangeNotification 17562->17564 17565 18e940 RtlAllocateHeap 17563->17565 17564->17557 17565->17559 17566 188e6d 17566->17553 17568 18e94d 17567->17568 17570 18e962 17567->17570 17586 1816ec 17568->17586 17571 1816ec RtlAllocateHeap 17570->17571 17573 18e987 17570->17573 17574 18e992 17571->17574 17573->17558 17577 1816ff __floor_pentium4 RtlAllocateHeap 17574->17577 17575 1816ff __floor_pentium4 RtlAllocateHeap 17576 18e95a 17575->17576 17576->17558 17578 18e99a 17577->17578 17579 178c60 ___std_exception_copy RtlAllocateHeap 17578->17579 17579->17576 17581 18e8be 17580->17581 17582 1816ff __floor_pentium4 RtlAllocateHeap 17581->17582 17585 18e8e8 17581->17585 17583 18e92a 17582->17583 17584 1816ec RtlAllocateHeap 17583->17584 17584->17585 17585->17566 17587 189f93 __floor_pentium4 RtlAllocateHeap 17586->17587 17588 1816f1 17587->17588 17588->17575 17590 158034 17589->17590 17591 157f1d 17589->17591 17600 142cf0 std::_Throw_Cpp_error 2 API calls 17590->17600 17602 157f29 17590->17602 17592 157f24 17591->17592 17593 157fcb 17591->17593 17594 157f83 17591->17594 17595 157f7c 17591->17595 17596 157f2b 17591->17596 17664 15c3a0 17592->17664 17593->16455 17597 173672 std::_Facet_Register 2 API calls 17594->17597 17669 15cf80 17595->17669 17599 173672 std::_Facet_Register 2 API calls 17596->17599 17597->17602 17599->17602 17603 15804f 17600->17603 17602->16455 17674 147f90 17603->17674 17605 158062 std::_Throw_Cpp_error 17607 16215f 17606->17607 17731 18133b 17607->17731 17611 15b4f0 17612 15db10 17611->17612 17613 15db56 17612->17613 17614 15de3d 17612->17614 17783 15ebb0 17613->17783 17616 15fd70 2 API calls 17614->17616 17618 15de87 17616->17618 17617 15dba4 17620 15fd70 2 API calls 17617->17620 17619 15eda0 3 API calls 17618->17619 17661 15df4f std::ios_base::_Ios_base_dtor 17618->17661 17621 15dee2 17619->17621 17622 15dbc1 17620->17622 17625 1475c0 2 API calls 17621->17625 17663 15dcc3 std::ios_base::_Ios_base_dtor 17622->17663 17789 15eda0 17622->17789 17623 157ef0 2 API calls 17626 15dfc7 17623->17626 17624 15de38 std::ios_base::_Ios_base_dtor 17624->16459 17627 15df06 17625->17627 17626->17624 17631 178c70 std::_Throw_Cpp_error RtlAllocateHeap 17626->17631 17632 15f440 3 API calls 17627->17632 17629 15dd82 17634 15dd9f 17629->17634 17639 157ef0 2 API calls 17629->17639 17630 15dcec 17635 157ef0 2 API calls 17630->17635 17637 15e06f 17631->17637 17646 15df1f 17632->17646 17633 15dc1c 17836 1475c0 17633->17836 17645 1535b0 RtlAllocateHeap 17634->17645 17636 15dd01 17635->17636 17880 1535b0 17636->17880 17885 1590b0 17637->17885 17639->17634 17641 15e093 17644 1590b0 2 API calls 17641->17644 17642 15dc40 17866 15f440 17642->17866 17652 15e0a1 std::_Throw_Cpp_error 17644->17652 17648 15dd6c 17645->17648 17646->17641 17650 147a20 RtlAllocateHeap 17646->17650 17647 15dc56 17647->17637 17651 15dc6b 17647->17651 17656 1535b0 RtlAllocateHeap 17648->17656 17649 15e07d std::_Throw_Cpp_error 17653 178c70 std::_Throw_Cpp_error RtlAllocateHeap 17649->17653 17650->17661 17875 147a20 17651->17875 17654 178c70 std::_Throw_Cpp_error RtlAllocateHeap 17652->17654 17653->17641 17658 15e0b7 17654->17658 17659 15de26 17656->17659 17660 1535b0 RtlAllocateHeap 17659->17660 17660->17624 17661->17623 17661->17626 17661->17652 17662 15dc86 17662->17649 17662->17663 17663->17629 17663->17630 17665 173672 std::_Facet_Register 2 API calls 17664->17665 17666 15c3c3 17665->17666 17667 173672 std::_Facet_Register 2 API calls 17666->17667 17668 15c3ec 17667->17668 17668->17602 17670 173672 std::_Facet_Register 2 API calls 17669->17670 17671 15cfb7 17670->17671 17672 143040 std::_Throw_Cpp_error 2 API calls 17671->17672 17673 15cfee 17672->17673 17673->17602 17685 147350 17674->17685 17676 148029 17703 15ad80 17676->17703 17678 14803d 17680 1480df 17678->17680 17681 148076 std::ios_base::_Ios_base_dtor 17678->17681 17683 178c70 std::_Throw_Cpp_error RtlAllocateHeap 17680->17683 17707 1472b0 17681->17707 17682 1480aa 17682->17605 17684 1480e4 17683->17684 17684->17605 17710 144d70 17685->17710 17694 158f00 std::_Throw_Cpp_error 2 API calls 17695 1473e6 17694->17695 17696 178c70 std::_Throw_Cpp_error RtlAllocateHeap 17695->17696 17698 147476 std::ios_base::_Ios_base_dtor 17695->17698 17697 1474c4 17696->17697 17699 174b78 ___std_exception_destroy RtlAllocateHeap 17697->17699 17698->17676 17700 147511 17699->17700 17701 174b78 ___std_exception_destroy RtlAllocateHeap 17700->17701 17702 147527 std::ios_base::_Ios_base_dtor 17701->17702 17702->17676 17704 15adb4 17703->17704 17705 158f00 std::_Throw_Cpp_error 2 API calls 17704->17705 17706 15adbf 17705->17706 17706->17678 17708 174b15 ___std_exception_copy 2 API calls 17707->17708 17709 14731a 17708->17709 17709->17682 17711 144da6 17710->17711 17712 144dd8 17711->17712 17713 143040 std::_Throw_Cpp_error 2 API calls 17711->17713 17714 15ac50 17712->17714 17713->17712 17716 15ac81 17714->17716 17715 15acd3 17716->17715 17717 15e8a0 2 API calls 17716->17717 17718 1473af 17717->17718 17719 15abb0 17718->17719 17720 15abe1 17719->17720 17720->17720 17721 158f00 std::_Throw_Cpp_error 2 API calls 17720->17721 17722 1473c2 17721->17722 17723 15ae20 17722->17723 17726 15e710 17723->17726 17725 1473d1 17725->17694 17727 15e753 17726->17727 17728 1432d0 std::_Throw_Cpp_error 2 API calls 17727->17728 17729 15e758 std::_Locinfo::_Locinfo_ctor 17727->17729 17730 15e843 std::_Locinfo::_Locinfo_ctor 17728->17730 17729->17725 17730->17725 17732 189e42 __Getctype RtlAllocateHeap 17731->17732 17733 181346 17732->17733 17734 18a12d __Getctype RtlAllocateHeap 17733->17734 17735 16225f 17734->17735 17736 15fd70 17735->17736 17739 15fde4 17736->17739 17740 15fd84 17736->17740 17738 15ff6c 17738->17611 17745 15fe74 17739->17745 17772 1601e0 17739->17772 17743 15fdc2 17740->17743 17750 169e20 17740->17750 17743->17739 17744 169e20 2 API calls 17743->17744 17747 15fe58 17743->17747 17744->17747 17745->17611 17746 15fecc 17746->17738 17749 169e20 2 API calls 17746->17749 17776 1608f0 17746->17776 17747->17745 17768 161430 17747->17768 17749->17746 17751 169f76 17750->17751 17752 169e62 17750->17752 17754 143330 2 API calls 17751->17754 17753 169e7c 17752->17753 17755 169eca 17752->17755 17756 169eba 17752->17756 17758 173672 std::_Facet_Register 2 API calls 17753->17758 17757 169f7b 17754->17757 17761 173672 std::_Facet_Register 2 API calls 17755->17761 17765 169e9a std::_Locinfo::_Locinfo_ctor 17755->17765 17756->17753 17756->17757 17759 142b50 Concurrency::cancel_current_task 2 API calls 17757->17759 17760 169e8f 17758->17760 17762 169f80 17759->17762 17760->17762 17760->17765 17761->17765 17763 178c70 std::_Throw_Cpp_error RtlAllocateHeap 17762->17763 17764 169f85 17763->17764 17766 1677d0 RtlAllocateHeap 17765->17766 17767 169f47 17766->17767 17767->17743 17769 161443 17768->17769 17770 161471 17769->17770 17771 169e20 2 API calls 17769->17771 17770->17739 17771->17770 17773 1601f0 17772->17773 17774 169e20 2 API calls 17773->17774 17775 160260 17773->17775 17774->17773 17775->17746 17777 161430 2 API calls 17776->17777 17780 1608fc 17777->17780 17778 16090a 17778->17746 17779 169e20 RtlAllocateHeap RtlAllocateHeap 17782 160995 17779->17782 17780->17778 17781 169e20 2 API calls 17780->17781 17780->17782 17781->17780 17782->17778 17782->17779 17784 15ec6d 17783->17784 17785 157ef0 2 API calls 17784->17785 17786 15ec8d 17785->17786 17888 1616c0 17786->17888 17788 15ecdf 17788->17617 17790 15ee46 17789->17790 17813 15ef1f std::ios_base::_Ios_base_dtor 17789->17813 17791 15f425 17790->17791 17794 15e8a0 2 API calls 17790->17794 17796 178c70 std::_Throw_Cpp_error RtlAllocateHeap 17791->17796 17792 158f00 std::_Throw_Cpp_error 2 API calls 17793 15ef5b 17792->17793 17795 15ef6a 17793->17795 17803 15f191 17793->17803 17797 15ee79 17794->17797 17798 15f440 3 API calls 17795->17798 17799 15f42f 17796->17799 17800 158f00 std::_Throw_Cpp_error 2 API calls 17797->17800 17801 15ef79 17798->17801 17804 178c70 std::_Throw_Cpp_error RtlAllocateHeap 17799->17804 17802 15ee93 17800->17802 17808 143040 std::_Throw_Cpp_error 2 API calls 17801->17808 17805 158f00 std::_Throw_Cpp_error 2 API calls 17802->17805 17803->17803 17809 143040 std::_Throw_Cpp_error 2 API calls 17803->17809 17806 15f434 17804->17806 17807 15eee3 17805->17807 17810 178c70 std::_Throw_Cpp_error RtlAllocateHeap 17806->17810 17807->17791 17807->17813 17811 15efba 17808->17811 17812 15f1c9 17809->17812 17834 15f375 std::ios_base::_Ios_base_dtor 17810->17834 17814 158f00 std::_Throw_Cpp_error 2 API calls 17811->17814 17815 15fbf0 2 API calls 17812->17815 17813->17792 17817 15efcd 17814->17817 17818 15f1e0 17815->17818 17816 178c70 std::_Throw_Cpp_error RtlAllocateHeap 17819 15f43e 17816->17819 17820 15e710 2 API calls 17817->17820 17821 158f00 std::_Throw_Cpp_error 2 API calls 17818->17821 17822 15f019 17820->17822 17826 15f22f std::ios_base::_Ios_base_dtor 17821->17826 17823 158f00 std::_Throw_Cpp_error 2 API calls 17822->17823 17824 15f032 17823->17824 17825 158f00 std::_Throw_Cpp_error 2 API calls 17824->17825 17829 15f081 std::ios_base::_Ios_base_dtor 17825->17829 17826->17806 17830 15f161 std::ios_base::_Ios_base_dtor 17826->17830 17827 143040 std::_Throw_Cpp_error 2 API calls 17828 15f30c 17827->17828 17831 15fbf0 2 API calls 17828->17831 17829->17799 17829->17830 17830->17827 17835 15f3f2 std::ios_base::_Ios_base_dtor 17830->17835 17832 15f323 17831->17832 17833 158f00 std::_Throw_Cpp_error 2 API calls 17832->17833 17833->17834 17834->17816 17834->17835 17835->17633 17957 144e30 17836->17957 17839 144e30 2 API calls 17840 14762b 17839->17840 17841 15ace0 2 API calls 17840->17841 17842 147640 17841->17842 17843 15abb0 2 API calls 17842->17843 17844 147656 17843->17844 17845 15e710 2 API calls 17844->17845 17847 14766d std::ios_base::_Ios_base_dtor 17845->17847 17846 147a09 17848 178c70 std::_Throw_Cpp_error RtlAllocateHeap 17846->17848 17847->17846 17849 14770a std::ios_base::_Ios_base_dtor 17847->17849 17850 147a0e 17848->17850 17853 147350 2 API calls 17849->17853 17851 178c70 std::_Throw_Cpp_error RtlAllocateHeap 17850->17851 17852 147a13 17851->17852 17854 1477a4 17853->17854 17855 158f00 std::_Throw_Cpp_error 2 API calls 17854->17855 17856 1477b9 17855->17856 17857 15e710 2 API calls 17856->17857 17858 14780c 17857->17858 17859 158f00 std::_Throw_Cpp_error 2 API calls 17858->17859 17860 147828 17859->17860 17861 15ad80 2 API calls 17860->17861 17863 147879 std::ios_base::_Ios_base_dtor 17861->17863 17862 147975 std::ios_base::_Ios_base_dtor 17864 1472b0 2 API calls 17862->17864 17863->17850 17863->17862 17865 1479ca 17864->17865 17865->17642 17867 15f630 17866->17867 17873 15f4c9 std::ios_base::_Ios_base_dtor std::_Locinfo::_Locinfo_ctor 17866->17873 17867->17647 17869 15f647 17872 178c70 std::_Throw_Cpp_error RtlAllocateHeap 17869->17872 17870 1432d0 std::_Throw_Cpp_error 2 API calls 17870->17873 17871 158f00 std::_Throw_Cpp_error 2 API calls 17871->17873 17874 15f651 17872->17874 17873->17867 17873->17869 17873->17870 17873->17871 17961 1434a0 17873->17961 17874->17647 17876 174b78 ___std_exception_destroy RtlAllocateHeap 17875->17876 17877 147a61 17876->17877 17878 174b78 ___std_exception_destroy RtlAllocateHeap 17877->17878 17879 147a77 17878->17879 17879->17662 17881 1535f1 std::ios_base::_Ios_base_dtor 17880->17881 17882 1535d1 17880->17882 17881->17648 17882->17881 17883 178c70 std::_Throw_Cpp_error RtlAllocateHeap 17882->17883 17884 153625 17883->17884 17884->17648 17968 156590 17885->17968 17891 1617d0 17888->17891 17890 1616da std::locale::_Setgloballocale 17890->17788 17892 161809 17891->17892 17898 161838 17891->17898 17893 161923 17892->17893 17896 16181b 17892->17896 17908 161990 17893->17908 17896->17898 17899 169f90 17896->17899 17898->17890 17900 169fc2 17899->17900 17901 16a0a3 17899->17901 17918 16d190 17900->17918 17902 143330 2 API calls 17901->17902 17906 16a000 std::_Locinfo::_Locinfo_ctor 17902->17906 17904 178c70 std::_Throw_Cpp_error RtlAllocateHeap 17905 16a0ad 17904->17905 17906->17904 17907 16a05f std::ios_base::_Ios_base_dtor 17906->17907 17907->17898 17909 171cea 2 API calls 17908->17909 17911 16199a 17909->17911 17910 161928 17911->17910 17912 142cf0 std::_Throw_Cpp_error 2 API calls 17911->17912 17913 161a03 17912->17913 17914 15ace0 2 API calls 17913->17914 17915 161a18 17914->17915 17926 147cf0 17915->17926 17917 161a2d std::_Throw_Cpp_error 17919 16d1d9 17918->17919 17920 16d199 17918->17920 17919->17919 17920->17919 17921 16d1b0 17920->17921 17923 173672 std::_Facet_Register 2 API calls 17920->17923 17922 16d1b9 17921->17922 17924 173672 std::_Facet_Register 2 API calls 17921->17924 17922->17906 17923->17921 17925 16d1d2 17924->17925 17925->17906 17927 147350 2 API calls 17926->17927 17928 147d80 17927->17928 17929 15ad80 2 API calls 17928->17929 17930 147d94 17929->17930 17931 147dcd std::ios_base::_Ios_base_dtor 17930->17931 17933 147e33 17930->17933 17932 1472b0 2 API calls 17931->17932 17934 147dfd 17932->17934 17935 178c70 std::_Throw_Cpp_error RtlAllocateHeap 17933->17935 17934->17917 17936 147e38 17935->17936 17937 147350 2 API calls 17936->17937 17938 147ece 17937->17938 17939 15ad80 2 API calls 17938->17939 17940 147ee2 17939->17940 17941 147f1b std::ios_base::_Ios_base_dtor 17940->17941 17943 147f81 17940->17943 17942 1472b0 2 API calls 17941->17942 17944 147f4b 17942->17944 17945 178c70 std::_Throw_Cpp_error RtlAllocateHeap 17943->17945 17944->17917 17946 147f86 17945->17946 17947 147350 2 API calls 17946->17947 17948 148029 17947->17948 17949 15ad80 2 API calls 17948->17949 17950 14803d 17949->17950 17952 1480df 17950->17952 17953 148076 std::ios_base::_Ios_base_dtor 17950->17953 17951 1472b0 2 API calls 17954 1480aa 17951->17954 17955 178c70 std::_Throw_Cpp_error RtlAllocateHeap 17952->17955 17953->17951 17954->17917 17956 1480e4 17955->17956 17956->17917 17958 144e66 17957->17958 17958->17958 17959 144ea8 17958->17959 17960 143040 std::_Throw_Cpp_error 2 API calls 17958->17960 17959->17839 17960->17959 17964 143380 17961->17964 17965 143399 17964->17965 17966 180dd7 2 API calls 17965->17966 17967 1433a7 17966->17967 17967->17873 17969 174b15 ___std_exception_copy 2 API calls 17968->17969 17970 1565ce 17969->17970 17971 174b15 ___std_exception_copy 2 API calls 17970->17971 17972 156601 17971->17972 17972->17649 17974 198e17 17973->17974 17978 198c08 17973->17978 17974->16462 17976 198d38 std::locale::_Setgloballocale 17976->17974 17977 143130 2 API calls 17976->17977 17977->17976 17978->17976 17980 1787b0 17978->17980 17989 143130 17978->17989 17981 1787e3 17980->17981 17986 1787c7 17980->17986 17982 189e42 __Getctype RtlAllocateHeap 17981->17982 17983 1787e8 17982->17983 17984 18a12d __Getctype RtlAllocateHeap 17983->17984 17985 1787f8 17984->17985 17985->17986 17987 189a39 2 API calls 17985->17987 17986->17978 17988 17882a 17987->17988 17988->17978 17990 1432b3 17989->17990 17991 14316f 17989->17991 17992 143330 2 API calls 17990->17992 17993 143189 17991->17993 17995 1431d7 17991->17995 17996 1431c7 17991->17996 17994 1432b8 17992->17994 17998 173672 std::_Facet_Register 2 API calls 17993->17998 17997 142b50 Concurrency::cancel_current_task 2 API calls 17994->17997 17999 173672 std::_Facet_Register 2 API calls 17995->17999 18002 14319c std::_Locinfo::_Locinfo_ctor 17995->18002 17996->17993 17996->17994 17997->18002 17998->18002 17999->18002 18000 178c70 std::_Throw_Cpp_error RtlAllocateHeap 18001 1432c2 18000->18001 18002->18000 18003 14326b std::ios_base::_Ios_base_dtor 18002->18003 18003->17978 18005 17364d GetSystemTimePreciseAsFileTime 18004->18005 18006 173077 18004->18006 18005->18006 18006->16121 18524 1647b0 18525 1648ed 18524->18525 18527 1647ed 18524->18527 18526 143330 2 API calls 18525->18526 18528 1648f2 18526->18528 18531 164a30 2 API calls 18527->18531 18529 164a23 18528->18529 18530 16493d 18528->18530 18532 143330 2 API calls 18529->18532 18534 164a30 2 API calls 18530->18534 18537 164827 18531->18537 18533 164a28 18532->18533 18535 164977 18534->18535 18543 153d50 18535->18543 18538 15e1e0 RtlAllocateHeap 18537->18538 18539 1648b4 18538->18539 18540 16499f 18541 15e1e0 RtlAllocateHeap 18540->18541 18542 1649ea 18541->18542 18544 153d8f 18543->18544 18545 153df7 std::_Locinfo::_Locinfo_ctor 18543->18545 18544->18545 18546 153d96 18544->18546 18547 153f7d 18544->18547 18548 153f1e 18544->18548 18549 153e69 18544->18549 18545->18540 18551 173672 std::_Facet_Register 2 API calls 18546->18551 18552 173672 std::_Facet_Register 2 API calls 18547->18552 18615 157e80 18548->18615 18550 173672 std::_Facet_Register 2 API calls 18549->18550 18554 153e73 18550->18554 18555 153da0 18551->18555 18556 153f8a 18552->18556 18554->18545 18576 16bf30 18554->18576 18557 173672 std::_Facet_Register 2 API calls 18555->18557 18556->18545 18560 153fd3 18556->18560 18561 15408e 18556->18561 18559 153dd2 18557->18559 18603 16f460 18559->18603 18564 154004 18560->18564 18565 153fdb 18560->18565 18563 143330 2 API calls 18561->18563 18566 154093 18563->18566 18568 173672 std::_Facet_Register 2 API calls 18564->18568 18565->18566 18567 153fe6 18565->18567 18569 142b50 Concurrency::cancel_current_task 2 API calls 18566->18569 18570 173672 std::_Facet_Register 2 API calls 18567->18570 18568->18545 18572 153fec 18569->18572 18570->18572 18571 153d50 6 API calls 18573 153eb1 18571->18573 18572->18545 18574 178c70 std::_Throw_Cpp_error RtlAllocateHeap 18572->18574 18573->18545 18573->18571 18575 15409d 18574->18575 18577 16bf42 18576->18577 18578 16bfab 18576->18578 18579 16bf7c 18577->18579 18580 16bf4d 18577->18580 18581 143330 2 API calls 18578->18581 18584 16bf99 18579->18584 18586 173672 std::_Facet_Register 2 API calls 18579->18586 18582 16bf54 18580->18582 18583 16bfb0 18580->18583 18581->18583 18585 173672 std::_Facet_Register 2 API calls 18582->18585 18587 142b50 Concurrency::cancel_current_task 2 API calls 18583->18587 18584->18573 18588 16bf5a 18585->18588 18589 16bf86 18586->18589 18587->18588 18590 178c70 std::_Throw_Cpp_error RtlAllocateHeap 18588->18590 18591 16bf63 18588->18591 18589->18573 18592 16bfba 18590->18592 18591->18573 18593 16c077 18592->18593 18594 16c00c 18592->18594 18597 16c013 std::_Locinfo::_Locinfo_ctor 18592->18597 18596 143330 2 API calls 18593->18596 18620 15fab0 18594->18620 18598 16c07c 18596->18598 18597->18573 18599 173672 std::_Facet_Register 2 API calls 18598->18599 18600 16c0ae 18599->18600 18601 143040 std::_Throw_Cpp_error 2 API calls 18600->18601 18602 16c0f2 18601->18602 18602->18573 18604 16f53f 18603->18604 18605 16f498 18603->18605 18604->18545 18606 173672 std::_Facet_Register 2 API calls 18605->18606 18607 16f4ba 18606->18607 18608 1563b0 std::_Throw_Cpp_error 2 API calls 18607->18608 18609 16f4d0 18608->18609 18610 153d50 6 API calls 18609->18610 18611 16f4e0 18610->18611 18612 16f460 6 API calls 18611->18612 18613 16f531 18612->18613 18614 16f460 6 API calls 18613->18614 18614->18604 18616 173672 std::_Facet_Register 2 API calls 18615->18616 18617 157ea6 18616->18617 18618 1563b0 std::_Throw_Cpp_error 2 API calls 18617->18618 18619 157ec5 18618->18619 18619->18545 18621 15fac2 18620->18621 18622 15fb2b 18620->18622 18624 15facd 18621->18624 18625 15fafc 18621->18625 18623 142b50 Concurrency::cancel_current_task 2 API calls 18622->18623 18627 15fada 18623->18627 18624->18622 18628 15fad4 18624->18628 18626 15fb19 18625->18626 18629 173672 std::_Facet_Register 2 API calls 18625->18629 18626->18597 18630 178c70 std::_Throw_Cpp_error RtlAllocateHeap 18627->18630 18633 15fae3 18627->18633 18631 173672 std::_Facet_Register 2 API calls 18628->18631 18632 15fb06 18629->18632 18634 15fb35 18630->18634 18631->18627 18632->18597 18633->18597 18635 15fb5b std::locale::_Setgloballocale 18634->18635 18638 169c70 18634->18638 18635->18597 18637 15fb7f 18637->18597 18639 169dc4 18638->18639 18644 169ca2 18638->18644 18640 143330 2 API calls 18639->18640 18653 169d04 std::_Locinfo::_Locinfo_ctor 18640->18653 18641 169dbf 18642 142b50 Concurrency::cancel_current_task 2 API calls 18641->18642 18642->18639 18643 178c70 std::_Throw_Cpp_error RtlAllocateHeap 18645 169dce 18643->18645 18644->18641 18646 169cf3 18644->18646 18647 169d1d 18644->18647 18655 159950 18645->18655 18646->18641 18649 169cfe 18646->18649 18652 173672 std::_Facet_Register 2 API calls 18647->18652 18647->18653 18651 173672 std::_Facet_Register 2 API calls 18649->18651 18650 169dd9 std::_Throw_Cpp_error 18651->18653 18652->18653 18653->18643 18654 169d8f std::ios_base::_Ios_base_dtor 18653->18654 18654->18637 18656 159968 18655->18656 18657 159978 std::ios_base::_Ios_base_dtor 18655->18657 18656->18657 18658 178c70 std::_Throw_Cpp_error RtlAllocateHeap 18656->18658 18657->18650 18659 15998d 18658->18659 18660 159a4f 18659->18660 18667 172b74 18659->18667 18660->18650 18666 159a04 18666->18650 18668 172af7 18667->18668 18669 1599cc 18668->18669 18689 179815 18668->18689 18669->18660 18675 1583b0 18669->18675 18671 172b43 18671->18669 18703 17d5f6 18671->18703 18674 17d0a8 5 API calls 18674->18669 18676 158463 18675->18676 18677 15843c 18675->18677 18679 15c430 18676->18679 18729 18120a 18677->18729 18681 15c45f std::_Throw_Cpp_error std::_Lockit::~_Lockit std::_Lockit::_Lockit 18679->18681 18680 15c4f8 std::_Lockit::~_Lockit 18680->18666 18681->18680 18682 173672 std::_Facet_Register 2 API calls 18681->18682 18683 15c506 18682->18683 18684 144040 std::_Throw_Cpp_error 3 API calls 18683->18684 18685 15c536 18684->18685 18686 144100 std::_Throw_Cpp_error 2 API calls 18685->18686 18687 15c592 18686->18687 18688 1726f7 std::_Facet_Register 2 API calls 18687->18688 18688->18680 18690 17975e std::_Locinfo::_Locinfo_ctor 18689->18690 18691 179771 18690->18691 18693 179791 18690->18693 18692 1816ff __floor_pentium4 RtlAllocateHeap 18691->18692 18694 179776 18692->18694 18696 179796 18693->18696 18697 1797a3 18693->18697 18695 178c60 ___std_exception_copy RtlAllocateHeap 18694->18695 18702 179781 18695->18702 18698 1816ff __floor_pentium4 RtlAllocateHeap 18696->18698 18699 18a8ef RtlAllocateHeap 18697->18699 18698->18702 18700 1797ac 18699->18700 18701 1816ff __floor_pentium4 RtlAllocateHeap 18700->18701 18700->18702 18701->18702 18702->18671 18704 17d609 ___std_exception_copy 18703->18704 18709 17d34d 18704->18709 18706 17d61e 18707 17899c ___std_exception_copy RtlAllocateHeap 18706->18707 18708 172b5e 18707->18708 18708->18669 18708->18674 18711 17d359 std::_Locinfo::_Locinfo_ctor 18709->18711 18710 17d35f 18712 178be3 ___std_exception_copy RtlAllocateHeap 18710->18712 18711->18710 18713 17d3a2 18711->18713 18715 17d37a 18712->18715 18716 17d4d0 18713->18716 18715->18706 18717 17d4f6 18716->18717 18718 17d4e3 18716->18718 18725 17d3f7 18717->18725 18718->18715 18720 17d519 18721 179a91 4 API calls 18720->18721 18724 17d5a7 18720->18724 18722 17d547 18721->18722 18723 18263d 2 API calls 18722->18723 18723->18724 18724->18715 18726 17d460 18725->18726 18727 17d408 18725->18727 18726->18720 18727->18726 18728 1825fd SetFilePointerEx RtlAllocateHeap 18727->18728 18728->18726 18730 181216 18729->18730 18734 18122b 18729->18734 18731 1816ff __floor_pentium4 RtlAllocateHeap 18730->18731 18732 18121b 18731->18732 18733 178c60 ___std_exception_copy RtlAllocateHeap 18732->18733 18735 181226 18733->18735 18734->18676 18735->18676 18016 54d0aa7 18017 54d0ab1 GetCurrentHwProfileW 18016->18017 18018 54d0ab6 18016->18018 18017->18018 18488 54d0a27 18489 54d0a0f GetCurrentHwProfileW 18488->18489 18491 54d0ab6 18489->18491

                                  Control-flow Graph

                                  APIs
                                  • setsockopt.WS2_32(00000338,0000FFFF,00001006,?,00000008), ref: 00207BA7
                                  • recv.WS2_32(?,00000004,00000002), ref: 00207BC1
                                  • recv.WS2_32(00000000,0000000C,00000002,00000000), ref: 00207C43
                                  • recv.WS2_32(00000000,0000000C,00000008), ref: 00207C64
                                    • Part of subcall function 00208590: WSAStartup.WS2_32 ref: 002085BB
                                    • Part of subcall function 00208590: socket.WS2_32(?,?,?,?,?,?,002C9328,?,?), ref: 0020865E
                                    • Part of subcall function 00208590: connect.WS2_32(00000000,00299BFC,?,?,?,?,002C9328,?,?), ref: 00208672
                                    • Part of subcall function 00208590: closesocket.WS2_32(00000000), ref: 0020867D
                                  • recv.WS2_32(00000000,?,00000008), ref: 00207D1B
                                  • recv.WS2_32(?,00000004,00000008), ref: 00207E23
                                  • __Xtime_get_ticks.LIBCPMT ref: 00207E2A
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00207E38
                                  • Sleep.KERNELBASE(00000001,00000000,?,00002710,00000000), ref: 00207EB1
                                  • Sleep.KERNELBASE(00000064,?,00002710,00000000), ref: 00207EB9
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3353733620.0000000000141000.00000040.00000001.01000000.00000005.sdmp, Offset: 00140000, based on PE: true
                                  • Associated: 00000006.00000002.3353387813.0000000000140000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3353733620.00000000002C5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3355120428.00000000002CA000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.00000000002CD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000044F000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000052C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000056B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.0000000000572000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.0000000000581000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3362966805.0000000000582000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3364367854.000000000071B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3364488303.000000000071D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_140000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: recv$Sleep$StartupUnothrow_t@std@@@Xtime_get_ticks__ehfuncinfo$??2@closesocketconnectsetsockoptsocket
                                  • String ID:
                                  • API String ID: 56803616-0
                                  • Opcode ID: 759dcae5a4d2076922d07ca199f8105081644d64df61292e608efcf314d5e253
                                  • Instruction ID: 292cab343ffb5cd66b6ef10ff6928837bc6a42c85d52263d5fbf5d81698e2e7c
                                  • Opcode Fuzzy Hash: 759dcae5a4d2076922d07ca199f8105081644d64df61292e608efcf314d5e253
                                  • Instruction Fuzzy Hash: 54B1ABB0D14348DBEB10DFA8DC89BADBBB1BF44304F204259E454AB2E2D7B06D94CB91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 58 208590-2085c2 WSAStartup 59 208696-20869f 58->59 60 2085c8-2085f2 call 22a420 * 2 58->60 65 2085f4-2085f8 60->65 66 2085fe-208644 60->66 65->59 65->66 68 208690 66->68 69 208646-20864c 66->69 68->59 70 2086a4-2086ae 69->70 71 20864e 69->71 70->68 75 2086b0-2086b8 70->75 72 208654-208668 socket 71->72 72->68 74 20866a-20867a connect 72->74 76 2086a0 74->76 77 20867c-208684 closesocket 74->77 76->70 77->72 78 208686-20868a 77->78 78->68
                                  APIs
                                  • WSAStartup.WS2_32 ref: 002085BB
                                  • socket.WS2_32(?,?,?,?,?,?,002C9328,?,?), ref: 0020865E
                                  • connect.WS2_32(00000000,00299BFC,?,?,?,?,002C9328,?,?), ref: 00208672
                                  • closesocket.WS2_32(00000000), ref: 0020867D
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3353733620.0000000000141000.00000040.00000001.01000000.00000005.sdmp, Offset: 00140000, based on PE: true
                                  • Associated: 00000006.00000002.3353387813.0000000000140000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3353733620.00000000002C5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3355120428.00000000002CA000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.00000000002CD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000044F000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000052C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000056B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.0000000000572000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.0000000000581000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3362966805.0000000000582000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3364367854.000000000071B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3364488303.000000000071D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_140000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: Startupclosesocketconnectsocket
                                  • String ID:
                                  • API String ID: 3098855095-0
                                  • Opcode ID: be8b15bfb22c6d0f9d0b6d2535469edd3fe2db6a5cf10008bd9f4572d8e9e728
                                  • Instruction ID: cfa8d782611f4cc4ae631df03062e45310ac79173d778f68d1cc4bd29bbaf59c
                                  • Opcode Fuzzy Hash: be8b15bfb22c6d0f9d0b6d2535469edd3fe2db6a5cf10008bd9f4572d8e9e728
                                  • Instruction Fuzzy Hash: 793104725107016BC7209F248C49A2BB7E8FFC9334F025F19FAE8922D1EB719C548B96

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 79 149280-1492dd call 1563b0 82 149413-149521 call 142df0 call 22a420 79->82 83 1492e3-1492e9 79->83 99 149537-14953f call 158dc0 82->99 100 149523-149535 82->100 84 1492f0-149313 83->84 87 149324-149331 84->87 88 149315-14931f 84->88 91 149342-14934f 87->91 92 149333-14933d 87->92 90 149403-149406 88->90 94 149409-14940d 90->94 95 149360-14936d 91->95 96 149351-14935b 91->96 92->90 94->82 94->84 97 14937e-14938b 95->97 98 14936f-149379 95->98 96->90 101 14938d-149397 97->101 102 149399-1493a6 97->102 98->90 103 149544-149597 call 22a420 * 2 99->103 100->103 101->90 105 1493b4-1493c1 102->105 106 1493a8-1493b2 102->106 116 149599-1495c8 call 22a420 call 175270 103->116 117 1495cb-1495e1 call 22a420 103->117 108 1493c3-1493cd 105->108 109 1493cf-1493dc 105->109 106->90 108->90 111 1493de-1493e8 109->111 112 1493ea-1493f4 109->112 111->90 112->94 115 1493f6-1493ff 112->115 115->90 116->117 122 1495e7-1495ed 117->122 123 1496e2 117->123 125 1495f0-1496ce WSASend 122->125 126 1496e6-1496f0 123->126 145 1496d4-1496dc 125->145 146 14975f-149763 125->146 128 1496f2-1496fe 126->128 129 14971e-14973d 126->129 133 149714-14971b call 1738f3 128->133 134 149700-14970e 128->134 130 14976f-149796 129->130 131 14973f-14974b 129->131 135 149765-14976c call 1738f3 131->135 136 14974d-14975b 131->136 133->129 134->133 137 149797-1497fe call 178c70 call 142df0 * 2 134->137 135->130 136->137 140 14975d 136->140 140->135 145->123 145->125 146->126
                                  APIs
                                  • WSASend.WS2_32(?,?,00000001,00000000,00000000,00000000,00000000,?,?,?,?,0028D15C,00000000,761B23A0,-002C9880), ref: 001496C9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3353733620.0000000000141000.00000040.00000001.01000000.00000005.sdmp, Offset: 00140000, based on PE: true
                                  • Associated: 00000006.00000002.3353387813.0000000000140000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3353733620.00000000002C5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3355120428.00000000002CA000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.00000000002CD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000044F000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000052C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000056B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.0000000000572000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.0000000000581000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3362966805.0000000000582000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3364367854.000000000071B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3364488303.000000000071D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_140000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: Send
                                  • String ID: Ws2_32.dll
                                  • API String ID: 121738739-3093949381
                                  • Opcode ID: edff7f6ce6f2e22a4a0baf01060cfd03c64880b1dae595c9f0b88ff3ed392cd8
                                  • Instruction ID: ba1ebaf09396a1451581948f42f75e42670bfc440dc455e77178653d8d1faa15
                                  • Opcode Fuzzy Hash: edff7f6ce6f2e22a4a0baf01060cfd03c64880b1dae595c9f0b88ff3ed392cd8
                                  • Instruction Fuzzy Hash: DF02DEB0D14298DFDF25CFA4C8907ADBBB0FF55314F244289E4896B686D7B01986CF92

