Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
LisectAVT_2403002B_242.exe

Overview

General Information

Sample name:LisectAVT_2403002B_242.exe
Analysis ID:1481918
MD5:814c7d754de0a807785f32a643082d2b
SHA1:a3f7abb4d5dc8bd5371f2e176b51e8c157b8f4bf
SHA256:5e4f50a70deeb3a29049c06b1b3a73abb6def3ddd4bea47dbce78e4eaa941333
Tags:exe
Infos:

Detection

RisePro Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Yara detected RisePro Stealer
AI detected suspicious sample
Connects to many ports of the same IP (likely port scanning)
Found API chain indicative of sandbox detection
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found stalling execution ending in API Sleep call
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Uses schtasks.exe or at.exe to add and modify task schedules
Abnormal high CPU Usage
Contains capabilities to detect virtual machines
Contains functionality to detect sandboxes (mouse cursor move detection)
Contains functionality to dynamically determine API calls
Contains functionality to read the PEB
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Entry point lies outside standard sections
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • LisectAVT_2403002B_242.exe (PID: 4156 cmdline: "C:\Users\user\Desktop\LisectAVT_2403002B_242.exe" MD5: 814C7D754DE0A807785F32A643082D2B)
    • schtasks.exe (PID: 3852 cmdline: schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 6472 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 4344 cmdline: schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 3548 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • MPGPH131.exe (PID: 2020 cmdline: C:\ProgramData\MPGPH131\MPGPH131.exe MD5: 814C7D754DE0A807785F32A643082D2B)
  • MPGPH131.exe (PID: 500 cmdline: C:\ProgramData\MPGPH131\MPGPH131.exe MD5: 814C7D754DE0A807785F32A643082D2B)
  • RageMP131.exe (PID: 1756 cmdline: "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe" MD5: 814C7D754DE0A807785F32A643082D2B)
  • RageMP131.exe (PID: 3220 cmdline: "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe" MD5: 814C7D754DE0A807785F32A643082D2B)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000006.00000003.2153204111.0000000004E00000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
    0000000C.00000003.2342969300.00000000046C0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
      00000008.00000002.3375310931.0000000000461000.00000040.00000001.01000000.00000005.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
        00000000.00000003.2128160270.00000000043E0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
          0000000C.00000002.3375376710.0000000000461000.00000040.00000001.01000000.00000005.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
            Click to see the 10 entries

            System Summary

            barindex
            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\LisectAVT_2403002B_242.exe, ProcessId: 4156, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RageMP131
            No Snort rule has matched
            Timestamp:2024-07-25T16:08:29.865110+0200
            SID:2046269
            Source Port:49721
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T16:08:10.131591+0200
            SID:2046269
            Source Port:49712
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T16:08:21.827803+0200
            SID:2046269
            Source Port:49715
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T16:08:10.225066+0200
            SID:2046269
            Source Port:49713
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T16:08:58.773939+0200
            SID:2022930
            Source Port:443
            Destination Port:49723
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T16:08:07.943795+0200
            SID:2046269
            Source Port:49710
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T16:08:21.030816+0200
            SID:2022930
            Source Port:443
            Destination Port:49716
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T16:08:04.974720+0200
            SID:2049060
            Source Port:49710
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: LisectAVT_2403002B_242.exeAvira: detected
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeAvira: detection malicious, Label: TR/Agent.kmrzu
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeAvira: detection malicious, Label: TR/Agent.kmrzu
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeJoe Sandbox ML: detected
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeJoe Sandbox ML: detected
            Source: LisectAVT_2403002B_242.exeJoe Sandbox ML: detected
            Source: LisectAVT_2403002B_242.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE

            Networking

            barindex
            Source: global trafficTCP traffic: 193.233.132.74 ports 0,5,7,8,58709,9
            Source: global trafficTCP traffic: 192.168.2.6:49710 -> 193.233.132.74:58709
            Source: Joe Sandbox ViewIP Address: 193.233.132.74 193.233.132.74
            Source: Joe Sandbox ViewASN Name: FREE-NET-ASFREEnetEU FREE-NET-ASFREEnetEU
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeCode function: 0_2_00C3D4A0 recv,setsockopt,WSAStartup,closesocket,socket,connect,closesocket,0_2_00C3D4A0
            Source: LisectAVT_2403002B_242.exe, 00000000.00000003.2128160270.00000000043E0000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002B_242.exe, 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000003.2153204111.0000000004E00000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.3375371093.0000000000821000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3375363971.0000000000821000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000003.2154011051.0000000004BF0000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000002.3375310931.0000000000461000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 00000008.00000003.2263129853.0000000004DC0000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000003.2342969300.00000000046C0000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3375376710.0000000000461000.00000040.00000001.01000000.00000005.sdmpString found in binary or memory: http://www.winimage.com/zLibDll
            Source: RageMP131.exeString found in binary or memory: https://ipinfo.io/
            Source: LisectAVT_2403002B_242.exe, 00000000.00000003.2128160270.00000000043E0000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002B_242.exe, 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000003.2153204111.0000000004E00000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.3375371093.0000000000821000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3375363971.0000000000821000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000003.2154011051.0000000004BF0000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000002.3375310931.0000000000461000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 00000008.00000003.2263129853.0000000004DC0000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000003.2342969300.00000000046C0000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3375376710.0000000000461000.00000040.00000001.01000000.00000005.sdmpString found in binary or memory: https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
            Source: LisectAVT_2403002B_242.exe, 00000000.00000002.3375441152.00000000004DE000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.3377080253.00000000014FD000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3376838901.00000000013BA000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000002.3376796312.00000000014BE000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3376567599.0000000000CF8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORT
            Source: RageMP131.exe, 0000000C.00000002.3376567599.0000000000CF8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORT2F
            Source: MPGPH131.exe, 00000007.00000002.3376838901.00000000013BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORT5
            Source: MPGPH131.exe, 00000006.00000002.3377080253.00000000014FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORTO
            Source: RageMP131.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address

            System Summary

            barindex
            Source: LisectAVT_2403002B_242.exeStatic PE information: section name:
            Source: LisectAVT_2403002B_242.exeStatic PE information: section name: .idata
            Source: LisectAVT_2403002B_242.exeStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name: .idata
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name: .idata
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeCode function: 0_2_00C288900_2_00C28890
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeCode function: 0_2_00D018B00_2_00D018B0
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeCode function: 0_2_00CA90B00_2_00CA90B0
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeCode function: 0_2_00D070700_2_00D07070
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeCode function: 0_2_00D050380_2_00D05038
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeCode function: 0_2_00D181A40_2_00D181A4
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeCode function: 0_2_00C942900_2_00C94290
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeCode function: 0_2_00D0AA7F0_2_00D0AA7F
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeCode function: 0_2_00CA12200_2_00CA1220
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeCode function: 0_2_00C393600_2_00C39360
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeCode function: 0_2_00C28CC00_2_00C28CC0
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeCode function: 0_2_00CA5CE00_2_00CA5CE0
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeCode function: 0_2_00C224F00_2_00C224F0
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeCode function: 0_2_00C964700_2_00C96470
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeCode function: 0_2_00CA4D200_2_00CA4D20
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_008288906_2_00828890
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_009018B06_2_009018B0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_008A90B06_2_008A90B0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_009050386_2_00905038
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_009070706_2_00907070
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_009181A46_2_009181A4
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_008942906_2_00894290
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_008A12206_2_008A1220
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_0090AA7F6_2_0090AA7F
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_008393606_2_00839360
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00828CC06_2_00828CC0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_008A5CE06_2_008A5CE0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_008224F06_2_008224F0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_008964706_2_00896470
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_008A4D206_2_008A4D20
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_008288907_2_00828890
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_009018B07_2_009018B0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_008A90B07_2_008A90B0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_009050387_2_00905038
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_009070707_2_00907070
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_009181A47_2_009181A4
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_008942907_2_00894290
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_008A12207_2_008A1220
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_0090AA7F7_2_0090AA7F
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_008393607_2_00839360
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_00828CC07_2_00828CC0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_008A5CE07_2_008A5CE0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_008224F07_2_008224F0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_008964707_2_00896470
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_008A4D207_2_008A4D20
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_005470708_2_00547070
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_005450388_2_00545038
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_004688908_2_00468890
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_005418B08_2_005418B0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_004E90B08_2_004E90B0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_005581A48_2_005581A4
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_0054AA7F8_2_0054AA7F
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_004E12208_2_004E1220
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_004D42908_2_004D4290
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_004793608_2_00479360
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_004D64708_2_004D6470
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_00468CC08_2_00468CC0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_004E5CE08_2_004E5CE0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_004624F08_2_004624F0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_004E4D208_2_004E4D20
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_0054707012_2_00547070
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_0054503812_2_00545038
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_0046889012_2_00468890
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_005418B012_2_005418B0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_004E90B012_2_004E90B0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_005581A412_2_005581A4
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_0054AA7F12_2_0054AA7F
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_004E122012_2_004E1220
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_004D429012_2_004D4290
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_0047936012_2_00479360
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_004D647012_2_004D6470
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_00468CC012_2_00468CC0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_004E5CE012_2_004E5CE0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_004624F012_2_004624F0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_004E4D2012_2_004E4D20
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: String function: 008FEAB0 appears 50 times
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: String function: 0053EAB0 appears 50 times
            Source: LisectAVT_2403002B_242.exe, 00000000.00000000.2122353802.0000000000D53000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamefilezilla.exe4 vs LisectAVT_2403002B_242.exe
            Source: LisectAVT_2403002B_242.exeBinary or memory string: OriginalFilenamefilezilla.exe4 vs LisectAVT_2403002B_242.exe
            Source: LisectAVT_2403002B_242.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: LisectAVT_2403002B_242.exeStatic PE information: Section: ZLIB complexity 0.9939268933496441
            Source: LisectAVT_2403002B_242.exeStatic PE information: Section: xdijjraj ZLIB complexity 0.9947976670506913
            Source: RageMP131.exe.0.drStatic PE information: Section: ZLIB complexity 0.9939268933496441
            Source: RageMP131.exe.0.drStatic PE information: Section: xdijjraj ZLIB complexity 0.9947976670506913
            Source: MPGPH131.exe.0.drStatic PE information: Section: ZLIB complexity 0.9939268933496441
            Source: MPGPH131.exe.0.drStatic PE information: Section: xdijjraj ZLIB complexity 0.9947976670506913
            Source: classification engineClassification label: mal100.troj.evad.winEXE@11/5@0/1
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeFile created: C:\Users\user\AppData\Local\RageMP131Jump to behavior
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6472:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3548:120:WilError_03
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeFile created: C:\Users\user\AppData\Local\Temp\rage131MP.tmpJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: LisectAVT_2403002B_242.exe, 00000000.00000003.2128160270.00000000043E0000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002B_242.exe, 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000003.2153204111.0000000004E00000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.3375371093.0000000000821000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3375363971.0000000000821000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000003.2154011051.0000000004BF0000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000002.3375310931.0000000000461000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 00000008.00000003.2263129853.0000000004DC0000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000003.2342969300.00000000046C0000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3375376710.0000000000461000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
            Source: LisectAVT_2403002B_242.exe, 00000000.00000003.2128160270.00000000043E0000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002B_242.exe, 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000003.2153204111.0000000004E00000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.3375371093.0000000000821000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3375363971.0000000000821000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000003.2154011051.0000000004BF0000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000002.3375310931.0000000000461000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 00000008.00000003.2263129853.0000000004DC0000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000003.2342969300.00000000046C0000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3375376710.0000000000461000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: UPDATE %Q.%s SET sql = sqlite_rename_table(sql, %Q), tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
            Source: LisectAVT_2403002B_242.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: LisectAVT_2403002B_242.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
            Source: MPGPH131.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: MPGPH131.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
            Source: MPGPH131.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: MPGPH131.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
            Source: RageMP131.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: RageMP131.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
            Source: RageMP131.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: RageMP131.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeFile read: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\LisectAVT_2403002B_242.exe "C:\Users\user\Desktop\LisectAVT_2403002B_242.exe"
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\ProgramData\MPGPH131\MPGPH131.exe C:\ProgramData\MPGPH131\MPGPH131.exe
            Source: unknownProcess created: C:\ProgramData\MPGPH131\MPGPH131.exe C:\ProgramData\MPGPH131\MPGPH131.exe
            Source: unknownProcess created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
            Source: unknownProcess created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHESTJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHESTJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winmm.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winmm.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: devobj.dllJump to behavior
            Source: LisectAVT_2403002B_242.exeStatic file information: File size 2045964 > 1048576
            Source: LisectAVT_2403002B_242.exeStatic PE information: Raw size of xdijjraj is bigger than: 0x100000 < 0x160a00