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 152 189789-1897ab 153 18999e 152->153 154 1897b1-1897b3 152->154 157 1899a0-1899a4 153->157 155 1897df-189802 154->155 156 1897b5-1897d4 call 178be3 154->156 159 189808-18980e 155->159 160 189804-189806 155->160 163 1897d7-1897da 156->163 159->156 162 189810-189821 159->162 160->159 160->162 164 189823-189831 call 18263d 162->164 165 189834-189844 call 1892ce 162->165 163->157 164->165 170 18988d-18989f 165->170 171 189846-18984c 165->171 174 1898a1-1898a7 170->174 175 1898f6-189916 WriteFile 170->175 172 18984e-189851 171->172 173 189875-18988b call 188e9f 171->173 176 18985c-18986b call 189266 172->176 177 189853-189856 172->177 197 18986e-189870 173->197 181 1898a9-1898ac 174->181 182 1898e2-1898f4 call 18934b 174->182 179 189918-18991e 175->179 180 189921 175->180 176->197 177->176 185 189936-189939 177->185 179->180 189 189924-18992f 180->189 183 1898ce-1898e0 call 18950f 181->183 184 1898ae-1898b1 181->184 203 1898c9-1898cc 182->203 183->203 192 18993c-18993e 184->192 193 1898b7-1898c4 call 189426 184->193 185->192 190 189999-18999c 189->190 191 189931-189934 189->191 190->157 191->185 200 18996c-189978 192->200 201 189940-189945 192->201 193->203 197->189 206 18997a-189980 200->206 207 189982-189994 200->207 204 18995e-189967 call 1816c8 201->204 205 189947-189959 201->205 203->197 204->163 205->163 206->153 206->207 207->163
                                  APIs
                                  • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0018990E
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3353733620.0000000000141000.00000040.00000001.01000000.00000005.sdmp, Offset: 00140000, based on PE: true
                                  • Associated: 00000006.00000002.3353387813.0000000000140000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3353733620.00000000002C5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3355120428.00000000002CA000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.00000000002CD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000044F000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000052C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000056B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.0000000000572000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.0000000000581000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3362966805.0000000000582000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3364367854.000000000071B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3364488303.000000000071D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_140000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: FileWrite
                                  • String ID:
                                  • API String ID: 3934441357-0
                                  • Opcode ID: 48b19d62dacf7455705ff915f5c891e6999cdb04cd0a54aeb85161c8d073c13e
                                  • Instruction ID: 8ef41b7bf968209073ce5ad0684c65d3ecbb6df1f165b7c93cdf7d229e14df37
                                  • Opcode Fuzzy Hash: 48b19d62dacf7455705ff915f5c891e6999cdb04cd0a54aeb85161c8d073c13e
                                  • Instruction Fuzzy Hash: C5619371D0411AAFDF15AFA8CC44AFE7BB9AF5A308F180149E904A7256D731DB11CFA0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 210 54d09d6-54d09dd 211 54d09df-54d09e0 210->211 212 54d09a2-54d09d1 210->212 214 54d09a0 211->214 215 54d09e2-54d09e4 211->215 216 54d09e5-54d0a86 call 54d0a11 212->216 214->212 215->216 226 54d0a9e-54d0ab1 GetCurrentHwProfileW 216->226 228 54d0ab6-54d0b1a call 54d0b1b 226->228
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 054D0AB1
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3374517989.00000000054D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_54d0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 7811f990a74fb20f4dc4571e728c4f41bbcb4889ee88ea2769ed78ab1de4878a
                                  • Instruction ID: a0a906bb2e6d78e0627eef8b1e27655479858ce388cab5f4a75d40c11003c177
                                  • Opcode Fuzzy Hash: 7811f990a74fb20f4dc4571e728c4f41bbcb4889ee88ea2769ed78ab1de4878a
                                  • Instruction Fuzzy Hash: 172160E720E1256DB712C5812778AF66B1EE5E3730B348467F44EC7602F2884D474131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 234 54d099f-54d0a86 call 54d0a11 246 54d0a9e-54d0ab1 GetCurrentHwProfileW 234->246 248 54d0ab6-54d0b1a call 54d0b1b 246->248
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3374517989.00000000054D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_54d0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: d6da41a25f03db339105d052fcfba8604bb7c9838c903959b726af420e75ea0f
                                  • Instruction ID: cab73b1e4de24711a6e8dc98dc9821c7cee75dc9eacc7345ccb1cd90984427fe
                                  • Opcode Fuzzy Hash: d6da41a25f03db339105d052fcfba8604bb7c9838c903959b726af420e75ea0f
                                  • Instruction Fuzzy Hash: AE11DDEB20E1257DB611D5C56B68AF6675ED5D6730B348067F40AD7602F2884D874131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 254 54d09c1-54d0a86 call 54d0a11 265 54d0a9e-54d0ab1 GetCurrentHwProfileW 254->265 267 54d0ab6-54d0b1a call 54d0b1b 265->267
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3374517989.00000000054D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_54d0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 27d3eb9b5e0a44fc273589e3c09d35097504a341c93dd9eae485fd5e5719b822
                                  • Instruction ID: 32c253d7db2f87fc32c9fb1c724b8655bc3a9985ee0ca718bc5ffa4184f32ff4
                                  • Opcode Fuzzy Hash: 27d3eb9b5e0a44fc273589e3c09d35097504a341c93dd9eae485fd5e5719b822
                                  • Instruction Fuzzy Hash: 71113DEB20E0256DB611D5812AB8AF6A75EE5E6730B348467F40ECB602F28C498B4130

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 273 54d0a27-54d0a2e 274 54d0a0f-54d0a20 273->274 275 54d0a30 273->275 276 54d0a32-54d0a86 274->276 275->276 281 54d0a9e-54d0ab1 GetCurrentHwProfileW 276->281 283 54d0ab6-54d0b1a call 54d0b1b 281->283
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 054D0AB1
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3374517989.00000000054D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_54d0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 1b008a31367f87e2fb7128c330f18a378189ffe9ee58baec381501a8fb8f41aa
                                  • Instruction ID: a4609230596f8aaf89ef979523667f21c08571b2014b5b2ebb14851d460e8b0e
                                  • Opcode Fuzzy Hash: 1b008a31367f87e2fb7128c330f18a378189ffe9ee58baec381501a8fb8f41aa
                                  • Instruction Fuzzy Hash: 6801D8DB21E0316CA211D08516BC5FA975EE5F6730B348467F40EC7702F18C4E870171

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 289 54d0a11-54d0a86 295 54d0a9e-54d0ab1 GetCurrentHwProfileW 289->295 297 54d0ab6-54d0b1a call 54d0b1b 295->297
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 054D0AB1
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3374517989.00000000054D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_54d0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 0936c147260bf0f52a45a539fca70a776835e496a81847e1300a555b95540313
                                  • Instruction ID: 9ef074985b02d8137f6249e307ae07cdac2a4bcf3c8e7ef18323e63650ca23af
                                  • Opcode Fuzzy Hash: 0936c147260bf0f52a45a539fca70a776835e496a81847e1300a555b95540313
                                  • Instruction Fuzzy Hash: 4E01A2EB20E1216D6622C1862AB89FA979ED5E67307308067F80ECB702F18C4E875170

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 303 188dff-188e13 call 18e940 306 188e19-188e21 303->306 307 188e15-188e17 303->307 309 188e2c-188e2f 306->309 310 188e23-188e2a 306->310 308 188e67-188e87 call 18e8af 307->308 320 188e99 308->320 321 188e89-188e97 call 1816c8 308->321 311 188e4d-188e5d call 18e940 FindCloseChangeNotification 309->311 312 188e31-188e35 309->312 310->309 314 188e37-188e4b call 18e940 * 2 310->314 311->307 325 188e5f-188e65 311->325 312->311 312->314 314->307 314->311 323 188e9b-188e9e 320->323 321->323 325->308
                                  APIs
                                  • FindCloseChangeNotification.KERNELBASE(00000000,00000000,?,?,00188CE6,00000000,?,002BA178,0000000C,00188DA2,?,?,?), ref: 00188E55
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3353733620.0000000000141000.00000040.00000001.01000000.00000005.sdmp, Offset: 00140000, based on PE: true
                                  • Associated: 00000006.00000002.3353387813.0000000000140000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3353733620.00000000002C5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3355120428.00000000002CA000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.00000000002CD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000044F000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000052C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000056B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.0000000000572000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.0000000000581000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3362966805.0000000000582000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3364367854.000000000071B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3364488303.000000000071D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_140000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: ChangeCloseFindNotification
                                  • String ID:
                                  • API String ID: 2591292051-0
                                  • Opcode ID: b578bb82ec18bb05f3fdc9f21a2f4d4e5f86dba2f0d451479f785dbf60d1b61e
                                  • Instruction ID: 6d884c1ddc45adb95807f5769599ff53ac216ee60f4254267e3324143f8540a7
                                  • Opcode Fuzzy Hash: b578bb82ec18bb05f3fdc9f21a2f4d4e5f86dba2f0d451479f785dbf60d1b61e
                                  • Instruction Fuzzy Hash: CC114E33A051141AD62532356C89BBE27894B9373CF79065DF9188B1D3DFB18E814B55

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 329 54d0ac1-54d0ac3 330 54d0acf-54d0adf 329->330 331 54d0ac5 329->331 332 54d0ae1-54d0b1a call 54d0b1b 330->332 333 54d0a5f-54d0ab1 GetCurrentHwProfileW 331->333 334 54d0ac7-54d0acb 331->334 342 54d0ab6-54d0abb 333->342 335 54d0ace 334->335 335->332 342->335
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 054D0AB1
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3374517989.00000000054D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_54d0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 89fea3ef330d42a6952b0192a871ab8f839202d16fe04bf6ea0fe2f296b2c163
                                  • Instruction ID: 0568f970e2bbf287815a8b9ec6c96369a1e8fcb046c8ea02136fc19a0c7bd8eb
                                  • Opcode Fuzzy Hash: 89fea3ef330d42a6952b0192a871ab8f839202d16fe04bf6ea0fe2f296b2c163
                                  • Instruction Fuzzy Hash: 2501D69B24F2212DA612D1A6167C5FAAF8ED8D76307244157E88ACB703F14D4D878171

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 343 54d0a39-54d0a86 347 54d0a9e-54d0ab1 GetCurrentHwProfileW 343->347 349 54d0ab6-54d0b1a call 54d0b1b 347->349
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 054D0AB1
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3374517989.00000000054D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_54d0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 56b4f028b167fcae553d8e1e4fbae969260a12a6a8ce5bdf83581faa07cd5d4b
                                  • Instruction ID: 3794eb7a73092c8697532ddd749bd1e2508d8088ea7f16d176a07a0ea724e611
                                  • Opcode Fuzzy Hash: 56b4f028b167fcae553d8e1e4fbae969260a12a6a8ce5bdf83581faa07cd5d4b
                                  • Instruction Fuzzy Hash: 05F0C2DB20E2257C6212D5851AA89FBA75EE8E7731734801BB84EC7702F28C0E8B0171

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 355 54d0a49-54d0a86 360 54d0a9e-54d0ab1 GetCurrentHwProfileW 355->360 362 54d0ab6-54d0b1a call 54d0b1b 360->362
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 054D0AB1
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3374517989.00000000054D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_54d0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 88c8bf7c45c4dc70aeeb20ff0883e43e5730ea65f2449bac66b7078f719b1c73
                                  • Instruction ID: e741ebb07519131977c0cd9b987656182c2f2ac9fa8aa2c4d88adb2e57befb40
                                  • Opcode Fuzzy Hash: 88c8bf7c45c4dc70aeeb20ff0883e43e5730ea65f2449bac66b7078f719b1c73
                                  • Instruction Fuzzy Hash: 78F096DB20E1316C6212D18626A85FA9B5ED4E76307744067B84EDB702F18D4E871171

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 368 54d0a4e-54d0a86 372 54d0a9e-54d0ab1 GetCurrentHwProfileW 368->372 374 54d0ab6-54d0b1a call 54d0b1b 372->374
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 054D0AB1
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3374517989.00000000054D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_54d0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 40d63fda58228c71833b5ee3fbe1a496ff38503b5c6387d7573cc2e7593242be
                                  • Instruction ID: 7f76e2df3fabe71c56ac7edfc62d2cb5c05615d3083be6d61d9012f757c4b908
                                  • Opcode Fuzzy Hash: 40d63fda58228c71833b5ee3fbe1a496ff38503b5c6387d7573cc2e7593242be
                                  • Instruction Fuzzy Hash: EBF02BDB21E1317C6113C68617A85F6A75ED8E37303344417F44EC7A02F18D0E870171

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 380 18251c-182534 call 18e940 383 18254a-182560 SetFilePointerEx 380->383 384 182536-18253d 380->384 386 182562-182573 call 1816c8 383->386 387 182575-18257f 383->387 385 182544-182548 384->385 389 18259b-18259e 385->389 386->385 387->385 388 182581-182596 387->388 388->389
                                  APIs
                                  • SetFilePointerEx.KERNELBASE(00000000,?,?,?,?,?,00000000,?,?,?,00182626,?,?,?,?,?), ref: 00182558
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3353733620.0000000000141000.00000040.00000001.01000000.00000005.sdmp, Offset: 00140000, based on PE: true
                                  • Associated: 00000006.00000002.3353387813.0000000000140000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3353733620.00000000002C5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3355120428.00000000002CA000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.00000000002CD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000044F000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000052C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000056B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.0000000000572000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.0000000000581000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3362966805.0000000000582000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3364367854.000000000071B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3364488303.000000000071D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_140000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: FilePointer
                                  • String ID:
                                  • API String ID: 973152223-0
                                  • Opcode ID: 260e2505f5d3edb8ed205da105a7e5a4a2ba379b911cf35f6a4d8c33ef584747
                                  • Instruction ID: 8854389700a8ba7c6e59884a4ff45f13a79652cc4124c775f9aac05b1a6b5a13
                                  • Opcode Fuzzy Hash: 260e2505f5d3edb8ed205da105a7e5a4a2ba379b911cf35f6a4d8c33ef584747
                                  • Instruction Fuzzy Hash: 81010032640208AECF0AAF29DC55CDE3B699B85320B340209F8109B2A0EB71EE418F90
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 054D0AB1
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3374517989.00000000054D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_54d0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 96cb9bfa17beac491dfdb866bafe3ca3be5dcce5b3cbb84ff23fb553e36249ec
                                  • Instruction ID: 916c16c6cd5a893015cf35dcb388442becc1da7e58420ab2c27e7d09513503aa
                                  • Opcode Fuzzy Hash: 96cb9bfa17beac491dfdb866bafe3ca3be5dcce5b3cbb84ff23fb553e36249ec
                                  • Instruction Fuzzy Hash: 1DF0E9EB30E1217C6112C58627E45FAA74EE9967313304457F88EC7A42F5890DC741B1
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0014331F
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3353733620.0000000000141000.00000040.00000001.01000000.00000005.sdmp, Offset: 00140000, based on PE: true
                                  • Associated: 00000006.00000002.3353387813.0000000000140000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3353733620.00000000002C5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3355120428.00000000002CA000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.00000000002CD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000044F000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000052C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000056B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.0000000000572000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.0000000000581000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3362966805.0000000000582000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3364367854.000000000071B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3364488303.000000000071D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_140000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID:
                                  • API String ID: 118556049-0
                                  • Opcode ID: 0fd589d96c9d07b1efa01aec19e4ff46bb0766daf2056f60d33bc81ca57302d3
                                  • Instruction ID: f8015ea12c3cb0a3f2d286390471fe919a22c48b7f799b1e866e3e4ade7aa4ce
                                  • Opcode Fuzzy Hash: 0fd589d96c9d07b1efa01aec19e4ff46bb0766daf2056f60d33bc81ca57302d3
                                  • Instruction Fuzzy Hash: B4F0B4721001049BDB146F64D8154E9B3F8EF24361750097AF8ADC7222EB26DA80C790
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000008,?,00000001,?,00189FE0,00000001,00000364,00000001,00000006,000000FF,?,00174B3F,?,?,761B23A0,?), ref: 0018A69C
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3353733620.0000000000141000.00000040.00000001.01000000.00000005.sdmp, Offset: 00140000, based on PE: true
                                  • Associated: 00000006.00000002.3353387813.0000000000140000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3353733620.00000000002C5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3355120428.00000000002CA000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.00000000002CD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000044F000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000052C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000056B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.0000000000572000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.0000000000581000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3362966805.0000000000582000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3364367854.000000000071B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3364488303.000000000071D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_140000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 6a3f4352e6c5e569768b5fe2ce6778baae7fb9f921c4d3596a788a2b883499e6
                                  • Instruction ID: 3929b7fb9cac1416fa6e4a298f057975afb4121aa73741cc9b1673a11447878f
                                  • Opcode Fuzzy Hash: 6a3f4352e6c5e569768b5fe2ce6778baae7fb9f921c4d3596a788a2b883499e6
                                  • Instruction Fuzzy Hash: 7EF0B4325105216BBB217A629815B6A774AAF41370FBD8113F804E6088FB20EA018FE6
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 054D0AB1
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3374517989.00000000054D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_54d0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 0fc6a850d51f7c0a4c45205810caf5ec5d65b13c0967bd15bf1d25cbf4296bae
                                  • Instruction ID: 7d96cebe0291dd062ebd3dd6312fd9fb00d1bf9096f395be0909148608dbe9b6
                                  • Opcode Fuzzy Hash: 0fc6a850d51f7c0a4c45205810caf5ec5d65b13c0967bd15bf1d25cbf4296bae
                                  • Instruction Fuzzy Hash: 0EF05C9374D620AE8613C68990D84F6BF9AAE6B524324008FF44A8B302F29D048282B2
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 054D0AB1
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3374517989.00000000054D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_54d0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: cd4dd707c2de3d320ee215dc31d16cf190ef8a653234ae2478a56e11e1907b26
                                  • Instruction ID: b8077a369a74e50ac172e800e6f68a8a4cd24dd2ddd54342f8c8d4cb59f1b289
                                  • Opcode Fuzzy Hash: cd4dd707c2de3d320ee215dc31d16cf190ef8a653234ae2478a56e11e1907b26
                                  • Instruction Fuzzy Hash: 41E09BC2709571694253D19505EC5F66B8A9967532314019BE4499B706F58E09834171
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000000,00000001,?,?,00174B3F,?,?,761B23A0,?,?,00143522,?,?), ref: 0018B0C7
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3353733620.0000000000141000.00000040.00000001.01000000.00000005.sdmp, Offset: 00140000, based on PE: true
                                  • Associated: 00000006.00000002.3353387813.0000000000140000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3353733620.00000000002C5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3355120428.00000000002CA000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.00000000002CD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000044F000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000052C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000056B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.0000000000572000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.0000000000581000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3362966805.0000000000582000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3364367854.000000000071B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3364488303.000000000071D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_140000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: b588e0939f623fed66c625f80fe0daf99209b514b813dc6dcf5aee0d638cac61
                                  • Instruction ID: 029bc0bf1831830b0233f8e36987ac28b790c8248b27694225a9b29780041f02
                                  • Opcode Fuzzy Hash: b588e0939f623fed66c625f80fe0daf99209b514b813dc6dcf5aee0d638cac61
                                  • Instruction Fuzzy Hash: 42E092322186256AEB313A659C94B5F766ADF423B0F5D0311FC24A61C1DB64DE108FE5
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3374575484.00000000054E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_54e0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 03d092df6a402eeed6bbe470c0943496633274d23c25c92c90ee9055238a433f
                                  • Instruction ID: cf7eaac3230aee8dcf2cfb666938220e964c16bdf16e7f3d26445a58980746e3
                                  • Opcode Fuzzy Hash: 03d092df6a402eeed6bbe470c0943496633274d23c25c92c90ee9055238a433f
                                  • Instruction Fuzzy Hash: ED0126B2408350EFE206CB5159685F77BFAE9872313308897F05BCB102D6E8AD0B9632
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3374575484.00000000054E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_54e0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 43536aec3816802f11f360334dbf0b2237b6fdbab5a1afb1ac2c6230ed2adb5f
                                  • Instruction ID: d7cbd49795e86505a33df9d7d093cdf67722cca01a7a2776e8addc86536f87a7
                                  • Opcode Fuzzy Hash: 43536aec3816802f11f360334dbf0b2237b6fdbab5a1afb1ac2c6230ed2adb5f
                                  • Instruction Fuzzy Hash: C7017B92D0D1916EC3168670199C5F23FF26D0312372849E7D06ACF692D7D66C079273
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3374575484.00000000054E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_54e0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 976b17f7e35f3ec0bbcb2992bf475be95a21e78d66552afc7e1ce8abe575097d
                                  • Instruction ID: 7e18023a7ce7b1080846e476a6de1b76c7b16bcb67f2095cd3c5928582cac9ee
                                  • Opcode Fuzzy Hash: 976b17f7e35f3ec0bbcb2992bf475be95a21e78d66552afc7e1ce8abe575097d
                                  • Instruction Fuzzy Hash: 5BF0C2E6548121BEA049C5516A5C6FB6BFFE5C62327308867F42BCA541D2E8AE0B6132
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3374575484.00000000054E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_54e0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0318ea30cbf29eb4733e8c223d02dcfed7e150586d39e054a164912b43c74c90
                                  • Instruction ID: 7f60657e0c21e5e5a33fbe2cf3f61a17fc0cdde27757c6e5947a9c42d0c48d2d
                                  • Opcode Fuzzy Hash: 0318ea30cbf29eb4733e8c223d02dcfed7e150586d39e054a164912b43c74c90
                                  • Instruction Fuzzy Hash: 44F0E1B3948214BF4009D295226C2F67BF76A4B1337308C67F41BDF501E2D89D035172
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3374575484.00000000054E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_54e0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 35fdf44f8b9cbc77090b88557c03491b2c48364a36cf8d6cdba426d5971ee2ea
                                  • Instruction ID: 2f83ffbe7e6285996321204e1b723620bb674f77de05439705b4ddd885d8842e
                                  • Opcode Fuzzy Hash: 35fdf44f8b9cbc77090b88557c03491b2c48364a36cf8d6cdba426d5971ee2ea
                                  • Instruction Fuzzy Hash: DBE06882088035AEC40CA8A2699C2F33FF7968B2777719947E09FC651AD9D6EC479072
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3374575484.00000000054E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_54e0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c6370bad9da52328fc38c8dba2b7934a77d2803abe886f2892d98e72784581aa
                                  • Instruction ID: b53b84de6ea320a03ec32f84646c8a9fe825f2b9e74c48ab6ed1606e032ccf7d
                                  • Opcode Fuzzy Hash: c6370bad9da52328fc38c8dba2b7934a77d2803abe886f2892d98e72784581aa
                                  • Instruction Fuzzy Hash: 29E02655844061AE90099462299C2F73EEA95C7073B708857A05BC6005D9C5DC47A072
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3374575484.00000000054E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_54e0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f91267c55423c1e87e8603028fb366e628f807fd56ae65c6ff07810fe5bdd82c
                                  • Instruction ID: 8ab2c27fab4e184fd68caee5cc3134eb35be1c4728d1c498a4b0f1f53175ed29
                                  • Opcode Fuzzy Hash: f91267c55423c1e87e8603028fb366e628f807fd56ae65c6ff07810fe5bdd82c
                                  • Instruction Fuzzy Hash: 87E02B57580135AAD0196092395C3F33BF65743173B704C53F057CA581E6D9AD437472
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3353733620.0000000000141000.00000040.00000001.01000000.00000005.sdmp, Offset: 00140000, based on PE: true
                                  • Associated: 00000006.00000002.3353387813.0000000000140000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3353733620.00000000002C5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3355120428.00000000002CA000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.00000000002CD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000044F000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000052C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000056B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.0000000000572000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.0000000000581000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3362966805.0000000000582000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3364367854.000000000071B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3364488303.000000000071D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_140000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 333d4b6d5425d6f9d03797ee82114c3711da98524c03317fffdb5ec62fb2b380
                                  • Instruction ID: 6f8c365b0eeb6de038b757ee73403f9b402818835f6c6d0b4b601da5a4c4b3a2
                                  • Opcode Fuzzy Hash: 333d4b6d5425d6f9d03797ee82114c3711da98524c03317fffdb5ec62fb2b380
                                  • Instruction Fuzzy Hash: F9021B71E012199BDF24CFA9D9806AEBBF1FF48314F25826DE919E7340D731AA41CB90
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3374575484.00000000054E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 054E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_54e0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f2619d2e0c68dc845c10a529eee03d42ba9b41fe2da5351b6e17b46cf1991970
                                  • Instruction ID: 9b91ef89ce300771fdb3afa8766167c0ce7da7ba38ccf1875a3fd286660c4838
                                  • Opcode Fuzzy Hash: f2619d2e0c68dc845c10a529eee03d42ba9b41fe2da5351b6e17b46cf1991970
                                  • Instruction Fuzzy Hash: B921006714C254AEDB02D5606D1CAF37F6BA6137713214827E4DECF422E296480B84A1
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3353733620.0000000000141000.00000040.00000001.01000000.00000005.sdmp, Offset: 00140000, based on PE: true
                                  • Associated: 00000006.00000002.3353387813.0000000000140000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3353733620.00000000002C5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3355120428.00000000002CA000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.00000000002CD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000044F000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000052C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000056B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.0000000000572000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.0000000000581000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3362966805.0000000000582000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3364367854.000000000071B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3364488303.000000000071D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_140000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: _strrchr
                                  • String ID:
                                  • API String ID: 3213747228-0
                                  • Opcode ID: 785c90e8ff89e0f1a3d98e37725974d6f6ea20f06d45e48120c47f1ca5a82ffe
                                  • Instruction ID: ed19df2125f878baf23917e156006fff781fe2278b3d181a31af70b5de0cf1b5
                                  • Opcode Fuzzy Hash: 785c90e8ff89e0f1a3d98e37725974d6f6ea20f06d45e48120c47f1ca5a82ffe
                                  • Instruction Fuzzy Hash: 8FB16932908255AFDB15AF68CCC2BFE7BA5EF66310F144155E904AF282D7749A01CFA0
                                  APIs
                                  • _ValidateLocalCookies.LIBCMT ref: 00177307
                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 0017730F
                                  • _ValidateLocalCookies.LIBCMT ref: 00177398
                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 001773C3
                                  • _ValidateLocalCookies.LIBCMT ref: 00177418
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3353733620.0000000000141000.00000040.00000001.01000000.00000005.sdmp, Offset: 00140000, based on PE: true
                                  • Associated: 00000006.00000002.3353387813.0000000000140000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3353733620.00000000002C5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3355120428.00000000002CA000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.00000000002CD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000044F000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000052C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000056B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.0000000000572000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.0000000000581000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3362966805.0000000000582000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3364367854.000000000071B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3364488303.000000000071D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_140000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                  • String ID: csm
                                  • API String ID: 1170836740-1018135373
                                  • Opcode ID: 663b33c57d2fd0e17ae08ef3afd74bb8b7d3939adb2806c101e375e99d1faeaf
                                  • Instruction ID: 8271bf3f5e93b0847c899b6cd9caaec96a7c756d859c2ee81ec5c10ec86ba777
                                  • Opcode Fuzzy Hash: 663b33c57d2fd0e17ae08ef3afd74bb8b7d3939adb2806c101e375e99d1faeaf
                                  • Instruction Fuzzy Hash: 0941AD30A04209ABCF10DF68C889A9EBBB5BF05318F14C155EC19AB392DB71EA51DB91
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0015A09D
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0015A0BF
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0015A0E7
                                  • __Getctype.LIBCPMT ref: 0015A1C5
                                  • std::_Facet_Register.LIBCPMT ref: 0015A1F9
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0015A223
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3353733620.0000000000141000.00000040.00000001.01000000.00000005.sdmp, Offset: 00140000, based on PE: true
                                  • Associated: 00000006.00000002.3353387813.0000000000140000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3353733620.00000000002C5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3355120428.00000000002CA000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.00000000002CD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000044F000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000052C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000056B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.0000000000572000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.0000000000581000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3362966805.0000000000582000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3364367854.000000000071B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3364488303.000000000071D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_140000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetctypeRegister
                                  • String ID:
                                  • API String ID: 1102183713-0
                                  • Opcode ID: 5f31e7674861dcb90efda49e00787d3029dd29237b60a69ba1893fd5cd9edf30
                                  • Instruction ID: 37c4d83058ad5ec1f3801663a0a588a355a786ce94e779b274cb0e9a197984f1
                                  • Opcode Fuzzy Hash: 5f31e7674861dcb90efda49e00787d3029dd29237b60a69ba1893fd5cd9edf30
                                  • Instruction Fuzzy Hash: DE51B8B1D00245CFCB11CF58C945BAEBBF0BF10710F148299E865AB391DB74AA49CBD2
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0015C45A
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0015C47C
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0015C4A4
                                  • std::_Facet_Register.LIBCPMT ref: 0015C59A
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0015C5C4
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3353733620.0000000000141000.00000040.00000001.01000000.00000005.sdmp, Offset: 00140000, based on PE: true
                                  • Associated: 00000006.00000002.3353387813.0000000000140000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3353733620.00000000002C5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3355120428.00000000002CA000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.00000000002CD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000044F000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000052C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000056B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.0000000000572000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.0000000000581000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3362966805.0000000000582000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3364367854.000000000071B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3364488303.000000000071D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_140000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                  • String ID:
                                  • API String ID: 459529453-0
                                  • Opcode ID: fb4ce07b8277cd41176dc26b277cf50af6fd2bbe7743e0b03dc771e3ca6bba77
                                  • Instruction ID: 742f2e8abb0faf4e6a5c1d03743fe669e370ff2f803653cc6da5b04374590df8
                                  • Opcode Fuzzy Hash: fb4ce07b8277cd41176dc26b277cf50af6fd2bbe7743e0b03dc771e3ca6bba77
                                  • Instruction Fuzzy Hash: D751CBB0A00244DFDB11CF98D858BAEBBF0FB11314F248198E856AF381D775AA49CBD0
                                  APIs
                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 0014499F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3353733620.0000000000141000.00000040.00000001.01000000.00000005.sdmp, Offset: 00140000, based on PE: true
                                  • Associated: 00000006.00000002.3353387813.0000000000140000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3353733620.00000000002C5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3355120428.00000000002CA000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.00000000002CD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000044F000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000052C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000056B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.0000000000572000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.0000000000581000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3362966805.0000000000582000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3364367854.000000000071B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3364488303.000000000071D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_140000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: Ios_base_dtorstd::ios_base::_
                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                  • API String ID: 323602529-1866435925
                                  • Opcode ID: 2f2c256f0a5cbf90e32aa95de66238ac68fc04a46422953bf4c195ee12b13c74
                                  • Instruction ID: 5636d6f09daedf0317b23af3c3caedb7e44ceaebfd94d93915718da8dba8b6f5
                                  • Opcode Fuzzy Hash: 2f2c256f0a5cbf90e32aa95de66238ac68fc04a46422953bf4c195ee12b13c74
                                  • Instruction Fuzzy Hash: C51140729147446BCB14DF58DC03F977398DB19714F044629FE588B2D2EB75A910C7D2
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 00172730
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0017273B
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 001727A9
                                    • Part of subcall function 0017288C: std::locale::_Locimp::_Locimp.LIBCPMT ref: 001728A4
                                  • std::locale::_Setgloballocale.LIBCPMT ref: 00172756
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3353733620.0000000000141000.00000040.00000001.01000000.00000005.sdmp, Offset: 00140000, based on PE: true
                                  • Associated: 00000006.00000002.3353387813.0000000000140000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3353733620.00000000002C5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3355120428.00000000002CA000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.00000000002CD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000044F000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000052C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000056B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.0000000000572000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.0000000000581000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3362966805.0000000000582000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3364367854.000000000071B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3364488303.000000000071D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_140000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                                  • String ID:
                                  • API String ID: 677527491-0
                                  • Opcode ID: 1f8db720e8ba288dcea0248d34e9598e68bc04c40554bc34e9ad4a83dc9b8969
                                  • Instruction ID: ceff2f356d2787f312810369a73d4687fd69214b1816197632031b02c5f77c22
                                  • Opcode Fuzzy Hash: 1f8db720e8ba288dcea0248d34e9598e68bc04c40554bc34e9ad4a83dc9b8969
                                  • Instruction Fuzzy Hash: 1D01DF75A002219BCB0AEB20E84993D7BB1FFE4790B148049E81A57381CF74AE02DBC6
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 0014750C
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00147522
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3353733620.0000000000141000.00000040.00000001.01000000.00000005.sdmp, Offset: 00140000, based on PE: true
                                  • Associated: 00000006.00000002.3353387813.0000000000140000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3353733620.00000000002C5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3355120428.00000000002CA000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.00000000002CD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000044F000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000052C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000056B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.0000000000572000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.0000000000581000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3362966805.0000000000582000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3364367854.000000000071B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3364488303.000000000071D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_140000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: [json.exception.
                                  • API String ID: 4194217158-791563284
                                  • Opcode ID: 9b44dc5286fa25ff49679bf5ac29efc523906518b6f15346309d37e97ad7e0a0
                                  • Instruction ID: 86e8beb0c88c1be6293698f3a50db716bfa3951f214d27aedb6efff06fca84cb
                                  • Opcode Fuzzy Hash: 9b44dc5286fa25ff49679bf5ac29efc523906518b6f15346309d37e97ad7e0a0
                                  • Instruction Fuzzy Hash: B351DFB1C04648DBDB00DFA8C906BAEFBB4EF25314F148259E854AB292E7B45A44C7A1
                                  APIs
                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 0014499F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3353733620.0000000000141000.00000040.00000001.01000000.00000005.sdmp, Offset: 00140000, based on PE: true
                                  • Associated: 00000006.00000002.3353387813.0000000000140000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3353733620.00000000002C5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3355120428.00000000002CA000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.00000000002CD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000044F000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000052C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000056B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.0000000000572000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.0000000000581000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3362966805.0000000000582000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3364367854.000000000071B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3364488303.000000000071D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_140000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: Ios_base_dtorstd::ios_base::_
                                  • String ID: ios_base::badbit set$ios_base::failbit set
                                  • API String ID: 323602529-1240500531
                                  • Opcode ID: afc5cb8b31e4e4134f0f62082c03b2b87830af2a56d7332587e102ae1a03876d
                                  • Instruction ID: f2564e996e4e7d5f0074ac9c8af82fc0af666627abd5910782926bdd45a7779d
                                  • Opcode Fuzzy Hash: afc5cb8b31e4e4134f0f62082c03b2b87830af2a56d7332587e102ae1a03876d
                                  • Instruction Fuzzy Hash: 734126B1C00248ABCB04DF58CC45BAEBBB8EF09710F14825DF554AB391D7755A00CBA1
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00144061
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 001440C4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3353733620.0000000000141000.00000040.00000001.01000000.00000005.sdmp, Offset: 00140000, based on PE: true
                                  • Associated: 00000006.00000002.3353387813.0000000000140000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3353733620.00000000002C5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3355120428.00000000002CA000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.00000000002CD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000044F000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000052C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.000000000056B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.0000000000572000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3357879539.0000000000581000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3362966805.0000000000582000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3364367854.000000000071B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3364488303.000000000071D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_140000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                  • String ID: bad locale name
                                  • API String ID: 3988782225-1405518554
                                  • Opcode ID: 638d6e1da498ef285348dfaef29783001ebd6f600a3dd8b3791c6830c7372ba7
                                  • Instruction ID: 2808c66df419158689960e53a3c700a522ba75cb4b10d83e8af05b32f2e17cc9
                                  • Opcode Fuzzy Hash: 638d6e1da498ef285348dfaef29783001ebd6f600a3dd8b3791c6830c7372ba7
                                  • Instruction Fuzzy Hash: 6D119370805B84EFD721CFA8C50474BBFF4AF26714F14869DE49997781D3B55A04CBA1

                                  Execution Graph

                                  Execution Coverage:3.2%
                                  Dynamic/Decrypted Code Coverage:2.5%
                                  Signature Coverage:0%
                                  Total number of Nodes:1861
                                  Total number of Limit Nodes:28
                                  execution_graph 18774 4ca089f 18776 4ca0889 18774->18776 18777 4ca08cb 18776->18777 18784 4ca08d8 18776->18784 18792 4ca0903 18777->18792 18785 4ca08eb 18784->18785 18786 4ca0903 2 API calls 18785->18786 18787 4ca08f0 18786->18787 18788 4ca0967 GetCurrentHwProfileW 18787->18788 18789 4ca0954 GetCurrentHwProfileW 18788->18789 18791 4ca0a8d 18789->18791 18793 4ca090b 18792->18793 18794 4ca0967 GetCurrentHwProfileW 18793->18794 18795 4ca0954 GetCurrentHwProfileW 18794->18795 18797 4ca0a8d 18795->18797 19179 4ca0993 19180 4ca09a8 GetCurrentHwProfileW 19179->19180 19182 4ca0a8d 19180->19182 16794 207b00 16795 207ecc 16794->16795 16808 207b3e std::ios_base::_Ios_base_dtor __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 16794->16808 16796 207b87 setsockopt recv 16796->16808 16798 207eb7 Sleep 16798->16795 16798->16808 16799 207e15 recv 16801 207eaf Sleep 16799->16801 16801->16798 16803 207c2d recv 16804 207c4e recv 16803->16804 16803->16808 16804->16808 16806 207ee1 16904 178c70 16806->16904 16808->16795 16808->16796 16808->16798 16808->16799 16808->16801 16808->16806 16810 207cb3 16808->16810 16815 208590 WSAStartup 16808->16815 16821 158dc0 16808->16821 16830 1563b0 16808->16830 16835 207ef0 16808->16835 16891 173069 16808->16891 16894 149280 16808->16894 16811 158dc0 2 API calls 16810->16811 16813 207d06 recv 16810->16813 16811->16810 16813->16808 16816 2085c8 16815->16816 16820 208686 16815->16820 16817 208654 socket 16816->16817 16816->16820 16818 20866a connect 16817->16818 16817->16820 16819 20867c closesocket 16818->16819 16818->16820 16819->16817 16819->16820 16820->16808 16823 158de2 std::locale::_Setgloballocale 16821->16823 16824 158e11 16821->16824 16822 158ef8 16823->16803 16824->16822 16907 1432d0 16824->16907 16826 158e66 std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 16827 158ecb std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 16826->16827 16921 142fe0 16826->16921 16827->16803 16829 158eb8 16829->16803 16832 1563d8 16830->16832 16831 1563e7 16831->16808 16832->16831 16833 1432d0 std::_Throw_Cpp_error 2 API calls 16832->16833 16834 15642a std::locale::_Locimp::_Locimp 16833->16834 16834->16808 16836 207f6c 16835->16836 16837 207f3e 16835->16837 16839 207f74 16836->16839 16840 207f8e 16836->16840 16838 142cf0 std::_Throw_Cpp_error 2 API calls 16837->16838 16843 207f50 16838->16843 17113 156290 16839->17113 16841 207fb0 16840->16841 16842 207f96 16840->16842 16846 207fd5 16841->16846 16847 207fb8 16841->16847 16845 156290 2 API calls 16842->16845 16848 149280 3 API calls 16843->16848 16888 207f64 16845->16888 16849 207ffb 16846->16849 16850 207fdd 16846->16850 16851 156290 2 API calls 16847->16851 16847->16888 16848->16888 16853 2082c0 16849->16853 16854 20801b 16849->16854 16849->16888 17117 1812b7 16850->17117 16851->16888 16856 2082c8 16853->16856 16857 20831b 16853->16857 17076 145400 16854->17076 17146 15b430 16856->17146 16859 208323 16857->16859 16860 208376 16857->16860 16863 15b430 3 API calls 16859->16863 16861 2083d1 16860->16861 16862 20837e 16860->16862 16865 2083d9 16861->16865 16866 20842c 16861->16866 16864 15b430 3 API calls 16862->16864 16863->16888 16864->16888 16868 15b430 3 API calls 16865->16868 16869 208484 16866->16869 16870 208434 16866->16870 16868->16888 16869->16888 17153 198b00 16869->17153 16871 15b430 3 API calls 16870->16871 16871->16888 16874 208040 16875 20810b 16874->16875 16874->16888 17086 142cf0 16874->17086 17090 15ace0 16874->17090 17093 142d30 16875->17093 16879 208140 16880 2081b2 16879->16880 16881 2081e5 16879->16881 16882 1563b0 std::_Throw_Cpp_error 2 API calls 16880->16882 17110 179820 16881->17110 16884 2081ce 16882->16884 17123 20f280 16884->17123 16888->16808 18697 17361d 16891->18697 16895 1563b0 std::_Throw_Cpp_error 2 API calls 16894->16895 16897 1492d4 16895->16897 16896 158dc0 2 API calls 16898 149523 std::locale::_Locimp::_Locimp 16896->16898 16897->16896 16897->16898 16899 1496e2 std::ios_base::_Ios_base_dtor 16898->16899 16900 1496b6 WSASend 16898->16900 16901 178c70 std::_Throw_Cpp_error RtlAllocateHeap 16899->16901 16902 14975d std::ios_base::_Ios_base_dtor 16899->16902 16900->16898 16900->16899 16903 14979c 16901->16903 16902->16808 16903->16808 16905 178bac ___std_exception_copy RtlAllocateHeap 16904->16905 16906 178c7f __Getctype 16905->16906 16908 143306 16907->16908 16909 1432e2 16907->16909 16912 143318 16908->16912 16913 173672 std::_Facet_Register 2 API calls 16908->16913 16910 14331f 16909->16910 16911 1432e9 16909->16911 16934 142b50 16910->16934 16926 173672 16911->16926 16912->16826 16916 143310 16913->16916 16916->16826 16917 1432ef 16918 178c70 std::_Throw_Cpp_error RtlAllocateHeap 16917->16918 16919 1432f8 16917->16919 16920 143329 16918->16920 16919->16826 16922 143007 16921->16922 16923 143017 std::ios_base::_Ios_base_dtor 16921->16923 16922->16923 16924 178c70 std::_Throw_Cpp_error RtlAllocateHeap 16922->16924 16923->16829 16925 143036 16924->16925 16928 173677 std::_Facet_Register 16926->16928 16929 173691 16928->16929 16931 142b50 Concurrency::cancel_current_task 16928->16931 16938 1823ec 16928->16938 16929->16917 16930 17369d 16930->16930 16931->16930 16944 174b15 16931->16944 16935 142b5e Concurrency::cancel_current_task 16934->16935 16936 174b15 ___std_exception_copy 2 API calls 16935->16936 16937 142bac 16936->16937 16937->16917 16943 18b094 __Getctype std::_Facet_Register 16938->16943 16939 18b0d2 16952 1816ff 16939->16952 16941 18b0bd RtlAllocateHeap 16942 18b0d0 16941->16942 16941->16943 16942->16928 16943->16939 16943->16941 16945 174b22 16944->16945 16950 142bac 16944->16950 16946 1823ec ___std_exception_copy 2 API calls 16945->16946 16945->16950 16947 174b3f 16946->16947 16951 174b4f 16947->16951 17014 1899a5 16947->17014 16950->16917 17023 181c96 16951->17023 16955 189f93 16952->16955 16957 189f9c __Getctype 16955->16957 16956 181704 16956->16942 16957->16956 16966 18a65a 16957->16966 16959 189fe0 __Getctype 16960 18a020 16959->16960 16962 189fe8 __Getctype 16959->16962 16974 189c70 16960->16974 16970 18b01a 16962->16970 16965 18b01a ___std_exception_destroy RtlAllocateHeap 16965->16956 16967 18a667 __Getctype std::_Facet_Register 16966->16967 16968 18a692 RtlAllocateHeap 16967->16968 16969 18a6a5 __floor_pentium4 16967->16969 16968->16967 16968->16969 16969->16959 16971 18b04f 16970->16971 16972 18b025 ___std_exception_destroy 16970->16972 16971->16956 16972->16971 16973 1816ff __floor_pentium4 RtlAllocateHeap 16972->16973 16973->16971 16975 189cde __Getctype 16974->16975 16978 189c16 16975->16978 16977 189d07 16977->16965 16979 189c22 std::_Lockit::_Lockit std::_Locinfo::_Locinfo_dtor 16978->16979 16982 189df7 16979->16982 16981 189c44 __Getctype 16981->16977 16983 189e2d __Getctype 16982->16983 16984 189e06 __Getctype 16982->16984 16983->16981 16984->16983 16986 192146 16984->16986 16987 1921c6 16986->16987 16990 19215c 16986->16990 16988 192214 16987->16988 16991 18b01a ___std_exception_destroy RtlAllocateHeap 16987->16991 16989 1922b7 __Getctype RtlAllocateHeap 16988->16989 17002 192222 16989->17002 16990->16987 16992 19218f 16990->16992 16997 18b01a ___std_exception_destroy RtlAllocateHeap 16990->16997 16993 1921e8 16991->16993 16994 1921b1 16992->16994 17003 18b01a ___std_exception_destroy RtlAllocateHeap 16992->17003 16995 18b01a ___std_exception_destroy RtlAllocateHeap 16993->16995 16996 18b01a ___std_exception_destroy RtlAllocateHeap 16994->16996 16998 1921fb 16995->16998 16999 1921bb 16996->16999 17001 192184 16997->17001 17004 18b01a ___std_exception_destroy RtlAllocateHeap 16998->17004 17007 18b01a ___std_exception_destroy RtlAllocateHeap 16999->17007 17000 192282 17008 18b01a ___std_exception_destroy RtlAllocateHeap 17000->17008 17009 19144a __Getctype RtlAllocateHeap 17001->17009 17002->17000 17010 18b01a RtlAllocateHeap ___std_exception_destroy 17002->17010 17005 1921a6 17003->17005 17006 192209 17004->17006 17011 1918a9 __Getctype RtlAllocateHeap 17005->17011 17012 18b01a ___std_exception_destroy RtlAllocateHeap 17006->17012 17007->16987 17013 192288 17008->17013 17009->16992 17010->17002 17011->16994 17012->16988 17013->16983 17015 1899b3 17014->17015 17016 1899c1 17014->17016 17015->17016 17021 1899d9 17015->17021 17017 1816ff __floor_pentium4 RtlAllocateHeap 17016->17017 17018 1899c9 17017->17018 17026 178c60 17018->17026 17019 1899d3 17019->16951 17021->17019 17022 1816ff __floor_pentium4 RtlAllocateHeap 17021->17022 17022->17018 17024 18b01a ___std_exception_destroy RtlAllocateHeap 17023->17024 17025 181cae 17024->17025 17025->16950 17029 178bac 17026->17029 17030 178bbe ___std_exception_copy 17029->17030 17035 178be3 17030->17035 17032 178bd6 17042 17899c 17032->17042 17036 178bf3 17035->17036 17039 178bfa ___std_exception_copy __Getctype 17035->17039 17048 178a01 17036->17048 17038 178c08 17038->17032 17039->17038 17040 178bac ___std_exception_copy RtlAllocateHeap 17039->17040 17041 178c6c 17040->17041 17041->17032 17043 1789a8 17042->17043 17044 1789bf 17043->17044 17063 178a47 17043->17063 17046 1789d2 17044->17046 17047 178a47 ___std_exception_copy RtlAllocateHeap 17044->17047 17046->17019 17047->17046 17049 178a10 17048->17049 17052 18a044 17049->17052 17053 18a057 __Getctype 17052->17053 17054 18a65a __Getctype RtlAllocateHeap 17053->17054 17062 178a32 17053->17062 17056 18a087 __Getctype 17054->17056 17055 18a08f __Getctype 17058 18b01a ___std_exception_destroy RtlAllocateHeap 17055->17058 17056->17055 17057 18a0c3 17056->17057 17059 189c70 __Getctype RtlAllocateHeap 17057->17059 17058->17062 17060 18a0ce 17059->17060 17061 18b01a ___std_exception_destroy RtlAllocateHeap 17060->17061 17061->17062 17062->17039 17064 178a51 17063->17064 17065 178a5a 17063->17065 17066 178a01 ___std_exception_copy RtlAllocateHeap 17064->17066 17065->17044 17067 178a56 17066->17067 17067->17065 17070 1841c6 17067->17070 17069 178a63 17071 1841cb std::locale::_Setgloballocale 17070->17071 17072 18f665 std::locale::_Setgloballocale RtlAllocateHeap 17071->17072 17074 1841d6 std::locale::_Setgloballocale 17071->17074 17072->17074 17073 1836e2 std::locale::_Setgloballocale RtlAllocateHeap 17075 184209 __Getctype std::locale::_Setgloballocale 17073->17075 17074->17073 17075->17069 17158 172b99 17076->17158 17079 145410 17080 145419 17079->17080 17082 172534 std::_Throw_Cpp_error 3 API calls 17079->17082 17080->16874 17083 145430 17082->17083 17167 17953c 17083->17167 17087 142d13 17086->17087 17087->17087 17088 143040 std::_Throw_Cpp_error 2 API calls 17087->17088 17089 142d25 17088->17089 17089->16874 17091 15ad10 17090->17091 17091->17091 17484 15fbf0 17091->17484 17094 143040 std::_Throw_Cpp_error 2 API calls 17093->17094 17095 142d55 17094->17095 17096 2162c0 17095->17096 17097 216358 17096->17097 17109 216361 std::locale::_Setgloballocale 17096->17109 17493 15e4b0 17097->17493 17100 21654f 17103 216553 17100->17103 17595 156130 17100->17595 17104 216580 std::ios_base::_Ios_base_dtor 17103->17104 17105 178c70 std::_Throw_Cpp_error RtlAllocateHeap 17103->17105 17104->16879 17106 2165ce 17105->17106 17107 173069 __Xtime_get_ticks GetSystemTimePreciseAsFileTime 17106->17107 17108 2165d6 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 17107->17108 17108->16879 17109->17100 17109->17103 17516 234760 17109->17516 17527 164160 17109->17527 17682 17975e 17110->17682 17112 179832 17112->16888 17134 181628 17112->17134 17114 1562b1 17113->17114 17115 15629d 17113->17115 17114->16888 17116 156130 2 API calls 17115->17116 17116->17114 17118 1812ca ___std_exception_copy 17117->17118 17706 17d6a5 17118->17706 17120 1812e4 17121 17899c ___std_exception_copy RtlAllocateHeap 17120->17121 17122 1812f1 17121->17122 17122->16888 17124 20f2f6 std::locale::_Setgloballocale 17123->17124 17865 15ab20 17124->17865 17127 158f00 std::_Throw_Cpp_error 2 API calls 17128 20f47f 17127->17128 17870 143440 17128->17870 17131 20f58b std::ios_base::_Ios_base_dtor 17131->16888 17132 178c70 std::_Throw_Cpp_error RtlAllocateHeap 17133 20f5ce 17132->17133 17133->16888 17135 18163b ___std_exception_copy 17134->17135 18111 18140a 17135->18111 17137 181650 17138 17899c ___std_exception_copy RtlAllocateHeap 17137->17138 17139 18165d 17138->17139 17140 17d0a8 17139->17140 17141 17d0bb ___std_exception_copy 17140->17141 18212 17cf83 17141->18212 17143 17d0c7 17144 17899c ___std_exception_copy RtlAllocateHeap 17143->17144 17145 17d0d3 17144->17145 17145->16888 18282 157ef0 17146->18282 17148 15b48d 18299 162100 17148->18299 17152 15b503 17152->16888 18666 198bb0 17153->18666 17155 198b31 std::locale::_Locimp::_Locimp 17156 143040 std::_Throw_Cpp_error 2 API calls 17155->17156 17157 198b7c 17156->17157 17157->16888 17173 172bc8 17158->17173 17160 145409 17160->17079 17161 172534 17160->17161 17162 17254a std::_Throw_Cpp_error 17161->17162 17180 1724e7 17162->17180 17164 17255a __EH_prolog3 std::_Throw_Cpp_error Concurrency::cancel_current_task 17186 159cb0 17164->17186 17166 1725c7 std::_Throw_Cpp_error 17166->17079 17168 17954f ___std_exception_copy 17167->17168 17468 1793db 17168->17468 17170 17955e 17171 17899c ___std_exception_copy RtlAllocateHeap 17170->17171 17172 145450 17171->17172 17172->16874 17176 172be1 17173->17176 17175 172bf2 _ValidateLocalCookies 17175->17160 17176->17175 17177 17302b 17176->17177 17178 173069 __Xtime_get_ticks GetSystemTimePreciseAsFileTime 17177->17178 17179 173036 __aulldiv __aullrem 17178->17179 17179->17176 17181 1724f3 __EH_prolog3_GS 17180->17181 17182 142cf0 std::_Throw_Cpp_error 2 API calls 17181->17182 17183 172507 17182->17183 17197 1436e0 17183->17197 17185 17251c std::_Throw_Cpp_error 17185->17164 17224 144900 17186->17224 17188 159d26 17189 173672 std::_Facet_Register 2 API calls 17188->17189 17190 159d2d 17189->17190 17229 172729 17190->17229 17192 159d39 17237 15a060 17192->17237 17194 159d76 17195 159dc7 std::_Throw_Cpp_error 17194->17195 17196 144900 std::_Throw_Cpp_error 2 API calls 17194->17196 17195->17166 17196->17195 17198 1563b0 std::_Throw_Cpp_error 2 API calls 17197->17198 17199 143731 17198->17199 17200 14375a 17199->17200 17211 158f00 17199->17211 17202 158f00 std::_Throw_Cpp_error 2 API calls 17200->17202 17203 14378a 17202->17203 17204 174b15 ___std_exception_copy 2 API calls 17203->17204 17206 14381e 17204->17206 17205 14385f std::ios_base::_Ios_base_dtor 17205->17185 17206->17205 17207 178c70 std::_Throw_Cpp_error RtlAllocateHeap 17206->17207 17208 1438b0 17207->17208 17220 174b78 17208->17220 17210 1438f5 std::ios_base::_Ios_base_dtor 17210->17185 17212 158f4f 17211->17212 17213 158f22 std::locale::_Locimp::_Locimp 17211->17213 17214 1432d0 std::_Throw_Cpp_error 2 API calls 17212->17214 17215 15902f std::ios_base::_Ios_base_dtor 17212->17215 17213->17200 17217 158fa4 std::locale::_Locimp::_Locimp 17214->17217 17215->17200 17216 159002 std::locale::_Locimp::_Locimp 17216->17200 17217->17216 17218 142fe0 std::_Throw_Cpp_error RtlAllocateHeap 17217->17218 17219 158fef 17218->17219 17219->17200 17221 174b85 17220->17221 17222 174b8c 17220->17222 17223 181c96 ___std_exception_destroy RtlAllocateHeap 17221->17223 17222->17210 17223->17222 17225 144922 17224->17225 17226 14491a std::_Throw_Cpp_error Concurrency::cancel_current_task 17224->17226 17225->17188 17249 1447f0 17226->17249 17228 144968 std::ios_base::_Ios_base_dtor Concurrency::cancel_current_task 17228->17188 17230 172735 __EH_prolog3 std::_Lockit::_Lockit 17229->17230 17231 172771 std::_Throw_Cpp_error std::_Lockit::~_Lockit 17230->17231 17267 17288c 17230->17267 17231->17192 17233 172753 17273 1728af 17233->17273 17238 15a0a2 std::_Throw_Cpp_error std::_Lockit::~_Lockit std::_Lockit::_Lockit 17237->17238 17239 173672 std::_Facet_Register 2 API calls 17238->17239 17248 15a144 std::_Lockit::~_Lockit 17238->17248 17240 15a152 17239->17240 17338 144040 17240->17338 17246 15a1f1 17373 1726f7 17246->17373 17248->17194 17250 144851 17249->17250 17250->17250 17261 143040 17250->17261 17252 144865 17253 1436e0 std::_Throw_Cpp_error 2 API calls 17252->17253 17255 14487b 17253->17255 17254 1448a5 std::ios_base::_Ios_base_dtor 17254->17228 17255->17254 17256 178c70 std::_Throw_Cpp_error RtlAllocateHeap 17255->17256 17258 1448f7 std::_Throw_Cpp_error Concurrency::cancel_current_task 17256->17258 17257 144922 17257->17228 17258->17257 17259 1447f0 std::_Throw_Cpp_error 2 API calls 17258->17259 17260 144968 std::ios_base::_Ios_base_dtor Concurrency::cancel_current_task 17259->17260 17260->17228 17262 1430c8 17261->17262 17264 143052 17261->17264 17262->17252 17263 143057 std::locale::_Locimp::_Locimp 17263->17252 17264->17263 17265 1432d0 std::_Throw_Cpp_error 2 API calls 17264->17265 17266 1430a3 std::locale::_Locimp::_Locimp 17265->17266 17266->17252 17268 173672 std::_Facet_Register 2 API calls 17267->17268 17269 172897 17268->17269 17270 1728ab 17269->17270 17283 172611 17269->17283 17270->17233 17274 17275b 17273->17274 17275 1728bb 17273->17275 17277 155a60 17274->17277 17286 17333a 17275->17286 17278 155a86 17277->17278 17282 155ab3 std::locale::_Locimp::_Locimp 17277->17282 17279 155a90 17278->17279 17280 181c96 ___std_exception_destroy RtlAllocateHeap 17278->17280 17281 1823ec ___std_exception_copy 2 API calls 17279->17281 17279->17282 17280->17279 17281->17282 17282->17231 17284 155a60 std::locale::_Locimp::_Locimp 2 API calls 17283->17284 17285 17264b 17284->17285 17285->17233 17287 17334a std::locale::_Setgloballocale 17286->17287 17287->17274 17290 1841d6 std::locale::_Setgloballocale 17287->17290 17292 18f665 17287->17292 17313 1836e2 17290->17313 17291 184209 __Getctype std::locale::_Setgloballocale 17291->17274 17295 18f671 std::_Locinfo::_Locinfo_dtor 17292->17295 17293 189f93 __floor_pentium4 RtlAllocateHeap 17299 18f6a2 std::locale::_Setgloballocale 17293->17299 17294 18f6c1 17296 1816ff __floor_pentium4 RtlAllocateHeap 17294->17296 17295->17293 17295->17294 17295->17299 17300 18f6d3 std::_Lockit::_Lockit std::locale::_Setgloballocale 17295->17300 17297 18f6c6 17296->17297 17298 178c60 ___std_exception_copy RtlAllocateHeap 17297->17298 17312 18f6ab 17298->17312 17299->17294 17299->17300 17299->17312 17301 18f843 std::_Lockit::~_Lockit 17300->17301 17302 18f746 17300->17302 17303 18f774 std::locale::_Setgloballocale 17300->17303 17304 1836e2 std::locale::_Setgloballocale RtlAllocateHeap 17301->17304 17302->17303 17316 189e42 17302->17316 17307 189e42 __Getctype RtlAllocateHeap 17303->17307 17310 18f7c9 17303->17310 17303->17312 17305 18f856 17304->17305 17307->17310 17309 189e42 __Getctype RtlAllocateHeap 17309->17303 17311 189e42 __Getctype RtlAllocateHeap 17310->17311 17310->17312 17311->17312 17312->17290 17330 183552 17313->17330 17315 1836f3 17315->17291 17317 189e4b __Getctype 17316->17317 17318 18a65a __Getctype RtlAllocateHeap 17317->17318 17320 189e62 17317->17320 17321 189e8f __Getctype 17318->17321 17319 189ef2 17319->17309 17320->17319 17322 1841c6 __Getctype RtlAllocateHeap 17320->17322 17323 189e97 __Getctype 17321->17323 17324 189ecf 17321->17324 17325 189efc 17322->17325 17327 18b01a ___std_exception_destroy RtlAllocateHeap 17323->17327 17326 189c70 __Getctype RtlAllocateHeap 17324->17326 17328 189eda 17326->17328 17327->17320 17329 18b01a ___std_exception_destroy RtlAllocateHeap 17328->17329 17329->17320 17332 18357f std::locale::_Setgloballocale 17330->17332 17334 1833e3 17332->17334 17333 1835c8 std::locale::_Setgloballocale 17333->17315 17335 1833ef std::_Lockit::_Lockit std::_Locinfo::_Locinfo_dtor 17334->17335 17336 18346a std::locale::_Setgloballocale RtlAllocateHeap 17335->17336 17337 183406 std::locale::_Setgloballocale 17336->17337 17337->17333 17339 144066 std::_Lockit::_Lockit 17338->17339 17340 1440e6 17339->17340 17341 1440c2 17339->17341 17385 171d4a 17340->17385 17376 172827 17341->17376 17344 1440f0 17346 172cf4 17417 183cf8 17346->17417 17348 172cfd __Getctype 17349 172d17 17348->17349 17350 172d35 17348->17350 17422 18454e 17349->17422 17352 18454e __Getctype RtlAllocateHeap 17350->17352 17353 172d1e 17352->17353 17427 183d42 17353->17427 17356 15a1ca 17358 144100 17356->17358 17464 172872 17358->17464 17361 144140 17363 14415b 17361->17363 17364 181c96 ___std_exception_destroy RtlAllocateHeap 17361->17364 17362 181c96 ___std_exception_destroy RtlAllocateHeap 17362->17361 17365 144176 17363->17365 17366 181c96 ___std_exception_destroy RtlAllocateHeap 17363->17366 17364->17363 17367 181c96 ___std_exception_destroy RtlAllocateHeap 17365->17367 17369 144191 17365->17369 17366->17365 17367->17369 17368 181c96 ___std_exception_destroy RtlAllocateHeap 17370 1441ac 17368->17370 17369->17368 17369->17370 17371 181c96 ___std_exception_destroy RtlAllocateHeap 17370->17371 17372 1441c7 std::_Lockit::~_Lockit 17370->17372 17371->17372 17372->17246 17374 173672 std::_Facet_Register 2 API calls 17373->17374 17375 172702 17374->17375 17375->17248 17388 184516 17376->17388 17379 155a60 std::locale::_Locimp::_Locimp 2 API calls 17380 17284b 17379->17380 17381 184516 std::_Locinfo::_Locinfo_dtor 2 API calls 17380->17381 17382 17285b 17380->17382 17381->17382 17383 155a60 std::locale::_Locimp::_Locimp 2 API calls 17382->17383 17384 1440c9 17383->17384 17384->17346 17414 143540 17385->17414 17387 171d5b Concurrency::cancel_current_task 17387->17344 17389 184523 std::_Lockit::_Lockit 17388->17389 17392 1842c1 17389->17392 17391 172833 17391->17379 17393 1842cd std::_Lockit::_Lockit std::_Locinfo::_Locinfo_dtor 17392->17393 17396 18431c 17393->17396 17395 1842e8 std::_Locinfo::_Locinfo_dtor 17395->17391 17397 18447b std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 17396->17397 17398 184337 17397->17398 17399 189e42 __Getctype RtlAllocateHeap 17398->17399 17412 184370 __Getctype 17398->17412 17400 184344 17399->17400 17401 183379 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 17400->17401 17402 184369 17401->17402 17403 18b094 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 17402->17403 17402->17412 17404 184395 17403->17404 17405 183379 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 17404->17405 17404->17412 17406 1843b1 17405->17406 17407 1843b8 17406->17407 17408 1843d3 17406->17408 17409 18b01a ___std_exception_destroy RtlAllocateHeap 17407->17409 17407->17412 17410 18b01a ___std_exception_destroy RtlAllocateHeap 17408->17410 17411 1843fe 17408->17411 17409->17412 17410->17411 17411->17412 17413 18b01a ___std_exception_destroy RtlAllocateHeap 17411->17413 17412->17395 17413->17412 17415 174b15 ___std_exception_copy 2 API calls 17414->17415 17416 143585 17415->17416 17416->17387 17418 189e42 __Getctype RtlAllocateHeap 17417->17418 17419 183d03 17418->17419 17438 18a12d 17419->17438 17423 189e42 __Getctype RtlAllocateHeap 17422->17423 17424 184559 17423->17424 17425 18a12d __Getctype RtlAllocateHeap 17424->17425 17426 184569 17425->17426 17426->17353 17428 189e42 __Getctype RtlAllocateHeap 17427->17428 17429 183d4d 17428->17429 17430 18a12d __Getctype RtlAllocateHeap 17429->17430 17431 172d46 17430->17431 17431->17356 17432 184572 17431->17432 17433 18457f 17432->17433 17437 1845b3 __Getctype 17432->17437 17433->17433 17434 1823ec ___std_exception_copy 2 API calls 17433->17434 17435 1845a2 17434->17435 17435->17437 17455 18e2f4 17435->17455 17437->17356 17439 18a140 17438->17439 17440 183d13 17438->17440 17439->17440 17442 192392 17439->17442 17440->17348 17443 19239e std::_Locinfo::_Locinfo_dtor 17442->17443 17444 189e42 __Getctype RtlAllocateHeap 17443->17444 17445 1923a7 std::_Lockit::_Lockit 17444->17445 17448 1923ed 17445->17448 17451 192413 17445->17451 17447 1923d6 __Getctype 17447->17448 17449 1841c6 __Getctype RtlAllocateHeap 17447->17449 17448->17440 17450 192412 17449->17450 17452 19242e 17451->17452 17453 192421 __Getctype 17451->17453 17452->17447 17453->17452 17454 192146 __Getctype RtlAllocateHeap 17453->17454 17454->17452 17456 18e302 17455->17456 17458 18e310 17455->17458 17456->17458 17462 18e32a 17456->17462 17457 1816ff __floor_pentium4 RtlAllocateHeap 17459 18e31a 17457->17459 17458->17457 17460 178c60 ___std_exception_copy RtlAllocateHeap 17459->17460 17461 18e324 17460->17461 17461->17437 17462->17461 17463 1816ff __floor_pentium4 RtlAllocateHeap 17462->17463 17463->17459 17465 17287e 17464->17465 17466 14412c 17464->17466 17467 184516 std::_Locinfo::_Locinfo_dtor 2 API calls 17465->17467 17466->17361 17466->17362 17467->17466 17469 1793e7 std::_Locinfo::_Locinfo_dtor 17468->17469 17470 1793f0 17469->17470 17473 179414 17469->17473 17471 178be3 ___std_exception_copy RtlAllocateHeap 17470->17471 17472 179409 17471->17472 17472->17170 17476 179432 17473->17476 17477 18a1e9 17473->17477 17475 178be3 ___std_exception_copy RtlAllocateHeap 17475->17472 17476->17472 17476->17475 17478 18a20a 17477->17478 17479 18a1f5 17477->17479 17478->17476 17480 1816ff __floor_pentium4 RtlAllocateHeap 17479->17480 17481 18a1fa 17480->17481 17482 178c60 ___std_exception_copy RtlAllocateHeap 17481->17482 17483 18a205 17482->17483 17483->17476 17486 15fc8d 17484->17486 17488 15fc12 std::locale::_Locimp::_Locimp 17484->17488 17485 15fd5e 17486->17485 17487 1432d0 std::_Throw_Cpp_error 2 API calls 17486->17487 17489 15fce1 std::locale::_Locimp::_Locimp 17487->17489 17490 15fd3a std::locale::_Locimp::_Locimp 17489->17490 17491 142fe0 std::_Throw_Cpp_error RtlAllocateHeap 17489->17491 17492 15fd27 17491->17492 17494 15e4c2 17493->17494 17495 15e528 17493->17495 17497 15e4f9 17494->17497 17498 15e4ca 17494->17498 17606 143330 17495->17606 17499 15e516 17497->17499 17502 173672 std::_Facet_Register 2 API calls 17497->17502 17500 15e52d 17498->17500 17501 15e4d1 17498->17501 17499->17109 17503 142b50 Concurrency::cancel_current_task 2 API calls 17500->17503 17504 173672 std::_Facet_Register 2 API calls 17501->17504 17505 15e503 17502->17505 17506 15e4d7 17503->17506 17504->17506 17505->17109 17507 15e4e0 17506->17507 17508 178c70 std::_Throw_Cpp_error RtlAllocateHeap 17506->17508 17507->17109 17509 15e537 17508->17509 17609 156ad0 17509->17609 17511 15e574 17512 144900 std::_Throw_Cpp_error 2 API calls 17511->17512 17514 15e5fb 17512->17514 17513 15e613 17513->17109 17514->17513 17613 159b60 17514->17613 17517 234767 17516->17517 17518 23476c 17516->17518 17517->17109 17519 1823ec ___std_exception_copy 2 API calls 17518->17519 17525 2347af 17518->17525 17519->17525 17520 2347c2 17520->17109 17521 234877 17521->17109 17522 181c96 ___std_exception_destroy RtlAllocateHeap 17523 234867 17522->17523 17523->17109 17524 234821 17524->17521 17524->17522 17525->17520 17525->17524 17526 181c96 ___std_exception_destroy RtlAllocateHeap 17525->17526 17526->17524 17528 164195 17527->17528 17529 164288 17527->17529 17531 1641b1 17528->17531 17532 1641f2 17528->17532 17535 164202 17528->17535 17530 143330 2 API calls 17529->17530 17533 16428d 17530->17533 17536 173672 std::_Facet_Register 2 API calls 17531->17536 17532->17531 17532->17533 17534 142b50 Concurrency::cancel_current_task 2 API calls 17533->17534 17537 164292 17534->17537 17538 173672 std::_Facet_Register 2 API calls 17535->17538 17544 1641cf std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 17535->17544 17539 1641c4 17536->17539 17540 178c70 std::_Throw_Cpp_error RtlAllocateHeap 17537->17540 17538->17544 17539->17537 17539->17544 17541 164297 17540->17541 17542 1642fa 17541->17542 17543 1643e9 17541->17543 17653 166ff0 17542->17653 17545 143330 2 API calls 17543->17545 17648 1677d0 17544->17648 17546 1643ee 17545->17546 17548 16445a 17546->17548 17549 164549 17546->17549 17553 166ff0 2 API calls 17548->17553 17551 143330 2 API calls 17549->17551 17559 16454e 17551->17559 17552 16425e 17552->17109 17555 164496 17553->17555 17554 16470b 17557 143330 2 API calls 17554->17557 17558 1563b0 std::_Throw_Cpp_error 2 API calls 17555->17558 17556 164706 17561 142b50 Concurrency::cancel_current_task 2 API calls 17556->17561 17562 1646af 17557->17562 17574 1644c4 17558->17574 17559->17554 17559->17556 17563 164615 17559->17563 17564 1645ee 17559->17564 17560 164336 17661 167830 17560->17661 17561->17554 17565 178c70 std::_Throw_Cpp_error RtlAllocateHeap 17562->17565 17586 1646d1 std::ios_base::_Ios_base_dtor 17562->17586 17571 173672 std::_Facet_Register 2 API calls 17563->17571 17577 1645ff 17563->17577 17564->17556 17566 1645f9 17564->17566 17567 164715 17565->17567 17568 173672 std::_Facet_Register 2 API calls 17566->17568 17673 15d010 17567->17673 17568->17577 17571->17577 17572 1643b0 17572->17109 17576 167830 RtlAllocateHeap 17574->17576 17578 164510 17576->17578 17577->17562 17577->17586 17666 171f9c 17577->17666 17578->17109 17579 16472f Concurrency::cancel_current_task 17580 164798 17579->17580 17582 16477f 17579->17582 17583 16475b 17579->17583 17581 142b50 Concurrency::cancel_current_task 2 API calls 17580->17581 17587 164768 17581->17587 17585 164791 17582->17585 17589 173672 std::_Facet_Register 2 API calls 17582->17589 17583->17580 17584 164762 17583->17584 17588 173672 std::_Facet_Register 2 API calls 17584->17588 17585->17109 17586->17109 17591 178c70 std::_Throw_Cpp_error RtlAllocateHeap 17587->17591 17594 164771 17587->17594 17588->17587 17592 164789 17589->17592 17593 1647a2 17591->17593 17592->17109 17594->17109 17596 156174 17595->17596 17598 156143 std::locale::_Locimp::_Locimp 17595->17598 17597 156180 17596->17597 17599 156200 17596->17599 17600 1432d0 std::_Throw_Cpp_error 2 API calls 17597->17600 17598->17103 17599->17599 17601 158f00 std::_Throw_Cpp_error 2 API calls 17599->17601 17603 1561bf std::locale::_Locimp::_Locimp 17600->17603 17602 156232 17601->17602 17602->17103 17604 1561ed 17603->17604 17605 142fe0 std::_Throw_Cpp_error RtlAllocateHeap 17603->17605 17604->17103 17605->17604 17617 171cea 17606->17617 17610 156b02 17609->17610 17611 156b1d 17610->17611 17637 1550e0 17610->17637 17611->17511 17614 159bbb 17613->17614 17615 159b96 17613->17615 17614->17513 17615->17614 17645 1588a0 17615->17645 17624 171a9f 17617->17624 17619 171cfb Concurrency::cancel_current_task 17627 171af4 17619->17627 17621 171d1b Concurrency::cancel_current_task 17630 171b37 17621->17630 17623 171d3b Concurrency::cancel_current_task 17634 1434e0 17624->17634 17628 1434e0 std::invalid_argument::invalid_argument 2 API calls 17627->17628 17629 171b06 17628->17629 17629->17621 17631 171b4b std::regex_error::regex_error 17630->17631 17632 1434e0 std::invalid_argument::invalid_argument 2 API calls 17631->17632 17633 171b54 17632->17633 17633->17623 17635 174b15 ___std_exception_copy 2 API calls 17634->17635 17636 143522 17635->17636 17636->17619 17638 155117 17637->17638 17643 1551b5 17637->17643 17639 156ad0 2 API calls 17638->17639 17640 155120 17639->17640 17641 15519d 17640->17641 17644 144900 std::_Throw_Cpp_error 2 API calls 17640->17644 17642 159b60 2 API calls 17641->17642 17641->17643 17642->17643 17643->17611 17644->17641 17646 144900 std::_Throw_Cpp_error 2 API calls 17645->17646 17647 1588bf 17646->17647 17647->17614 17649 1677dc 17648->17649 17650 1677f9 std::ios_base::_Ios_base_dtor 17648->17650 17649->17650 17651 178c70 std::_Throw_Cpp_error RtlAllocateHeap 17649->17651 17650->17552 17652 167824 17651->17652 17654 16703c 17653->17654 17655 166ff9 17653->17655 17654->17654 17655->17654 17656 167013 17655->17656 17657 173672 std::_Facet_Register 2 API calls 17655->17657 17658 173672 std::_Facet_Register 2 API calls 17656->17658 17660 16701c 17656->17660 17657->17656 17659 167035 17658->17659 17659->17560 17660->17560 17662 167882 std::ios_base::_Ios_base_dtor 17661->17662 17663 16783d 17661->17663 17662->17572 17663->17662 17664 178c70 std::_Throw_Cpp_error RtlAllocateHeap 17663->17664 17665 1678b6 17664->17665 17667 171fa5 17666->17667 17668 171fb2 17666->17668 17667->17668 17669 1841c6 __Getctype RtlAllocateHeap 17667->17669 17668->17577 17670 171fbb 17669->17670 17671 171f9c RtlAllocateHeap 17670->17671 17672 171fca 17671->17672 17672->17577 17674 15d02e 17673->17674 17675 15d01a 17673->17675 17677 159910 17674->17677 17675->17674 17676 171f9c RtlAllocateHeap 17675->17676 17676->17675 17678 159928 17677->17678 17679 159938 std::ios_base::_Ios_base_dtor 17677->17679 17678->17679 17680 178c70 std::_Throw_Cpp_error RtlAllocateHeap 17678->17680 17679->17579 17681 15994d 17680->17681 17685 17976a std::_Locinfo::_Locinfo_dtor 17682->17685 17683 179771 17684 1816ff __floor_pentium4 RtlAllocateHeap 17683->17684 17686 179776 17684->17686 17685->17683 17687 179791 17685->17687 17688 178c60 ___std_exception_copy RtlAllocateHeap 17686->17688 17689 179796 17687->17689 17690 1797a3 17687->17690 17695 179781 17688->17695 17692 1816ff __floor_pentium4 RtlAllocateHeap 17689->17692 17696 18a8ef 17690->17696 17692->17695 17693 1797ac 17694 1816ff __floor_pentium4 RtlAllocateHeap 17693->17694 17693->17695 17694->17695 17695->17112 17697 18a8fb std::_Lockit::_Lockit std::_Locinfo::_Locinfo_dtor 17696->17697 17700 18a993 17697->17700 17699 18a916 17699->17693 17702 18a9b6 17700->17702 17701 18a65a __Getctype RtlAllocateHeap 17703 18aa17 17701->17703 17702->17701 17705 18a9fc std::locale::_Setgloballocale 17702->17705 17704 18b01a ___std_exception_destroy RtlAllocateHeap 17703->17704 17704->17705 17705->17699 17720 17ce79 17706->17720 17708 17d6ff 17714 17d723 17708->17714 17727 17e1d0 17708->17727 17709 17d6b7 17709->17708 17710 17d6cc 17709->17710 17719 17d6e7 std::_Locinfo::_Locinfo_dtor 17709->17719 17711 178be3 ___std_exception_copy RtlAllocateHeap 17710->17711 17711->17719 17716 17d747 17714->17716 17734 17ce94 17714->17734 17715 17d7cf 17717 17ce22 RtlAllocateHeap 17715->17717 17716->17715 17741 17ce22 17716->17741 17717->17719 17719->17120 17721 17ce91 17720->17721 17722 17ce7e 17720->17722 17721->17709 17723 1816ff __floor_pentium4 RtlAllocateHeap 17722->17723 17724 17ce83 17723->17724 17725 178c60 ___std_exception_copy RtlAllocateHeap 17724->17725 17726 17ce8e 17725->17726 17726->17709 17728 178a47 ___std_exception_copy RtlAllocateHeap 17727->17728 17729 17e1e0 17728->17729 17747 18a15a 17729->17747 17735 17cea0 17734->17735 17737 17ceb6 17734->17737 17736 18454e __Getctype RtlAllocateHeap 17735->17736 17738 17ceab std::_Locinfo::_Locinfo_dtor 17736->17738 17739 17cec6 17737->17739 17849 189a39 17737->17849 17738->17714 17739->17714 17742 17ce47 17741->17742 17743 17ce33 17741->17743 17742->17715 17743->17742 17744 1816ff __floor_pentium4 RtlAllocateHeap 17743->17744 17745 17ce3c 17744->17745 17746 178c60 ___std_exception_copy RtlAllocateHeap 17745->17746 17746->17742 17748 17e1fd 17747->17748 17749 18a171 17747->17749 17751 18a1b8 17748->17751 17749->17748 17750 192392 __Getctype RtlAllocateHeap 17749->17750 17750->17748 17752 18a1cf 17751->17752 17754 17e20a 17751->17754 17752->17754 17755 1906bd 17752->17755 17754->17714 17756 189e42 __Getctype RtlAllocateHeap 17755->17756 17757 1906c2 17756->17757 17760 1905d5 17757->17760 17759 1906cd 17759->17754 17764 1905e1 std::_Lockit::_Lockit std::_Locinfo::_Locinfo_dtor 17760->17764 17761 190602 17761->17759 17762 1905fb std::_Locinfo::_Locinfo_dtor 17762->17761 17763 1841c6 __Getctype RtlAllocateHeap 17762->17763 17765 190674 17763->17765 17764->17762 17767 18b01a ___std_exception_destroy RtlAllocateHeap 17764->17767 17766 1906b0 17765->17766 17771 189efd 17765->17771 17766->17759 17767->17762 17772 189f08 __Getctype 17771->17772 17773 18a65a __Getctype RtlAllocateHeap 17772->17773 17783 189f14 17772->17783 17777 189f38 __Getctype 17773->17777 17774 1841c6 __Getctype RtlAllocateHeap 17776 189f92 17774->17776 17775 189f19 17785 190480 17775->17785 17778 189f74 17777->17778 17779 189f40 __Getctype 17777->17779 17780 189c70 __Getctype RtlAllocateHeap 17778->17780 17781 18b01a ___std_exception_destroy RtlAllocateHeap 17779->17781 17782 189f7f 17780->17782 17781->17783 17784 18b01a ___std_exception_destroy RtlAllocateHeap 17782->17784 17783->17774 17783->17775 17784->17775 17786 1905d5 std::_Locinfo::_Locinfo_dtor 2 API calls 17785->17786 17787 1904aa 17786->17787 17808 190207 17787->17808 17790 1904c3 17790->17766 17793 1904ea 17817 1906d0 17793->17817 17794 1904dc 17795 18b01a ___std_exception_destroy RtlAllocateHeap 17794->17795 17795->17790 17797 190517 17798 190522 17797->17798 17802 19053d std::_Locinfo::_Locinfo_dtor 17797->17802 17799 1816ff __floor_pentium4 RtlAllocateHeap 17798->17799 17800 190527 17799->17800 17801 18b01a ___std_exception_destroy RtlAllocateHeap 17800->17801 17801->17790 17804 18b01a ___std_exception_destroy RtlAllocateHeap 17802->17804 17807 190569 17802->17807 17803 18b01a ___std_exception_destroy RtlAllocateHeap 17803->17790 17804->17807 17806 1905b2 17806->17803 17807->17806 17822 1900f9 17807->17822 17826 1795ae 17808->17826 17811 18b094 17812 18b0d2 17811->17812 17816 18b0a2 __Getctype std::_Facet_Register 17811->17816 17813 1816ff __floor_pentium4 RtlAllocateHeap 17812->17813 17815 18b0d0 17813->17815 17814 18b0bd RtlAllocateHeap 17814->17815 17814->17816 17815->17793 17815->17794 17816->17812 17816->17814 17818 190207 std::_Locinfo::_Locinfo_dtor 2 API calls 17817->17818 17821 1906f0 std::_Locinfo::_Locinfo_dtor std::locale::_Setgloballocale 17818->17821 17819 1907f5 std::_Locinfo::_Locinfo_dtor _ValidateLocalCookies 17819->17797 17821->17819 17834 1902db 17821->17834 17823 190105 std::_Lockit::_Lockit std::_Locinfo::_Locinfo_dtor 17822->17823 17842 190146 17823->17842 17825 19011c std::_Locinfo::_Locinfo_dtor 17825->17806 17827 1795cc 17826->17827 17833 1795c5 17826->17833 17828 189e42 __Getctype RtlAllocateHeap 17827->17828 17827->17833 17829 1795ed 17828->17829 17830 18a12d __Getctype RtlAllocateHeap 17829->17830 17831 179603 17830->17831 17832 18a18b std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 17831->17832 17832->17833 17833->17790 17833->17811 17835 190303 17834->17835 17841 1903cc _ValidateLocalCookies 17834->17841 17836 18f44d std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 17835->17836 17835->17841 17837 190383 17836->17837 17838 18a8a6 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 17837->17838 17839 1903a4 17838->17839 17840 18a8a6 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 17839->17840 17840->17841 17841->17819 17843 17ceeb std::_Locinfo::_Locinfo_dtor RtlAllocateHeap 17842->17843 17844 190168 17843->17844 17845 17ceeb std::_Locinfo::_Locinfo_dtor