            Data Obfuscation

            barindex
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeUnpacked PE file: 0.2.LisectAVT_2403002B_242.exe.c20000.0.unpack :EW;.rsrc:W;.idata :W; :EW;xdijjraj:EW;xgxezfhn:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;xdijjraj:EW;xgxezfhn:EW;.taggant:EW;
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeUnpacked PE file: 6.2.MPGPH131.exe.820000.0.unpack :EW;.rsrc:W;.idata :W; :EW;xdijjraj:EW;xgxezfhn:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;xdijjraj:EW;xgxezfhn:EW;.taggant:EW;
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeUnpacked PE file: 7.2.MPGPH131.exe.820000.0.unpack :EW;.rsrc:W;.idata :W; :EW;xdijjraj:EW;xgxezfhn:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;xdijjraj:EW;xgxezfhn:EW;.taggant:EW;
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeUnpacked PE file: 8.2.RageMP131.exe.460000.0.unpack :EW;.rsrc:W;.idata :W; :EW;xdijjraj:EW;xgxezfhn:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;xdijjraj:EW;xgxezfhn:EW;.taggant:EW;
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeUnpacked PE file: 12.2.RageMP131.exe.460000.0.unpack :EW;.rsrc:W;.idata :W; :EW;xdijjraj:EW;xgxezfhn:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;xdijjraj:EW;xgxezfhn:EW;.taggant:EW;
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeCode function: 0_2_00C39360 LoadLibraryA,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,0_2_00C39360
            Source: initial sampleStatic PE information: section where entry point is pointing to: .taggant
            Source: LisectAVT_2403002B_242.exeStatic PE information: real checksum: 0x1fc5cb should be: 0x1fdff6
            Source: RageMP131.exe.0.drStatic PE information: real checksum: 0x1fc5cb should be: 0x1fdff6
            Source: MPGPH131.exe.0.drStatic PE information: real checksum: 0x1fc5cb should be: 0x1fdff6
            Source: LisectAVT_2403002B_242.exeStatic PE information: section name:
            Source: LisectAVT_2403002B_242.exeStatic PE information: section name: .idata
            Source: LisectAVT_2403002B_242.exeStatic PE information: section name:
            Source: LisectAVT_2403002B_242.exeStatic PE information: section name: xdijjraj
            Source: LisectAVT_2403002B_242.exeStatic PE information: section name: xgxezfhn
            Source: LisectAVT_2403002B_242.exeStatic PE information: section name: .taggant
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name: .idata
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name: xdijjraj
            Source: RageMP131.exe.0.drStatic PE information: section name: xgxezfhn
            Source: RageMP131.exe.0.drStatic PE information: section name: .taggant
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name: .idata
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name: xdijjraj
            Source: MPGPH131.exe.0.drStatic PE information: section name: xgxezfhn
            Source: MPGPH131.exe.0.drStatic PE information: section name: .taggant
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeCode function: 0_2_00CFE689 push ecx; ret 0_2_00CFE69C
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_008FE689 push ecx; ret 6_2_008FE69C
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_008FE689 push ecx; ret 7_2_008FE69C
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_0053E689 push ecx; ret 8_2_0053E69C
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_0053E689 push ecx; ret 12_2_0053E69C
            Source: LisectAVT_2403002B_242.exeStatic PE information: section name: entropy: 7.935474542943052
            Source: LisectAVT_2403002B_242.exeStatic PE information: section name: xdijjraj entropy: 7.953698825467194
            Source: RageMP131.exe.0.drStatic PE information: section name: entropy: 7.935474542943052
            Source: RageMP131.exe.0.drStatic PE information: section name: xdijjraj entropy: 7.953698825467194
            Source: MPGPH131.exe.0.drStatic PE information: section name: entropy: 7.935474542943052
            Source: MPGPH131.exe.0.drStatic PE information: section name: xdijjraj entropy: 7.953698825467194
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeFile created: C:\ProgramData\MPGPH131\MPGPH131.exeJump to dropped file
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeFile created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeJump to dropped file
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeFile created: C:\ProgramData\MPGPH131\MPGPH131.exeJump to dropped file

            Boot Survival

            barindex
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RageMP131Jump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RageMP131Jump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeCode function: 0_2_00CA4D20 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00CA4D20