RtlAllocateHeap 17844->17845 17846 190187 17845->17846 17847 1901ae 17846->17847 17848 18b01a ___std_exception_destroy RtlAllocateHeap 17846->17848 17847->17825 17848->17847 17850 1795ae std::_Locinfo::_Locinfo_dtor 2 API calls 17849->17850 17851 189a56 17850->17851 17853 189a66 _ValidateLocalCookies 17851->17853 17854 18f44d 17851->17854 17853->17739 17855 1795ae std::_Locinfo::_Locinfo_dtor 2 API calls 17854->17855 17856 18f46d std::_Locinfo::_Locinfo_dtor 17855->17856 17857 18b094 std::_Locinfo::_Locinfo_dtor 2 API calls 17856->17857 17858 18f529 _ValidateLocalCookies 17856->17858 17860 18f4bf std::_Locinfo::_Locinfo_dtor std::locale::_Setgloballocale 17856->17860 17857->17860 17858->17853 17861 173275 17860->17861 17862 17327f 17861->17862 17864 173290 17861->17864 17863 181c96 ___std_exception_destroy RtlAllocateHeap 17862->17863 17862->17864 17863->17864 17864->17858 17866 15ab55 17865->17866 17867 15aba3 17866->17867 17874 15e8a0 17866->17874 17869 15ab83 17869->17127 17871 143459 17870->17871 17878 180dd7 17871->17878 17875 15e8ce 17874->17875 17877 15e8f8 std::locale::_Locimp::_Locimp 17874->17877 17876 1432d0 std::_Throw_Cpp_error 2 API calls 17875->17876 17876->17877 17877->17869 17879 180deb ___std_exception_copy 17878->17879 17884 17e565 17879->17884 17881 180e06 17882 17899c ___std_exception_copy RtlAllocateHeap 17881->17882 17883 143467 17882->17883 17883->17131 17883->17132 17885 17e5b4 17884->17885 17886 17e591 17884->17886 17885->17886 17888 17e5bc 17885->17888 17887 178be3 ___std_exception_copy RtlAllocateHeap 17886->17887 17889 17e5a9 _ValidateLocalCookies 17887->17889 17893 17faa7 17888->17893 17889->17881 17911 180b0d 17893->17911 17896 17faf4 std::_Locinfo::_Locinfo_dtor 17899 17e63d 17896->17899 17902 17e1d0 std::_Locinfo::_Locinfo_dtor 2 API calls 17896->17902 17904 17fbd0 17896->17904 17915 17f49b 17896->17915 17918 17fed4 17896->17918 17950 18036f 17896->17950 17897 17facc 17898 178be3 ___std_exception_copy RtlAllocateHeap 17897->17898 17898->17899 17908 17f28d 17899->17908 17902->17896 17905 178be3 ___std_exception_copy RtlAllocateHeap 17904->17905 17906 17fbea 17905->17906 17907 178be3 ___std_exception_copy RtlAllocateHeap 17906->17907 17907->17899 17909 18b01a ___std_exception_destroy RtlAllocateHeap 17908->17909 17910 17f29d 17909->17910 17910->17889 17912 17fac1 17911->17912 17913 180b18 17911->17913 17912->17896 17912->17897 17912->17899 17914 178be3 ___std_exception_copy RtlAllocateHeap 17913->17914 17914->17912 17977 17e842 17915->17977 17917 17f4d6 17917->17896 17919 17fef2 17918->17919 17920 17fedb 17918->17920 17923 178be3 ___std_exception_copy RtlAllocateHeap 17919->17923 17933 17ff31 17919->17933 17921 1803f4 17920->17921 17922 180394 17920->17922 17920->17933 17927 1803f9 17921->17927 17928 18042d 17921->17928 17924 18041a 17922->17924 17925 18039a 17922->17925 17926 17ff26 17923->17926 18012 17ebfc 17924->18012 17939 18039f 17925->17939 17940 1803eb 17925->17940 17926->17896 17929 1803fb 17927->17929 17930 180426 17927->17930 17931 18044a 17928->17931 17932 180432 17928->17932 17935 1803ae 17929->17935 17942 18040a 17929->17942 18019 180a30 17930->18019 18023 180a4d 17931->18023 17932->17924 17932->17940 17949 1803c5 17932->17949 17933->17896 17948 180453 _ValidateLocalCookies 17935->17948 17987 180785 17935->17987 17939->17935 17943 1803d8 17939->17943 17939->17949 17940->17948 18001 17ed89 17940->18001 17942->17924 17945 18040e 17942->17945 17943->17948 17997 180916 17943->17997 17945->17948 18008 1809ab 17945->18008 17948->17896 17949->17948 18026 18c5ba 17949->18026 17951 1803f4 17950->17951 17952 180394 17950->17952 17955 1803f9 17951->17955 17956 18042d 17951->17956 17953 18041a 17952->17953 17954 18039a 17952->17954 17962 17ebfc 2 API calls 17953->17962 17966 18039f 17954->17966 17967 1803eb 17954->17967 17957 1803fb 17955->17957 17958 180426 17955->17958 17959 18044a 17956->17959 17960 180432 17956->17960 17964 1803ae 17957->17964 17970 18040a 17957->17970 17963 180a30 2 API calls 17958->17963 17961 180a4d 2 API calls 17959->17961 17960->17953 17960->17967 17974 1803c5 17960->17974 17961->17974 17962->17974 17963->17974 17965 180785 2 API calls 17964->17965 17976 180453 _ValidateLocalCookies 17964->17976 17965->17974 17966->17964 17968 1803d8 17966->17968 17966->17974 17969 17ed89 2 API calls 17967->17969 17967->17976 17971 180916 2 API calls 17968->17971 17968->17976 17969->17974 17970->17953 17972 18040e 17970->17972 17971->17974 17973 1809ab RtlAllocateHeap 17972->17973 17972->17976 17973->17974 17975 18c5ba 2 API calls 17974->17975 17974->17976 17975->17974 17976->17896 17978 17ce79 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap 17977->17978 17979 17e854 17978->17979 17980 17e869 17979->17980 17983 17e89c 17979->17983 17986 17e884 std::_Locinfo::_Locinfo_dtor 17979->17986 17981 178be3 ___std_exception_copy RtlAllocateHeap 17980->17981 17981->17986 17982 17e933 17984 17ce22 RtlAllocateHeap 17982->17984 17983->17982 17985 17ce22 RtlAllocateHeap 17983->17985 17984->17986 17985->17982 17986->17917 17988 18079f 17987->17988 18032 17e790 17988->18032 17990 1807de 18043 18c439 17990->18043 17992 180895 17995 17e1d0 std::_Locinfo::_Locinfo_dtor 2 API calls 17992->17995 17996 1808c8 17992->17996 17994 17e1d0 std::_Locinfo::_Locinfo_dtor 2 API calls 17994->17992 17995->17996 17996->17949 17999 180931 17997->17999 17998 180967 17998->17949 17999->17998 18000 18c5ba 2 API calls 17999->18000 18000->17998 18002 17ed9e 18001->18002 18003 17ede7 18002->18003 18004 17edc0 18002->18004 18006 17e790 2 API calls 18003->18006 18007 17eddd 18003->18007 18005 178be3 ___std_exception_copy RtlAllocateHeap 18004->18005 18005->18007 18006->18007 18007->17949 18011 1809c1 18008->18011 18009 178be3 ___std_exception_copy RtlAllocateHeap 18010 1809e2 18009->18010 18010->17949 18011->18009 18011->18010 18013 17ec11 18012->18013 18014 17ec33 18013->18014 18016 17ec5a 18013->18016 18015 178be3 ___std_exception_copy RtlAllocateHeap 18014->18015 18018 17ec50 18015->18018 18017 17e790 2 API calls 18016->18017 18016->18018 18017->18018 18018->17949 18020 180a3c 18019->18020 18104 17ea6f 18020->18104 18022 180a4c 18022->17949 18024 17ed89 2 API calls 18023->18024 18025 180a62 18024->18025 18025->17949 18027 18c5cf 18026->18027 18029 17e1d0 std::_Locinfo::_Locinfo_dtor 2 API calls 18027->18029 18030 18c5d3 std::_Locinfo::_Locinfo_dtor std::locale::_Setgloballocale 18027->18030 18031 18c5fc std::_Locinfo::_Locinfo_dtor std::locale::_Setgloballocale 18027->18031 18028 178be3 ___std_exception_copy RtlAllocateHeap 18028->18030 18029->18031 18030->17949 18031->18028 18031->18030 18033 17e7b7 18032->18033 18034 17e7a5 18032->18034 18033->18034 18035 18b094 std::_Locinfo::_Locinfo_dtor 2 API calls 18033->18035 18034->17990 18036 17e7db 18035->18036 18037 17e7e3 18036->18037 18038 17e7ee 18036->18038 18039 18b01a ___std_exception_destroy RtlAllocateHeap 18037->18039 18062 17f2a7 18038->18062 18039->18034 18042 18b01a ___std_exception_destroy RtlAllocateHeap 18042->18034 18044 18c46e 18043->18044 18046 18c44a 18043->18046 18044->18046 18047 18c4a1 18044->18047 18045 178be3 ___std_exception_copy RtlAllocateHeap 18059 180871 18045->18059 18046->18045 18048 18c4da 18047->18048 18050 18c509 18047->18050 18065 18c2dd 18048->18065 18049 18c532 18054 18c599 18049->18054 18055 18c55f 18049->18055 18050->18049 18051 18c537 18050->18051 18070 18bb66 18051->18070 18097 18be93 18054->18097 18057 18c57f 18055->18057 18058 18c564 18055->18058 18090 18c08a 18057->18090 18080 18c20e 18058->18080 18059->17992 18059->17994 18063 18b01a ___std_exception_destroy RtlAllocateHeap 18062->18063 18064 17e7f9 18063->18064 18064->18042 18066 18c2f3 18065->18066 18067 18c2fe 18065->18067 18066->18059 18068 1899a5 ___std_exception_copy RtlAllocateHeap 18067->18068 18069 18c359 __Getctype 18068->18069 18069->18059 18071 18bb79 18070->18071 18072 18bb88 18071->18072 18073 18bbaa 18071->18073 18075 178be3 ___std_exception_copy RtlAllocateHeap 18072->18075 18074 18bbbf 18073->18074 18078 18bc12 18073->18078 18076 18be93 RtlAllocateHeap RtlAllocateHeap 18074->18076 18077 18bba0 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z std::locale::_Setgloballocale __allrem _strrchr 18075->18077 18076->18077 18077->18059 18078->18077 18079 17e1d0 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 18078->18079 18079->18077 18081 1947bf RtlAllocateHeap 18080->18081 18082 18c23e 18081->18082 18083 1946c5 RtlAllocateHeap 18082->18083 18086 18c27c 18083->18086 18084 18c283 18084->18059 18085 18c2bc 18087 18bf37 RtlAllocateHeap RtlAllocateHeap 18085->18087 18086->18084 18086->18085 18088 18c295 18086->18088 18087->18084 18089 18c120 RtlAllocateHeap RtlAllocateHeap 18088->18089 18089->18084 18091 1947bf RtlAllocateHeap 18090->18091 18092 18c0b9 18091->18092 18093 1946c5 RtlAllocateHeap 18092->18093 18094 18c0fa 18093->18094 18095 18c101 18094->18095 18096 18c120 RtlAllocateHeap RtlAllocateHeap 18094->18096 18095->18059 18096->18095 18098 1947bf RtlAllocateHeap 18097->18098 18099 18bebd 18098->18099 18100 1946c5 RtlAllocateHeap 18099->18100 18101 18bf0b 18100->18101 18102 18bf12 18101->18102 18103 18bf37 RtlAllocateHeap RtlAllocateHeap 18101->18103 18102->18059 18103->18102 18105 17ea84 18104->18105 18106 17eaa6 18105->18106 18108 17eacd 18105->18108 18107 178be3 ___std_exception_copy RtlAllocateHeap 18106->18107 18110 17eac3 18107->18110 18109 17e790 2 API calls 18108->18109 18108->18110 18109->18110 18110->18022 18112 181440 18111->18112 18113 181418 18111->18113 18112->17137 18113->18112 18114 181425 18113->18114 18115 181447 18113->18115 18117 178be3 ___std_exception_copy RtlAllocateHeap 18114->18117 18119 181363 18115->18119 18117->18112 18118 18147f 18118->17137 18120 18136f std::_Locinfo::_Locinfo_dtor 18119->18120 18123 1813be 18120->18123 18122 18138a 18122->18118 18130 18c8aa 18123->18130 18150 18c86c 18130->18150 18132 18c8bb 18133 1813d6 18132->18133 18134 18b094 std::_Locinfo::_Locinfo_dtor 2 API calls 18132->18134 18137 181481 18133->18137 18135 18c914 18134->18135 18136 18b01a ___std_exception_destroy RtlAllocateHeap 18135->18136 18136->18133 18139 181493 18137->18139 18141 1813f4 18137->18141 18138 1814a1 18140 178be3 ___std_exception_copy RtlAllocateHeap 18138->18140 18139->18138 18139->18141 18144 1814d7 std::locale::_Locimp::_Locimp 18139->18144 18140->18141 18146 18c955 18141->18146 18143 18a1e9 RtlAllocateHeap 18143->18144 18144->18141 18144->18143 18166 179a91 18144->18166 18172 189678 18144->18172 18147 18c960 18146->18147 18148 181400 18146->18148 18147->18148 18149 179a91 4 API calls 18147->18149 18148->18122 18149->18148 18151 18c878 18150->18151 18152 18c8a2 18151->18152 18153 18a1e9 RtlAllocateHeap 18151->18153 18152->18132 18154 18c893 18153->18154 18157 193be3 18154->18157 18156 18c899 18156->18132 18158 193bfd 18157->18158 18159 193bf0 18157->18159 18161 193c09 18158->18161 18162 1816ff __floor_pentium4 RtlAllocateHeap 18158->18162 18160 1816ff __floor_pentium4 RtlAllocateHeap 18159->18160 18163 193bf5 18160->18163 18161->18156 18164 193c2a 18162->18164 18163->18156 18165 178c60 ___std_exception_copy RtlAllocateHeap 18164->18165 18165->18163 18167 179ad1 18166->18167 18168 179aaa 18166->18168 18167->18144 18168->18167 18169 18a1e9 RtlAllocateHeap 18168->18169 18170 179ac6 18169->18170 18171 189678 4 API calls 18170->18171 18171->18167 18173 189684 std::_Locinfo::_Locinfo_dtor 18172->18173 18174 1896c5 18173->18174 18176 18968c 18173->18176 18177 18970b 18173->18177 18175 178be3 ___std_exception_copy RtlAllocateHeap 18174->18175 18175->18176 18176->18144 18177->18176 18179 189789 18177->18179 18180 1897b1 18179->18180 18192 1897d4 18179->18192 18181 1897b5 18180->18181 18183 189810 18180->18183 18182 178be3 ___std_exception_copy RtlAllocateHeap 18181->18182 18182->18192 18184 18982e 18183->18184 18198 18263d 18183->18198 18193 1892ce 18184->18193 18188 18988d 18190 1898f6 WriteFile 18188->18190 18188->18192 18189 189846 18189->18192 18201 188e9f 18189->18201 18190->18192 18192->18176 18194 193be3 RtlAllocateHeap 18193->18194 18196 1892e0 18194->18196 18195 18930e 18195->18188 18195->18189 18196->18195 18197 17e1d0 std::_Locinfo::_Locinfo_dtor 2 API calls 18196->18197 18197->18195 18207 18251c 18198->18207 18200 182656 18200->18184 18202 188f07 18201->18202 18203 17e1d0 std::_Locinfo::_Locinfo_dtor 2 API calls 18202->18203 18205 188f18 std::_Locinfo::_Locinfo_dtor std::locale::_Locimp::_Locimp 18202->18205 18203->18205 18204 18c724 RtlAllocateHeap RtlAllocateHeap 18204->18205 18205->18204 18206 1891ce _ValidateLocalCookies 18205->18206 18206->18192 18208 18e940 RtlAllocateHeap 18207->18208 18209 18252e 18208->18209 18210 18254a SetFilePointerEx 18209->18210 18211 182536 18209->18211 18210->18211 18211->18200 18213 17cf8f std::_Locinfo::_Locinfo_dtor 18212->18213 18214 17cf99 18213->18214 18217 17cfbc 18213->18217 18215 178be3 ___std_exception_copy RtlAllocateHeap 18214->18215 18216 17cfb4 18215->18216 18216->17143 18217->18216 18219 17d01a 18217->18219 18220 17d027 18219->18220 18222 17d04a 18219->18222 18221 178be3 ___std_exception_copy RtlAllocateHeap 18220->18221 18223 17d042 18221->18223 18222->18223 18224 179a91 4 API calls 18222->18224 18223->18216 18225 17d062 18224->18225 18233 18b054 18225->18233 18228 18a1e9 RtlAllocateHeap 18229 17d076 18228->18229 18237 188d2c 18229->18237 18232 18b01a ___std_exception_destroy RtlAllocateHeap 18232->18223 18234 18b06b 18233->18234 18236 17d06a 18233->18236 18235 18b01a ___std_exception_destroy RtlAllocateHeap 18234->18235 18234->18236 18235->18236 18236->18228 18240 188d55 18237->18240 18243 17d07d 18237->18243 18238 188da4 18239 178be3 ___std_exception_copy RtlAllocateHeap 18238->18239 18239->18243 18240->18238 18241 188d7c 18240->18241 18244 188c9b 18241->18244 18243->18223 18243->18232 18245 188ca7 std::_Locinfo::_Locinfo_dtor 18244->18245 18247 188ce6 18245->18247 18248 188dff 18245->18248 18247->18243 18260 18e940 18248->18260 18250 188e15 18273 18e8af 18250->18273 18252 188e0f 18252->18250 18253 188e47 18252->18253 18255 18e940 RtlAllocateHeap 18252->18255 18253->18250 18254 18e940 RtlAllocateHeap 18253->18254 18257 188e53 FindCloseChangeNotification 18254->18257 18256 188e3e 18255->18256 18258 18e940 RtlAllocateHeap 18256->18258 18257->18250 18258->18253 18259 188e6d 18259->18247 18261 18e94d 18260->18261 18264 18e962 18260->18264 18279 1816ec 18261->18279 18265 1816ec RtlAllocateHeap 18264->18265 18267 18e987 18264->18267 18268 18e992 18265->18268 18266 1816ff __floor_pentium4 RtlAllocateHeap 18270 18e95a 18266->18270 18267->18252 18269 1816ff __floor_pentium4 RtlAllocateHeap 18268->18269 18271 18e99a 18269->18271 18270->18252 18272 178c60 ___std_exception_copy RtlAllocateHeap 18271->18272 18272->18270 18274 18e8be 18273->18274 18275 1816ff __floor_pentium4 RtlAllocateHeap 18274->18275 18278 18e8e8 18274->18278 18276 18e92a 18275->18276 18277 1816ec RtlAllocateHeap 18276->18277 18277->18278 18278->18259 18280 189f93 __floor_pentium4 RtlAllocateHeap 18279->18280 18281 1816f1 18280->18281 18281->18266 18283 158034 18282->18283 18284 157f1d 18282->18284 18291 142cf0 std::_Throw_Cpp_error 2 API calls 18283->18291 18296 157f29 18283->18296 18285 157f24 18284->18285 18286 157f83 18284->18286 18287 157f7c 18284->18287 18288 157fcb 18284->18288 18289 157f2b 18284->18289 18357 15c3a0 18285->18357 18293 173672 std::_Facet_Register 2 API calls 18286->18293 18362 15cf80 18287->18362 18288->17148 18290 173672 std::_Facet_Register 2 API calls 18289->18290 18290->18296 18295 15804f 18291->18295 18293->18296 18367 147f90 18295->18367 18296->17148 18298 158062 Concurrency::cancel_current_task 18301 16215f 18299->18301 18424 18133b 18301->18424 18304 15b4f0 18305 15db10 18304->18305 18306 15db56 18305->18306 18307 15de3d 18305->18307 18476 15ebb0 18306->18476 18310 15fd70 2 API calls 18307->18310 18309 15dba4 18313 15fd70 2 API calls 18309->18313 18311 15de87 18310->18311 18312 15eda0 3 API calls 18311->18312 18314 15df4f std::ios_base::_Ios_base_dtor 18311->18314 18315 15dee2 18312->18315 18316 15dbc1 18313->18316 18317 157ef0 2 API calls 18314->18317 18320 15dfc7 18314->18320 18342 15e0a1 Concurrency::cancel_current_task 18314->18342 18319 1475c0 2 API calls 18315->18319 18355 15dcc3 std::ios_base::_Ios_base_dtor 18316->18355 18482 15eda0 18316->18482 18317->18320 18318 15de38 std::ios_base::_Ios_base_dtor 18318->17152 18321 15df06 18319->18321 18320->18318 18325 178c70 std::_Throw_Cpp_error RtlAllocateHeap 18320->18325 18326 15f440 3 API calls 18321->18326 18323 15dd82 18331 157ef0 2 API calls 18323->18331 18335 15dd9f 18323->18335 18324 15dcec 18328 157ef0 2 API calls 18324->18328 18329 15e06f 18325->18329 18340 15df1f 18326->18340 18327 15dc1c 18529 1475c0 18327->18529 18352 15dd01 18328->18352 18578 1590b0 18329->18578 18331->18335 18333 15e093 18338 1590b0 2 API calls 18333->18338 18334 15dc40 18559 15f440 18334->18559 18339 1535b0 RtlAllocateHeap 18335->18339 18336 15e07d Concurrency::cancel_current_task 18346 178c70 std::_Throw_Cpp_error RtlAllocateHeap 18336->18346 18338->18342 18343 15dd6c 18339->18343 18340->18333 18344 147a20 RtlAllocateHeap 18340->18344 18341 15dc56 18341->18329 18345 15dc6b 18341->18345 18347 178c70 std::_Throw_Cpp_error RtlAllocateHeap 18342->18347 18349 1535b0 RtlAllocateHeap 18343->18349 18344->18314 18568 147a20 18345->18568 18346->18333 18351 15e0b7 18347->18351 18353 15de26 18349->18353 18573 1535b0 18352->18573 18354 1535b0 RtlAllocateHeap 18353->18354 18354->18318 18355->18323 18355->18324 18356 15dc86 18356->18336 18356->18355 18358 173672 std::_Facet_Register 2 API calls 18357->18358 18359 15c3c3 18358->18359 18360 173672 std::_Facet_Register 2 API calls 18359->18360 18361 15c3ec 18360->18361 18361->18296 18363 173672 std::_Facet_Register 2 API calls 18362->18363 18364 15cfb7 18363->18364 18365 143040 std::_Throw_Cpp_error 2 API calls 18364->18365 18366 15cfee 18365->18366 18366->18296 18378 147350 18367->18378 18369 148029 18396 15ad80 18369->18396 18371 14803d 18372 148076 std::ios_base::_Ios_base_dtor 18371->18372 18374 1480df 18371->18374 18400 1472b0 18372->18400 18376 178c70 std::_Throw_Cpp_error RtlAllocateHeap 18374->18376 18375 1480aa 18375->18298 18377 1480e4 18376->18377 18377->18298 18403 144d70 18378->18403 18387 158f00 std::_Throw_Cpp_error 2 API calls 18388 1473e6 18387->18388 18389 178c70 std::_Throw_Cpp_error RtlAllocateHeap 18388->18389 18390 147476 std::ios_base::_Ios_base_dtor 18388->18390 18391 1474c4 18389->18391 18390->18369 18392 174b78 ___std_exception_destroy RtlAllocateHeap 18391->18392 18393 147511 18392->18393 18394 174b78 ___std_exception_destroy RtlAllocateHeap 18393->18394 18395 147527 std::ios_base::_Ios_base_dtor 18394->18395 18395->18369 18397 15adb4 18396->18397 18398 158f00 std::_Throw_Cpp_error 2 API calls 18397->18398 18399 15adbf 18398->18399 18399->18371 18401 174b15 ___std_exception_copy 2 API calls 18400->18401 18402 14731a 18401->18402 18402->18375 18404 144da6 18403->18404 18405 144dd8 18404->18405 18406 143040 std::_Throw_Cpp_error 2 API calls 18404->18406 18407 15ac50 18405->18407 18406->18405 18408 15ac81 18407->18408 18409 15acd3 18408->18409 18410 15e8a0 2 API calls 18408->18410 18411 1473af 18410->18411 18412 15abb0 18411->18412 18413 15abe1 18412->18413 18413->18413 18414 158f00 std::_Throw_Cpp_error 2 API calls 18413->18414 18415 1473c2 18414->18415 18416 15ae20 18415->18416 18419 15e710 18416->18419 18418 1473d1 18418->18387 18420 15e753 18419->18420 18421 1432d0 std::_Throw_Cpp_error 2 API calls 18420->18421 18422 15e758 std::locale::_Locimp::_Locimp 18420->18422 18423 15e843 std::locale::_Locimp::_Locimp 18421->18423 18422->18418 18423->18418 18425 189e42 __Getctype RtlAllocateHeap 18424->18425 18426 181346 18425->18426 18427 18a12d __Getctype RtlAllocateHeap 18426->18427 18428 16225f 18427->18428 18429 15fd70 18428->18429 18432 15fd84 18429->18432 18435 15fde4 18429->18435 18431 15ff6c 18431->18304 18436 15fdc2 18432->18436 18443 169e20 18432->18443 18438 15fe74 18435->18438 18465 1601e0 18435->18465 18436->18435 18437 169e20 2 API calls 18436->18437 18439 15fe58 18436->18439 18437->18439 18438->18304 18439->18438 18461 161430 18439->18461 18441 169e20 2 API calls 18442 15fecc 18441->18442 18442->18431 18442->18441 18469 1608f0 18442->18469 18444 169f76 18443->18444 18445 169e62 18443->18445 18447 143330 2 API calls 18444->18447 18446 169e7c 18445->18446 18448 169eca 18445->18448 18449 169eba 18445->18449 18451 173672 std::_Facet_Register 2 API calls 18446->18451 18450 169f7b 18447->18450 18455 173672 std::_Facet_Register 2 API calls 18448->18455 18458 169e9a std::locale::_Locimp::_Locimp 18448->18458 18449->18446 18449->18450 18452 142b50 Concurrency::cancel_current_task 2 API calls 18450->18452 18454 169e8f 18451->18454 18453 169f80 18452->18453 18456 178c70 std::_Throw_Cpp_error RtlAllocateHeap 18453->18456 18454->18453 18454->18458 18455->18458 18457 169f85 18456->18457 18459 1677d0 RtlAllocateHeap 18458->18459 18460 169f47 18459->18460 18460->18436 18462 161443 18461->18462 18463 161471 18462->18463 18464 169e20 2 API calls 18462->18464 18463->18435 18464->18463 18466 1601f0 18465->18466 18467 169e20 2 API calls 18466->18467 18468 160260 18466->18468 18467->18466 18468->18442 18470 161430 2 API calls 18469->18470 18472 1608fc 18470->18472 18471 16090a 18471->18442 18472->18471 18473 169e20 2 API calls 18472->18473 18474 160995 18472->18474 18473->18472 18474->18471 18475 169e20 RtlAllocateHeap RtlAllocateHeap 18474->18475 18475->18474 18477 15ec6d 18476->18477 18478 157ef0 2 API calls 18477->18478 18479 15ec8d 18478->18479 18581 1616c0 18479->18581 18481 15ecdf 18481->18309 18483 15ee46 18482->18483 18507 15ef1f std::ios_base::_Ios_base_dtor 18482->18507 18485 15f425 18483->18485 18487 15e8a0 2 API calls 18483->18487 18484 158f00 std::_Throw_Cpp_error 2 API calls 18486 15ef5b 18484->18486 18491 178c70 std::_Throw_Cpp_error RtlAllocateHeap 18485->18491 18488 15ef6a 18486->18488 18496 15f191 18486->18496 18489 15ee79 18487->18489 18490 15f440 3 API calls 18488->18490 18492 158f00 std::_Throw_Cpp_error 2 API calls 18489->18492 18493 15ef79 18490->18493 18494 15f42f 18491->18494 18495 15ee93 18492->18495 18501 143040 std::_Throw_Cpp_error 2 API calls 18493->18501 18497 178c70 std::_Throw_Cpp_error RtlAllocateHeap 18494->18497 18498 158f00 std::_Throw_Cpp_error 2 API calls 18495->18498 18496->18496 18502 143040 std::_Throw_Cpp_error 2 API calls 18496->18502 18499 15f434 18497->18499 18500 15eee3 18498->18500 18503 178c70 std::_Throw_Cpp_error RtlAllocateHeap 18499->18503 18500->18485 18500->18507 18504 15efba 18501->18504 18505 15f1c9 18502->18505 18528 15f375 std::ios_base::_Ios_base_dtor 18503->18528 18508 158f00 std::_Throw_Cpp_error 2 API calls 18504->18508 18509 15fbf0 2 API calls 18505->18509 18506 178c70 std::_Throw_Cpp_error RtlAllocateHeap 18510 15f43e 18506->18510 18507->18484 18511 15efcd 18508->18511 18512 15f1e0 18509->18512 18514 15e710 2 API calls 18511->18514 18513 158f00 std::_Throw_Cpp_error 2 API calls 18512->18513 18518 15f22f std::ios_base::_Ios_base_dtor 18513->18518 18515 15f019 18514->18515 18516 158f00 std::_Throw_Cpp_error 2 API calls 18515->18516 18517 15f032 18516->18517 18519 158f00 std::_Throw_Cpp_error 2 API calls 18517->18519 18518->18499 18520 15f161 std::ios_base::_Ios_base_dtor 18518->18520 18521 15f081 std::ios_base::_Ios_base_dtor 18519->18521 18522 143040 std::_Throw_Cpp_error 2 API calls 18520->18522 18527 15f3f2 std::ios_base::_Ios_base_dtor 18520->18527 18521->18494 18521->18520 18523 15f30c 18522->18523 18524 15fbf0 2 API calls 18523->18524 18525 15f323 18524->18525 18526 158f00 std::_Throw_Cpp_error 2 API calls 18525->18526 18526->18528 18527->18327 18528->18506 18528->18527 18650 144e30 18529->18650 18532 144e30 2 API calls 18533 14762b 18532->18533 18534 15ace0 2 API calls 18533->18534 18535 147640 18534->18535 18536 15abb0 2 API calls 18535->18536 18537 147656 18536->18537 18538 15e710 2 API calls 18537->18538 18540 14766d std::ios_base::_Ios_base_dtor 18538->18540 18539 147a09 18541 178c70 std::_Throw_Cpp_error RtlAllocateHeap 18539->18541 18540->18539 18543 14770a std::ios_base::_Ios_base_dtor 18540->18543 18542 147a0e 18541->18542 18544 178c70 std::_Throw_Cpp_error RtlAllocateHeap 18542->18544 18546 147350 2 API calls 18543->18546 18545 147a13 18544->18545 18547 1477a4 18546->18547 18548 158f00 std::_Throw_Cpp_error 2 API calls 18547->18548 18549 1477b9 18548->18549 18550 15e710 2 API calls 18549->18550 18551 14780c 18550->18551 18552 158f00 std::_Throw_Cpp_error 2 API calls 18551->18552 18553 147828 18552->18553 18554 15ad80 2 API calls 18553->18554 18556 147879 std::ios_base::_Ios_base_dtor 18554->18556 18555 147975 std::ios_base::_Ios_base_dtor 18557 1472b0 2 API calls 18555->18557 18556->18542 18556->18555 18558 1479ca 18557->18558 18558->18334 18560 15f630 18559->18560 18566 15f4c9 std::ios_base::_Ios_base_dtor std::locale::_Locimp::_Locimp 18559->18566 18560->18341 18562 15f647 18564 178c70 std::_Throw_Cpp_error RtlAllocateHeap 18562->18564 18563 1432d0 std::_Throw_Cpp_error 2 API calls 18563->18566 18567 15f651 18564->18567 18565 158f00 std::_Throw_Cpp_error 2 API calls 18565->18566 18566->18560 18566->18562 18566->18563 18566->18565 18654 1434a0 18566->18654 18567->18341 18567->18567 18569 174b78 ___std_exception_destroy RtlAllocateHeap 18568->18569 18570 147a61 18569->18570 18571 174b78 ___std_exception_destroy RtlAllocateHeap 18570->18571 18572 147a77 18571->18572 18572->18356 18574 1535d1 18573->18574 18575 1535f1 std::ios_base::_Ios_base_dtor 18573->18575 18574->18575 18576 178c70 std::_Throw_Cpp_error RtlAllocateHeap 18574->18576 18575->18343 18577 153625 18576->18577 18577->18343 18661 156590 18578->18661 18584 1617d0 18581->18584 18583 1616da std::locale::_Setgloballocale 18583->18481 18585 161809 18584->18585 18591 161838 18584->18591 18586 161923 18585->18586 18589 16181b 18585->18589 18601 161990 18586->18601 18589->18591 18592 169f90 18589->18592 18591->18583 18593 169fc2 18592->18593 18594 16a0a3 18592->18594 18611 16d190 18593->18611 18595 143330 2 API calls 18594->18595 18599 16a000 std::locale::_Locimp::_Locimp 18595->18599 18597 178c70 std::_Throw_Cpp_error RtlAllocateHeap 18598 16a0ad 18597->18598 18599->18597 18600 16a05f std::ios_base::_Ios_base_dtor 18599->18600 18600->18591 18602 171cea 2 API calls 18601->18602 18603 16199a 18602->18603 18604 161928 18603->18604 18605 142cf0 std::_Throw_Cpp_error 2 API calls 18603->18605 18606 161a03 18605->18606 18607 15ace0 2 API calls 18606->18607 18608 161a18 18607->18608 18619 147cf0 18608->18619 18610 161a2d Concurrency::cancel_current_task 18612 16d1d9 18611->18612 18613 16d199 18611->18613 18612->18612 18613->18612 18614 16d1b0 18613->18614 18617 173672 std::_Facet_Register 2 API calls 18613->18617 18615 16d1b9 18614->18615 18616 173672 std::_Facet_Register 2 API calls 18614->18616 18615->18599 18618 16d1d2 18616->18618 18617->18614 18618->18599 18620 147350 2 API calls 18619->18620 18621 147d80 18620->18621 18622 15ad80 2 API calls 18621->18622 18623 147d94 18622->18623 18625 147dcd std::ios_base::_Ios_base_dtor 18623->18625 18627 147e33 18623->18627 18624 1472b0 2 API calls 18626 147dfd 18624->18626 18625->18624 18626->18610 18628 178c70 std::_Throw_Cpp_error RtlAllocateHeap 18627->18628 18629 147e38 18628->18629 18630 147350 2 API calls 18629->18630 18631 147ece 18630->18631 18632 15ad80 2 API calls 18631->18632 18633 147ee2 18632->18633 18635 147f1b std::ios_base::_Ios_base_dtor 18633->18635 18636 147f81 18633->18636 18634 1472b0 2 API calls 18637 147f4b 18634->18637 18635->18634 18638 178c70 std::_Throw_Cpp_error RtlAllocateHeap 18636->18638 18637->18610 18639 147f86 18638->18639 18640 147350 2 API calls 18639->18640 18641 148029 18640->18641 18642 15ad80 2 API calls 18641->18642 18643 14803d 18642->18643 18644 148076 std::ios_base::_Ios_base_dtor 18643->18644 18646 1480df 18643->18646 18645 1472b0 2 API calls 18644->18645 18647 1480aa 18645->18647 18648 178c70 std::_Throw_Cpp_error RtlAllocateHeap 18646->18648 18647->18610 18649 1480e4 18648->18649 18649->18610 18651 144e66 18650->18651 18651->18651 18652 144ea8 18651->18652 18653 143040 std::_Throw_Cpp_error 2 API calls 18651->18653 18652->18532 18653->18652 18657 143380 18654->18657 18658 143399 18657->18658 18659 180dd7 2 API calls 18658->18659 18660 1433a7 18659->18660 18660->18566 18662 174b15 ___std_exception_copy 2 API calls 18661->18662 18663 1565ce 18662->18663 18664 174b15 ___std_exception_copy 2 API calls 18663->18664 18665 156601 18664->18665 18665->18336 18667 198e17 18666->18667 18671 198c08 18666->18671 18667->17155 18668 198d38 std::locale::_Setgloballocale 18668->18667 18670 143130 2 API calls 18668->18670 18670->18668 18671->18668 18673 1787b0 18671->18673 18682 143130 18671->18682 18674 1787e3 18673->18674 18678 1787c7 18673->18678 18675 189e42 __Getctype RtlAllocateHeap 18674->18675 18676 1787e8 18675->18676 18677 18a12d __Getctype RtlAllocateHeap 18676->18677 18679 1787f8 18677->18679 18678->18671 18679->18678 18680 189a39 2 API calls 18679->18680 18681 17882a 18680->18681 18681->18671 18683 1432b3 18682->18683 18684 14316f 18682->18684 18685 143330 2 API calls 18683->18685 18686 143189 18684->18686 18687 1431d7 18684->18687 18688 1431c7 18684->18688 18689 1432b8 18685->18689 18691 173672 std::_Facet_Register 2 API calls 18686->18691 18692 173672 std::_Facet_Register 2 API calls 18687->18692 18695 14319c std::locale::_Locimp::_Locimp 18687->18695 18688->18686 18688->18689 18690 142b50 Concurrency::cancel_current_task 2 API calls 18689->18690 18690->18695 18691->18695 18692->18695 18693 178c70 std::_Throw_Cpp_error RtlAllocateHeap 18694 1432c2 18693->18694 18695->18693 18696 14326b std::ios_base::_Ios_base_dtor 18695->18696 18696->18671 18698 17364d GetSystemTimePreciseAsFileTime 18697->18698 18699 173077 18697->18699 18698->18699 18699->16808 18798 4ca08ab 18799 4ca08d8 3 API calls 18798->18799 18801 4ca0889 18798->18801 18799->18801 18800 4ca08cb 18802 4ca0903 2 API calls 18800->18802 18801->18800 18803 4ca08d8 3 API calls 18801->18803 18804 4ca08f0 18802->18804 18803->18801 18805 4ca0967 GetCurrentHwProfileW 18804->18805 18806 4ca0954 GetCurrentHwProfileW 18805->18806 18808 4ca0a8d 18806->18808 19210 1647b0 19211 1648ed 19210->19211 19212 1647ed 19210->19212 19213 143330 2 API calls 19211->19213 19217 164a30 2 API calls 19212->19217 19214 1648f2 19213->19214 19215 164a23 19214->19215 19216 16493d 19214->19216 19218 143330 2 API calls 19215->19218 19220 164a30 2 API calls 19216->19220 19223 164827 19217->19223 19219 164a28 19218->19219 19221 164977 19220->19221 19229 153d50 19221->19229 19224 15e1e0 RtlAllocateHeap 19223->19224 19225 1648b4 19224->19225 19226 16499f 19227 15e1e0 RtlAllocateHeap 19226->19227 19228 1649ea 19227->19228 19230 153d8f 19229->19230 19260 153df7 std::locale::_Locimp::_Locimp 19229->19260 19231 153d96 19230->19231 19232 153f7d 19230->19232 19233 153f1e 19230->19233 19234 153e69 19230->19234 19230->19260 19237 173672 std::_Facet_Register 2 API calls 19231->19237 19238 173672 std::_Facet_Register 2 API calls 19232->19238 19301 157e80 19233->19301 19236 173672 std::_Facet_Register 2 API calls 19234->19236 19239 153e73 19236->19239 19240 153da0 19237->19240 19241 153f8a 19238->19241 19239->19260 19262 16bf30 19239->19262 19242 173672 std::_Facet_Register 2 API calls 19240->19242 19245 153fd3 19241->19245 19246 15408e 19241->19246 19241->19260 19244 153dd2 19242->19244 19289 16f460 19244->19289 19250 154004 19245->19250 19251 153fdb 19245->19251 19249 143330 2 API calls 19246->19249 19247 153eb1 19258 153d50 6 API calls 19247->19258 19247->19260 19253 154093 19249->19253 19252 173672 std::_Facet_Register 2 API calls 19250->19252 19251->19253 19254 153fe6 19251->19254 19252->19260 19256 142b50 Concurrency::cancel_current_task 2 API calls 19253->19256 19255 173672 std::_Facet_Register 2 API calls 19254->19255 19257 153fec 19255->19257 19256->19257 19259 178c70 std::_Throw_Cpp_error RtlAllocateHeap 19257->19259 19257->19260 19258->19247 19261 15409d 19259->19261 19260->19226 19260->19260 19263 16bf42 19262->19263 19264 16bfab 19262->19264 19266 16bf7c 19263->19266 19267 16bf4d 19263->19267 19265 143330 2 API calls 19264->19265 19268 16bfb0 19265->19268 19270 16bf99 19266->19270 19273 173672 std::_Facet_Register 2 API calls 19266->19273 19267->19268 19269 16bf54 19267->19269 19271 142b50 Concurrency::cancel_current_task 2 API calls 19268->19271 19272 173672 std::_Facet_Register 2 API calls 19269->19272 19270->19247 19274 16bf5a 19271->19274 19272->19274 19275 16bf86 19273->19275 19276 178c70 std::_Throw_Cpp_error RtlAllocateHeap 19274->19276 19277 16bf63 19274->19277 19275->19247 19278 16bfba 19276->19278 19277->19247 19279 16c077 19278->19279 19280 16c00c 19278->19280 19283 16c013 std::locale::_Locimp::_Locimp 19278->19283 19282 143330 2 API calls 19279->19282 19306 15fab0 19280->19306 19284 16c07c 19282->19284 19283->19247 19285 173672 std::_Facet_Register 2 API calls 19284->19285 19286 16c0ae 19285->19286 19287 143040 std::_Throw_Cpp_error 2 API calls 19286->19287 19288 16c0f2 19287->19288 19288->19247 19290 16f498 19289->19290 19300 16f53f 19289->19300 19291 173672 std::_Facet_Register 2 API calls 19290->19291 19292 16f4ba 19291->19292 19293 1563b0 std::_Throw_Cpp_error 2 API calls 19292->19293 19294 16f4d0 19293->19294 19295 153d50 6 API calls 19294->19295 19296 16f4e0 19295->19296 19297 16f460 6 API calls 19296->19297 19298 16f531 19297->19298 19299 16f460 6 API calls 19298->19299 19299->19300 19300->19260 19302 173672 std::_Facet_Register 2 API calls 19301->19302 19303 157ea6 19302->19303 19304 1563b0 std::_Throw_Cpp_error 2 API calls 19303->19304 19305 157ec5 19304->19305 19305->19260 19307 15fac2 19306->19307 19308 15fb2b 19306->19308 19310 15facd 19307->19310 19311 15fafc 19307->19311 19309 142b50 Concurrency::cancel_current_task 2 API calls 19308->19309 19312 15fada 19309->19312 19310->19308 19313 15fad4 19310->19313 19314 15fb19 19311->19314 19317 173672 std::_Facet_Register 2 API calls 19311->19317 19315 178c70 std::_Throw_Cpp_error RtlAllocateHeap 19312->19315 19319 15fae3 19312->19319 19316 173672 std::_Facet_Register 2 API calls 19313->19316 19314->19283 19320 15fb35 19315->19320 19316->19312 19318 15fb06 19317->19318 19318->19283 19319->19283 19322 15fb5b std::locale::_Setgloballocale 19320->19322 19324 169c70 19320->19324 19322->19283 19323 15fb7f 19323->19283 19325 169dc4 19324->19325 19330 169ca2 19324->19330 19326 143330 2 API calls 19325->19326 19339 169d04 std::locale::_Locimp::_Locimp 19326->19339 19327 169dbf 19328 142b50 Concurrency::cancel_current_task 2 API calls 19327->19328 19328->19325 19329 178c70 std::_Throw_Cpp_error RtlAllocateHeap 19331 169dce 19329->19331 19330->19327 19332 169cf3 19330->19332 19333 169d1d 19330->19333 19341 159950 19331->19341 19332->19327 19335 169cfe 19332->19335 19336 173672 std::_Facet_Register 2 API calls 19333->19336 19333->19339 19337 173672 std::_Facet_Register 2 API calls 19335->19337 19336->19339 19337->19339 19338 169dd9 Concurrency::cancel_current_task 19339->19329 19340 169d8f std::ios_base::_Ios_base_dtor 19339->19340 19340->19323 19342 159968 19341->19342 19343 159978 std::ios_base::_Ios_base_dtor 19341->19343 19342->19343 19344 178c70 std::_Throw_Cpp_error RtlAllocateHeap 19342->19344 19343->19338 19345 15998d 19344->19345 19346 159a4f 19345->19346 19353 172b74 19345->19353 19346->19338 19352 159a04 19352->19338 19354 172af7 19353->19354 19355 1599cc 19354->19355 19375 179815 19354->19375 19355->19346 19361 1583b0 19355->19361 19357 172b43 19357->19355 19389 17d5f6 19357->19389 19360 17d0a8 5 API calls 19360->19355 19362 158463 19361->19362 19363 15843c 19361->19363 19365 15c430 19362->19365 19415 18120a 19363->19415 19367 15c45f std::_Throw_Cpp_error std::_Lockit::~_Lockit std::_Lockit::_Lockit 19365->19367 19366 15c4f8 std::_Lockit::~_Lockit 19366->19352 19367->19366 19368 173672 std::_Facet_Register 2 API calls 19367->19368 19369 15c506 19368->19369 19370 144040 std::_Throw_Cpp_error 3 API calls 19369->19370 19371 15c536 19370->19371 19372 144100 std::_Throw_Cpp_error 2 API calls 19371->19372 19373 15c592 19372->19373 19374 1726f7 std::_Facet_Register 2 API calls 19373->19374 19374->19366 19376 17975e std::_Locinfo::_Locinfo_dtor 19375->19376 19377 179771 19376->19377 19380 179791 19376->19380 19378 1816ff __floor_pentium4 RtlAllocateHeap 19377->19378 19379 179776 19378->19379 19381 178c60 ___std_exception_copy RtlAllocateHeap 19379->19381 19382 179796 19380->19382 19383 1797a3 19380->19383 19388 179781 19381->19388 19385 1816ff __floor_pentium4 RtlAllocateHeap 19382->19385 19384 18a8ef RtlAllocateHeap 19383->19384 19386 1797ac 19384->19386 19385->19388 19387 1816ff __floor_pentium4 RtlAllocateHeap 19386->19387 19386->19388 19387->19388 19388->19357 19390 17d609 ___std_exception_copy 19389->19390 19395 17d34d 19390->19395 19392 17d61e 19393 17899c ___std_exception_copy RtlAllocateHeap 19392->19393 19394 172b5e 19393->19394 19394->19355 19394->19360 19398 17d359 std::_Locinfo::_Locinfo_dtor 19395->19398 19396 17d35f 19397 178be3 ___std_exception_copy RtlAllocateHeap 19396->19397 19401 17d37a 19397->19401 19398->19396 19399 17d3a2 19398->19399 19402 17d4d0 19399->19402 19401->19392 19403 17d4f6 19402->19403 19404 17d4e3 19402->19404 19411 17d3f7 19403->19411 19404->19401 19406 17d5a7 19406->19401 19407 17d519 19407->19406 19408 179a91 4 API calls 19407->19408 19409 17d547 19408->19409 19410 18263d 2 API calls 19409->19410 19410->19406 19412 17d460 19411->19412 19413 17d408 19411->19413 19412->19407 19413->19412 19414 1825fd SetFilePointerEx RtlAllocateHeap 19413->19414 19414->19412 19416 181216 19415->19416 19419 18122b 19415->19419 19417 1816ff __floor_pentium4 RtlAllocateHeap 19416->19417 19418 18121b 19417->19418 19420 178c60 ___std_exception_copy RtlAllocateHeap 19418->19420 19419->19362 19421 181226 19420->19421 19421->19362 18764 4ca08e2 18765 4ca090b 18764->18765 18770 4ca0967 18765->18770 18771 4ca0996 GetCurrentHwProfileW 18770->18771 18773 4ca0a8d 18771->18773 19439 4ca0923 19440 4ca0928 19439->19440 19441 4ca0967 GetCurrentHwProfileW 19440->19441 19442 4ca0954 GetCurrentHwProfileW 19441->19442 19444 4ca0a8d 19442->19444 18914 4ca083c 18915 4ca0861 18914->18915 18916 4ca08d8 3 API calls 18915->18916 18917 4ca08cb 18915->18917 18916->18915 18918 4ca0903 2 API calls 18917->18918 18919 4ca08f0 18918->18919 18920 4ca0967 GetCurrentHwProfileW 18919->18920 18921 4ca0954 GetCurrentHwProfileW 18920->18921 18923 4ca0a8d 18921->18923

                                  Control-flow Graph

                                  APIs
                                  • setsockopt.WS2_32(000003E0,0000FFFF,00001006,?,00000008), ref: 00207BA6
                                  • recv.WS2_32(?,00000004,00000002), ref: 00207BC1
                                  • recv.WS2_32(00000000,0000000C,00000002,00000000), ref: 00207C43
                                  • recv.WS2_32(00000000,0000000C,00000008), ref: 00207C64
                                    • Part of subcall function 00208590: WSAStartup.WS2_32 ref: 002085BB
                                    • Part of subcall function 00208590: socket.WS2_32(?,?,?,?,?,?,002C9328,?,?), ref: 0020865E
                                    • Part of subcall function 00208590: connect.WS2_32(00000000,00299BFC,?,?,?,?,002C9328,?,?), ref: 00208672
                                    • Part of subcall function 00208590: closesocket.WS2_32(00000000), ref: 0020867D
                                  • recv.WS2_32(00000000,?,00000008), ref: 00207D1B
                                  • recv.WS2_32(?,00000004,00000008), ref: 00207E23
                                  • __Xtime_get_ticks.LIBCPMT ref: 00207E2A
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00207E38
                                  • Sleep.KERNELBASE(00000001,00000000,?,00002710,00000000), ref: 00207EB1
                                  • Sleep.KERNELBASE(00000064,?,00002710,00000000), ref: 00207EB9
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3353611302.0000000000141000.00000040.00000001.01000000.00000005.sdmp, Offset: 00140000, based on PE: true
                                  • Associated: 00000007.00000002.3353380213.0000000000140000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3353611302.00000000002C5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3355825099.00000000002CA000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.00000000002CD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000044F000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000052C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000056B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.0000000000572000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.0000000000581000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3364371124.0000000000582000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3365897546.000000000071B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3366003571.000000000071D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_140000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: recv$Sleep$StartupUnothrow_t@std@@@Xtime_get_ticks__ehfuncinfo$??2@closesocketconnectsetsockoptsocket
                                  • String ID:
                                  • API String ID: 56803616-0
                                  • Opcode ID: b0ada02130e3625bd2a139468aa763fcfcda6b9ee5f8ecc4cf4fb84e769f926c
                                  • Instruction ID: 74bff91aacfb178d2008532da8348a4ba58d5ec6817cee3ceb805c39dc2c549f
                                  • Opcode Fuzzy Hash: b0ada02130e3625bd2a139468aa763fcfcda6b9ee5f8ecc4cf4fb84e769f926c
                                  • Instruction Fuzzy Hash: D5B1AAB0D14348DBEB10DFA8DC89BADBBB1BF54304F204259E454AB2E2D7B06D94CB91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 58 208590-2085c2 WSAStartup 59 208696-20869f 58->59 60 2085c8-2085f2 call 22a420 * 2 58->60 65 2085f4-2085f8 60->65 66 2085fe-208644 60->66 65->59 65->66 68 208690 66->68 69 208646-20864c 66->69 68->59 70 2086a4-2086ae 69->70 71 20864e 69->71 70->68 75 2086b0-2086b8 70->75 72 208654-208668 socket 71->72 72->68 74 20866a-20867a connect 72->74 76 2086a0 74->76 77 20867c-208684 closesocket 74->77 76->70 77->72 78 208686-20868f 77->78 78->68
                                  APIs
                                  • WSAStartup.WS2_32 ref: 002085BB
                                  • socket.WS2_32(?,?,?,?,?,?,002C9328,?,?), ref: 0020865E
                                  • connect.WS2_32(00000000,00299BFC,?,?,?,?,002C9328,?,?), ref: 00208672
                                  • closesocket.WS2_32(00000000), ref: 0020867D
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3353611302.0000000000141000.00000040.00000001.01000000.00000005.sdmp, Offset: 00140000, based on PE: true
                                  • Associated: 00000007.00000002.3353380213.0000000000140000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3353611302.00000000002C5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3355825099.00000000002CA000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.00000000002CD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000044F000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000052C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000056B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.0000000000572000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.0000000000581000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3364371124.0000000000582000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3365897546.000000000071B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3366003571.000000000071D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_140000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: Startupclosesocketconnectsocket
                                  • String ID:
                                  • API String ID: 3098855095-0
                                  • Opcode ID: 9b007b9958d8c6abb6efa22e680811fee46dc7306c0b79ee90d1df80c9738508
                                  • Instruction ID: b100a413e53ca68233a512a2378b76214116267d48c10f6d67ef39308441749a
                                  • Opcode Fuzzy Hash: 9b007b9958d8c6abb6efa22e680811fee46dc7306c0b79ee90d1df80c9738508
                                  • Instruction Fuzzy Hash: 0A31F3725107016BC7209F248C49A2BB7E8FFC5334F015F19FAE8922D1EB7198548A96

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 80 149280-1492dd call 1563b0 83 149413-149521 call 142df0 call 22a420 80->83 84 1492e3-1492e9 80->84 100 149537-14953f call 158dc0 83->100 101 149523-149535 83->101 85 1492f0-149313 84->85 87 149324-149331 85->87 88 149315-14931f 85->88 91 149342-14934f 87->91 92 149333-14933d 87->92 90 149403-149406 88->90 94 149409-14940d 90->94 95 149360-14936d 91->95 96 149351-14935b 91->96 92->90 94->83 94->85 98 14937e-14938b 95->98 99 14936f-149379 95->99 96->90 103 14938d-149397 98->103 104 149399-1493a6 98->104 99->90 105 149544-149597 call 22a420 * 2 100->105 101->105 103->90 106 1493b4-1493c1 104->106 107 1493a8-1493b2 104->107 117 149599-1495c8 call 22a420 call 175270 105->117 118 1495cb-1495e1 call 22a420 105->118 109 1493c3-1493cd 106->109 110 1493cf-1493dc 106->110 107->90 109->90 112 1493de-1493e8 110->112 113 1493ea-1493f4 110->113 112->90 113->94 116 1493f6-1493ff 113->116 116->90 117->118 124 1495e7-1495ed 118->124 125 1496e2 118->125 128 1495f0-1496ce WSASend 124->128 126 1496e6-1496f0 125->126 129 1496f2-1496fe 126->129 130 14971e-14973d 126->130 146 1496d4-1496dc 128->146 147 14975f-149763 128->147 132 149714-14971b call 1738f3 129->132 133 149700-14970e 129->133 134 14976f-149796 130->134 135 14973f-14974b 130->135 132->130 133->132 136 149797-1497fe call 178c70 call 142df0 * 2 133->136 138 149765-14976c call 1738f3 135->138 139 14974d-14975b 135->139 138->134 139->136 144 14975d 139->144 144->138 146->125 146->128 147->126
                                  APIs
                                  • WSASend.WS2_32(?,?,00000001,00000000,00000000,00000000,00000000,?,?,?,?,0028D15C,00000000,761B23A0,-002C9880), ref: 001496C9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3353611302.0000000000141000.00000040.00000001.01000000.00000005.sdmp, Offset: 00140000, based on PE: true
                                  • Associated: 00000007.00000002.3353380213.0000000000140000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3353611302.00000000002C5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3355825099.00000000002CA000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.00000000002CD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000044F000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000052C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000056B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.0000000000572000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.0000000000581000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3364371124.0000000000582000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3365897546.000000000071B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3366003571.000000000071D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_140000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: Send
                                  • String ID: Ws2_32.dll
                                  • API String ID: 121738739-3093949381
                                  • Opcode ID: b82bdebb7e46ef1b537885c9b434fdfb033718c3ffdc5aaf066d0a3472038256
                                  • Instruction ID: d372a728f8a5de39e9d89a8c9ac16d07e07cdf54ac70e7502c7571c5ef980ca1
                                  • Opcode Fuzzy Hash: b82bdebb7e46ef1b537885c9b434fdfb033718c3ffdc5aaf066d0a3472038256
                                  • Instruction Fuzzy Hash: 3F02DEB0D14298DFDF25CFA4C8907ADBBB0FF55314F244289E4896B686D7B01986CF92

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 153 4ca0855-4ca085d 154 4ca085f-4ca0860 153->154 155 4ca0864-4ca0877 153->155 154->155 156 4ca0879-4ca0887 155->156 157 4ca0816-4ca0824 155->157 158 4ca0891-4ca08c6 call 4ca08d8 156->158 157->153 163 4ca088b-4ca088f 158->163 164 4ca08c8-4ca08c9 158->164 163->158 165 4ca08cb-4ca0a54 call 4ca0903 call 4ca0967 164->165 166 4ca0889 164->166 183 4ca0a61-4ca0a74 GetCurrentHwProfileW 165->183 166->163 184 4ca0a8d-4ca0ae9 call 4ca0ad9 183->184
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3374244425.0000000004CA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4ca0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6caed366ed0977c8b5a2e83305feeab128c01b2d2edf48a9996d59cf332bf4f7
                                  • Instruction ID: bdb8a0e5b352b4faa92571ecc925ea344ddc1f851a45a1f67a5c168191bf74fb
                                  • Opcode Fuzzy Hash: 6caed366ed0977c8b5a2e83305feeab128c01b2d2edf48a9996d59cf332bf4f7
                                  • Instruction Fuzzy Hash: 2B4148E330C2026EF201D8A71B956FB67AFD6C77B8738853AF403C6102F2815E5A6172

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 191 4ca083c-4ca0887 194 4ca0891-4ca08c6 call 4ca08d8 191->194 199 4ca088b-4ca088f 194->199 200 4ca08c8-4ca08c9 194->200 199->194 201 4ca08cb-4ca0a54 call 4ca0903 call 4ca0967 200->201 202 4ca0889 200->202 219 4ca0a61-4ca0a74 GetCurrentHwProfileW 201->219 202->199 220 4ca0a8d-4ca0ae9 call 4ca0ad9 219->220
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3374244425.0000000004CA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4ca0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 617c78ad5871362860ea1b259ed6c9c126acbcda2d6cee0edf8c3267b3f203fa
                                  • Instruction ID: fa000ed96c691478b92b194298c7fe8653a7a93cb935c2a74faf2a41c173a49f
                                  • Opcode Fuzzy Hash: 617c78ad5871362860ea1b259ed6c9c126acbcda2d6cee0edf8c3267b3f203fa
                                  • Instruction Fuzzy Hash: 9F415BE730C2127DB201D8A31B95AFB6BAFD6C37B4738843AF403C6502F2845E5A6172

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 227 4ca089f-4ca08a2 228 4ca08a4-4ca08c6 call 4ca08d8 227->228 232 4ca088b-4ca0898 228->232 233 4ca08c8-4ca08c9 228->233 232->228 235 4ca08cb-4ca0a54 call 4ca0903 call 4ca0967 233->235 236 4ca0889 233->236 253 4ca0a61-4ca0a74 GetCurrentHwProfileW 235->253 236->232 254 4ca0a8d-4ca0ae9 call 4ca0ad9 253->254
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3374244425.0000000004CA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4ca0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4f3881b31f053b9f84ed374719c246e5f7576b1f4a5d77c2b4c7eaff5b61f193
                                  • Instruction ID: 8608a4bc38dce11624e1ad6876efcaa5d52c0d50750a8f3c3239279c0f02c4f0
                                  • Opcode Fuzzy Hash: 4f3881b31f053b9f84ed374719c246e5f7576b1f4a5d77c2b4c7eaff5b61f193
                                  • Instruction Fuzzy Hash: FE4138E73082127DB201D8972B94AFB67AFD6C77B4738853AF403C6502F2855E5A6072

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 261 189789-1897ab 262 18999e 261->262 263 1897b1-1897b3 261->263 264 1899a0-1899a4 262->264 265 1897df-189802 263->265 266 1897b5-1897d4 call 178be3 263->266 267 189808-18980e 265->267 268 189804-189806 265->268 274 1897d7-1897da 266->274 267->266 270 189810-189821 267->270 268->267 268->270 272 189823-189831 call 18263d 270->272 273 189834-189844 call 1892ce 270->273 272->273 279 18988d-18989f 273->279 280 189846-18984c 273->280 274->264 281 1898a1-1898a7 279->281 282 1898f6-189916 WriteFile 279->282 283 18984e-189851 280->283 284 189875-18988b call 188e9f 280->284 288 1898a9-1898ac 281->288 289 1898e2-1898f4 call 18934b 281->289 285 189918-18991e 282->285 286 189921 282->286 290 18985c-18986b call 189266 283->290 291 189853-189856 283->291 301 18986e-189870 284->301 285->286 293 189924-18992f 286->293 294 1898ce-1898e0 call 18950f 288->294 295 1898ae-1898b1 288->295 308 1898c9-1898cc 289->308 290->301 291->290 296 189936-189939 291->296 302 189999-18999c 293->302 303 189931-189934 293->303 294->308 304 18993c-18993e 295->304 305 1898b7-1898c4 call 189426 295->305 296->304 301->293 302->264 303->296 310 18996c-189978 304->310 311 189940-189945 304->311 305->308 308->301 313 18997a-189980 310->313 314 189982-189994 310->314 315 18995e-189967 call 1816c8 311->315 316 189947-189959 311->316 313->262 313->314 314->274 315->274 316->274
                                  APIs
                                  • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0018990E
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3353611302.0000000000141000.00000040.00000001.01000000.00000005.sdmp, Offset: 00140000, based on PE: true
                                  • Associated: 00000007.00000002.3353380213.0000000000140000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3353611302.00000000002C5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3355825099.00000000002CA000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.00000000002CD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000044F000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000052C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000056B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.0000000000572000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.0000000000581000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3364371124.0000000000582000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3365897546.000000000071B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3366003571.000000000071D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_140000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: FileWrite
                                  • String ID:
                                  • API String ID: 3934441357-0
                                  • Opcode ID: 1c71f9eeba68a584ad56dd86c4b20466a5a26e5cd8d456ef366976f7a5676feb
                                  • Instruction ID: 73d77ca2728b4c3457da1ec77d5e02876e4d4e5ed840b23f849a4a1efd8b5bb3
                                  • Opcode Fuzzy Hash: 1c71f9eeba68a584ad56dd86c4b20466a5a26e5cd8d456ef366976f7a5676feb
                                  • Instruction Fuzzy Hash: 4961A471D0411AAFDF15EFA8CC84ABE7BB9AF5A308F180149E900A7246D731DB11DFA0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 319 4ca08ab-4ca08bf 320 4ca08c6 319->320 321 4ca08c1 call 4ca08d8 319->321 322 4ca088b-4ca08c1 call 4ca08d8 320->322 323 4ca08c8-4ca08c9 320->323 321->320 322->320 325 4ca08cb-4ca0a54 call 4ca0903 call 4ca0967 323->325 326 4ca0889 323->326 346 4ca0a61-4ca0a74 GetCurrentHwProfileW 325->346 326->322 347 4ca0a8d-4ca0ae9 call 4ca0ad9 346->347
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3374244425.0000000004CA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4ca0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a5f364af4bd5c4804e0563dcf2906590aa490dfbe1a5b9c02d776138ef5f605a
                                  • Instruction ID: c3a82d2768e1ba2d0a5b0f33de394253608cdef63b2a1e14e9b705339b4e3a13
                                  • Opcode Fuzzy Hash: a5f364af4bd5c4804e0563dcf2906590aa490dfbe1a5b9c02d776138ef5f605a
                                  • Instruction Fuzzy Hash: 4E413BE73082127DF202D8971B94AFB679FD6D77B4738853AF403C6502F2855E5A6132

                                  Control-flow Graph

                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3374244425.0000000004CA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4ca0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 18fdb81544e14937099854d915f8da96d24543cbaf4e66272d40bda55a489f8e
                                  • Instruction ID: 8956b81a59d2c56808497e9ea1af23382b068c847413882daf5f84043b21af90
                                  • Opcode Fuzzy Hash: 18fdb81544e14937099854d915f8da96d24543cbaf4e66272d40bda55a489f8e
                                  • Instruction Fuzzy Hash: 0331C4E73082127DB202D8A72B65AFB6B9FD6D77B4738853AF507C6102F2815E5A6031

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 379 4ca08e2-4ca0a54 call 4ca0967 393 4ca0a61-4ca0a74 GetCurrentHwProfileW 379->393 394 4ca0a8d-4ca0ae9 call 4ca0ad9 393->394
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3374244425.0000000004CA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4ca0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 9db037fe0a98192dba76314fcfc3ca37d818bd89a228b071340b1c1ccd1701b0
                                  • Instruction ID: 6ad7cd65631af0e4d36de4c2035473ef74cf13e55ac38734f6adb83d79716dd2
                                  • Opcode Fuzzy Hash: 9db037fe0a98192dba76314fcfc3ca37d818bd89a228b071340b1c1ccd1701b0
                                  • Instruction Fuzzy Hash: 1E3108E73082027EF202C4A71B95AF76B9FD6C7774738453AF407C6506F2815E5A6031

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 401 4ca0903-4ca0a54 call 4ca0967 415 4ca0a61-4ca0a74 GetCurrentHwProfileW 401->415 416 4ca0a8d-4ca0ae9 call 4ca0ad9 415->416
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3374244425.0000000004CA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4ca0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 5d9bc4bc5df6adaa611b86988c03d91e727339d4af2c7152209687b6fc369ab8
                                  • Instruction ID: 9f1b00348e1d8bd24b7b687cca3be7fb6e7a19393415f5d5e12839d731304269
                                  • Opcode Fuzzy Hash: 5d9bc4bc5df6adaa611b86988c03d91e727339d4af2c7152209687b6fc369ab8
                                  • Instruction Fuzzy Hash: 7631B2E73082127DB202C8972B64AFB5BAFD6D77B4738853AF907C6106F2C55E5A2031

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 423 4ca092d-4ca0a54 call 4ca0967 436 4ca0a61-4ca0a74 GetCurrentHwProfileW 423->436 437 4ca0a8d-4ca0ae9 call 4ca0ad9 436->437
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3374244425.0000000004CA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4ca0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ce356deca980c99a02e7697dfa2877225afd6a86e73d6bc653f43c648760adc1
                                  • Instruction ID: d90da0919168597039f40020386277c10d3cc475b49a6cd6a566fa1ab28ea0af
                                  • Opcode Fuzzy Hash: ce356deca980c99a02e7697dfa2877225afd6a86e73d6bc653f43c648760adc1
                                  • Instruction Fuzzy Hash: 8331E2E73082027DB211C4A72B54AFB5BAFD2D77B4738853AF803C6506F2C15E5A2031

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 444 4ca0923-4ca0a54 call 4ca0967 457 4ca0a61-4ca0a74 GetCurrentHwProfileW 444->457 458 4ca0a8d-4ca0ae9 call 4ca0ad9 457->458
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3374244425.0000000004CA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4ca0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 0e8f29e37c0fe8e6716593f60e642d3b893b9fc44b898336806d810a49b6cdca
                                  • Instruction ID: 38ad73f91ac79a0912f7fdbbbf607fa806adac2c63e26f00ece7c1f0f9be0bb7
                                  • Opcode Fuzzy Hash: 0e8f29e37c0fe8e6716593f60e642d3b893b9fc44b898336806d810a49b6cdca
                                  • Instruction Fuzzy Hash: 2631C0E73082027DB202C4A72B64BFB5BAFD6D67B4738853AF803C6106F2C15E5A2031