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSandbox detection routine: GetCursorPos, DecisionNode, Sleepgraph_8-17697
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeSandbox detection routine: GetCursorPos, DecisionNode, Sleepgraph_0-17127
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSandbox detection routine: GetCursorPos, DecisionNode, Sleepgraph_6-16846
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeEvasive API call chain: GetPEB, DecisionNodes, Sleepgraph_0-17129
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeEvasive API call chain: GetPEB, DecisionNodes, Sleepgraph_6-16847
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeEvasive API call chain: GetPEB, DecisionNodes, Sleepgraph_8-17699
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeStalling execution: Execution stalls by calling Sleepgraph_8-17280
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: D5B108 second address: D5B10C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: D5B10C second address: D5B112 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: ED4A85 second address: ED4A89 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: ED4A89 second address: ED4AA7 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FCBB4F3EEA6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jmp 00007FCBB4F3EEABh 0x00000010 jns 00007FCBB4F3EEA6h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: ED4D4B second address: ED4D60 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCBB4EE8170h 0x00000009 popad 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: ED4D60 second address: ED4D7C instructions: 0x00000000 rdtsc 0x00000002 jl 00007FCBB4F3EEAEh 0x00000008 pushad 0x00000009 popad 0x0000000a jp 00007FCBB4F3EEA6h 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push eax 0x00000013 push edx 0x00000014 push ebx 0x00000015 pushad 0x00000016 popad 0x00000017 pop ebx 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b popad 0x0000001c rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: ED4D7C second address: ED4D80 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: ED4D80 second address: ED4D86 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: ED4D86 second address: ED4DB4 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jmp 00007FCBB4EE8179h 0x00000008 pop ebx 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c jng 00007FCBB4EE8166h 0x00000012 jng 00007FCBB4EE8166h 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: ED4EE4 second address: ED4EEE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007FCBB4F3EEA6h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: ED4EEE second address: ED4EFA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: ED4EFA second address: ED4EFE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: ED4EFE second address: ED4F0D instructions: 0x00000000 rdtsc 0x00000002 je 00007FCBB4EE8166h 0x00000008 push eax 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: ED4F0D second address: ED4F13 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: ED52FE second address: ED5317 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCBB4EE8175h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EBF468 second address: EBF470 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EF45CE second address: EF45D4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EF45D4 second address: EF45DA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EF45DA second address: EF45DE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EF4715 second address: EF4719 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EF4719 second address: EF471F instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EF471F second address: EF4725 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EF48ED second address: EF4903 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 jmp 00007FCBB4EE816Eh 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EF4903 second address: EF490F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pushad 0x00000007 pushad 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EF4BDB second address: EF4BE5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007FCBB4EE8166h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EF4EEB second address: EF4EFD instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jc 00007FCBB4F3EEA6h 0x00000009 pop ecx 0x0000000a jbe 00007FCBB4F3EEBBh 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EF507C second address: EF509B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 jne 00007FCBB4EE8166h 0x0000000b popad 0x0000000c pushad 0x0000000d jmp 00007FCBB4EE8170h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EF55E2 second address: EF55ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 push esi 0x00000007 push edx 0x00000008 pop edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EF5750 second address: EF5757 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EF5757 second address: EF5770 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FCBB4F3EEB5h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EF5770 second address: EF5774 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EEC419 second address: EEC42C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 jp 00007FCBB4F3EEA6h 0x0000000d jo 00007FCBB4F3EEA6h 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EEC42C second address: EEC430 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EF58C3 second address: EF58C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EF58C7 second address: EF58D5 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FCBB4EE8166h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EF58D5 second address: EF58D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EF9386 second address: EF938B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EF97F7 second address: EF98F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007FCBB4F3EEB3h 0x0000000a popad 0x0000000b mov dword ptr [esp], eax 0x0000000e stc 0x0000000f push dword ptr fs:[00000000h] 0x00000016 jmp 00007FCBB4F3EEB0h 0x0000001b mov dword ptr fs:[00000000h], esp 0x00000022 jnl 00007FCBB4F3EEAAh 0x00000028 pushad 0x00000029 push esi 0x0000002a ja 00007FCBB4F3EEA6h 0x00000030 pop ecx 0x00000031 mov bh, 99h 0x00000033 popad 0x00000034 lea eax, dword ptr [ebp+12472BD6h] 0x0000003a pushad 0x0000003b and dh, 0000003Bh 0x0000003e mov ah, 04h 0x00000040 popad 0x00000041 mov dword ptr [eax+01h], esp 0x00000044 pushad 0x00000045 jmp 00007FCBB4F3EEB7h 0x0000004a xor si, 6884h 0x0000004f popad 0x00000050 lea eax, dword ptr [ebp+12472C02h] 0x00000056 ja 00007FCBB4F3EEB4h 0x0000005c mov dword ptr [eax+01h], ebp 0x0000005f jnp 00007FCBB4F3EEA7h 0x00000065 mov byte ptr [ebp+122D36D9h], 0000004Fh 0x0000006c push 00000000h 0x0000006e push esi 0x0000006f call 00007FCBB4F3EEA8h 0x00000074 pop esi 0x00000075 mov dword ptr [esp+04h], esi 0x00000079 add dword ptr [esp+04h], 0000001Ch 0x00000081 inc esi 0x00000082 push esi 0x00000083 ret 0x00000084 pop esi 0x00000085 ret 0x00000086 jmp 00007FCBB4F3EEB3h 0x0000008b push B0892644h 0x00000090 push eax 0x00000091 push edx 0x00000092 jmp 00007FCBB4F3EEB8h 0x00000097 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EF8144 second address: EF814B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EF814B second address: EF8158 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pushad 0x00000004 popad 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push ebx 0x0000000a push ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EF998A second address: EF998E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EF998E second address: EF99BC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 push eax 0x00000008 pushad 0x00000009 push ecx 0x0000000a je 00007FCBB4F3EEA6h 0x00000010 pop ecx 0x00000011 pushad 0x00000012 pushad 0x00000013 popad 0x00000014 pushad 0x00000015 popad 0x00000016 popad 0x00000017 popad 0x00000018 mov eax, dword ptr [esp+04h] 0x0000001c jmp 00007FCBB4F3EEABh 0x00000021 mov eax, dword ptr [eax] 0x00000023 push edi 0x00000024 push eax 0x00000025 push edx 0x00000026 pushad 0x00000027 popad 0x00000028 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EF99BC second address: EF99E4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBB4EE8171h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edi 0x0000000a mov dword ptr [esp+04h], eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jc 00007FCBB4EE816Ch 0x00000016 jnp 00007FCBB4EE8166h 0x0000001c rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EFB994 second address: EFB99A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EFB99A second address: EFB99E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EFB99E second address: EFB9C4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jns 00007FCBB4F3EEA6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 jmp 00007FCBB4F3EEB6h 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EFFC09 second address: EFFC0D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EFFC0D second address: EFFC13 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EFFC13 second address: EFFC40 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [eax] 0x0000000a jg 00007FCBB4EE816Ah 0x00000010 mov dword ptr [esp+04h], eax 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007FCBB4EE8173h 0x0000001b rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EFFC40 second address: EFFC82 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBB4F3EEB2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop eax 0x0000000a movzx esi, cx 0x0000000d call 00007FCBB4F3EEA9h 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 pushad 0x00000016 popad 0x00000017 jmp 00007FCBB4F3EEB9h 0x0000001c popad 0x0000001d rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EFFC82 second address: EFFC88 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EFFC88 second address: EFFC8C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EFFC8C second address: EFFCCF instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007FCBB4EE816Dh 0x0000000e mov eax, dword ptr [esp+04h] 0x00000012 jbe 00007FCBB4EE816Eh 0x00000018 push esi 0x00000019 jl 00007FCBB4EE8166h 0x0000001f pop esi 0x00000020 mov eax, dword ptr [eax] 0x00000022 push eax 0x00000023 push edx 0x00000024 pushad 0x00000025 jmp 00007FCBB4EE816Fh 0x0000002a jg 00007FCBB4EE8166h 0x00000030 popad 0x00000031 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EFFE11 second address: EFFE19 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push esi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F000A7 second address: F000AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F001AB second address: F001AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F001AF second address: F001B5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F00891 second address: F00897 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F00897 second address: F0089C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F00982 second address: F00988 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F00988 second address: F0098D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F00E40 second address: F00E46 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F00E46 second address: F00E4A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F022AC second address: F022B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F0310C second address: F03110 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F03110 second address: F03116 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F03D46 second address: F03D67 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FCBB4EE8173h 0x00000008 pushad 0x00000009 popad 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F03D67 second address: F03D6B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F03D6B second address: F03D6F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F04789 second address: F047BC instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 pushad 0x00000008 jmp 00007FCBB4F3EEB8h 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FCBB4F3EEB1h 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F04575 second address: F0457F instructions: 0x00000000 rdtsc 0x00000002 jne 00007FCBB4EE8166h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F05294 second address: F0529F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007FCBB4F3EEA6h 0x0000000a popad 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F06713 second address: F06717 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F0C995 second address: F0C999 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F0C999 second address: F0C99F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F07084 second address: F07088 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F0EFD4 second address: F0F04E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop esi 0x00000006 push eax 0x00000007 jmp 00007FCBB4EE8173h 0x0000000c nop 0x0000000d push 00000000h 0x0000000f push ebp 0x00000010 call 00007FCBB4EE8168h 0x00000015 pop ebp 0x00000016 mov dword ptr [esp+04h], ebp 0x0000001a add dword ptr [esp+04h], 00000017h 0x00000022 inc ebp 0x00000023 push ebp 0x00000024 ret 0x00000025 pop ebp 0x00000026 ret 0x00000027 movsx ebx, ax 0x0000002a push 00000000h 0x0000002c mov edi, dword ptr [ebp+122D2BC5h] 0x00000032 push 00000000h 0x00000034 push 00000000h 0x00000036 push esi 0x00000037 call 00007FCBB4EE8168h 0x0000003c pop esi 0x0000003d mov dword ptr [esp+04h], esi 0x00000041 add dword ptr [esp+04h], 0000001Dh 0x00000049 inc esi 0x0000004a push esi 0x0000004b ret 0x0000004c pop esi 0x0000004d ret 0x0000004e mov bx, 6F32h 0x00000052 push eax 0x00000053 push eax 0x00000054 jl 00007FCBB4EE816Ch 0x0000005a push eax 0x0000005b push edx 0x0000005c rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F111A9 second address: F111AE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F111AE second address: F111B4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F144D4 second address: F144D8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F144D8 second address: F144EC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FCBB4EE816Ah 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F144EC second address: F144F2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F144F2 second address: F144F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F144F6 second address: F144FA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F1658B second address: F1658F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F1026E second address: F1028D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop esi 0x00000008 push eax 0x00000009 pushad 0x0000000a push edi 0x0000000b jmp 00007FCBB4F3EEAFh 0x00000010 pop edi 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F1658F second address: F16608 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 jmp 00007FCBB4EE8170h 0x0000000c pop ebx 0x0000000d popad 0x0000000e mov dword ptr [esp], eax 0x00000011 push 00000000h 0x00000013 push ebx 0x00000014 call 00007FCBB4EE8168h 0x00000019 pop ebx 0x0000001a mov dword ptr [esp+04h], ebx 0x0000001e add dword ptr [esp+04h], 00000017h 0x00000026 inc ebx 0x00000027 push ebx 0x00000028 ret 0x00000029 pop ebx 0x0000002a ret 0x0000002b pushad 0x0000002c sbb dh, 0000006Dh 0x0000002f sub dword ptr [ebp+122D369Fh], edi 0x00000035 popad 0x00000036 push 00000000h 0x00000038 mov di, B8DEh 0x0000003c push 00000000h 0x0000003e push 00000000h 0x00000040 push edx 0x00000041 call 00007FCBB4EE8168h 0x00000046 pop edx 0x00000047 mov dword ptr [esp+04h], edx 0x0000004b add dword ptr [esp+04h], 00000017h 0x00000053 inc edx 0x00000054 push edx 0x00000055 ret 0x00000056 pop edx 0x00000057 ret 0x00000058 mov ebx, dword ptr [ebp+122D2BE5h] 0x0000005e xchg eax, esi 0x0000005f push eax 0x00000060 push eax 0x00000061 push edx 0x00000062 pushad 0x00000063 popad 0x00000064 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F1028D second address: F10320 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FCBB4F3EEA6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b nop 0x0000000c mov bh, 3Dh 0x0000000e push dword ptr fs:[00000000h] 0x00000015 call 00007FCBB4F3EEB3h 0x0000001a mov edi, edx 0x0000001c pop ebx 0x0000001d mov dword ptr fs:[00000000h], esp 0x00000024 mov bl, 2Eh 0x00000026 mov eax, dword ptr [ebp+122D090Dh] 0x0000002c push 00000000h 0x0000002e push ecx 0x0000002f call 00007FCBB4F3EEA8h 0x00000034 pop ecx 0x00000035 mov dword ptr [esp+04h], ecx 0x00000039 add dword ptr [esp+04h], 0000001Ah 0x00000041 inc ecx 0x00000042 push ecx 0x00000043 ret 0x00000044 pop ecx 0x00000045 ret 0x00000046 push FFFFFFFFh 0x00000048 jc 00007FCBB4F3EEACh 0x0000004e mov ebx, dword ptr [ebp+122D3837h] 0x00000054 nop 0x00000055 jns 00007FCBB4F3EEBBh 0x0000005b push eax 0x0000005c pushad 0x0000005d jnp 00007FCBB4F3EEA8h 0x00000063 pushad 0x00000064 push eax 0x00000065 push edx 0x00000066 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F16608 second address: F1662D instructions: 0x00000000 rdtsc 0x00000002 je 00007FCBB4EE8166h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d pushad 0x0000000e jmp 00007FCBB4EE8175h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F14716 second address: F14729 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBB4F3EEAFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F1662D second address: F16636 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F14729 second address: F14730 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F16636 second address: F1663A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F158DD second address: F158E7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jl 00007FCBB4F3EEA6h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F158E7 second address: F158EB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F175AC second address: F175DF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBB4F3EEB4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jbe 00007FCBB4F3EEB4h 0x0000000f jmp 00007FCBB4F3EEAEh 0x00000014 popad 0x00000015 push eax 0x00000016 push eax 0x00000017 push edx 0x00000018 push ebx 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F16763 second address: F1676D instructions: 0x00000000 rdtsc 0x00000002 jno 00007FCBB4EE8166h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F175DF second address: F175E4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F186B6 second address: F18703 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007FCBB4EE8166h 0x0000000a popad 0x0000000b push ebx 0x0000000c push edx 0x0000000d pop edx 0x0000000e pop ebx 0x0000000f popad 0x00000010 mov dword ptr [esp], eax 0x00000013 push 00000000h 0x00000015 push 00000000h 0x00000017 push edi 0x00000018 call 00007FCBB4EE8168h 0x0000001d pop edi 0x0000001e mov dword ptr [esp+04h], edi 0x00000022 add dword ptr [esp+04h], 0000001Ah 0x0000002a inc edi 0x0000002b push edi 0x0000002c ret 0x0000002d pop edi 0x0000002e ret 0x0000002f cld 0x00000030 push 00000000h 0x00000032 push esi 0x00000033 mov edi, dword ptr [ebp+12476AABh] 0x00000039 pop edi 0x0000003a mov dword ptr [ebp+122D373Ah], ebx 0x00000040 xchg eax, esi 0x00000041 push edi 0x00000042 push edx 0x00000043 push eax 0x00000044 push edx 0x00000045 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F1777A second address: F1778C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FCBB4F3EEAEh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F19549 second address: F1954F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F18817 second address: F1881C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F1881C second address: F18821 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F18821 second address: F1882D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F1A51A second address: F1A55D instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b push edx 0x0000000c push ebx 0x0000000d ja 00007FCBB4EE8166h 0x00000013 pop ebx 0x00000014 pop edi 0x00000015 push 00000000h 0x00000017 mov di, 8A0Eh 0x0000001b call 00007FCBB4EE8172h 0x00000020 mov edi, dword ptr [ebp+122D29ADh] 0x00000026 pop ebx 0x00000027 push 00000000h 0x00000029 mov edi, dword ptr [ebp+122D29A1h] 0x0000002f stc 0x00000030 push eax 0x00000031 push eax 0x00000032 push edx 0x00000033 push ecx 0x00000034 push eax 0x00000035 push edx 0x00000036 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F197FC second address: F19806 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FCBB4F3EEA6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F1A55D second address: F1A562 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F1A562 second address: F1A56D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 je 00007FCBB4F3EEA6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F1B75A second address: F1B760 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F1B760 second address: F1B765 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F1B803 second address: F1B809 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F1C61C second address: F1C6D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jmp 00007FCBB4F3EEACh 0x0000000a popad 0x0000000b push eax 0x0000000c jmp 00007FCBB4F3EEB3h 0x00000011 nop 0x00000012 movzx ebx, di 0x00000015 push dword ptr fs:[00000000h] 0x0000001c push 00000000h 0x0000001e push ecx 0x0000001f call 00007FCBB4F3EEA8h 0x00000024 pop ecx 0x00000025 mov dword ptr [esp+04h], ecx 0x00000029 add dword ptr [esp+04h], 00000014h 0x00000031 inc ecx 0x00000032 push ecx 0x00000033 ret 0x00000034 pop ecx 0x00000035 ret 0x00000036 mov dword ptr fs:[00000000h], esp 0x0000003d xor edi, dword ptr [ebp+122D29C1h] 0x00000043 pushad 0x00000044 mov edi, dword ptr [ebp+122D372Eh] 0x0000004a add ax, 94B7h 0x0000004f popad 0x00000050 mov eax, dword ptr [ebp+122D07B5h] 0x00000056 or di, 84C1h 0x0000005b push FFFFFFFFh 0x0000005d and ebx, dword ptr [ebp+122D2945h] 0x00000063 call 00007FCBB4F3EEB4h 0x00000068 mov dword ptr [ebp+122D3077h], ebx 0x0000006e pop ebx 0x0000006f nop 0x00000070 jmp 00007FCBB4F3EEB5h 0x00000075 push eax 0x00000076 jc 00007FCBB4F3EEB4h 0x0000007c push eax 0x0000007d push edx 0x0000007e pushad 0x0000007f popad 0x00000080 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F2A33C second address: F2A34D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jno 00007FCBB4EE816Ch 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F29790 second address: F29794 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F29794 second address: F29798 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F29798 second address: F297CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edi 0x00000009 pushad 0x0000000a jnc 00007FCBB4F3EEAEh 0x00000010 push eax 0x00000011 push edx 0x00000012 jng 00007FCBB4F3EEA6h 0x00000018 jmp 00007FCBB4F3EEB4h 0x0000001d rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F297CC second address: F297D0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F29C18 second address: F29C24 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FCBB4F3EEAEh 0x00000008 push edi 0x00000009 pop edi 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F29D85 second address: F29D89 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F29EEB second address: F29F0C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jng 00007FCBB4F3EEA6h 0x0000000c jmp 00007FCBB4F3EEB5h 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F37141 second address: F37173 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FCBB4EE8172h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jmp 00007FCBB4EE8171h 0x00000010 pushad 0x00000011 ja 00007FCBB4EE8166h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F37173 second address: F37179 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F37179 second address: F37184 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F37184 second address: F3718A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F3718A second address: F37194 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FCBB4EE8166h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F35051 second address: F35069 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCBB4F3EEB3h 0x00000009 popad 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F35069 second address: F3506E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F3506E second address: F35074 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F35233 second address: F35252 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCBB4EE8179h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F35694 second address: F35698 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F35994 second address: F3599C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F3599C second address: F359A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F35B40 second address: F35B73 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBB4EE8175h 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jp 00007FCBB4EE8172h 0x00000011 jp 00007FCBB4EE8166h 0x00000017 js 00007FCBB4EE8166h 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 popad 0x00000021 pushad 0x00000022 popad 0x00000023 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F35E14 second address: F35E18 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F35F76 second address: F35F7B instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F3685A second address: F36860 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F36860 second address: F3686F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jns 00007FCBB4EE816Ah 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F3686F second address: F368A2 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FCBB4F3EEBFh 0x00000008 jmp 00007FCBB4F3EEB3h 0x0000000d je 00007FCBB4F3EEA6h 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007FCBB4F3EEB0h 0x0000001a rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F368A2 second address: F368A6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F34D89 second address: F34D91 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F34D91 second address: F34D99 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: ECC6C9 second address: ECC6CD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F3DD50 second address: F3DD56 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F3DD56 second