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 465 4ca0932-4ca0a54 call 4ca0967 477 4ca0a61-4ca0a74 GetCurrentHwProfileW 465->477 478 4ca0a8d-4ca0ae9 call 4ca0ad9 477->478
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3374244425.0000000004CA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4ca0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 25931b46c08e247de1f0d7a9450b5a143b1c656f3e3411173353aa3593dcae9c
                                  • Instruction ID: f750ecc023c7a90dc1f30e2a11f191ab69ef5d065e6c4a5a6c703316f0dd2855
                                  • Opcode Fuzzy Hash: 25931b46c08e247de1f0d7a9450b5a143b1c656f3e3411173353aa3593dcae9c
                                  • Instruction Fuzzy Hash: 1E31C2E73082127DF202C9A72B64AFB5BAFD6D67B4738853AF403C6506F2C55E5A2131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 485 4ca09a0-4ca09ad 486 4ca09ff-4ca0a0a 485->486 487 4ca09af-4ca09f9 485->487 489 4ca0a0c-4ca0a54 486->489 487->489 494 4ca0a61-4ca0a74 GetCurrentHwProfileW 489->494 495 4ca0a8d-4ca0ae9 call 4ca0ad9 494->495
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04CA0A6D
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3374244425.0000000004CA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4ca0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: c1467ade84d67d59383372fbc0b40b75868f3ff1349f9146e12b1ac03241e570
                                  • Instruction ID: 552ac7c276e211d7594c117f5556bd0cc1196f2b3e5e9ba66e149e80eb1ee5ef
                                  • Opcode Fuzzy Hash: c1467ade84d67d59383372fbc0b40b75868f3ff1349f9146e12b1ac03241e570
                                  • Instruction Fuzzy Hash: AC2186A720C2522DF302C8631A546F66BEEE6D73B8738457AF402C6503F2815F2B5272
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04CA0A6D
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3374244425.0000000004CA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4ca0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 05dc64984f0f92fc02101b89a31654df2a3b31550608517579ce34b5e1f6f148
                                  • Instruction ID: a41f27dd63642174491c09ee89af3c3a6320a2ced0b373dce751154b89aa6056
                                  • Opcode Fuzzy Hash: 05dc64984f0f92fc02101b89a31654df2a3b31550608517579ce34b5e1f6f148
                                  • Instruction Fuzzy Hash: 8D216DEB20C2127DF211C8972B54AFB57AEE2D67B4739853AF407C6146F3C45E5A2132
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04CA0A6D
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3374244425.0000000004CA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4ca0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: dd3f60f572b31a80168a2ed3ce51b411a0bfefeb47a20d692a58e2b2bb23682b
                                  • Instruction ID: 5f6bd6b2ab2f371f278a6b5777d71c48bf81ccb7ad50decf9d540439666a7914
                                  • Opcode Fuzzy Hash: dd3f60f572b31a80168a2ed3ce51b411a0bfefeb47a20d692a58e2b2bb23682b
                                  • Instruction Fuzzy Hash: 9B118EEB3081126DF202C8971B55AF666AFE6D67B4738853AF807C6142F2845E5A2131
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04CA0A6D
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3374244425.0000000004CA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4ca0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 46285bb4ea6c17d3f12376f46c3e36c667f03960b868d75e7e99375c62871cf4
                                  • Instruction ID: 3bb073540dac77b36a5704e379af1d13455ca4112a4f62d6ab53edffcb5b5b27
                                  • Opcode Fuzzy Hash: 46285bb4ea6c17d3f12376f46c3e36c667f03960b868d75e7e99375c62871cf4
                                  • Instruction Fuzzy Hash: 4C11BFEB3481126CF202C8972B54AF66BAFE2D77B87398536F407C5502F2816E5A6131
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04CA0A6D
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3374244425.0000000004CA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4ca0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: dbf6f0d18eea11efd65176be00f6e1f0f10e63314e0feb5fe2ea2813bbe9dc20
                                  • Instruction ID: 8d8ea9a1d1defd607df1d44206f66177433443d8f152b2a0ee64cbe2213f0578
                                  • Opcode Fuzzy Hash: dbf6f0d18eea11efd65176be00f6e1f0f10e63314e0feb5fe2ea2813bbe9dc20
                                  • Instruction Fuzzy Hash: 74118CA630D2432ED302CDA709956E57BDAD9C36B872D0176E446CB103F2415E6753A1
                                  APIs
                                  • FindCloseChangeNotification.KERNELBASE(00000000,00000000,?,?,00188CE6,00000000,?,002BA178,0000000C,00188DA2,?,?,?), ref: 00188E55
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3353611302.0000000000141000.00000040.00000001.01000000.00000005.sdmp, Offset: 00140000, based on PE: true
                                  • Associated: 00000007.00000002.3353380213.0000000000140000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3353611302.00000000002C5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3355825099.00000000002CA000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.00000000002CD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000044F000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000052C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000056B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.0000000000572000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.0000000000581000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3364371124.0000000000582000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3365897546.000000000071B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3366003571.000000000071D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_140000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: ChangeCloseFindNotification
                                  • String ID:
                                  • API String ID: 2591292051-0
                                  • Opcode ID: b174f92d5f3ea6184b04097df36d91e8ad55779ba282831c7c6948c906115694
                                  • Instruction ID: 402e979a0802c9c1816277fce8c95b92725691a1e8d53ee7a4a9553a3b57bb09
                                  • Opcode Fuzzy Hash: b174f92d5f3ea6184b04097df36d91e8ad55779ba282831c7c6948c906115694
                                  • Instruction Fuzzy Hash: A9114E33A051241AD62532346CC5B7E27C94B9373CF79069DF9188B1C2DFA19E814B51
                                  APIs
                                  • SetFilePointerEx.KERNELBASE(00000000,?,?,?,?,?,00000000,?,?,?,00182626,?,?,?,?,?), ref: 00182558
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3353611302.0000000000141000.00000040.00000001.01000000.00000005.sdmp, Offset: 00140000, based on PE: true
                                  • Associated: 00000007.00000002.3353380213.0000000000140000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3353611302.00000000002C5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3355825099.00000000002CA000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.00000000002CD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000044F000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000052C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000056B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.0000000000572000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.0000000000581000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3364371124.0000000000582000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3365897546.000000000071B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3366003571.000000000071D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_140000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: FilePointer
                                  • String ID:
                                  • API String ID: 973152223-0
                                  • Opcode ID: e2eb2de86e61a7e94306eaaf19432d7ea6ee7ba541e6d184cf08ed3290a52217
                                  • Instruction ID: a2551f3f067590891fbb76474420bd11d80da66aa7ad94c8820e928d359fbfbf
                                  • Opcode Fuzzy Hash: e2eb2de86e61a7e94306eaaf19432d7ea6ee7ba541e6d184cf08ed3290a52217
                                  • Instruction Fuzzy Hash: F60126326402086FCF0AEF19DC51CDE3B59DB85334B340148F8009B2A0E771EE418F90
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04CA0A6D
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3374244425.0000000004CA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4ca0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: c0f323985b2cd2a0670b831a5c92f14b75489abff70ef1f5344f91ec134e0957
                                  • Instruction ID: 9c5b925b14b5e8b67479cc1a1e2c82f12effa6fdc323c23e55c35d56a43cd0a3
                                  • Opcode Fuzzy Hash: c0f323985b2cd2a0670b831a5c92f14b75489abff70ef1f5344f91ec134e0957
                                  • Instruction Fuzzy Hash: D8F0F6A23182036EE360DCAB46546B637DFE6D73B8B294535E442CB142F681AE521250
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0014331F
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3353611302.0000000000141000.00000040.00000001.01000000.00000005.sdmp, Offset: 00140000, based on PE: true
                                  • Associated: 00000007.00000002.3353380213.0000000000140000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3353611302.00000000002C5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3355825099.00000000002CA000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.00000000002CD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000044F000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000052C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000056B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.0000000000572000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.0000000000581000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3364371124.0000000000582000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3365897546.000000000071B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3366003571.000000000071D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_140000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID:
                                  • API String ID: 118556049-0
                                  • Opcode ID: 0fd589d96c9d07b1efa01aec19e4ff46bb0766daf2056f60d33bc81ca57302d3
                                  • Instruction ID: f8015ea12c3cb0a3f2d286390471fe919a22c48b7f799b1e866e3e4ade7aa4ce
                                  • Opcode Fuzzy Hash: 0fd589d96c9d07b1efa01aec19e4ff46bb0766daf2056f60d33bc81ca57302d3
                                  • Instruction Fuzzy Hash: B4F0B4721001049BDB146F64D8154E9B3F8EF24361750097AF8ADC7222EB26DA80C790
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04CA0A6D
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3374244425.0000000004CA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4ca0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 3d86c50182b0bb433d015bbda97bb5c5752945abce9a779438224efe10232da5
                                  • Instruction ID: 0c1d09d029fa8d478422c40172b2a42f4984dcebdbceac6792f5094d114b5b3a
                                  • Opcode Fuzzy Hash: 3d86c50182b0bb433d015bbda97bb5c5752945abce9a779438224efe10232da5
                                  • Instruction Fuzzy Hash: 11F05C923181032DE310D8EB06547B617CFD6D73F8B394536A453CB242F740DD535145
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000008,?,00000001,?,00189FE0,00000001,00000364,00000001,00000006,000000FF,?,00174B3F,?,?,761B23A0,?), ref: 0018A69C
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3353611302.0000000000141000.00000040.00000001.01000000.00000005.sdmp, Offset: 00140000, based on PE: true
                                  • Associated: 00000007.00000002.3353380213.0000000000140000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3353611302.00000000002C5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3355825099.00000000002CA000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.00000000002CD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000044F000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000052C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000056B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.0000000000572000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.0000000000581000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3364371124.0000000000582000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3365897546.000000000071B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3366003571.000000000071D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_140000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 6a3f4352e6c5e569768b5fe2ce6778baae7fb9f921c4d3596a788a2b883499e6
                                  • Instruction ID: 3929b7fb9cac1416fa6e4a298f057975afb4121aa73741cc9b1673a11447878f
                                  • Opcode Fuzzy Hash: 6a3f4352e6c5e569768b5fe2ce6778baae7fb9f921c4d3596a788a2b883499e6
                                  • Instruction Fuzzy Hash: 7EF0B4325105216BBB217A629815B6A774AAF41370FBD8113F804E6088FB20EA018FE6
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000000,00000001,?,?,00174B3F,?,?,761B23A0,?,?,00143522,?,?), ref: 0018B0C7
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3353611302.0000000000141000.00000040.00000001.01000000.00000005.sdmp, Offset: 00140000, based on PE: true
                                  • Associated: 00000007.00000002.3353380213.0000000000140000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3353611302.00000000002C5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3355825099.00000000002CA000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.00000000002CD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000044F000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000052C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000056B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.0000000000572000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.0000000000581000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3364371124.0000000000582000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3365897546.000000000071B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3366003571.000000000071D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_140000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: b588e0939f623fed66c625f80fe0daf99209b514b813dc6dcf5aee0d638cac61
                                  • Instruction ID: 029bc0bf1831830b0233f8e36987ac28b790c8248b27694225a9b29780041f02
                                  • Opcode Fuzzy Hash: b588e0939f623fed66c625f80fe0daf99209b514b813dc6dcf5aee0d638cac61
                                  • Instruction Fuzzy Hash: 42E092322186256AEB313A659C94B5F766ADF423B0F5D0311FC24A61C1DB64DE108FE5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3374301264.0000000004CB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4cb0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: op6)
                                  • API String ID: 0-3713947904
                                  • Opcode ID: ddd6032d4d5edbaf1bf1af17c1095040647ff896e3a09efb5d8e4228a6fb3337
                                  • Instruction ID: 8bec395a22fa36f6b9ec7ce80bc758bfc3c45c9899364bf8b6cb4c7bf11680ec
                                  • Opcode Fuzzy Hash: ddd6032d4d5edbaf1bf1af17c1095040647ff896e3a09efb5d8e4228a6fb3337
                                  • Instruction Fuzzy Hash: 9D0126AB24C212BDA15384432A005F72A1FE5E2230B394567B4C3C6A03F681260E71F7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3374301264.0000000004CB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4cb0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: op6)
                                  • API String ID: 0-3713947904
                                  • Opcode ID: 37ba1c562516a73208d5a361061cb9215d68519c2f95385da89a863833e1a0a4
                                  • Instruction ID: 4c36f744cd92c20c0a74754417d9375bee0301c2efa50ea637a9a0577d4911c8
                                  • Opcode Fuzzy Hash: 37ba1c562516a73208d5a361061cb9215d68519c2f95385da89a863833e1a0a4
                                  • Instruction Fuzzy Hash: 4F018EAF28C210AEAA0F099366112F77E2BB747330F384156F48785B13F290661975E0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3374301264.0000000004CB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4cb0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: op6)
                                  • API String ID: 0-3713947904
                                  • Opcode ID: 657021b94a4b6a8784251faaa547fafb561150fcbb6fb05d542186bc449b56f5
                                  • Instruction ID: 2344ab8aba44d48ee7b53234b11fce613dcd2e00bf93cac605a55c170aab3cbb
                                  • Opcode Fuzzy Hash: 657021b94a4b6a8784251faaa547fafb561150fcbb6fb05d542186bc449b56f5
                                  • Instruction Fuzzy Hash: 0B0145AF248204AED687096352512FB7F22BB43230F3C4089F4C68A603F291270A72B1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3374301264.0000000004CB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4cb0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: op6)
                                  • API String ID: 0-3713947904
                                  • Opcode ID: eaa204fe822e1cde2a05ca1497cdaa730f0148cdb7c8cf168dcd256b460ca5ee
                                  • Instruction ID: c7bddcfe2a63dae8d43726163be1cb1e60611d18f60038f948d8ef092a0ee1de
                                  • Opcode Fuzzy Hash: eaa204fe822e1cde2a05ca1497cdaa730f0148cdb7c8cf168dcd256b460ca5ee
                                  • Instruction Fuzzy Hash: 29F028AF24C304BEA55B088356111F73A1BB787330F3C4196F48786B52F6A02A1875A1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3374301264.0000000004CB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4cb0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: op6)
                                  • API String ID: 0-3713947904
                                  • Opcode ID: 24f46e0358f7ee04613894cf7b200f607dd9c3512436cae9c45a5740373a1d1d
                                  • Instruction ID: 92b5041fcc4b8b55494648d6b04c75c4851c3c6ebb5efbdc883939c5747738ef
                                  • Opcode Fuzzy Hash: 24f46e0358f7ee04613894cf7b200f607dd9c3512436cae9c45a5740373a1d1d
                                  • Instruction Fuzzy Hash: D8F027AF348304FEE68B0543A5212F73A17B747230F3C0096F4C795B02F6A03A1976A6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3374301264.0000000004CB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4cb0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: op6)
                                  • API String ID: 0-3713947904
                                  • Opcode ID: 1923aef8eb9ed1ac2ae616eedd2a9d1de69ad976acbaf712738b90d311dcc5cb
                                  • Instruction ID: 40244d8fbb50bdf0fff34f12a08f6d81ec01919dce0e845450e48f75fd5291a0
                                  • Opcode Fuzzy Hash: 1923aef8eb9ed1ac2ae616eedd2a9d1de69ad976acbaf712738b90d311dcc5cb
                                  • Instruction Fuzzy Hash: ECE0687F288304E99587048366112F77A1ABA03230F780097F48796E02B5A0275CBAB6
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3353611302.0000000000141000.00000040.00000001.01000000.00000005.sdmp, Offset: 00140000, based on PE: true
                                  • Associated: 00000007.00000002.3353380213.0000000000140000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3353611302.00000000002C5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3355825099.00000000002CA000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.00000000002CD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000044F000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000052C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000056B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.0000000000572000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.0000000000581000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3364371124.0000000000582000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3365897546.000000000071B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3366003571.000000000071D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_140000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 333d4b6d5425d6f9d03797ee82114c3711da98524c03317fffdb5ec62fb2b380
                                  • Instruction ID: 6f8c365b0eeb6de038b757ee73403f9b402818835f6c6d0b4b601da5a4c4b3a2
                                  • Opcode Fuzzy Hash: 333d4b6d5425d6f9d03797ee82114c3711da98524c03317fffdb5ec62fb2b380
                                  • Instruction Fuzzy Hash: F9021B71E012199BDF24CFA9D9806AEBBF1FF48314F25826DE919E7340D731AA41CB90
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3353611302.0000000000141000.00000040.00000001.01000000.00000005.sdmp, Offset: 00140000, based on PE: true
                                  • Associated: 00000007.00000002.3353380213.0000000000140000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3353611302.00000000002C5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3355825099.00000000002CA000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.00000000002CD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000044F000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000052C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000056B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.0000000000572000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.0000000000581000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3364371124.0000000000582000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3365897546.000000000071B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3366003571.000000000071D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_140000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: _strrchr
                                  • String ID:
                                  • API String ID: 3213747228-0
                                  • Opcode ID: 785c90e8ff89e0f1a3d98e37725974d6f6ea20f06d45e48120c47f1ca5a82ffe
                                  • Instruction ID: ed19df2125f878baf23917e156006fff781fe2278b3d181a31af70b5de0cf1b5
                                  • Opcode Fuzzy Hash: 785c90e8ff89e0f1a3d98e37725974d6f6ea20f06d45e48120c47f1ca5a82ffe
                                  • Instruction Fuzzy Hash: 8FB16932908255AFDB15AF68CCC2BFE7BA5EF66310F144155E904AF282D7749A01CFA0
                                  APIs
                                  • _ValidateLocalCookies.LIBCMT ref: 00177307
                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 0017730F
                                  • _ValidateLocalCookies.LIBCMT ref: 00177398
                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 001773C3
                                  • _ValidateLocalCookies.LIBCMT ref: 00177418
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3353611302.0000000000141000.00000040.00000001.01000000.00000005.sdmp, Offset: 00140000, based on PE: true
                                  • Associated: 00000007.00000002.3353380213.0000000000140000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3353611302.00000000002C5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3355825099.00000000002CA000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.00000000002CD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000044F000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000052C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000056B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.0000000000572000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.0000000000581000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3364371124.0000000000582000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3365897546.000000000071B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3366003571.000000000071D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_140000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                  • String ID: csm
                                  • API String ID: 1170836740-1018135373
                                  • Opcode ID: 663b33c57d2fd0e17ae08ef3afd74bb8b7d3939adb2806c101e375e99d1faeaf
                                  • Instruction ID: 8271bf3f5e93b0847c899b6cd9caaec96a7c756d859c2ee81ec5c10ec86ba777
                                  • Opcode Fuzzy Hash: 663b33c57d2fd0e17ae08ef3afd74bb8b7d3939adb2806c101e375e99d1faeaf
                                  • Instruction Fuzzy Hash: 0941AD30A04209ABCF10DF68C889A9EBBB5BF05318F14C155EC19AB392DB71EA51DB91
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0015A09D
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0015A0BF
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0015A0E7
                                  • __Getctype.LIBCPMT ref: 0015A1C5
                                  • std::_Facet_Register.LIBCPMT ref: 0015A1F9
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0015A223
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3353611302.0000000000141000.00000040.00000001.01000000.00000005.sdmp, Offset: 00140000, based on PE: true
                                  • Associated: 00000007.00000002.3353380213.0000000000140000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3353611302.00000000002C5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3355825099.00000000002CA000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.00000000002CD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000044F000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000052C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000056B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.0000000000572000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.0000000000581000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3364371124.0000000000582000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3365897546.000000000071B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3366003571.000000000071D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_140000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetctypeRegister
                                  • String ID:
                                  • API String ID: 1102183713-0
                                  • Opcode ID: 5f31e7674861dcb90efda49e00787d3029dd29237b60a69ba1893fd5cd9edf30
                                  • Instruction ID: 37c4d83058ad5ec1f3801663a0a588a355a786ce94e779b274cb0e9a197984f1
                                  • Opcode Fuzzy Hash: 5f31e7674861dcb90efda49e00787d3029dd29237b60a69ba1893fd5cd9edf30
                                  • Instruction Fuzzy Hash: DE51B8B1D00245CFCB11CF58C945BAEBBF0BF10710F148299E865AB391DB74AA49CBD2
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0015C45A
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0015C47C
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0015C4A4
                                  • std::_Facet_Register.LIBCPMT ref: 0015C59A
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0015C5C4
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3353611302.0000000000141000.00000040.00000001.01000000.00000005.sdmp, Offset: 00140000, based on PE: true
                                  • Associated: 00000007.00000002.3353380213.0000000000140000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3353611302.00000000002C5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3355825099.00000000002CA000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.00000000002CD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000044F000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000052C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000056B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.0000000000572000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.0000000000581000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3364371124.0000000000582000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3365897546.000000000071B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3366003571.000000000071D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_140000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                  • String ID:
                                  • API String ID: 459529453-0
                                  • Opcode ID: fb4ce07b8277cd41176dc26b277cf50af6fd2bbe7743e0b03dc771e3ca6bba77
                                  • Instruction ID: 742f2e8abb0faf4e6a5c1d03743fe669e370ff2f803653cc6da5b04374590df8
                                  • Opcode Fuzzy Hash: fb4ce07b8277cd41176dc26b277cf50af6fd2bbe7743e0b03dc771e3ca6bba77
                                  • Instruction Fuzzy Hash: D751CBB0A00244DFDB11CF98D858BAEBBF0FB11314F248198E856AF381D775AA49CBD0
                                  APIs
                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 0014499F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3353611302.0000000000141000.00000040.00000001.01000000.00000005.sdmp, Offset: 00140000, based on PE: true
                                  • Associated: 00000007.00000002.3353380213.0000000000140000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3353611302.00000000002C5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3355825099.00000000002CA000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.00000000002CD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000044F000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000052C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000056B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.0000000000572000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.0000000000581000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3364371124.0000000000582000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3365897546.000000000071B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3366003571.000000000071D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_140000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: Ios_base_dtorstd::ios_base::_
                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                  • API String ID: 323602529-1866435925
                                  • Opcode ID: 2f2c256f0a5cbf90e32aa95de66238ac68fc04a46422953bf4c195ee12b13c74
                                  • Instruction ID: 5636d6f09daedf0317b23af3c3caedb7e44ceaebfd94d93915718da8dba8b6f5
                                  • Opcode Fuzzy Hash: 2f2c256f0a5cbf90e32aa95de66238ac68fc04a46422953bf4c195ee12b13c74
                                  • Instruction Fuzzy Hash: C51140729147446BCB14DF58DC03F977398DB19714F044629FE588B2D2EB75A910C7D2
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 00172730
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0017273B
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 001727A9
                                    • Part of subcall function 0017288C: std::locale::_Locimp::_Locimp.LIBCPMT ref: 001728A4
                                  • std::locale::_Setgloballocale.LIBCPMT ref: 00172756
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3353611302.0000000000141000.00000040.00000001.01000000.00000005.sdmp, Offset: 00140000, based on PE: true
                                  • Associated: 00000007.00000002.3353380213.0000000000140000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3353611302.00000000002C5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3355825099.00000000002CA000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.00000000002CD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000044F000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000052C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000056B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.0000000000572000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.0000000000581000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3364371124.0000000000582000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3365897546.000000000071B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3366003571.000000000071D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_140000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                                  • String ID:
                                  • API String ID: 677527491-0
                                  • Opcode ID: 1f8db720e8ba288dcea0248d34e9598e68bc04c40554bc34e9ad4a83dc9b8969
                                  • Instruction ID: ceff2f356d2787f312810369a73d4687fd69214b1816197632031b02c5f77c22
                                  • Opcode Fuzzy Hash: 1f8db720e8ba288dcea0248d34e9598e68bc04c40554bc34e9ad4a83dc9b8969
                                  • Instruction Fuzzy Hash: 1D01DF75A002219BCB0AEB20E84993D7BB1FFE4790B148049E81A57381CF74AE02DBC6
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 0014750C
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00147522
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3353611302.0000000000141000.00000040.00000001.01000000.00000005.sdmp, Offset: 00140000, based on PE: true
                                  • Associated: 00000007.00000002.3353380213.0000000000140000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3353611302.00000000002C5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3355825099.00000000002CA000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.00000000002CD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000044F000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000052C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000056B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.0000000000572000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.0000000000581000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3364371124.0000000000582000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3365897546.000000000071B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3366003571.000000000071D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_140000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: [json.exception.
                                  • API String ID: 4194217158-791563284
                                  • Opcode ID: 9b44dc5286fa25ff49679bf5ac29efc523906518b6f15346309d37e97ad7e0a0
                                  • Instruction ID: 86e8beb0c88c1be6293698f3a50db716bfa3951f214d27aedb6efff06fca84cb
                                  • Opcode Fuzzy Hash: 9b44dc5286fa25ff49679bf5ac29efc523906518b6f15346309d37e97ad7e0a0
                                  • Instruction Fuzzy Hash: B351DFB1C04648DBDB00DFA8C906BAEFBB4EF25314F148259E854AB292E7B45A44C7A1
                                  APIs
                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 0014499F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3353611302.0000000000141000.00000040.00000001.01000000.00000005.sdmp, Offset: 00140000, based on PE: true
                                  • Associated: 00000007.00000002.3353380213.0000000000140000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3353611302.00000000002C5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3355825099.00000000002CA000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.00000000002CD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000044F000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000052C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000056B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.0000000000572000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.0000000000581000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3364371124.0000000000582000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3365897546.000000000071B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3366003571.000000000071D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_140000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: Ios_base_dtorstd::ios_base::_
                                  • String ID: ios_base::badbit set$ios_base::failbit set
                                  • API String ID: 323602529-1240500531
                                  • Opcode ID: afc5cb8b31e4e4134f0f62082c03b2b87830af2a56d7332587e102ae1a03876d
                                  • Instruction ID: f2564e996e4e7d5f0074ac9c8af82fc0af666627abd5910782926bdd45a7779d
                                  • Opcode Fuzzy Hash: afc5cb8b31e4e4134f0f62082c03b2b87830af2a56d7332587e102ae1a03876d
                                  • Instruction Fuzzy Hash: 734126B1C00248ABCB04DF58CC45BAEBBB8EF09710F14825DF554AB391D7755A00CBA1
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00144061
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 001440C4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3353611302.0000000000141000.00000040.00000001.01000000.00000005.sdmp, Offset: 00140000, based on PE: true
                                  • Associated: 00000007.00000002.3353380213.0000000000140000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3353611302.00000000002C5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3355825099.00000000002CA000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.00000000002CD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000044F000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000052C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.000000000056B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.0000000000572000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3357930710.0000000000581000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3364371124.0000000000582000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3365897546.000000000071B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000007.00000002.3366003571.000000000071D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_140000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                  • String ID: bad locale name
                                  • API String ID: 3988782225-1405518554
                                  • Opcode ID: 638d6e1da498ef285348dfaef29783001ebd6f600a3dd8b3791c6830c7372ba7
                                  • Instruction ID: 2808c66df419158689960e53a3c700a522ba75cb4b10d83e8af05b32f2e17cc9
                                  • Opcode Fuzzy Hash: 638d6e1da498ef285348dfaef29783001ebd6f600a3dd8b3791c6830c7372ba7
                                  • Instruction Fuzzy Hash: 6D119370805B84EFD721CFA8C50474BBFF4AF26714F14869DE49997781D3B55A04CBA1

                                  Control-flow Graph

                                  APIs
                                  • setsockopt.WS2_32(00000404,0000FFFF,00001006,?,00000008), ref: 01017BA7
                                  • recv.WS2_32(?,00000004,00000002), ref: 01017BC1
                                  • recv.WS2_32(00000000,0000000C,00000002,00000000), ref: 01017C43
                                  • recv.WS2_32(00000000,0000000C,00000008), ref: 01017C64
                                    • Part of subcall function 01018590: WSAStartup.WS2_32 ref: 010185BA
                                    • Part of subcall function 01018590: socket.WS2_32(?,?,?,?,?,?,010D9328,?,?), ref: 0101865E
                                    • Part of subcall function 01018590: connect.WS2_32(00000000,010A9BFC,?,?,?,?,010D9328,?,?), ref: 01018672
                                    • Part of subcall function 01018590: closesocket.WS2_32(00000000), ref: 0101867D
                                  • recv.WS2_32(00000000,?,00000008), ref: 01017D1B
                                  • recv.WS2_32(?,00000004,00000008), ref: 01017E23
                                  • __Xtime_get_ticks.LIBCPMT ref: 01017E2A
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01017E38
                                  • Sleep.KERNELBASE(00000001,00000000,?,00002710,00000000), ref: 01017EB1
                                  • Sleep.KERNELBASE(00000064,?,00002710,00000000), ref: 01017EB9
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3363611949.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, Offset: 00F50000, based on PE: true
                                  • Associated: 00000008.00000002.3363384316.0000000000F50000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3363611949.00000000010D5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364695090.00000000010DA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.00000000010DD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000125F000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000133C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000137B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.0000000001382000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.0000000001391000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3366817625.0000000001392000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3367196806.000000000152B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3367244410.000000000152D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_f50000_RageMP131.jbxd
                                  Similarity
                                  • API ID: recv$Sleep$StartupUnothrow_t@std@@@Xtime_get_ticks__ehfuncinfo$??2@closesocketconnectsetsockoptsocket
                                  • String ID:
                                  • API String ID: 56803616-0
                                  • Opcode ID: cd809cb36100311be51a18912b3d021abf1398d3b2adaaa6f50964f9cd0feda7
                                  • Instruction ID: 748d60e0b35b49dffd5ef21974d154f7e42d000f832f4aa50bcf6116987e7fcc
                                  • Opcode Fuzzy Hash: cd809cb36100311be51a18912b3d021abf1398d3b2adaaa6f50964f9cd0feda7
                                  • Instruction Fuzzy Hash: 69B1D071D00308DFEB20EBA8CC49BADBBF1FB49314F104259E984AB2D6D7795944CB91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 58 1018590-10185c2 WSAStartup 59 1018696-101869f 58->59 60 10185c8-10185f2 call 103a420 * 2 58->60 65 10185f4-10185f8 60->65 66 10185fe-1018644 60->66 65->59 65->66 68 1018690 66->68 69 1018646-101864c 66->69 68->59 70 10186a4-10186ae 69->70 71 101864e 69->71 70->68 75 10186b0-10186b8 70->75 72 1018654-1018668 socket 71->72 72->68 74 101866a-101867a connect 72->74 76 10186a0 74->76 77 101867c-1018684 closesocket 74->77 76->70 77->72 78 1018686-101868a 77->78 78->68
                                  APIs
                                  • WSAStartup.WS2_32 ref: 010185BA
                                  • socket.WS2_32(?,?,?,?,?,?,010D9328,?,?), ref: 0101865E
                                  • connect.WS2_32(00000000,010A9BFC,?,?,?,?,010D9328,?,?), ref: 01018672
                                  • closesocket.WS2_32(00000000), ref: 0101867D
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3363611949.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, Offset: 00F50000, based on PE: true
                                  • Associated: 00000008.00000002.3363384316.0000000000F50000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3363611949.00000000010D5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364695090.00000000010DA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.00000000010DD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000125F000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000133C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000137B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.0000000001382000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.0000000001391000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3366817625.0000000001392000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3367196806.000000000152B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3367244410.000000000152D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_f50000_RageMP131.jbxd
                                  Similarity
                                  • API ID: Startupclosesocketconnectsocket
                                  • String ID:
                                  • API String ID: 3098855095-0
                                  • Opcode ID: 723d35d60bf27976fa9a030c2dd80abc297f500d1c08082e60406882eca698b1
                                  • Instruction ID: f8e6c5dca087ce4b7fc70da2f0852a2165eafae796e3046b31a6cbe8b31eb683
                                  • Opcode Fuzzy Hash: 723d35d60bf27976fa9a030c2dd80abc297f500d1c08082e60406882eca698b1
                                  • Instruction Fuzzy Hash: 4231F5729003015FD7608E288C4866BB7E4FFC9738F019F5AFAE8932D0D77499048792

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 79 f59280-f592dd call f663b0 82 f59413-f59521 call f52df0 call 103a420 79->82 83 f592e3-f592e9 79->83 99 f59537-f5953f call f68dc0 82->99 100 f59523-f59535 82->100 85 f592f0-f59313 83->85 87 f59315-f5931f 85->87 88 f59324-f59331 85->88 90 f59403-f59406 87->90 91 f59333-f5933d 88->91 92 f59342-f5934f 88->92 96 f59409-f5940d 90->96 91->90 93 f59351-f5935b 92->93 94 f59360-f5936d 92->94 93->90 97 f5936f-f59379 94->97 98 f5937e-f5938b 94->98 96->82 96->85 97->90 101 f5938d-f59397 98->101 102 f59399-f593a6 98->102 103 f59544-f59597 call 103a420 * 2 99->103 100->103 101->90 105 f593b4-f593c1 102->105 106 f593a8-f593b2 102->106 116 f59599-f595c8 call 103a420 call f85270 103->116 117 f595cb-f595e1 call 103a420 103->117 108 f593c3-f593cd 105->108 109 f593cf-f593dc 105->109 106->90 108->90 111 f593de-f593e8 109->111 112 f593ea-f593f4 109->112 111->90 112->96 115 f593f6-f593ff 112->115 115->90 116->117 123 f595e7-f595ed 117->123 124 f596e2 117->124 126 f595f0-f596ce WSASend 123->126 127 f596e6-f596f0 124->127 145 f596d4-f596dc 126->145 146 f5975f-f59763 126->146 128 f596f2-f596fe 127->128 129 f5971e-f5973d 127->129 133 f59714-f5971b call f838f3 128->133 134 f59700-f5970e 128->134 130 f5976f-f59796 129->130 131 f5973f-f5974b 129->131 137 f59765-f5976c call f838f3 131->137 138 f5974d-f5975b 131->138 133->129 134->133 135 f59797-f597fe call f88c70 call f52df0 * 2 134->135 137->130 138->135 140 f5975d 138->140 140->137 145->124 145->126 146->127
                                  APIs
                                  • WSASend.WS2_32(?,?,00000001,00000000,00000000,00000000,00000000,?,?,?,?,0109D15C,00000000,761B23A0,-010D9880), ref: 00F596C9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3363611949.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, Offset: 00F50000, based on PE: true
                                  • Associated: 00000008.00000002.3363384316.0000000000F50000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3363611949.00000000010D5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364695090.00000000010DA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.00000000010DD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000125F000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000133C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000137B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.0000000001382000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.0000000001391000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3366817625.0000000001392000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3367196806.000000000152B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3367244410.000000000152D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_f50000_RageMP131.jbxd
                                  Similarity
                                  • API ID: Send
                                  • String ID: Ws2_32.dll
                                  • API String ID: 121738739-3093949381
                                  • Opcode ID: 22d969c05f2aa974c0975e92b829f278fd2cdd95051a7deafacba48a0a27bdce
                                  • Instruction ID: 37ce38a5d3388f0a0f4bd904c21e5167f636941f88499e2a0cbf8d1169377ea1
                                  • Opcode Fuzzy Hash: 22d969c05f2aa974c0975e92b829f278fd2cdd95051a7deafacba48a0a27bdce
                                  • Instruction Fuzzy Hash: 7A02E270D08298DFDF25CFA4C8907EDBBB0EF55314F24428DE8856B286D7B41986DB92

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 152 4de0000-4de003f 154 4de0054-4de00a9 call 4de00b2 152->154 161 4de00ab-4de026d 154->161 162 4de0043-4de0053 154->162 184 4de027f-4de028b GetCurrentHwProfileW 161->184 162->154 185 4de0298-4de04b0 184->185 205 4de04c6-4de04df call 4de04e3 185->205 208 4de04c0-4de04c5 205->208 209 4de04e1 205->209 208->205
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3374856555.0000000004DE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_4de0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 1ed0075d7ebcfed7d06e566ccb1bd55c245c43449d9b46282d7e1c4e8751b2c8
                                  • Instruction ID: 68979e294259ae42ea26329aeefaf688f673f12cc33a172bc8e855e0d7f802e4
                                  • Opcode Fuzzy Hash: 1ed0075d7ebcfed7d06e566ccb1bd55c245c43449d9b46282d7e1c4e8751b2c8
                                  • Instruction Fuzzy Hash: 3661C5EB34C131BDB603A5936B54AFB676EE6D27307308426F487D6502F2D89A4DB031

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 210 4de001e-4de0028 211 4de002a-4de003f 210->211 212 4de007b-4de007d 210->212 216 4de0054-4de0071 211->216 214 4de007e-4de00a9 call 4de00b2 212->214 221 4de00ab-4de026d 214->221 222 4de0043-4de0053 214->222 216->214 244 4de027f-4de028b GetCurrentHwProfileW 221->244 222->216 245 4de0298-4de04b0 244->245 265 4de04c6-4de04df call 4de04e3 245->265 268 4de04c0-4de04c5 265->268 269 4de04e1 265->269 268->265
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3374856555.0000000004DE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_4de0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 927c725078d7650ed077a821e5d01171a56185c6b5d713a2c880d7042a5b0497
                                  • Instruction ID: f332132af397f9e993fb7f767d457261142c314ce5a1e15474d584a18286ef3f
                                  • Opcode Fuzzy Hash: 927c725078d7650ed077a821e5d01171a56185c6b5d713a2c880d7042a5b0497
                                  • Instruction Fuzzy Hash: 8151E6EB34C131BDB503A5936B54AFB676EE6C27307308426F487D6502F3D4AA4EA031

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 270 4de0063 271 4de0065-4de00a9 call 4de00b2 270->271 277 4de00ab-4de026d 271->277 278 4de0043-4de005b 271->278 301 4de027f-4de028b GetCurrentHwProfileW 277->301 278->271 302 4de0298-4de04b0 301->302 322 4de04c6-4de04df call 4de04e3 302->322 325 4de04c0-4de04c5 322->325 326 4de04e1 322->326 325->322
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3374856555.0000000004DE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_4de0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: d91fb5ee3c06192c2f9e67902e6d43ada16576a5827c36e5afdef3cb99362b97
                                  • Instruction ID: b11270bdab47660ffb64688c02a6cf570b7dd9b2545f3e20d29515543d4a8f05
                                  • Opcode Fuzzy Hash: d91fb5ee3c06192c2f9e67902e6d43ada16576a5827c36e5afdef3cb99362b97
                                  • Instruction Fuzzy Hash: 7851F5EB30C131BDB603A5936B54AFB676EE6D67307308426F487D6502F3D4AA89B031

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 327 4de007a-4de007d 329 4de007e-4de00a9 call 4de00b2 327->329 334 4de00ab-4de026d 329->334 335 4de0043-4de0071 329->335 359 4de027f-4de028b GetCurrentHwProfileW 334->359 335->329 360 4de0298-4de04b0 359->360 380 4de04c6-4de04df call 4de04e3 360->380 383 4de04c0-4de04c5 380->383 384 4de04e1 380->384 383->380
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3374856555.0000000004DE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_4de0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 19d4291fe299975fca75df03f0f167aff1cfd274d89d342b6fcafb69823273f8
                                  • Instruction ID: 69fe9a9ddf45af2b89e5bb5b13a298575cdfcd26824b2102e7eef9eb5238b5e3
                                  • Opcode Fuzzy Hash: 19d4291fe299975fca75df03f0f167aff1cfd274d89d342b6fcafb69823273f8
                                  • Instruction Fuzzy Hash: 6851F6EB30C131BDB603A5936B54AFB676EE6D27307308426F487D6502F3D4AA49B031

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 385 4de0090-4de0094 386 4de009b-4de00a9 call 4de00b2 385->386 387 4de0096-4de0099 385->387 390 4de00ab-4de026d 386->390 391 4de0043-4de009a 386->391 387->386 417 4de027f-4de028b GetCurrentHwProfileW 390->417 391->386 418 4de0298-4de04b0 417->418 438 4de04c6-4de04df call 4de04e3 418->438 441 4de04c0-4de04c5 438->441 442 4de04e1 438->442 441->438
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3374856555.0000000004DE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_4de0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3900711adde8904c55b6ccdf442f6c2c01fbc63b2c0c6bca43980402f0ceede2
                                  • Instruction ID: 999995bc1ca936213f4ba4199398b980d2785331f18b67008b431588ceb61855
                                  • Opcode Fuzzy Hash: 3900711adde8904c55b6ccdf442f6c2c01fbc63b2c0c6bca43980402f0ceede2
                                  • Instruction Fuzzy Hash: 1251F7EB30C230BDB603A5936B54AFB676EE6D67307308427F447DA502F2D4AA49B031