address: F3DD5A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F3DD5A second address: F3DD73 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FCBB4EE8173h 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F3DD73 second address: F3DD78 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F3DD78 second address: F3DD7E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F3DEBF second address: F3DECE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop eax 0x00000007 push eax 0x00000008 jo 00007FCBB4F3EEA6h 0x0000000e pop eax 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EBBF2E second address: EBBF33 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EBBF33 second address: EBBF49 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jbe 00007FCBB4F3EEA6h 0x0000000b jns 00007FCBB4F3EEA6h 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EBBF49 second address: EBBF4F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EBBF4F second address: EBBF53 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F4F51B second address: F4F527 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FCBB4EE8166h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F4F527 second address: F4F52E instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F587C0 second address: F587DC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBB4EE8178h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EC0EFC second address: EC0F00 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EC0F00 second address: EC0F29 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pushad 0x00000008 pushad 0x00000009 jc 00007FCBB4EE8166h 0x0000000f jmp 00007FCBB4EE8171h 0x00000014 pushad 0x00000015 popad 0x00000016 push edi 0x00000017 pop edi 0x00000018 popad 0x00000019 push eax 0x0000001a push edx 0x0000001b push esi 0x0000001c pop esi 0x0000001d rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EC0F29 second address: EC0F44 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FCBB4F3EEA6h 0x00000008 jmp 00007FCBB4F3EEAEh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F5860D second address: F5863D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCBB4EE8174h 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FCBB4EE8174h 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F5863D second address: F58641 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F611C0 second address: F611C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F611C7 second address: F611DA instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007FCBB4F3EEAAh 0x0000000a pop edi 0x0000000b push ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F60D4A second address: F60D82 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jne 00007FCBB4EE8179h 0x0000000c js 00007FCBB4EE817Dh 0x00000012 jmp 00007FCBB4EE8171h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: ECFC09 second address: ECFC28 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBB4F3EEB3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jne 00007FCBB4F3EEA6h 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: EC4488 second address: EC44A4 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FCBB4EE8172h 0x00000008 jmp 00007FCBB4EE816Ch 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push ecx 0x00000012 pushad 0x00000013 popad 0x00000014 pop ecx 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F74C3B second address: F74C45 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F74C45 second address: F74C96 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007FCBB4EE8166h 0x0000000a jmp 00007FCBB4EE8178h 0x0000000f popad 0x00000010 pushad 0x00000011 push esi 0x00000012 pop esi 0x00000013 push eax 0x00000014 pop eax 0x00000015 push esi 0x00000016 pop esi 0x00000017 jmp 00007FCBB4EE8173h 0x0000001c popad 0x0000001d popad 0x0000001e pushad 0x0000001f pushad 0x00000020 jl 00007FCBB4EE8166h 0x00000026 push edx 0x00000027 pop edx 0x00000028 jnp 00007FCBB4EE8166h 0x0000002e push eax 0x0000002f push edx 0x00000030 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F77085 second address: F77090 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jl 00007FCBB4F3EEA6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F7A3D4 second address: F7A3EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FCBB4EE816Ah 0x0000000a pop ebx 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f pop eax 0x00000010 jns 00007FCBB4EE8166h 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F7A3EF second address: F7A410 instructions: 0x00000000 rdtsc 0x00000002 js 00007FCBB4F3EEA6h 0x00000008 jmp 00007FCBB4F3EEB4h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F7A410 second address: F7A42E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007FCBB4EE8176h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F7A27C second address: F7A284 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F7A284 second address: F7A28A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F7A28A second address: F7A298 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCBB4F3EEAAh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F7A298 second address: F7A29C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F7A29C second address: F7A2A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F8040E second address: F80425 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b jnp 00007FCBB4EE8166h 0x00000011 jp 00007FCBB4EE8166h 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F80425 second address: F80434 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBB4F3EEABh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F7FFD9 second address: F7FFDD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F7FFDD second address: F7FFE9 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F7FFE9 second address: F7FFED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F7FFED second address: F7FFF3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F7FFF3 second address: F7FFFF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jns 00007FCBB4EE8166h 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F7FFFF second address: F80011 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jns 00007FCBB4F3EEA6h 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F80011 second address: F80027 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jl 00007FCBB4EE817Eh 0x0000000e push eax 0x0000000f push edx 0x00000010 je 00007FCBB4EE8166h 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F80027 second address: F80032 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F80175 second address: F80199 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FCBB4EE8179h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F80199 second address: F801A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: F801A2 second address: F801A8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: FA42E5 second address: FA42EB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: FA42EB second address: FA42FF instructions: 0x00000000 rdtsc 0x00000002 jp 00007FCBB4EE8166h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jbe 00007FCBB4EE8166h 0x00000012 push edx 0x00000013 pop edx 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: FA42FF second address: FA4309 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FCBB4F3EEA6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: FA4309 second address: FA432A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FCBB4EE816Eh 0x00000008 jng 00007FCBB4EE8166h 0x0000000e push esi 0x0000000f pop esi 0x00000010 popad 0x00000011 pop edx 0x00000012 pop eax 0x00000013 push eax 0x00000014 push eax 0x00000015 push edx 0x00000016 push ecx 0x00000017 pop ecx 0x00000018 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: FA376A second address: FA3772 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: FA3772 second address: FA3776 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: FA4011 second address: FA401A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: FA401A second address: FA4029 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 jno 00007FCBB4EE8166h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: FA4029 second address: FA403F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCBB4F3EEB0h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: FA403F second address: FA405B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FCBB4EE816Dh 0x0000000e jns 00007FCBB4EE8166h 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: FA6EE0 second address: FA6EEC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007FCBB4F3EEA6h 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: FA83E1 second address: FA8413 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007FCBB4EE8166h 0x0000000a jns 00007FCBB4EE8166h 0x00000010 popad 0x00000011 push esi 0x00000012 pushad 0x00000013 popad 0x00000014 push edi 0x00000015 pop edi 0x00000016 pop esi 0x00000017 push edi 0x00000018 jmp 00007FCBB4EE816Eh 0x0000001d pop edi 0x0000001e popad 0x0000001f jo 00007FCBB4EE81ABh 0x00000025 push eax 0x00000026 push edx 0x00000027 push eax 0x00000028 push edx 0x00000029 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: FA8413 second address: FA841D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007FCBB4F3EEA6h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: FAAF35 second address: FAAF61 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esi 0x00000009 jmp 00007FCBB4EE8176h 0x0000000e pushad 0x0000000f popad 0x00000010 pop esi 0x00000011 push eax 0x00000012 push edx 0x00000013 js 00007FCBB4EE8166h 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: FAAF61 second address: FAAF65 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: FAD7C5 second address: FAD7CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: FAD7CC second address: FAD7D2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: FAD7D2 second address: FAD7D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: FAD7D6 second address: FAD7F7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBB4F3EEB6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: FAD8C9 second address: FAD8E1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBB4EE816Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: FADE8B second address: FADE91 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeRDTSC instruction interceptor: First address: FB106C second address: FB108F instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 jmp 00007FCBB4EE8173h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop edi 0x0000000c push ecx 0x0000000d push eax 0x0000000e push edx 0x0000000f jns 00007FCBB4EE8166h 0x00000015 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: 95B108 second address: 95B10C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: 95B10C second address: 95B112 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AD4A85 second address: AD4A89 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AD4A89 second address: AD4AA7 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FCBB4EE8166h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jmp 00007FCBB4EE816Bh 0x00000010 jns 00007FCBB4EE8166h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AD4D4B second address: AD4D60 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCBB4F3EEB0h 0x00000009 popad 0x0000000a rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AD4D60 second address: AD4D7C instructions: 0x00000000 rdtsc 0x00000002 jl 00007FCBB4EE816Eh 0x00000008 pushad 0x00000009 popad 0x0000000a jp 00007FCBB4EE8166h 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push eax 0x00000013 push edx 0x00000014 push ebx 0x00000015 pushad 0x00000016 popad 0x00000017 pop ebx 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b popad 0x0000001c rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AD4D7C second address: AD4D80 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AD4D80 second address: AD4D86 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AD4D86 second address: AD4DB4 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jmp 00007FCBB4F3EEB9h 0x00000008 pop ebx 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c jng 00007FCBB4F3EEA6h 0x00000012 jng 00007FCBB4F3EEA6h 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AD4EE4 second address: AD4EEE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007FCBB4EE8166h 0x0000000a rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AD4EEE second address: AD4EFA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AD4EFA second address: AD4EFE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AD4EFE second address: AD4F0D instructions: 0x00000000 rdtsc 0x00000002 je 00007FCBB4F3EEA6h 0x00000008 push eax 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AD4F0D second address: AD4F13 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AD52FE second address: AD5317 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCBB4F3EEB5h 0x00000009 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AD4A89 second address: AD4AA7 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FCBB4F3EEA6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jmp 00007FCBB4F3EEABh 0x00000010 jns 00007FCBB4F3EEA6h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AD4D4B second address: AD4D60 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCBB4EE8170h 0x00000009 popad 0x0000000a rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AD4D60 second address: AD4D7C instructions: 0x00000000 rdtsc 0x00000002 jl 00007FCBB4F3EEAEh 0x00000008 pushad 0x00000009 popad 0x0000000a jp 00007FCBB4F3EEA6h 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push eax 0x00000013 push edx 0x00000014 push ebx 0x00000015 pushad 0x00000016 popad 0x00000017 pop ebx 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b popad 0x0000001c rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AD4D86 second address: AD4DB4 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jmp 00007FCBB4EE8179h 0x00000008 pop ebx 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c jng 00007FCBB4EE8166h 0x00000012 jng 00007FCBB4EE8166h 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AD4EE4 second address: AD4EEE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007FCBB4F3EEA6h 0x0000000a rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AD4EFE second address: AD4F0D instructions: 0x00000000 rdtsc 0x00000002 je 00007FCBB4EE8166h 0x00000008 push eax 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AD52FE second address: AD5317 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCBB4EE8175h 0x00000009 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: ABF468 second address: ABF470 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AF45CE second address: AF45D4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AF45D4 second address: AF45DA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AF45DA second address: AF45DE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AF4715 second address: AF4719 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AF4719 second address: AF471F instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AF471F second address: AF4725 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AF48ED second address: AF4903 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 jmp 00007FCBB4EE816Eh 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AF4903 second address: AF490F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pushad 0x00000007 pushad 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AF4BDB second address: AF4BE5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007FCBB4EE8166h 0x0000000a rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AF4EEB second address: AF4EFD instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jc 00007FCBB4F3EEA6h 0x00000009 pop ecx 0x0000000a jbe 00007FCBB4F3EEBBh 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AF507C second address: AF509B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 jne 00007FCBB4EE8166h 0x0000000b popad 0x0000000c pushad 0x0000000d jmp 00007FCBB4EE8170h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AF55E2 second address: AF55ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 push esi 0x00000007 push edx 0x00000008 pop edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AF5750 second address: AF5757 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AF5757 second address: AF5770 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FCBB4F3EEB5h 0x00000009 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AF5770 second address: AF5774 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AEC419 second address: AEC42C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 jp 00007FCBB4F3EEA6h 0x0000000d jo 00007FCBB4F3EEA6h 0x00000013 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AEC42C second address: AEC430 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AF58C3 second address: AF58C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AF58C7 second address: AF58D5 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FCBB4EE8166h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AF58D5 second address: AF58D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AF9386 second address: AF938B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AF97F7 second address: AF98F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007FCBB4F3EEB3h 0x0000000a popad 0x0000000b mov dword ptr [esp], eax 0x0000000e stc 0x0000000f push dword ptr fs:[00000000h] 0x00000016 jmp 00007FCBB4F3EEB0h 0x0000001b mov dword ptr fs:[00000000h], esp 0x00000022 jnl 00007FCBB4F3EEAAh 0x00000028 pushad 0x00000029 push esi 0x0000002a ja 00007FCBB4F3EEA6h 0x00000030 pop ecx 0x00000031 mov bh, 99h 0x00000033 popad 0x00000034 lea eax, dword ptr [ebp+12472BD6h] 0x0000003a pushad 0x0000003b and dh, 0000003Bh 0x0000003e mov ah, 04h 0x00000040 popad 0x00000041 mov dword ptr [eax+01h], esp 0x00000044 pushad 0x00000045 jmp 00007FCBB4F3EEB7h 0x0000004a xor si, 6884h 0x0000004f popad 0x00000050 lea eax, dword ptr [ebp+12472C02h] 0x00000056 ja 00007FCBB4F3EEB4h 0x0000005c mov dword ptr [eax+01h], ebp 0x0000005f jnp 00007FCBB4F3EEA7h 0x00000065 mov byte ptr [ebp+122D36D9h], 0000004Fh 0x0000006c push 00000000h 0x0000006e push esi 0x0000006f call 00007FCBB4F3EEA8h 0x00000074 pop esi 0x00000075 mov dword ptr [esp+04h], esi 0x00000079 add dword ptr [esp+04h], 0000001Ch 0x00000081 inc esi 0x00000082 push esi 0x00000083 ret 0x00000084 pop esi 0x00000085 ret 0x00000086 jmp 00007FCBB4F3EEB3h 0x0000008b push B0892644h 0x00000090 push eax 0x00000091 push edx 0x00000092 jmp 00007FCBB4F3EEB8h 0x00000097 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AF8144 second address: AF814B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AF814B second address: AF8158 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pushad 0x00000004 popad 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push ebx 0x0000000a push ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AF998A second address: AF998E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AF998E second address: AF99BC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 push eax 0x00000008 pushad 0x00000009 push ecx 0x0000000a je 00007FCBB4F3EEA6h 0x00000010 pop ecx 0x00000011 pushad 0x00000012 pushad 0x00000013 popad 0x00000014 pushad 0x00000015 popad 0x00000016 popad 0x00000017 popad 0x00000018 mov eax, dword ptr [esp+04h] 0x0000001c jmp 00007FCBB4F3EEABh 0x00000021 mov eax, dword ptr [eax] 0x00000023 push edi 0x00000024 push eax 0x00000025 push edx 0x00000026 pushad 0x00000027 popad 0x00000028 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AF99BC second address: AF99E4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBB4EE8171h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edi 0x0000000a mov dword ptr [esp+04h], eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jc 00007FCBB4EE816Ch 0x00000016 jnp 00007FCBB4EE8166h 0x0000001c rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AFB994 second address: AFB99A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AFB99A second address: AFB99E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AFB99E second address: AFB9C4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jns 00007FCBB4F3EEA6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 jmp 00007FCBB4F3EEB6h 0x00000015 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AFFC09 second address: AFFC0D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AFFC0D second address: AFFC13 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AFFC13 second address: AFFC40 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [eax] 0x0000000a jg 00007FCBB4EE816Ah 0x00000010 mov dword ptr [esp+04h], eax 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007FCBB4EE8173h 0x0000001b rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AFFC40 second address: AFFC82 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBB4F3EEB2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop eax 0x0000000a movzx esi, cx 0x0000000d call 00007FCBB4F3EEA9h 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 pushad 0x00000016 popad 0x00000017 jmp 00007FCBB4F3EEB9h 0x0000001c popad 0x0000001d rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AFFC82 second address: AFFC88 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AFFC88 second address: AFFC8C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AFFC8C second address: AFFCCF instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007FCBB4EE816Dh 0x0000000e mov eax, dword ptr [esp+04h] 0x00000012 jbe 00007FCBB4EE816Eh 0x00000018 push esi 0x00000019 jl 00007FCBB4EE8166h 0x0000001f pop esi 0x00000020 mov eax, dword ptr [eax] 0x00000022 push eax 0x00000023 push edx 0x00000024 pushad 0x00000025 jmp 00007FCBB4EE816Fh 0x0000002a jg 00007FCBB4EE8166h 0x00000030 popad 0x00000031 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AFFE11 second address: AFFE19 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push esi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B000A7 second address: B000AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B001AB second address: B001AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B001AF second address: B001B5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B00891 second address: B00897 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B00897 second address: B0089C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B00982 second address: B00988 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B00988 second address: B0098D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B00E40 second address: B00E46 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B00E46 second address: B00E4A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B022AC second address: B022B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B0310C second address: B03110 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B03110 second address: B03116 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B03D46 second address: B03D67 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FCBB4EE8173h 0x00000008 pushad 0x00000009 popad 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B03D67 second address: B03D6B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B03D6B second address: B03D6F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B04789 second address: B047BC instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 pushad 0x00000008 jmp 00007FCBB4F3EEB8h 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FCBB4F3EEB1h 0x00000014 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B04575 second address: B0457F instructions: 0x00000000 rdtsc 0x00000002 jne 00007FCBB4EE8166h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B05294 second address: B0529F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007FCBB4F3EEA6h 0x0000000a popad 0x0000000b rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B06713 second address: B06717 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B07084 second address: B07088 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B0C995 second address: B0C999 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B0C999 second address: B0C99F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B0EFD4 second address: B0F04E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop esi 0x00000006 push eax 0x00000007 jmp 00007FCBB4EE8173h 0x0000000c nop 0x0000000d push 00000000h 0x0000000f push ebp 0x00000010 call 00007FCBB4EE8168h 0x00000015 pop ebp 0x00000016 mov dword ptr [esp+04h], ebp 0x0000001a add dword ptr [esp+04h], 00000017h 0x00000022 inc ebp 0x00000023 push ebp 0x00000024 ret 0x00000025 pop ebp 0x00000026 ret 0x00000027 movsx ebx, ax 0x0000002a push 00000000h 0x0000002c mov edi, dword ptr [ebp+122D2BC5h] 0x00000032 push 00000000h 0x00000034 push 00000000h 0x00000036 push esi 0x00000037 call 00007FCBB4EE8168h 0x0000003c pop esi 0x0000003d mov dword ptr [esp+04h], esi 0x00000041 add dword ptr [esp+04h], 0000001Dh 0x00000049 inc esi 0x0000004a push esi 0x0000004b ret 0x0000004c pop esi 0x0000004d ret 0x0000004e mov bx, 6F32h 0x00000052 push eax 0x00000053 push eax 0x00000054 jl 00007FCBB4EE816Ch 0x0000005a push eax 0x0000005b push edx 0x0000005c rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B111A9 second address: B111AE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B111AE second address: B111B4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B1026E second address: B1028D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop esi 0x00000008 push eax 0x00000009 pushad 0x0000000a push edi 0x0000000b jmp 00007FCBB4F3EEAFh 0x00000010 pop edi 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B1028D second address: B10320 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FCBB4EE8166h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b nop 0x0000000c mov bh, 3Dh 0x0000000e push dword ptr fs:[00000000h] 0x00000015 call 00007FCBB4EE8173h 0x0000001a mov edi, edx 0x0000001c pop ebx 0x0000001d mov dword ptr fs:[00000000h], esp 0x00000024 mov bl, 2Eh 0x00000026 mov eax, dword ptr [ebp+122D090Dh] 0x0000002c push 00000000h 0x0000002e push ecx 0x0000002f call 00007FCBB4EE8168h 0x00000034 pop