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 443 4de00d5-4de00e1 444 4de00a6-4de00a7 443->444 445 4de00e3-4de026d 443->445 446 4de00a9 444->446 447 4de00b3-4de00cc 444->447 476 4de027f-4de028b GetCurrentHwProfileW 445->476 449 4de00ab-4de00af 446->449 450 4de0043-4de00a9 call 4de00b2 446->450 447->445 449->447 450->449 477 4de0298-4de04b0 476->477 497 4de04c6-4de04df call 4de04e3 477->497 500 4de04c0-4de04c5 497->500 501 4de04e1 497->501 500->497
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3374856555.0000000004DE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_4de0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: de7dc37eb57e126b3dc346aee157cf063dcb87c5d355afe5cc747a95aade6530
                                  • Instruction ID: 670d9931ffd7009a87ea160c299d15a469ca29422138b4ea8742df546517528c
                                  • Opcode Fuzzy Hash: de7dc37eb57e126b3dc346aee157cf063dcb87c5d355afe5cc747a95aade6530
                                  • Instruction Fuzzy Hash: 4E51E4EB34C130BDB603A4936B54AFB27AEE6C67307308426F487D6506F2D4AA49B031

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 502 4de00b2-4de026d 524 4de027f-4de028b GetCurrentHwProfileW 502->524 525 4de0298-4de04b0 524->525 545 4de04c6-4de04df call 4de04e3 525->545 548 4de04c0-4de04c5 545->548 549 4de04e1 545->549 548->545
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04DE0282
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3374856555.0000000004DE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_4de0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 6315df998900d4ca0cf47acedef32b1d087be40107322d27084e29213cabc620
                                  • Instruction ID: 637113b8b50fbc8c712b868e2c525fb6f2d13f892478a4745aa38bdd2717ec53
                                  • Opcode Fuzzy Hash: 6315df998900d4ca0cf47acedef32b1d087be40107322d27084e29213cabc620
                                  • Instruction Fuzzy Hash: 3851D5EB34C130BDB643A5936B54AFB676EE6D27307308426F447D6502F3D4AA49B031

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 550 4de00ec-4de00fd 551 4de00ff-4de0103 550->551 552 4de012a-4de012d 550->552 553 4de011a-4de011b 551->553 554 4de010e-4de0119 552->554 555 4de012f 552->555 556 4de0131-4de026d 553->556 554->553 555->556 572 4de027f-4de028b GetCurrentHwProfileW 556->572 573 4de0298-4de04b0 572->573 593 4de04c6-4de04df call 4de04e3 573->593 596 4de04c0-4de04c5 593->596 597 4de04e1 593->597 596->593
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04DE0282
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3374856555.0000000004DE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_4de0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 9f63044f0eb86decb47c74d6b67733deba779d8565da81c15e6180b202676f6a
                                  • Instruction ID: 5439a457551b47dc17d22674405384e7be36253aa4f73ec8f19c51bcfd55b04f
                                  • Opcode Fuzzy Hash: 9f63044f0eb86decb47c74d6b67733deba779d8565da81c15e6180b202676f6a
                                  • Instruction Fuzzy Hash: CB51E6EB34C131BDB253A4932B546FB67AEE6D27307308426F447DA506F2D49B4AB031

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 598 4de010a-4de026d 616 4de027f-4de028b GetCurrentHwProfileW 598->616 617 4de0298-4de04b0 616->617 637 4de04c6-4de04df call 4de04e3 617->637 640 4de04c0-4de04c5 637->640 641 4de04e1 637->641 640->637
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04DE0282
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3374856555.0000000004DE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_4de0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: c1f4163ee2cf6ef34d0fad66d00fecd4b5b48a4dac3145d07b6c071288935646
                                  • Instruction ID: 38437239957e0a4c64436b10c9137478faa1c90d71db9716a2d37d9e646fe77c
                                  • Opcode Fuzzy Hash: c1f4163ee2cf6ef34d0fad66d00fecd4b5b48a4dac3145d07b6c071288935646
                                  • Instruction Fuzzy Hash: 3941A4EB34C131BDB643A5832B54AFB666EE6D27307308426F447D6502F3D4AE49B031

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 642 4de0120-4de012d 644 4de010e-4de011b 642->644 645 4de012f 642->645 646 4de0131-4de026d 644->646 645->646 663 4de027f-4de028b GetCurrentHwProfileW 646->663 664 4de0298-4de04b0 663->664 684 4de04c6-4de04df call 4de04e3 664->684 687 4de04c0-4de04c5 684->687 688 4de04e1 684->688 687->684
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04DE0282
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3374856555.0000000004DE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_4de0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 95c405dc195e206e1d4d5fb18bb5f3e85f44d9926d877b4ae0891026ea9fa487
                                  • Instruction ID: 4a976be6153779cfdce9de47b76ce1bfd6919aa07ad2770af2ec97cd8f9df4e6
                                  • Opcode Fuzzy Hash: 95c405dc195e206e1d4d5fb18bb5f3e85f44d9926d877b4ae0891026ea9fa487
                                  • Instruction Fuzzy Hash: B641B3EB24C231BDB653A5832B54AFB67BEE6D27307308426F447D6506F3D4AB49A031

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 689 4de015d-4de0162 690 4de0164-4de01ae 689->690 691 4de01b5-4de01b7 689->691 693 4de01b9-4de026d 690->693 691->693 703 4de027f-4de028b GetCurrentHwProfileW 693->703 704 4de0298-4de04b0 703->704 724 4de04c6-4de04df call 4de04e3 704->724 727 4de04c0-4de04c5 724->727 728 4de04e1 724->728 727->724
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04DE0282
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3374856555.0000000004DE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_4de0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: a83007c6c28783c444b8fa322124fc2e3cb56b423b5c7875e47e2138e76fa50d
                                  • Instruction ID: 9552b3103667490a1b941b3a12c2e3dab7a5c41993d42f801bf23b2d2fbcf79b
                                  • Opcode Fuzzy Hash: a83007c6c28783c444b8fa322124fc2e3cb56b423b5c7875e47e2138e76fa50d
                                  • Instruction Fuzzy Hash: DC41A4EB24C231BDB653A5832B54AFB676EE5D27303308426F487D6507F2D89E4AA031

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 729 4de013c-4de013d 730 4de013f-4de01ae 729->730 731 4de01b2-4de01b7 729->731 735 4de01b9-4de026d 730->735 731->735 748 4de027f-4de028b GetCurrentHwProfileW 735->748 749 4de0298-4de04b0 748->749 769 4de04c6-4de04df call 4de04e3 749->769 772 4de04c0-4de04c5 769->772 773 4de04e1 769->773 772->769
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04DE0282
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3374856555.0000000004DE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_4de0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: f720fb06254fefaf26a465a99bc6f28414b57a701183a2f0f0ef6e85bb9a6726
                                  • Instruction ID: 7256a5fccc10483f5e1f1c7d168383139b02312638cc5693a45d9303035a51b7
                                  • Opcode Fuzzy Hash: f720fb06254fefaf26a465a99bc6f28414b57a701183a2f0f0ef6e85bb9a6726
                                  • Instruction Fuzzy Hash: 7E41A4EB34C231BDB553A1932B54AFB67AEE5D27307308426F487DA507F2D4AA49B031
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04DE0282
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3374856555.0000000004DE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_4de0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: ff426e8aba19352bab0103a7ca0f2f74c65206a7d571471c3c7b4104735751b5
                                  • Instruction ID: 1be8bf5d0a0236ff96aeac830a807dd056eeced2784f7c3b2841635c9a470a82
                                  • Opcode Fuzzy Hash: ff426e8aba19352bab0103a7ca0f2f74c65206a7d571471c3c7b4104735751b5
                                  • Instruction Fuzzy Hash: 6541A2EB34C131BDB653A1836B54AFB67AEE6D27307308426F447D6502F2D49A4AA031
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04DE0282
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3374856555.0000000004DE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_4de0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 550026db4eac3ca71edf523946ac82e901f252b6f5cbae8432cb444c3b75c308
                                  • Instruction ID: 98da4c113fa94d576de742e3e100f0e4f99cf60a4cd4ac961e653cf03d01a9bf
                                  • Opcode Fuzzy Hash: 550026db4eac3ca71edf523946ac82e901f252b6f5cbae8432cb444c3b75c308
                                  • Instruction Fuzzy Hash: A04190EB34C235BDB553A1832B54AFB66AEE5D27307308427F847D6502F2D4AE89B031
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04DE0282
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3374856555.0000000004DE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_4de0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 218fd8a088810f021f3d8588f9d4696196f153a128655a6cd1efc72d07063b8e
                                  • Instruction ID: c6e777ecebcaad62433d3f5fdfd41859eeaa75b98e502b8c26a0db0723c76494
                                  • Opcode Fuzzy Hash: 218fd8a088810f021f3d8588f9d4696196f153a128655a6cd1efc72d07063b8e
                                  • Instruction Fuzzy Hash: EC4160EB24C131BDB553A1936B54AFB67AEE5D2730330C426F847D5507F2D4AE8AA031
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04DE0282
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3374856555.0000000004DE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_4de0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 0665abdd12764dee7f91971d8c201c5da530fe75b11af82c22ba74c5db89288f
                                  • Instruction ID: c649dfd1dedc2f38bf32dc37121edb6d0728e95926515c94d81170050b80b6fe
                                  • Opcode Fuzzy Hash: 0665abdd12764dee7f91971d8c201c5da530fe75b11af82c22ba74c5db89288f
                                  • Instruction Fuzzy Hash: 43417CEB34C131BDB653A1836B54AFB676EE5D2730331C426F847C6506F2D89E8AA031
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04DE0282
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3374856555.0000000004DE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_4de0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 08f4f17699bebc565a18d33566bb66d37ee4fe9fe5a7b21ead5d72854db4de0b
                                  • Instruction ID: d06e57b436aadc5036fb58f2351b643da3dddcc5a46abf2e75fee6754db94085
                                  • Opcode Fuzzy Hash: 08f4f17699bebc565a18d33566bb66d37ee4fe9fe5a7b21ead5d72854db4de0b
                                  • Instruction Fuzzy Hash: 5E417EEB34C1317DB613A1832B54AFB67AEE6D27307308426F847D6506F2D49A4AA031
                                  APIs
                                  • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00F9990E
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3363611949.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, Offset: 00F50000, based on PE: true
                                  • Associated: 00000008.00000002.3363384316.0000000000F50000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3363611949.00000000010D5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364695090.00000000010DA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.00000000010DD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000125F000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000133C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000137B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.0000000001382000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.0000000001391000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3366817625.0000000001392000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3367196806.000000000152B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3367244410.000000000152D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_f50000_RageMP131.jbxd
                                  Similarity
                                  • API ID: FileWrite
                                  • String ID:
                                  • API String ID: 3934441357-0
                                  • Opcode ID: 6d2e73e14f004a1ff9d2e084f12b4405e72a66be7c1ae686b551cb18f73e4600
                                  • Instruction ID: 3356028c33c9297b443ac7fdf3778fd0f636e03b8d114ab348b7ad2f9e23eb6b
                                  • Opcode Fuzzy Hash: 6d2e73e14f004a1ff9d2e084f12b4405e72a66be7c1ae686b551cb18f73e4600
                                  • Instruction Fuzzy Hash: DF61C372D08109BFEF11DFACC884AEE7BB9AF49314F15014DE904A7246D7B6D901EBA1
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04DE0282
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3374856555.0000000004DE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_4de0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: ccb7510a5875f6b31adb1ff8fbea7ec626abc2c34e079e939449ad45f48c8249
                                  • Instruction ID: 59d4c22f571d1c32bb32a369faae58c6a83d9096c11ade307cc02b4ebfca1bd8
                                  • Opcode Fuzzy Hash: ccb7510a5875f6b31adb1ff8fbea7ec626abc2c34e079e939449ad45f48c8249
                                  • Instruction Fuzzy Hash: 70318FFB34C231BDB653A1936B50AFB67AEE5D27303308426F447C6506F3D49A8AA031
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04DE0282
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3374856555.0000000004DE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_4de0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 7beebef7ed9fec7a52e53339ffc09d0c16aae4f2fb2db35b06eb06705d524954
                                  • Instruction ID: 43c8c7844d1e34941b780d1d94642d863f7631eabc17be2fa3818154eb83f3cc
                                  • Opcode Fuzzy Hash: 7beebef7ed9fec7a52e53339ffc09d0c16aae4f2fb2db35b06eb06705d524954
                                  • Instruction Fuzzy Hash: 423190EB34C2317DB653A1836B50AFB276EE6D2730330C427F847C6502F2D49A8AA031
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04DE0282
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3374856555.0000000004DE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_4de0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 148e27151fd1181e675492a074a4b80e403e480b45d1d08aa45164d882a37af5
                                  • Instruction ID: 1f2b580101abc2f1ee9cf17158b2aed409481574ead5eb4c35b64e98b1a5e2fe
                                  • Opcode Fuzzy Hash: 148e27151fd1181e675492a074a4b80e403e480b45d1d08aa45164d882a37af5
                                  • Instruction Fuzzy Hash: 5E317EEB34C2317DB653A1936B54AFB676EE6D2730330C427F847C6506F2D49A8AA031
                                  APIs
                                  • FindCloseChangeNotification.KERNELBASE(00000000,00000000,?,?,00F98CE6,00000000,?,010CA178,0000000C,00F98DA2,?,?,?), ref: 00F98E55
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3363611949.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, Offset: 00F50000, based on PE: true
                                  • Associated: 00000008.00000002.3363384316.0000000000F50000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3363611949.00000000010D5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364695090.00000000010DA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.00000000010DD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000125F000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000133C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000137B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.0000000001382000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.0000000001391000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3366817625.0000000001392000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3367196806.000000000152B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3367244410.000000000152D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_f50000_RageMP131.jbxd
                                  Similarity
                                  • API ID: ChangeCloseFindNotification
                                  • String ID:
                                  • API String ID: 2591292051-0
                                  • Opcode ID: 8e5a570c356d4eefdbf80817dc52b0d1e32d8b76718427a6c63aed778438f014
                                  • Instruction ID: f1f6d9254857130faaa61870ed2dabbe992133239f63b569153186d0b35e6cef
                                  • Opcode Fuzzy Hash: 8e5a570c356d4eefdbf80817dc52b0d1e32d8b76718427a6c63aed778438f014
                                  • Instruction Fuzzy Hash: 62116B33E0212456FE3573B4AC55B7E37894BC37B4F290619F9188B1C2EE799C83A255
                                  APIs
                                  • SetFilePointerEx.KERNELBASE(00000000,?,?,?,?,?,00000000,?,?,?,00F92626,?,?,?,?,?), ref: 00F92558
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3363611949.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, Offset: 00F50000, based on PE: true
                                  • Associated: 00000008.00000002.3363384316.0000000000F50000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3363611949.00000000010D5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364695090.00000000010DA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.00000000010DD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000125F000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000133C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000137B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.0000000001382000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.0000000001391000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3366817625.0000000001392000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3367196806.000000000152B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3367244410.000000000152D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_f50000_RageMP131.jbxd
                                  Similarity
                                  • API ID: FilePointer
                                  • String ID:
                                  • API String ID: 973152223-0
                                  • Opcode ID: 5d8a1f60e07bfe4d1f3b6e7c2f83c2241e4346aa4a852c26efc204e30824426f
                                  • Instruction ID: 8798dd719b0217dafb2c302c94b0a09964cd9fff24dcfe68dbaa152d7ba08622
                                  • Opcode Fuzzy Hash: 5d8a1f60e07bfe4d1f3b6e7c2f83c2241e4346aa4a852c26efc204e30824426f
                                  • Instruction Fuzzy Hash: 32012632A00215BFEF09DF18CC11D9E3B59DB85330B390108FC009B291E671ED419B90
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00F5331F
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3363611949.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, Offset: 00F50000, based on PE: true
                                  • Associated: 00000008.00000002.3363384316.0000000000F50000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3363611949.00000000010D5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364695090.00000000010DA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.00000000010DD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000125F000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000133C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000137B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.0000000001382000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.0000000001391000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3366817625.0000000001392000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3367196806.000000000152B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3367244410.000000000152D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_f50000_RageMP131.jbxd
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID:
                                  • API String ID: 118556049-0
                                  • Opcode ID: 0fd589d96c9d07b1efa01aec19e4ff46bb0766daf2056f60d33bc81ca57302d3
                                  • Instruction ID: 6d2ae0047a4148310f0b6b12516d032169d98fc93c9a9037459437aec8a28d9a
                                  • Opcode Fuzzy Hash: 0fd589d96c9d07b1efa01aec19e4ff46bb0766daf2056f60d33bc81ca57302d3
                                  • Instruction Fuzzy Hash: 96F0B4725001049BDB147F68D8158E9B3E8DF243A2750097AEE8DC7222EB2ADA59A790
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000000,00000001,?,?,00F84B3F,?,?,761B23A0,?,?,00F53522,?,?), ref: 00F9B0C6
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3363611949.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, Offset: 00F50000, based on PE: true
                                  • Associated: 00000008.00000002.3363384316.0000000000F50000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3363611949.00000000010D5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364695090.00000000010DA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.00000000010DD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000125F000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000133C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000137B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.0000000001382000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.0000000001391000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3366817625.0000000001392000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3367196806.000000000152B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3367244410.000000000152D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_f50000_RageMP131.jbxd
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 0661767f5766ea1aa61a108cef838215102bb11753d5ad45d92dcab8c265886e
                                  • Instruction ID: fb1ccc187ebc8a706a439ead32b3ab8b0239d21f2169d8f9aff4e18a19dffa5d
                                  • Opcode Fuzzy Hash: 0661767f5766ea1aa61a108cef838215102bb11753d5ad45d92dcab8c265886e
                                  • Instruction Fuzzy Hash: F6E02B32A013201AFF3126A5BD00B5B76499F813B0F150220FD29A61E0CB24DC00B2A5
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3363611949.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, Offset: 00F50000, based on PE: true
                                  • Associated: 00000008.00000002.3363384316.0000000000F50000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3363611949.00000000010D5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364695090.00000000010DA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.00000000010DD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000125F000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000133C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000137B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.0000000001382000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.0000000001391000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3366817625.0000000001392000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3367196806.000000000152B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3367244410.000000000152D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_f50000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 333d4b6d5425d6f9d03797ee82114c3711da98524c03317fffdb5ec62fb2b380
                                  • Instruction ID: c5b41566cfdde02848cd8a4224886613f4c64437f6dabb9503a930f4d4bf03ee
                                  • Opcode Fuzzy Hash: 333d4b6d5425d6f9d03797ee82114c3711da98524c03317fffdb5ec62fb2b380
                                  • Instruction Fuzzy Hash: C4022A71E012199BDF14DFA9D8806EEBBF1FF48324F258269E919E7380D731A941DB90
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3363611949.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, Offset: 00F50000, based on PE: true
                                  • Associated: 00000008.00000002.3363384316.0000000000F50000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3363611949.00000000010D5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364695090.00000000010DA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.00000000010DD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000125F000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000133C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000137B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.0000000001382000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.0000000001391000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3366817625.0000000001392000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3367196806.000000000152B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3367244410.000000000152D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_f50000_RageMP131.jbxd
                                  Similarity
                                  • API ID: _strrchr
                                  • String ID:
                                  • API String ID: 3213747228-0
                                  • Opcode ID: 785c90e8ff89e0f1a3d98e37725974d6f6ea20f06d45e48120c47f1ca5a82ffe
                                  • Instruction ID: b3b029c729aaa1684603917594f22f5e12f570c0b9a7d1764eb26c7a59002044
                                  • Opcode Fuzzy Hash: 785c90e8ff89e0f1a3d98e37725974d6f6ea20f06d45e48120c47f1ca5a82ffe
                                  • Instruction Fuzzy Hash: A4B18872E002559FFF158F24DD82BEE7BA9EF55360F144166E904AF382D7749801EBA0
                                  APIs
                                  • _ValidateLocalCookies.LIBCMT ref: 00F87307
                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 00F8730F
                                  • _ValidateLocalCookies.LIBCMT ref: 00F87398
                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 00F873C3
                                  • _ValidateLocalCookies.LIBCMT ref: 00F87418
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3363611949.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, Offset: 00F50000, based on PE: true
                                  • Associated: 00000008.00000002.3363384316.0000000000F50000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3363611949.00000000010D5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364695090.00000000010DA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.00000000010DD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000125F000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000133C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000137B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.0000000001382000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.0000000001391000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3366817625.0000000001392000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3367196806.000000000152B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3367244410.000000000152D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_f50000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                  • String ID: csm
                                  • API String ID: 1170836740-1018135373
                                  • Opcode ID: b916359818be52cadd852ba1a65f1144f7b3636a092d5d2838edfb7818938de8
                                  • Instruction ID: 4f7524c69198bb9a055aa5308b8025d66207ebca9d759d6dd1716f5efe99509c
                                  • Opcode Fuzzy Hash: b916359818be52cadd852ba1a65f1144f7b3636a092d5d2838edfb7818938de8
                                  • Instruction Fuzzy Hash: F141A031E043099BCF10FF68C885BDEBBA5AF05364F648055EC199B352DB35E901EB92
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00F6A09D
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00F6A0BF
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00F6A0E7
                                  • __Getctype.LIBCPMT ref: 00F6A1C5
                                  • std::_Facet_Register.LIBCPMT ref: 00F6A1F9
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00F6A223
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3363611949.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, Offset: 00F50000, based on PE: true
                                  • Associated: 00000008.00000002.3363384316.0000000000F50000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3363611949.00000000010D5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364695090.00000000010DA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.00000000010DD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000125F000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000133C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000137B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.0000000001382000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.0000000001391000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3366817625.0000000001392000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3367196806.000000000152B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3367244410.000000000152D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_f50000_RageMP131.jbxd
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetctypeRegister
                                  • String ID:
                                  • API String ID: 1102183713-0
                                  • Opcode ID: 9d740a6ab856070d26d960c9e7bc02329af67587182d4655c3a135580047f548
                                  • Instruction ID: 45756babcbb03cf2e39a4ef8299c1b5cb7cbc32f497fbd1e6c5d3d65e9a57f45
                                  • Opcode Fuzzy Hash: 9d740a6ab856070d26d960c9e7bc02329af67587182d4655c3a135580047f548
                                  • Instruction Fuzzy Hash: A0519BB0D01245DFCB21DF98C9417AEBBF0BB11324F148159D895AB391E739AE44DF92
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00F6C45A
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00F6C47C
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00F6C4A4
                                  • std::_Facet_Register.LIBCPMT ref: 00F6C59A
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00F6C5C4
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3363611949.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, Offset: 00F50000, based on PE: true
                                  • Associated: 00000008.00000002.3363384316.0000000000F50000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3363611949.00000000010D5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364695090.00000000010DA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.00000000010DD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000125F000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000133C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000137B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.0000000001382000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.0000000001391000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3366817625.0000000001392000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3367196806.000000000152B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3367244410.000000000152D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_f50000_RageMP131.jbxd
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                  • String ID:
                                  • API String ID: 459529453-0
                                  • Opcode ID: 2be6194bdea988a23fb2b7f99cdffca9057abc1dd94c8adda4495bcbda64794c
                                  • Instruction ID: 04c6d4a23bf3b688adf3adea3a783d02e2ac540d94af8687721b1f683187c904
                                  • Opcode Fuzzy Hash: 2be6194bdea988a23fb2b7f99cdffca9057abc1dd94c8adda4495bcbda64794c
                                  • Instruction Fuzzy Hash: 5A518E70901244DBDB21DF98C855BAEBBF0FB00728F248159E8866B381D779AE05DBD1
                                  APIs
                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 00F5499F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3363611949.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, Offset: 00F50000, based on PE: true
                                  • Associated: 00000008.00000002.3363384316.0000000000F50000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3363611949.00000000010D5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364695090.00000000010DA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.00000000010DD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000125F000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000133C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000137B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.0000000001382000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.0000000001391000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3366817625.0000000001392000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3367196806.000000000152B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3367244410.000000000152D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_f50000_RageMP131.jbxd
                                  Similarity
                                  • API ID: Ios_base_dtorstd::ios_base::_
                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                  • API String ID: 323602529-1866435925
                                  • Opcode ID: ccdbe11d4a24a362e2ef977840ab081ac8635f51752bb2f6d24ef25f4027f5f7
                                  • Instruction ID: b0945168ec7421633c7c02754eedeb0a2673db3124373712422eb53654170d45
                                  • Opcode Fuzzy Hash: ccdbe11d4a24a362e2ef977840ab081ac8635f51752bb2f6d24ef25f4027f5f7
                                  • Instruction Fuzzy Hash: 751136729046486BCB10EB58DC43FAA7398A705B25F04465DFE988B2C1EA39B9449792
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 00F82730
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00F8273B
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00F827A9
                                    • Part of subcall function 00F8288C: std::locale::_Locimp::_Locimp.LIBCPMT ref: 00F828A4
                                  • std::locale::_Setgloballocale.LIBCPMT ref: 00F82756
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3363611949.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, Offset: 00F50000, based on PE: true
                                  • Associated: 00000008.00000002.3363384316.0000000000F50000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3363611949.00000000010D5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364695090.00000000010DA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.00000000010DD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000125F000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000133C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000137B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.0000000001382000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.0000000001391000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3366817625.0000000001392000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3367196806.000000000152B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3367244410.000000000152D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_f50000_RageMP131.jbxd
                                  Similarity
                                  • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                                  • String ID:
                                  • API String ID: 677527491-0
                                  • Opcode ID: 59dbd0b34f4c15b19a9b5b69a8ffb453d126d1b6147eb32880d782e1b489de74
                                  • Instruction ID: 4ad959e3f2299531c940319bfe23572c0203b1f8b07092cf79525a104e8c68b3
                                  • Opcode Fuzzy Hash: 59dbd0b34f4c15b19a9b5b69a8ffb453d126d1b6147eb32880d782e1b489de74
                                  • Instruction Fuzzy Hash: 7A01BC76A012109BCB0AFB64CC425BD7BB1BF84750B14800AE85217386CF3DAE02EBD1
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00F5750C
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00F57522
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3363611949.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, Offset: 00F50000, based on PE: true
                                  • Associated: 00000008.00000002.3363384316.0000000000F50000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3363611949.00000000010D5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364695090.00000000010DA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.00000000010DD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000125F000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000133C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000137B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.0000000001382000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.0000000001391000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3366817625.0000000001392000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3367196806.000000000152B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3367244410.000000000152D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_f50000_RageMP131.jbxd
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: [json.exception.
                                  • API String ID: 4194217158-791563284
                                  • Opcode ID: 526d44382c5c4c2e1de771d0872a998011e53f91a81d16597fefe6965ad02553
                                  • Instruction ID: 341cece7779e34df8844daa7e96e1b0b7e5dfc70cbdcb0872362e24cd818ba9b
                                  • Opcode Fuzzy Hash: 526d44382c5c4c2e1de771d0872a998011e53f91a81d16597fefe6965ad02553
                                  • Instruction Fuzzy Hash: 3851D1B1C043489BDB00EFA8CD05B9EBBB4EF11314F144259E850AB292D7B95A48EBE1
                                  APIs
                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 00F5499F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3363611949.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, Offset: 00F50000, based on PE: true
                                  • Associated: 00000008.00000002.3363384316.0000000000F50000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3363611949.00000000010D5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364695090.00000000010DA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.00000000010DD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000125F000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000133C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000137B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.0000000001382000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.0000000001391000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3366817625.0000000001392000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3367196806.000000000152B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3367244410.000000000152D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_f50000_RageMP131.jbxd
                                  Similarity
                                  • API ID: Ios_base_dtorstd::ios_base::_
                                  • String ID: ios_base::badbit set$ios_base::failbit set
                                  • API String ID: 323602529-1240500531
                                  • Opcode ID: 83b0cb563eb5a69c337f8d86990d7125367289b477a22704151097f99c12da90
                                  • Instruction ID: e6aaf219a0fa4072a1b079d6917b8676530c6aca057a3e49951cffd532885409
                                  • Opcode Fuzzy Hash: 83b0cb563eb5a69c337f8d86990d7125367289b477a22704151097f99c12da90
                                  • Instruction Fuzzy Hash: AC415A71D00244AFCB04DF58CC46BAEB7B4EF05724F14821DFA54A7381D775AA44DBA1
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00F54061
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00F540C4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3363611949.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, Offset: 00F50000, based on PE: true
                                  • Associated: 00000008.00000002.3363384316.0000000000F50000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3363611949.00000000010D5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364695090.00000000010DA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.00000000010DD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000125F000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000133C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.000000000137B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.0000000001382000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3364829451.0000000001391000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3366817625.0000000001392000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3367196806.000000000152B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000008.00000002.3367244410.000000000152D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_f50000_RageMP131.jbxd
                                  Similarity
                                  • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                  • String ID: bad locale name
                                  • API String ID: 3988782225-1405518554
                                  • Opcode ID: 5a278ad72a31b6b4ed3bcb4294401783d8dda4007b745a46944e74f37c0417c3
                                  • Instruction ID: 4050444781e82d3ffbb5730a9cf68c6514410606e2f431d730b8102ee8ebd497
                                  • Opcode Fuzzy Hash: 5a278ad72a31b6b4ed3bcb4294401783d8dda4007b745a46944e74f37c0417c3
                                  • Instruction Fuzzy Hash: 4211E670805B84EED721CF68C90478BBFF4AF15714F14868DD4959B782D3B9A604D7A1
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 052E0363
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3374657681.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_52e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: f69b8f67edff91873da4a5b36eef2a9e465fbfdf405108977648fd3036f27f07
                                  • Instruction ID: 399689c31123fb567a75ab84395fb9fd92d0e86af61997843c2ac5cb1140c6ba
                                  • Opcode Fuzzy Hash: f69b8f67edff91873da4a5b36eef2a9e465fbfdf405108977648fd3036f27f07
                                  • Instruction Fuzzy Hash: 203199E362C304AFE302D1911A5C7F77BAEEFC2230BB084A6F842DA106E2D14D4B4231

                                  Control-flow Graph

                                  APIs
                                  • setsockopt.WS2_32(000003E8,0000FFFF,00001006,?,00000008), ref: 01017BA6
                                  • recv.WS2_32(?,00000004,00000002), ref: 01017BC1
                                  • recv.WS2_32(00000000,0000000C,00000002,00000000), ref: 01017C43
                                  • recv.WS2_32(00000000,0000000C,00000008), ref: 01017C64
                                    • Part of subcall function 01018590: WSAStartup.WS2_32 ref: 010185BB
                                    • Part of subcall function 01018590: socket.WS2_32(?,?,?,?,?,?,010D9328,?,?), ref: 0101865E
                                    • Part of subcall function 01018590: connect.WS2_32(00000000,010A9BFC,?,?,?,?,010D9328,?,?), ref: 01018672
                                    • Part of subcall function 01018590: closesocket.WS2_32(00000000), ref: 0101867D
                                  • recv.WS2_32(00000000,?,00000008), ref: 01017D1B
                                  • recv.WS2_32(?,00000004,00000008), ref: 01017E23
                                  • __Xtime_get_ticks.LIBCPMT ref: 01017E2A
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01017E38
                                  • Sleep.KERNELBASE(00000001,00000000,?,00002710,00000000), ref: 01017EB1
                                  • Sleep.KERNELBASE(00000064,?,00002710,00000000), ref: 01017EB9
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3363481001.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, Offset: 00F50000, based on PE: true
                                  • Associated: 0000000C.00000002.3363332796.0000000000F50000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3363481001.00000000010D5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364704612.00000000010DA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.00000000010DD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000125F000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000133C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000137B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.0000000001382000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.0000000001391000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3366836996.0000000001392000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3367196845.000000000152B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3367242663.000000000152D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_f50000_RageMP131.jbxd
                                  Similarity
                                  • API ID: recv$Sleep$StartupUnothrow_t@std@@@Xtime_get_ticks__ehfuncinfo$??2@closesocketconnectsetsockoptsocket
                                  • String ID:
                                  • API String ID: 56803616-0
                                  • Opcode ID: f1f7ca2bc86691546f7f57c844cd6fb077fc8f54e51284c4afd4aca3288fda39
                                  • Instruction ID: 31152d4c2fb7094baaeef6ddbfcb81c45227bafc2c2937e32e3979e2dd15b333
                                  • Opcode Fuzzy Hash: f1f7ca2bc86691546f7f57c844cd6fb077fc8f54e51284c4afd4aca3288fda39
                                  • Instruction Fuzzy Hash: E4B1CE71D00308DFEB20EBA8CC89BADBBF1BB49314F104259E994AB2D6D7795944CB91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 58 1018590-10185c2 WSAStartup 59 1018696-101869f 58->59 60 10185c8-10185f2 call 103a420 * 2 58->60 65 10185f4-10185f8 60->65 66 10185fe-1018644 60->66 65->59 65->66 68 1018690 66->68 69 1018646-101864c 66->69 68->59 70 10186a4-10186ae 69->70 71 101864e 69->71 70->68 75 10186b0-10186b8 70->75 72 1018654-1018668 socket 71->72 72->68 74 101866a-101867a connect 72->74 76 10186a0 74->76 77 101867c-1018684 closesocket 74->77 76->70 77->72 78 1018686-101868f 77->78 78->68
                                  APIs
                                  • WSAStartup.WS2_32 ref: 010185BB
                                  • socket.WS2_32(?,?,?,?,?,?,010D9328,?,?), ref: 0101865E
                                  • connect.WS2_32(00000000,010A9BFC,?,?,?,?,010D9328,?,?), ref: 01018672
                                  • closesocket.WS2_32(00000000), ref: 0101867D
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3363481001.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, Offset: 00F50000, based on PE: true
                                  • Associated: 0000000C.00000002.3363332796.0000000000F50000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3363481001.00000000010D5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364704612.00000000010DA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.00000000010DD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000125F000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000133C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000137B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.0000000001382000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.0000000001391000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3366836996.0000000001392000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3367196845.000000000152B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3367242663.000000000152D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_f50000_RageMP131.jbxd
                                  Similarity
                                  • API ID: Startupclosesocketconnectsocket
                                  • String ID:
                                  • API String ID: 3098855095-0
                                  • Opcode ID: 21ead7dc6f94a1989e664a05a725783d1c2e25d960dcf0fcadff3471ebf2ecc2
                                  • Instruction ID: 93570b54cf343b3de45bb48e518b9501bb43998c4bcf9f89450a092100a79985
                                  • Opcode Fuzzy Hash: 21ead7dc6f94a1989e664a05a725783d1c2e25d960dcf0fcadff3471ebf2ecc2
                                  • Instruction Fuzzy Hash: 4931F5729003005FD7208E288C4866BB7E4FFC9738F119F5AFAE8A32D0D77499048792

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 80 f59280-f592dd call f663b0 83 f59413-f59521 call f52df0 call 103a420 80->83 84 f592e3-f592e9 80->84 100 f59537-f5953f call f68dc0 83->100 101 f59523-f59535 83->101 85 f592f0-f59313 84->85 87 f59315-f5931f 85->87 88 f59324-f59331 85->88 90 f59403-f59406 87->90 91 f59333-f5933d 88->91 92 f59342-f5934f 88->92 94 f59409-f5940d 90->94 91->90 95 f59351-f5935b 92->95 96 f59360-f5936d 92->96 94->83 94->85 95->90 98 f5936f-f59379 96->98 99 f5937e-f5938b 96->99 98->90 103 f5938d-f59397 99->103 104 f59399-f593a6 99->104 105 f59544-f59597 call 103a420 * 2 100->105 101->105 103->90 106 f593b4-f593c1 104->106 107 f593a8-f593b2 104->107 117 f59599-f595c8 call 103a420 call f85270 105->117 118 f595cb-f595e1 call 103a420 105->118 109 f593c3-f593cd 106->109 110 f593cf-f593dc 106->110 107->90 109->90 112 f593de-f593e8 110->112 113 f593ea-f593f4 110->113 112->90 113->94 116 f593f6-f593ff 113->116 116->90 117->118 124 f595e7-f595ed 118->124 125 f596e2 118->125 128 f595f0-f596ce WSASend 124->128 126 f596e6-f596f0 125->126 129 f596f2-f596fe 126->129 130 f5971e-f5973d 126->130 146 f596d4-f596dc 128->146 147 f5975f-f59763 128->147 132 f59714-f5971b call f838f3 129->132 133 f59700-f5970e 129->133 134 f5976f-f59796 130->134 135 f5973f-f5974b 130->135 132->130 133->132 136 f59797-f597fe call f88c70 call f52df0 * 2 133->136 138 f59765-f5976c call f838f3 135->138 139 f5974d-f5975b 135->139 138->134 139->136 144 f5975d 139->144 144->138 146->125 146->128 147->126
                                  APIs
                                  • WSASend.WS2_32(?,?,00000001,00000000,00000000,00000000,00000000,?,?,?,?,0109D15C,00000000,761B23A0,-010D9880), ref: 00F596C9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3363481001.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, Offset: 00F50000, based on PE: true
                                  • Associated: 0000000C.00000002.3363332796.0000000000F50000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3363481001.00000000010D5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364704612.00000000010DA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.00000000010DD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000125F000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000133C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000137B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.0000000001382000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.0000000001391000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3366836996.0000000001392000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3367196845.000000000152B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3367242663.000000000152D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_f50000_RageMP131.jbxd
                                  Similarity
                                  • API ID: Send
                                  • String ID: Ws2_32.dll
                                  • API String ID: 121738739-3093949381
                                  • Opcode ID: 196bf51b9763acf6c54cc3c0b54848f8397bfdc15de1dc2985eb43e248d783dd
                                  • Instruction ID: 251054fb17327d10036a0f7c9fbf420968f53122d70440d20e3f867fff12aa6c
                                  • Opcode Fuzzy Hash: 196bf51b9763acf6c54cc3c0b54848f8397bfdc15de1dc2985eb43e248d783dd
                                  • Instruction Fuzzy Hash: 7E02E270D08298DFDF25CF94C8907EDBBB0EF55310F24428DE8856B286D7B41986DB92