ecx 0x00000035 mov dword ptr [esp+04h], ecx 0x00000039 add dword ptr [esp+04h], 0000001Ah 0x00000041 inc ecx 0x00000042 push ecx 0x00000043 ret 0x00000044 pop ecx 0x00000045 ret 0x00000046 push FFFFFFFFh 0x00000048 jc 00007FCBB4EE816Ch 0x0000004e mov ebx, dword ptr [ebp+122D3837h] 0x00000054 nop 0x00000055 jns 00007FCBB4EE817Bh 0x0000005b push eax 0x0000005c pushad 0x0000005d jnp 00007FCBB4EE8168h 0x00000063 pushad 0x00000064 push eax 0x00000065 push edx 0x00000066 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B144D4 second address: B144D8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B144D8 second address: B144EC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FCBB4EE816Ah 0x0000000f rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B144EC second address: B144F2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B144F2 second address: B144F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B144F6 second address: B144FA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B14716 second address: B14729 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBB4EE816Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B14729 second address: B14730 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B1658B second address: B1658F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B1658F second address: B16608 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 jmp 00007FCBB4F3EEB0h 0x0000000c pop ebx 0x0000000d popad 0x0000000e mov dword ptr [esp], eax 0x00000011 push 00000000h 0x00000013 push ebx 0x00000014 call 00007FCBB4F3EEA8h 0x00000019 pop ebx 0x0000001a mov dword ptr [esp+04h], ebx 0x0000001e add dword ptr [esp+04h], 00000017h 0x00000026 inc ebx 0x00000027 push ebx 0x00000028 ret 0x00000029 pop ebx 0x0000002a ret 0x0000002b pushad 0x0000002c sbb dh, 0000006Dh 0x0000002f sub dword ptr [ebp+122D369Fh], edi 0x00000035 popad 0x00000036 push 00000000h 0x00000038 mov di, B8DEh 0x0000003c push 00000000h 0x0000003e push 00000000h 0x00000040 push edx 0x00000041 call 00007FCBB4F3EEA8h 0x00000046 pop edx 0x00000047 mov dword ptr [esp+04h], edx 0x0000004b add dword ptr [esp+04h], 00000017h 0x00000053 inc edx 0x00000054 push edx 0x00000055 ret 0x00000056 pop edx 0x00000057 ret 0x00000058 mov ebx, dword ptr [ebp+122D2BE5h] 0x0000005e xchg eax, esi 0x0000005f push eax 0x00000060 push eax 0x00000061 push edx 0x00000062 pushad 0x00000063 popad 0x00000064 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B16608 second address: B1662D instructions: 0x00000000 rdtsc 0x00000002 je 00007FCBB4EE8166h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d pushad 0x0000000e jmp 00007FCBB4EE8175h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B1662D second address: B16636 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B16636 second address: B1663A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B158DD second address: B158E7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jl 00007FCBB4F3EEA6h 0x0000000a rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B158E7 second address: B158EB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B175AC second address: B175DF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBB4F3EEB4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jbe 00007FCBB4F3EEB4h 0x0000000f jmp 00007FCBB4F3EEAEh 0x00000014 popad 0x00000015 push eax 0x00000016 push eax 0x00000017 push edx 0x00000018 push ebx 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B175DF second address: B175E4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B16763 second address: B1676D instructions: 0x00000000 rdtsc 0x00000002 jno 00007FCBB4F3EEA6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B186B6 second address: B18703 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007FCBB4EE8166h 0x0000000a popad 0x0000000b push ebx 0x0000000c push edx 0x0000000d pop edx 0x0000000e pop ebx 0x0000000f popad 0x00000010 mov dword ptr [esp], eax 0x00000013 push 00000000h 0x00000015 push 00000000h 0x00000017 push edi 0x00000018 call 00007FCBB4EE8168h 0x0000001d pop edi 0x0000001e mov dword ptr [esp+04h], edi 0x00000022 add dword ptr [esp+04h], 0000001Ah 0x0000002a inc edi 0x0000002b push edi 0x0000002c ret 0x0000002d pop edi 0x0000002e ret 0x0000002f cld 0x00000030 push 00000000h 0x00000032 push esi 0x00000033 mov edi, dword ptr [ebp+12476AABh] 0x00000039 pop edi 0x0000003a mov dword ptr [ebp+122D373Ah], ebx 0x00000040 xchg eax, esi 0x00000041 push edi 0x00000042 push edx 0x00000043 push eax 0x00000044 push edx 0x00000045 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B1777A second address: B1778C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FCBB4F3EEAEh 0x00000009 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B19549 second address: B1954F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B18817 second address: B1881C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B1881C second address: B18821 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B18821 second address: B1882D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B1A51A second address: B1A55D instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b push edx 0x0000000c push ebx 0x0000000d ja 00007FCBB4EE8166h 0x00000013 pop ebx 0x00000014 pop edi 0x00000015 push 00000000h 0x00000017 mov di, 8A0Eh 0x0000001b call 00007FCBB4EE8172h 0x00000020 mov edi, dword ptr [ebp+122D29ADh] 0x00000026 pop ebx 0x00000027 push 00000000h 0x00000029 mov edi, dword ptr [ebp+122D29A1h] 0x0000002f stc 0x00000030 push eax 0x00000031 push eax 0x00000032 push edx 0x00000033 push ecx 0x00000034 push eax 0x00000035 push edx 0x00000036 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B1A55D second address: B1A562 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B1A562 second address: B1A56D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 je 00007FCBB4EE8166h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B197FC second address: B19806 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FCBB4F3EEA6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B1B75A second address: B1B760 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B1B760 second address: B1B765 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B1B803 second address: B1B809 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B2A33C second address: B2A34D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jno 00007FCBB4F3EEACh 0x0000000b rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B1C61C second address: B1C6D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jmp 00007FCBB4EE816Ch 0x0000000a popad 0x0000000b push eax 0x0000000c jmp 00007FCBB4EE8173h 0x00000011 nop 0x00000012 movzx ebx, di 0x00000015 push dword ptr fs:[00000000h] 0x0000001c push 00000000h 0x0000001e push ecx 0x0000001f call 00007FCBB4EE8168h 0x00000024 pop ecx 0x00000025 mov dword ptr [esp+04h], ecx 0x00000029 add dword ptr [esp+04h], 00000014h 0x00000031 inc ecx 0x00000032 push ecx 0x00000033 ret 0x00000034 pop ecx 0x00000035 ret 0x00000036 mov dword ptr fs:[00000000h], esp 0x0000003d xor edi, dword ptr [ebp+122D29C1h] 0x00000043 pushad 0x00000044 mov edi, dword ptr [ebp+122D372Eh] 0x0000004a add ax, 94B7h 0x0000004f popad 0x00000050 mov eax, dword ptr [ebp+122D07B5h] 0x00000056 or di, 84C1h 0x0000005b push FFFFFFFFh 0x0000005d and ebx, dword ptr [ebp+122D2945h] 0x00000063 call 00007FCBB4EE8174h 0x00000068 mov dword ptr [ebp+122D3077h], ebx 0x0000006e pop ebx 0x0000006f nop 0x00000070 jmp 00007FCBB4EE8175h 0x00000075 push eax 0x00000076 jc 00007FCBB4EE8174h 0x0000007c push eax 0x0000007d push edx 0x0000007e pushad 0x0000007f popad 0x00000080 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B29790 second address: B29794 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B29794 second address: B29798 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B29798 second address: B297CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edi 0x00000009 pushad 0x0000000a jnc 00007FCBB4F3EEAEh 0x00000010 push eax 0x00000011 push edx 0x00000012 jng 00007FCBB4F3EEA6h 0x00000018 jmp 00007FCBB4F3EEB4h 0x0000001d rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B297CC second address: B297D0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B29C18 second address: B29C24 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FCBB4F3EEAEh 0x00000008 push edi 0x00000009 pop edi 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B29D85 second address: B29D89 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B29EEB second address: B29F0C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jng 00007FCBB4F3EEA6h 0x0000000c jmp 00007FCBB4F3EEB5h 0x00000011 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B37141 second address: B37173 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FCBB4EE8172h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jmp 00007FCBB4EE8171h 0x00000010 pushad 0x00000011 ja 00007FCBB4EE8166h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B37173 second address: B37179 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B37179 second address: B37184 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B37184 second address: B3718A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B3718A second address: B37194 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FCBB4EE8166h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B35051 second address: B35069 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCBB4F3EEB3h 0x00000009 popad 0x0000000a rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B35069 second address: B3506E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B3506E second address: B35074 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B35233 second address: B35252 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCBB4EE8179h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B35694 second address: B35698 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B35994 second address: B3599C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B3599C second address: B359A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B35B40 second address: B35B73 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBB4EE8175h 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jp 00007FCBB4EE8172h 0x00000011 jp 00007FCBB4EE8166h 0x00000017 js 00007FCBB4EE8166h 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 popad 0x00000021 pushad 0x00000022 popad 0x00000023 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B35E14 second address: B35E18 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B35F76 second address: B35F7B instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B3685A second address: B36860 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B36860 second address: B3686F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jns 00007FCBB4EE816Ah 0x0000000b rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B3686F second address: B368A2 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FCBB4F3EEBFh 0x00000008 jmp 00007FCBB4F3EEB3h 0x0000000d je 00007FCBB4F3EEA6h 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007FCBB4F3EEB0h 0x0000001a rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B368A2 second address: B368A6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B34D89 second address: B34D91 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B34D91 second address: B34D99 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: ACC6C9 second address: ACC6CD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B3DD50 second address: B3DD56 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B3DD56 second address: B3DD5A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B3DD5A second address: B3DD73 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FCBB4EE8173h 0x0000000b rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B3DD73 second address: B3DD78 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B3DD78 second address: B3DD7E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B3DEBF second address: B3DECE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop eax 0x00000007 push eax 0x00000008 jo 00007FCBB4F3EEA6h 0x0000000e pop eax 0x0000000f rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: ABBF2E second address: ABBF33 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: ABBF33 second address: ABBF49 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jbe 00007FCBB4F3EEA6h 0x0000000b jns 00007FCBB4F3EEA6h 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: ABBF49 second address: ABBF4F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: ABBF4F second address: ABBF53 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B4F51B second address: B4F527 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FCBB4EE8166h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B4F527 second address: B4F52E instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B587C0 second address: B587DC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBB4EE8178h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AC0EFC second address: AC0F00 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AC0F00 