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 153 52e0000-52e0036 155 52e004d-52e0079 call 52e0067 call 52e0074 153->155 160 52e003e-52e004b 155->160 161 52e007b-52e007c 155->161 160->155 162 52e007e-52e033e call 52e02ed 161->162 163 52e003c 161->163 194 52e0350-52e0368 GetCurrentHwProfileW 162->194 163->160 196 52e0378-52e03c0 call 52e03b1 call 52e03c6 194->196 203 52e0439-52e047d call 52e0485 196->203 204 52e03c2-52e03c4 196->204 210 52e047f 203->210 211 52e04f2-52e0679 call 52e067b 203->211 210->211
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3374657681.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_52e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 97906bf3570c089d637416d03bd44dd32c1973000f833c4d1dac7a526a73da6d
                                  • Instruction ID: ff5f58fdb4c884ee881ac3ef146256bd0a9099bc51af0305001fcd407a926fa7
                                  • Opcode Fuzzy Hash: 97906bf3570c089d637416d03bd44dd32c1973000f833c4d1dac7a526a73da6d
                                  • Instruction Fuzzy Hash: D451E2E723C210BEA202D1956B6CAF76BAFEEC67303B08466F407DA506E2D40E4F5131
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3374657681.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_52e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 167058d5621ab2d19dc75ba892a28556d16b7b1ad5260672f5bc8381080c40b9
                                  • Instruction ID: bf8206f0c8c5d528bb0e3bf1bf360c5a2f111be645cb74ec984d5221024ceaf5
                                  • Opcode Fuzzy Hash: 167058d5621ab2d19dc75ba892a28556d16b7b1ad5260672f5bc8381080c40b9
                                  • Instruction Fuzzy Hash: 4B5126E727C250BEA243D1956B6CAF66BAFEEC66303708466F407DA502E2D40E4F5231

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 304 52e003b-52e004b 305 52e004d-52e0079 call 52e0067 call 52e0074 304->305 310 52e003e-52e004b 305->310 311 52e007b-52e007c 305->311 310->305 312 52e007e-52e033e call 52e02ed 311->312 313 52e003c 311->313 344 52e0350-52e0368 GetCurrentHwProfileW 312->344 313->310 346 52e0378-52e03c0 call 52e03b1 call 52e03c6 344->346 353 52e0439-52e047d call 52e0485 346->353 354 52e03c2-52e03c4 346->354 360 52e047f 353->360 361 52e04f2-52e0679 call 52e067b 353->361 360->361
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3374657681.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_52e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 896ea2bee0ab41324eeef8d82ab90624cb52450dff054478b9fb32a8064e0c7a
                                  • Instruction ID: c9e71d81a607731ac2aa864f5a98a25a6b968085b5ab557174b05953aae96376
                                  • Opcode Fuzzy Hash: 896ea2bee0ab41324eeef8d82ab90624cb52450dff054478b9fb32a8064e0c7a
                                  • Instruction Fuzzy Hash: F45115E727C250BEA243D1956B6CAF66BAFEEC67303708466F407DA606E2D40E4F5131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 229 52e001c-52e0036 230 52e004d-52e0079 call 52e0067 call 52e0074 229->230 235 52e003e-52e004b 230->235 236 52e007b-52e007c 230->236 235->230 237 52e007e-52e033e call 52e02ed 236->237 238 52e003c 236->238 269 52e0350-52e0368 GetCurrentHwProfileW 237->269 238->235 271 52e0378-52e03c0 call 52e03b1 call 52e03c6 269->271 278 52e0439-52e047d call 52e0485 271->278 279 52e03c2-52e03c4 271->279 285 52e047f 278->285 286 52e04f2-52e0679 call 52e067b 278->286 285->286
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3374657681.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_52e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fa96efcf04cafac9b5176a3b94fea92952329d34b176a77eef20b31a3be39d85
                                  • Instruction ID: ac7d7c8a56b9d7f53a6cfc0a96b7a8acaf3735e96dd2a4678ee99ea379d84add
                                  • Opcode Fuzzy Hash: fa96efcf04cafac9b5176a3b94fea92952329d34b176a77eef20b31a3be39d85
                                  • Instruction Fuzzy Hash: 5F51E3E723C250BEE202D1956B6CAF66BAFEEC67307708466F447DA502E2D40E4B5231

                                  Control-flow Graph

                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3374657681.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_52e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 057bcc724fb4631157bf3885d60e0d8d8fd52c9498d563b3eeac374997cce1ee
                                  • Instruction ID: e270bd7acff5596e5ca207d9cbc3a76894b5dbeb4ac3253a17aabf52ef72dba4
                                  • Opcode Fuzzy Hash: 057bcc724fb4631157bf3885d60e0d8d8fd52c9498d563b3eeac374997cce1ee
                                  • Instruction Fuzzy Hash: 404190E727C214BEB242C1856F68AFB57AFEAC67307B08426F807D9602E2D44E4F1131

                                  Control-flow Graph

                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3374657681.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_52e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 3601d78087803f96849cadc2c519125b5caa7ffb16b752887153e5473863b47a
                                  • Instruction ID: 6bea071ea09d8bb9ba8b5842760bdcac9a8a3d8b4a45de424b3f248a890fc1b8
                                  • Opcode Fuzzy Hash: 3601d78087803f96849cadc2c519125b5caa7ffb16b752887153e5473863b47a
                                  • Instruction Fuzzy Hash: 6041C4E723C214BEA242C1852B68AFB57AFEEC67307B08426F807D9602E2D44E4F1131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 512 f99789-f997ab 513 f9999e 512->513 514 f997b1-f997b3 512->514 515 f999a0-f999a4 513->515 516 f997df-f99802 514->516 517 f997b5-f997d4 call f88be3 514->517 518 f99808-f9980e 516->518 519 f99804-f99806 516->519 523 f997d7-f997da 517->523 518->517 522 f99810-f99821 518->522 519->518 519->522 524 f99823-f99831 call f9263d 522->524 525 f99834-f99844 call f992ce 522->525 523->515 524->525 530 f9988d-f9989f 525->530 531 f99846-f9984c 525->531 532 f998a1-f998a7 530->532 533 f998f6-f99916 WriteFile 530->533 534 f9984e-f99851 531->534 535 f99875-f9988b call f98e9f 531->535 539 f998a9-f998ac 532->539 540 f998e2-f998f4 call f9934b 532->540 536 f99918-f9991e 533->536 537 f99921 533->537 541 f9985c-f9986b call f99266 534->541 542 f99853-f99856 534->542 553 f9986e-f99870 535->553 536->537 546 f99924-f9992f 537->546 547 f998ce-f998e0 call f9950f 539->547 548 f998ae-f998b1 539->548 559 f998c9-f998cc 540->559 541->553 542->541 549 f99936-f99939 542->549 554 f99999-f9999c 546->554 555 f99931-f99934 546->555 547->559 556 f9993c-f9993e 548->556 557 f998b7-f998c4 call f99426 548->557 549->556 553->546 554->515 555->549 561 f9996c-f99978 556->561 562 f99940-f99945 556->562 557->559 559->553 564 f9997a-f99980 561->564 565 f99982-f99994 561->565 566 f9995e-f99967 call f916c8 562->566 567 f99947-f99959 562->567 564->513 564->565 565->523 566->523 567->523
                                  APIs
                                  • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00F9990E
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3363481001.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, Offset: 00F50000, based on PE: true
                                  • Associated: 0000000C.00000002.3363332796.0000000000F50000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3363481001.00000000010D5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364704612.00000000010DA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.00000000010DD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000125F000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000133C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000137B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.0000000001382000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.0000000001391000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3366836996.0000000001392000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3367196845.000000000152B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3367242663.000000000152D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_f50000_RageMP131.jbxd
                                  Similarity
                                  • API ID: FileWrite
                                  • String ID:
                                  • API String ID: 3934441357-0
                                  • Opcode ID: e138364b1a8e89909f1ad75a926647a3f3e17248564f004573fd2389b9bc8d76
                                  • Instruction ID: 53b15b16ee7db8fc507a6ca89e0c2511f0de6336094e3b9a65d6c9cbd82a5839
                                  • Opcode Fuzzy Hash: e138364b1a8e89909f1ad75a926647a3f3e17248564f004573fd2389b9bc8d76
                                  • Instruction Fuzzy Hash: 3961C272D08109AEEF11DFACCC84AEE7BB9AF49314F16014DE900A7246D7B6D901EB91

                                  Control-flow Graph

                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3374657681.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_52e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: a1433e2e8b17215f22fbd0927b7b3996e83e4637a9becc883fad815769b6c712
                                  • Instruction ID: 242fd48cffc3976444a661b655882fe041d97c28d178063444d8dc28e14a32d3
                                  • Opcode Fuzzy Hash: a1433e2e8b17215f22fbd0927b7b3996e83e4637a9becc883fad815769b6c712
                                  • Instruction Fuzzy Hash: D641C4E727C214BEA242C1852B686FB67AFDEC67307B08467F807DA602E2D50E4F1131

                                  Control-flow Graph

                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3374657681.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_52e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 270cfb7ca184a794dff9dba6718971fe41ab74fa49359852687e1714c9879448
                                  • Instruction ID: 29d3cd76ca788c1434485fce775dc9b15d53ed2ea6089112ec7924c90dae574e
                                  • Opcode Fuzzy Hash: 270cfb7ca184a794dff9dba6718971fe41ab74fa49359852687e1714c9879448
                                  • Instruction Fuzzy Hash: C141F5E723C214BEA246C1852B6C6F75BAFEEC63307B05426B807DD602E2D41E4B1131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 697 52e0167-52e0179 698 52e017a-52e033e call 52e02ed 697->698 699 52e0118-52e0161 697->699 728 52e0350-52e0368 GetCurrentHwProfileW 698->728 699->698 730 52e0378-52e03c0 call 52e03b1 call 52e03c6 728->730 737 52e0439-52e047d call 52e0485 730->737 738 52e03c2-52e03c4 730->738 744 52e047f 737->744 745 52e04f2-52e0679 call 52e067b 737->745 744->745
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3374657681.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_52e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: af6679bd817d70cdc4bdfa7f4064e9c859d81232d1cfcd3ba14954f5439bbdb7
                                  • Instruction ID: 59335bd454e490040a5aeb78e41e471e8c3a580902dfa9eb684ade64a62c92da
                                  • Opcode Fuzzy Hash: af6679bd817d70cdc4bdfa7f4064e9c859d81232d1cfcd3ba14954f5439bbdb7
                                  • Instruction Fuzzy Hash: 744123E757C214AEE246C1911B6C7FA6BAFAFC72307B04066B403EE642E2D40A4B5131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 763 52e0188-52e0192 764 52e0194 763->764 765 52e0131-52e0183 763->765 767 52e0196-52e033e call 52e02ed 764->767 765->767 790 52e0350-52e0368 GetCurrentHwProfileW 767->790 792 52e0378-52e03c0 call 52e03b1 call 52e03c6 790->792 799 52e0439-52e047d call 52e0485 792->799 800 52e03c2-52e03c4 792->800 806 52e047f 799->806 807 52e04f2-52e0679 call 52e067b 799->807 806->807
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3374657681.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_52e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: aa992b9332ae7992cabb610176ed355bdbda1dbbdeffedb29be39bb79725d926
                                  • Instruction ID: b545d5335e4c2bf9f832cc7e8db3359006765d8f55386e34795575be81a082a8
                                  • Opcode Fuzzy Hash: aa992b9332ae7992cabb610176ed355bdbda1dbbdeffedb29be39bb79725d926
                                  • Instruction Fuzzy Hash: BB3139E757C214BE9242D1851BAC7F65B9FEFC62307B05016B807DE602E2D50E4B5131

                                  Control-flow Graph

                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3374657681.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_52e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: bd9461a48f55d8e66cc07e9299b43fd0c7b9265abf6e24cc74026bc4f9cfc92a
                                  • Instruction ID: 5cba846ea32321be88170c979b429a30da4caf35337e1d2db971749993b0594f
                                  • Opcode Fuzzy Hash: bd9461a48f55d8e66cc07e9299b43fd0c7b9265abf6e24cc74026bc4f9cfc92a
                                  • Instruction Fuzzy Hash: 263137E727C214BEA246C1851B6C7FA5BAFEFC63307B04066B807EE602E2D40E4B5131

                                  Control-flow Graph

                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3374657681.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_52e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: bc239b90bd738f464139b1a739b36aefc15be51ce385de445bd94e25b95236f5
                                  • Instruction ID: 3336219d150f000dd85fd1519ff467898d77650f330ed29a356bf3d83126adc2
                                  • Opcode Fuzzy Hash: bc239b90bd738f464139b1a739b36aefc15be51ce385de445bd94e25b95236f5
                                  • Instruction Fuzzy Hash: F73124E753C214BEA242D1811BAC7F66BAFEFC72307B05066B803EE602E2D50E4B5131
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3374657681.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_52e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: eb2dc90b0a14208adc6d8e35702fb1d025e245caf0bb440230eb75fe220b249e
                                  • Instruction ID: 97ffb30afe4e49db7cac032c78cce7ab58138a58fb0e07c4a4cda7f3b5110503
                                  • Opcode Fuzzy Hash: eb2dc90b0a14208adc6d8e35702fb1d025e245caf0bb440230eb75fe220b249e
                                  • Instruction Fuzzy Hash: C831F4E763C214AEA242D1951B6C7F66BAFEFD72307B04066B803DA642E2D40E4B5131
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3374657681.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_52e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 19eb69b33ee10789dd76286dbdc8b01d2a17c206edceceb70f393eb59fbdbf96
                                  • Instruction ID: a47c5be6ae6875c153c5fc51d759ec8b0676df1542e12e1e3a2f2f668a1899f4
                                  • Opcode Fuzzy Hash: 19eb69b33ee10789dd76286dbdc8b01d2a17c206edceceb70f393eb59fbdbf96
                                  • Instruction Fuzzy Hash: B43102E767C214AEA646D0851B6C7F76BAFEFD73307B05066B803DA642E2D40E4B1135
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3374657681.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_52e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: d38119e41f90dc5bf4a6ec77f6be5ad29186ea123b917ab1c9ba9d0333216efe
                                  • Instruction ID: a09443d1a0c97b331e927773ff9941384cd1f5ba456f9ebce154eed16badc2cf
                                  • Opcode Fuzzy Hash: d38119e41f90dc5bf4a6ec77f6be5ad29186ea123b917ab1c9ba9d0333216efe
                                  • Instruction Fuzzy Hash: C031F3E763C214AEE242D1951B5C7F76BAFAFD63307B05166B803EA642E2E44E4F1121
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 052E0363
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3374657681.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_52e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 7388673886e35257c448577b523d71f85991236b9a5bc1c82c91c66a862ed232
                                  • Instruction ID: 201aa5c01544fc59570d1959f2e5795e9c18621340dd64b2b487e66f8e5a95eb
                                  • Opcode Fuzzy Hash: 7388673886e35257c448577b523d71f85991236b9a5bc1c82c91c66a862ed232
                                  • Instruction Fuzzy Hash: 4D3146E367C214AEE652D1911B9C6FA6BAFEFD23307B05166F803DA246E2D50E4F1131
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3374657681.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_52e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 754b190bfaeb78e20e97af1bc9de80f602bfe9cf04453fe2fd5e20fa0587e3a5
                                  • Instruction ID: 547ef2f4d69441ceb93c93a0981e851623d04cc19fbe37bd471f6354924f658d
                                  • Opcode Fuzzy Hash: 754b190bfaeb78e20e97af1bc9de80f602bfe9cf04453fe2fd5e20fa0587e3a5
                                  • Instruction Fuzzy Hash: DA31F4A723C214AEE746D1911A6C6FA6BAFEFC67307745066F803E6602E2D40E4F5131
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3374657681.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_52e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 9c2209fea1f09061496f28bee1747bca39b4a9284aa8d0fef354234b9e2fcb23
                                  • Instruction ID: 3e80705614f994c77d6521c4fc5b359935928c1c07b58890ea91303c760704a6
                                  • Opcode Fuzzy Hash: 9c2209fea1f09061496f28bee1747bca39b4a9284aa8d0fef354234b9e2fcb23
                                  • Instruction Fuzzy Hash: 222106E663C214AEE242D1811B687FB67AFDF82230BB05066B803EA202E2D44E4B1135
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3374657681.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_52e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 1a20beb2e345c1ac8ca7808ab8c16c238614be3b743b12c7fb1b2dadb2eb5755
                                  • Instruction ID: b4ac085e1cc8f21bb6a97f31c07cedcb14b2a1e1d7a3c9d074e0eb153e82ec62
                                  • Opcode Fuzzy Hash: 1a20beb2e345c1ac8ca7808ab8c16c238614be3b743b12c7fb1b2dadb2eb5755
                                  • Instruction Fuzzy Hash: EC2148E362C2546FE752D2911E686FB6BAEDFC23307744066F842D6246E2D40E4B5131
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3374657681.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_52e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 3fec8880c748054cd8e747869b5a198b27126461347b7b4281eaa09f32e3b5e7
                                  • Instruction ID: dba64247a9e2bdbd0a8a30aa12b572edff2b9e7cac1b6f2ca4f0a5accb3b6d3c
                                  • Opcode Fuzzy Hash: 3fec8880c748054cd8e747869b5a198b27126461347b7b4281eaa09f32e3b5e7
                                  • Instruction Fuzzy Hash: CD1102F262C214AFA612D2812BA86FB67AEEFC233077040A6F842D6106E3E44D4B5131
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3374657681.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_52e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: e9761e5d63732ba951746c1ef15aff1995c0f3f1211b89e8f1c7c7246d1c4425
                                  • Instruction ID: b86d2756d0815492f3fade6df3f027414d49c75a99ab8eb8d5070727b8b6a695
                                  • Opcode Fuzzy Hash: e9761e5d63732ba951746c1ef15aff1995c0f3f1211b89e8f1c7c7246d1c4425
                                  • Instruction Fuzzy Hash: 2811E2E772C2546FE616D2912BA86FB67AFDEC23307704466F842D6106E2D54E4B1132
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 052E0363
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3374657681.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_52e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 0bd81405f324cddad57c6611e89a19a628fd5723ec63eacce489deb27459075b
                                  • Instruction ID: d6b3a28b607e9d0a3266efaa834ee0362b2d031777af4570373bef6a9250a827
                                  • Opcode Fuzzy Hash: 0bd81405f324cddad57c6611e89a19a628fd5723ec63eacce489deb27459075b
                                  • Instruction Fuzzy Hash: 010184F762C2156FB216D1812B589FAA76EDAC63307744467FC02D5106E2C14D4B1132
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 052E0363
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3374657681.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_52e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: b10554d970a2e515b6f97a01ca073ea012ecc3480e6d564051bb4dbcf385c380
                                  • Instruction ID: 94662cfdc7bda223666e57d4e5d8ec1b7b946105894a6db07a30ac7f0e0bbd41
                                  • Opcode Fuzzy Hash: b10554d970a2e515b6f97a01ca073ea012ecc3480e6d564051bb4dbcf385c380
                                  • Instruction Fuzzy Hash: D901D4E772C2507FA706D291265C5FA6B5EDDC323137444B7FD02CA50AD2C60D0B5232
                                  APIs
                                  • FindCloseChangeNotification.KERNELBASE(00000000,00000000,?,?,00F98CE6,00000000,?,010CA178,0000000C,00F98DA2,?,?,?), ref: 00F98E55
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3363481001.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, Offset: 00F50000, based on PE: true
                                  • Associated: 0000000C.00000002.3363332796.0000000000F50000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3363481001.00000000010D5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364704612.00000000010DA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.00000000010DD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000125F000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000133C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000137B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.0000000001382000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.0000000001391000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3366836996.0000000001392000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3367196845.000000000152B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3367242663.000000000152D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_f50000_RageMP131.jbxd
                                  Similarity
                                  • API ID: ChangeCloseFindNotification
                                  • String ID:
                                  • API String ID: 2591292051-0
                                  • Opcode ID: b2540c401efb84d11e4791904acf33e21e333ea9428cfe927c21fed3b69dab49
                                  • Instruction ID: 740962c0a6704c72f4b76fcb519590832f8cf223cc77a76864476bae02e792a0
                                  • Opcode Fuzzy Hash: b2540c401efb84d11e4791904acf33e21e333ea9428cfe927c21fed3b69dab49
                                  • Instruction Fuzzy Hash: 35114833E0216459FE2572B4AC59B7E37894BC37B4F290619F9188B1C2EE698C82A255
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 052E0363
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3374657681.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_52e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 6ea6ecd83ea53d8e6473541d24b562e120e8586f4d12c67bf0febc6039f47cd7
                                  • Instruction ID: 40b1387e77688e10360cd92b53149fccbb65f4ed3d72c07633f3e41857fc7f39
                                  • Opcode Fuzzy Hash: 6ea6ecd83ea53d8e6473541d24b562e120e8586f4d12c67bf0febc6039f47cd7
                                  • Instruction Fuzzy Hash: 9401D1E762C2657FB206D2812B6CAFBA76ED9C62307758477FC02D6106E2C10D4F1032
                                  APIs
                                  • SetFilePointerEx.KERNELBASE(00000000,?,?,?,?,?,00000000,?,?,?,00F92626,?,?,?,?,?), ref: 00F92558
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3363481001.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, Offset: 00F50000, based on PE: true
                                  • Associated: 0000000C.00000002.3363332796.0000000000F50000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3363481001.00000000010D5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364704612.00000000010DA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.00000000010DD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000125F000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000133C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000137B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.0000000001382000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.0000000001391000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3366836996.0000000001392000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3367196845.000000000152B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3367242663.000000000152D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_f50000_RageMP131.jbxd
                                  Similarity
                                  • API ID: FilePointer
                                  • String ID:
                                  • API String ID: 973152223-0
                                  • Opcode ID: 88d9d9155ca011ec7cedd5273f6162b48940be8025c9a1adc5b374fddcf3b003
                                  • Instruction ID: 98691e83b1d66a204f6b6fabb277a8feaefbe39d665ce8532b160ff4ba01e0d1
                                  • Opcode Fuzzy Hash: 88d9d9155ca011ec7cedd5273f6162b48940be8025c9a1adc5b374fddcf3b003
                                  • Instruction Fuzzy Hash: FF012632A10219BFEF09CF18CC5599E3B59DF85330B290108F8109B2A1E671EE419B90
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 052E0363
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3374657681.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_52e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 41428e518b4e5ae12e1ddaea50784027776bfd3a8072ca85d351a6060c6214d9
                                  • Instruction ID: 3b2396b037ec106c98065dad51d6362b5ee2d6c6262b4c5f627cffae564f2ff3
                                  • Opcode Fuzzy Hash: 41428e518b4e5ae12e1ddaea50784027776bfd3a8072ca85d351a6060c6214d9
                                  • Instruction Fuzzy Hash: 8CF02BE3B2C2555FD706E2A017AC1FA67AAEEC6230BB44876ED02C6109E2C14D071172
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00F5331F
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3363481001.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, Offset: 00F50000, based on PE: true
                                  • Associated: 0000000C.00000002.3363332796.0000000000F50000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3363481001.00000000010D5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364704612.00000000010DA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.00000000010DD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000125F000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000133C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000137B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.0000000001382000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.0000000001391000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3366836996.0000000001392000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3367196845.000000000152B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3367242663.000000000152D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_f50000_RageMP131.jbxd
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID:
                                  • API String ID: 118556049-0
                                  • Opcode ID: 0fd589d96c9d07b1efa01aec19e4ff46bb0766daf2056f60d33bc81ca57302d3
                                  • Instruction ID: 6d2ae0047a4148310f0b6b12516d032169d98fc93c9a9037459437aec8a28d9a
                                  • Opcode Fuzzy Hash: 0fd589d96c9d07b1efa01aec19e4ff46bb0766daf2056f60d33bc81ca57302d3
                                  • Instruction Fuzzy Hash: 96F0B4725001049BDB147F68D8158E9B3E8DF243A2750097AEE8DC7222EB2ADA59A790
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000008,?,00000001,?,00F99FE0,00000001,00000364,00000001,00000006,000000FF,?,00F84B3F,?,?,761B23A0,?), ref: 00F9A69C
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3363481001.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, Offset: 00F50000, based on PE: true
                                  • Associated: 0000000C.00000002.3363332796.0000000000F50000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3363481001.00000000010D5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364704612.00000000010DA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.00000000010DD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000125F000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000133C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000137B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.0000000001382000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.0000000001391000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3366836996.0000000001392000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3367196845.000000000152B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3367242663.000000000152D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_f50000_RageMP131.jbxd
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 7076f200ed19fc2739e901bbc23b2a0f0ac3b19820c93dc390f7810cecb9b6e0
                                  • Instruction ID: deb5970d7d4bb23b63d84d908631d98d21bdc7e846ffea7ca3676a5306395565
                                  • Opcode Fuzzy Hash: 7076f200ed19fc2739e901bbc23b2a0f0ac3b19820c93dc390f7810cecb9b6e0
                                  • Instruction Fuzzy Hash: 4CF0E9329106256EFF665E76DC11B6A3749AF41770F1C8111FD44DA180DA34DC00A6E6
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000000,00000001,?,?,00F84B3F,?,?,761B23A0,?,?,00F53522,?,?), ref: 00F9B0C7
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3363481001.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, Offset: 00F50000, based on PE: true
                                  • Associated: 0000000C.00000002.3363332796.0000000000F50000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3363481001.00000000010D5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364704612.00000000010DA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.00000000010DD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000125F000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000133C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000137B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.0000000001382000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.0000000001391000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3366836996.0000000001392000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3367196845.000000000152B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3367242663.000000000152D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_f50000_RageMP131.jbxd
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: fa7499793404f47338189940e1b3190b7ad814e28078c6417bbbb8a52b52784b
                                  • Instruction ID: aff17a7554127afd2a0aed0a388f0b2027461c6b10a7604f5ec00b66e768fccd
                                  • Opcode Fuzzy Hash: fa7499793404f47338189940e1b3190b7ad814e28078c6417bbbb8a52b52784b
                                  • Instruction Fuzzy Hash: 8FE02B32A003211AFF3126A5BE10B5B76499F823B0F040210FD29961E0DB24DC00B2E5
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3363481001.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, Offset: 00F50000, based on PE: true
                                  • Associated: 0000000C.00000002.3363332796.0000000000F50000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3363481001.00000000010D5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364704612.00000000010DA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.00000000010DD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000125F000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000133C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000137B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.0000000001382000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.0000000001391000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3366836996.0000000001392000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3367196845.000000000152B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3367242663.000000000152D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_f50000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 333d4b6d5425d6f9d03797ee82114c3711da98524c03317fffdb5ec62fb2b380
                                  • Instruction ID: c5b41566cfdde02848cd8a4224886613f4c64437f6dabb9503a930f4d4bf03ee
                                  • Opcode Fuzzy Hash: 333d4b6d5425d6f9d03797ee82114c3711da98524c03317fffdb5ec62fb2b380
                                  • Instruction Fuzzy Hash: C4022A71E012199BDF14DFA9D8806EEBBF1FF48324F258269E919E7380D731A941DB90
                                  APIs
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3363481001.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, Offset: 00F50000, based on PE: true
                                  • Associated: 0000000C.00000002.3363332796.0000000000F50000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3363481001.00000000010D5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364704612.00000000010DA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.00000000010DD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000125F000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000133C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000137B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.0000000001382000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.0000000001391000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3366836996.0000000001392000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3367196845.000000000152B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3367242663.000000000152D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_f50000_RageMP131.jbxd
                                  Similarity
                                  • API ID: _strrchr
                                  • String ID:
                                  • API String ID: 3213747228-0
                                  • Opcode ID: 785c90e8ff89e0f1a3d98e37725974d6f6ea20f06d45e48120c47f1ca5a82ffe
                                  • Instruction ID: b3b029c729aaa1684603917594f22f5e12f570c0b9a7d1764eb26c7a59002044
                                  • Opcode Fuzzy Hash: 785c90e8ff89e0f1a3d98e37725974d6f6ea20f06d45e48120c47f1ca5a82ffe
                                  • Instruction Fuzzy Hash: A4B18872E002559FFF158F24DD82BEE7BA9EF55360F144166E904AF382D7749801EBA0
                                  APIs
                                  • _ValidateLocalCookies.LIBCMT ref: 00F87307
                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 00F8730F
                                  • _ValidateLocalCookies.LIBCMT ref: 00F87398
                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 00F873C3
                                  • _ValidateLocalCookies.LIBCMT ref: 00F87418
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3363481001.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, Offset: 00F50000, based on PE: true
                                  • Associated: 0000000C.00000002.3363332796.0000000000F50000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3363481001.00000000010D5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364704612.00000000010DA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.00000000010DD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000125F000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000133C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000137B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.0000000001382000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.0000000001391000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3366836996.0000000001392000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3367196845.000000000152B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3367242663.000000000152D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_f50000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                  • String ID: csm
                                  • API String ID: 1170836740-1018135373
                                  • Opcode ID: b916359818be52cadd852ba1a65f1144f7b3636a092d5d2838edfb7818938de8
                                  • Instruction ID: 4f7524c69198bb9a055aa5308b8025d66207ebca9d759d6dd1716f5efe99509c
                                  • Opcode Fuzzy Hash: b916359818be52cadd852ba1a65f1144f7b3636a092d5d2838edfb7818938de8
                                  • Instruction Fuzzy Hash: F141A031E043099BCF10FF68C885BDEBBA5AF05364F648055EC199B352DB35E901EB92
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00F6A09D
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00F6A0BF
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00F6A0E7
                                  • __Getctype.LIBCPMT ref: 00F6A1C5
                                  • std::_Facet_Register.LIBCPMT ref: 00F6A1F9
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00F6A223
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3363481001.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, Offset: 00F50000, based on PE: true
                                  • Associated: 0000000C.00000002.3363332796.0000000000F50000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3363481001.00000000010D5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364704612.00000000010DA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.00000000010DD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000125F000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000133C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000137B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.0000000001382000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.0000000001391000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3366836996.0000000001392000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3367196845.000000000152B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3367242663.000000000152D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_f50000_RageMP131.jbxd
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetctypeRegister
                                  • String ID:
                                  • API String ID: 1102183713-0
                                  • Opcode ID: 9d740a6ab856070d26d960c9e7bc02329af67587182d4655c3a135580047f548
                                  • Instruction ID: 45756babcbb03cf2e39a4ef8299c1b5cb7cbc32f497fbd1e6c5d3d65e9a57f45
                                  • Opcode Fuzzy Hash: 9d740a6ab856070d26d960c9e7bc02329af67587182d4655c3a135580047f548
                                  • Instruction Fuzzy Hash: A0519BB0D01245DFCB21DF98C9417AEBBF0BB11324F148159D895AB391E739AE44DF92
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00F6C45A
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00F6C47C
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00F6C4A4
                                  • std::_Facet_Register.LIBCPMT ref: 00F6C59A
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00F6C5C4
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3363481001.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, Offset: 00F50000, based on PE: true
                                  • Associated: 0000000C.00000002.3363332796.0000000000F50000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3363481001.00000000010D5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364704612.00000000010DA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.00000000010DD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000125F000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000133C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000137B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.0000000001382000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.0000000001391000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3366836996.0000000001392000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3367196845.000000000152B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3367242663.000000000152D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_f50000_RageMP131.jbxd
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                  • String ID:
                                  • API String ID: 459529453-0
                                  • Opcode ID: 2be6194bdea988a23fb2b7f99cdffca9057abc1dd94c8adda4495bcbda64794c
                                  • Instruction ID: 04c6d4a23bf3b688adf3adea3a783d02e2ac540d94af8687721b1f683187c904
                                  • Opcode Fuzzy Hash: 2be6194bdea988a23fb2b7f99cdffca9057abc1dd94c8adda4495bcbda64794c
                                  • Instruction Fuzzy Hash: 5A518E70901244DBDB21DF98C855BAEBBF0FB00728F248159E8866B381D779AE05DBD1
                                  APIs
                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 00F5499F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3363481001.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, Offset: 00F50000, based on PE: true
                                  • Associated: 0000000C.00000002.3363332796.0000000000F50000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3363481001.00000000010D5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364704612.00000000010DA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.00000000010DD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000125F000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000133C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000137B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.0000000001382000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.0000000001391000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3366836996.0000000001392000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3367196845.000000000152B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3367242663.000000000152D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_f50000_RageMP131.jbxd
                                  Similarity
                                  • API ID: Ios_base_dtorstd::ios_base::_
                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                  • API String ID: 323602529-1866435925
                                  • Opcode ID: ccdbe11d4a24a362e2ef977840ab081ac8635f51752bb2f6d24ef25f4027f5f7
                                  • Instruction ID: b0945168ec7421633c7c02754eedeb0a2673db3124373712422eb53654170d45
                                  • Opcode Fuzzy Hash: ccdbe11d4a24a362e2ef977840ab081ac8635f51752bb2f6d24ef25f4027f5f7
                                  • Instruction Fuzzy Hash: 751136729046486BCB10EB58DC43FAA7398A705B25F04465DFE988B2C1EA39B9449792
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 00F82730
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00F8273B
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00F827A9
                                    • Part of subcall function 00F8288C: std::locale::_Locimp::_Locimp.LIBCPMT ref: 00F828A4
                                  • std::locale::_Setgloballocale.LIBCPMT ref: 00F82756
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3363481001.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, Offset: 00F50000, based on PE: true
                                  • Associated: 0000000C.00000002.3363332796.0000000000F50000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3363481001.00000000010D5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364704612.00000000010DA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.00000000010DD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000125F000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000133C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000137B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.0000000001382000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.0000000001391000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3366836996.0000000001392000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3367196845.000000000152B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3367242663.000000000152D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_f50000_RageMP131.jbxd
                                  Similarity
                                  • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                                  • String ID:
                                  • API String ID: 677527491-0
                                  • Opcode ID: 59dbd0b34f4c15b19a9b5b69a8ffb453d126d1b6147eb32880d782e1b489de74
                                  • Instruction ID: 4ad959e3f2299531c940319bfe23572c0203b1f8b07092cf79525a104e8c68b3
                                  • Opcode Fuzzy Hash: 59dbd0b34f4c15b19a9b5b69a8ffb453d126d1b6147eb32880d782e1b489de74
                                  • Instruction Fuzzy Hash: 7A01BC76A012109BCB0AFB64CC425BD7BB1BF84750B14800AE85217386CF3DAE02EBD1
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00F5750C
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00F57522
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3363481001.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, Offset: 00F50000, based on PE: true
                                  • Associated: 0000000C.00000002.3363332796.0000000000F50000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3363481001.00000000010D5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364704612.00000000010DA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.00000000010DD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000125F000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000133C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000137B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.0000000001382000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.0000000001391000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3366836996.0000000001392000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3367196845.000000000152B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3367242663.000000000152D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_f50000_RageMP131.jbxd
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: [json.exception.
                                  • API String ID: 4194217158-791563284
                                  • Opcode ID: 526d44382c5c4c2e1de771d0872a998011e53f91a81d16597fefe6965ad02553
                                  • Instruction ID: 341cece7779e34df8844daa7e96e1b0b7e5dfc70cbdcb0872362e24cd818ba9b
                                  • Opcode Fuzzy Hash: 526d44382c5c4c2e1de771d0872a998011e53f91a81d16597fefe6965ad02553
                                  • Instruction Fuzzy Hash: 3851D1B1C043489BDB00EFA8CD05B9EBBB4EF11314F144259E850AB292D7B95A48EBE1
                                  APIs
                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 00F5499F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3363481001.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, Offset: 00F50000, based on PE: true
                                  • Associated: 0000000C.00000002.3363332796.0000000000F50000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3363481001.00000000010D5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364704612.00000000010DA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.00000000010DD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000125F000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000133C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000137B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.0000000001382000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.0000000001391000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3366836996.0000000001392000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3367196845.000000000152B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3367242663.000000000152D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_f50000_RageMP131.jbxd
                                  Similarity
                                  • API ID: Ios_base_dtorstd::ios_base::_
                                  • String ID: ios_base::badbit set$ios_base::failbit set
                                  • API String ID: 323602529-1240500531
                                  • Opcode ID: 83b0cb563eb5a69c337f8d86990d7125367289b477a22704151097f99c12da90
                                  • Instruction ID: e6aaf219a0fa4072a1b079d6917b8676530c6aca057a3e49951cffd532885409
                                  • Opcode Fuzzy Hash: 83b0cb563eb5a69c337f8d86990d7125367289b477a22704151097f99c12da90
                                  • Instruction Fuzzy Hash: AC415A71D00244AFCB04DF58CC46BAEB7B4EF05724F14821DFA54A7381D775AA44DBA1
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00F54061
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00F540C4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3363481001.0000000000F51000.00000040.00000001.01000000.00000006.sdmp, Offset: 00F50000, based on PE: true
                                  • Associated: 0000000C.00000002.3363332796.0000000000F50000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3363481001.00000000010D5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364704612.00000000010DA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.00000000010DD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000125F000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000133C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.000000000137B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.0000000001382000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3364831991.0000000001391000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3366836996.0000000001392000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3367196845.000000000152B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000C.00000002.3367242663.000000000152D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_f50000_RageMP131.jbxd
                                  Similarity
                                  • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                  • String ID: bad locale name
                                  • API String ID: 3988782225-1405518554
                                  • Opcode ID: 5a278ad72a31b6b4ed3bcb4294401783d8dda4007b745a46944e74f37c0417c3
                                  • Instruction ID: 4050444781e82d3ffbb5730a9cf68c6514410606e2f431d730b8102ee8ebd497
                                  • Opcode Fuzzy Hash: 5a278ad72a31b6b4ed3bcb4294401783d8dda4007b745a46944e74f37c0417c3
                                  • Instruction Fuzzy Hash: 4211E670805B84EED721CF68C90478BBFF4AF15714F14868DD4959B782D3B9A604D7A1