second address: AC0F29 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pushad 0x00000008 pushad 0x00000009 jc 00007FCBB4EE8166h 0x0000000f jmp 00007FCBB4EE8171h 0x00000014 pushad 0x00000015 popad 0x00000016 push edi 0x00000017 pop edi 0x00000018 popad 0x00000019 push eax 0x0000001a push edx 0x0000001b push esi 0x0000001c pop esi 0x0000001d rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AC0F29 second address: AC0F44 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FCBB4F3EEA6h 0x00000008 jmp 00007FCBB4F3EEAEh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B5860D second address: B5863D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCBB4EE8174h 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FCBB4EE8174h 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B5863D second address: B58641 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B611C0 second address: B611C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B611C7 second address: B611DA instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007FCBB4F3EEAAh 0x0000000a pop edi 0x0000000b push ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B60D4A second address: B60D82 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jne 00007FCBB4EE8179h 0x0000000c js 00007FCBB4EE817Dh 0x00000012 jmp 00007FCBB4EE8171h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: ACFC09 second address: ACFC28 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBB4EE8173h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jne 00007FCBB4EE8166h 0x00000011 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: AC4488 second address: AC44A4 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FCBB4EE8172h 0x00000008 jmp 00007FCBB4EE816Ch 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push ecx 0x00000012 pushad 0x00000013 popad 0x00000014 pop ecx 0x00000015 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B74C3B second address: B74C45 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B74C45 second address: B74C96 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007FCBB4EE8166h 0x0000000a jmp 00007FCBB4EE8178h 0x0000000f popad 0x00000010 pushad 0x00000011 push esi 0x00000012 pop esi 0x00000013 push eax 0x00000014 pop eax 0x00000015 push esi 0x00000016 pop esi 0x00000017 jmp 00007FCBB4EE8173h 0x0000001c popad 0x0000001d popad 0x0000001e pushad 0x0000001f pushad 0x00000020 jl 00007FCBB4EE8166h 0x00000026 push edx 0x00000027 pop edx 0x00000028 jnp 00007FCBB4EE8166h 0x0000002e push eax 0x0000002f push edx 0x00000030 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B77085 second address: B77090 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jl 00007FCBB4F3EEA6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B7A3D4 second address: B7A3EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FCBB4EE816Ah 0x0000000a pop ebx 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f pop eax 0x00000010 jns 00007FCBB4EE8166h 0x00000016 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B7A3EF second address: B7A410 instructions: 0x00000000 rdtsc 0x00000002 js 00007FCBB4F3EEA6h 0x00000008 jmp 00007FCBB4F3EEB4h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B7A410 second address: B7A42E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007FCBB4EE8176h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B7A27C second address: B7A284 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B7A284 second address: B7A28A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B7A28A second address: B7A298 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCBB4F3EEAAh 0x00000009 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B7A298 second address: B7A29C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B7A29C second address: B7A2A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B29798 second address: B297CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edi 0x00000009 pushad 0x0000000a jnc 00007FCBB4EE816Eh 0x00000010 push eax 0x00000011 push edx 0x00000012 jng 00007FCBB4EE8166h 0x00000018 jmp 00007FCBB4EE8174h 0x0000001d rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B29C18 second address: B29C24 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FCBB4EE816Eh 0x00000008 push edi 0x00000009 pop edi 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B29EEB second address: B29F0C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jng 00007FCBB4EE8166h 0x0000000c jmp 00007FCBB4EE8175h 0x00000011 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B37141 second address: B37173 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FCBB4F3EEB2h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jmp 00007FCBB4F3EEB1h 0x00000010 pushad 0x00000011 ja 00007FCBB4F3EEA6h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B3718A second address: B37194 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FCBB4F3EEA6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B35051 second address: B35069 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCBB4EE8173h 0x00000009 popad 0x0000000a rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B35233 second address: B35252 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCBB4F3EEB9h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B35B40 second address: B35B73 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBB4F3EEB5h 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jp 00007FCBB4F3EEB2h 0x00000011 jp 00007FCBB4F3EEA6h 0x00000017 js 00007FCBB4F3EEA6h 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 popad 0x00000021 pushad 0x00000022 popad 0x00000023 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B36860 second address: B3686F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jns 00007FCBB4F3EEAAh 0x0000000b rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B3686F second address: B368A2 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FCBB4EE817Fh 0x00000008 jmp 00007FCBB4EE8173h 0x0000000d je 00007FCBB4EE8166h 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007FCBB4EE8170h 0x0000001a rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B3DD5A second address: B3DD73 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FCBB4F3EEB3h 0x0000000b rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B3DEBF second address: B3DECE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop eax 0x00000007 push eax 0x00000008 jo 00007FCBB4EE8166h 0x0000000e pop eax 0x0000000f rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: ABBF33 second address: ABBF49 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jbe 00007FCBB4EE8166h 0x0000000b jns 00007FCBB4EE8166h 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B8040E second address: B80425 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b jnp 00007FCBB4F3EEA6h 0x00000011 jp 00007FCBB4F3EEA6h 0x00000017 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B80425 second address: B80434 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBB4EE816Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B7FFD9 second address: B7FFDD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B7FFDD second address: B7FFE9 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B7FFE9 second address: B7FFED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B7FFED second address: B7FFF3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B7FFF3 second address: B7FFFF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jns 00007FCBB4F3EEA6h 0x0000000c rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B7FFFF second address: B80011 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jns 00007FCBB4EE8166h 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B80011 second address: B80027 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jl 00007FCBB4F3EEBEh 0x0000000e push eax 0x0000000f push edx 0x00000010 je 00007FCBB4F3EEA6h 0x00000016 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B80027 second address: B80032 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B80175 second address: B80199 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FCBB4F3EEB9h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B80199 second address: B801A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B801A2 second address: B801A8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: BA42E5 second address: BA42EB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: BA42EB second address: BA42FF instructions: 0x00000000 rdtsc 0x00000002 jp 00007FCBB4F3EEA6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jbe 00007FCBB4F3EEA6h 0x00000012 push edx 0x00000013 pop edx 0x00000014 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: BA42FF second address: BA4309 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FCBB4EE8166h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: BA4309 second address: BA432A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FCBB4F3EEAEh 0x00000008 jng 00007FCBB4F3EEA6h 0x0000000e push esi 0x0000000f pop esi 0x00000010 popad 0x00000011 pop edx 0x00000012 pop eax 0x00000013 push eax 0x00000014 push eax 0x00000015 push edx 0x00000016 push ecx 0x00000017 pop ecx 0x00000018 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: BA376A second address: BA3772 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: BA3772 second address: BA3776 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: BA4011 second address: BA401A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: BA401A second address: BA4029 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 jno 00007FCBB4F3EEA6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: BA4029 second address: BA403F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCBB4EE8170h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: BA403F second address: BA405B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FCBB4F3EEADh 0x0000000e jns 00007FCBB4F3EEA6h 0x00000014 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: BA6EE0 second address: BA6EEC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007FCBB4EE8166h 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: BA83E1 second address: BA8413 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007FCBB4F3EEA6h 0x0000000a jns 00007FCBB4F3EEA6h 0x00000010 popad 0x00000011 push esi 0x00000012 pushad 0x00000013 popad 0x00000014 push edi 0x00000015 pop edi 0x00000016 pop esi 0x00000017 push edi 0x00000018 jmp 00007FCBB4F3EEAEh 0x0000001d pop edi 0x0000001e popad 0x0000001f jo 00007FCBB4F3EEEBh 0x00000025 push eax 0x00000026 push edx 0x00000027 push eax 0x00000028 push edx 0x00000029 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: BA8413 second address: BA841D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007FCBB4EE8166h 0x0000000a rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B4F51B second address: B4F527 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FCBB4F3EEA6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: BAAF35 second address: BAAF61 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esi 0x00000009 jmp 00007FCBB4F3EEB6h 0x0000000e pushad 0x0000000f popad 0x00000010 pop esi 0x00000011 push eax 0x00000012 push edx 0x00000013 js 00007FCBB4F3EEA6h 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: BAAF61 second address: BAAF65 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: BAD7C5 second address: BAD7CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: BAD7CC second address: BAD7D2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: BAD7D2 second address: BAD7D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: BAD7D6 second address: BAD7F7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBB4EE8176h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: BAD8C9 second address: BAD8E1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBB4F3EEAEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: BADE8B second address: BADE91 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: BB106C second address: BB108F instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 jmp 00007FCBB4F3EEB3h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop edi 0x0000000c push ecx 0x0000000d push eax 0x0000000e push edx 0x0000000f jns 00007FCBB4F3EEA6h 0x00000015 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: ACFC09 second address: ACFC28 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBB4F3EEB3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jne 00007FCBB4F3EEA6h 0x00000011 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B8040E second address: B80425 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b jnp 00007FCBB4EE8166h 0x00000011 jp 00007FCBB4EE8166h 0x00000017 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B80425 second address: B80434 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBB4F3EEABh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B7FFF3 second address: B7FFFF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jns 00007FCBB4EE8166h 0x0000000c rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B7FFFF second address: B80011 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jns 00007FCBB4F3EEA6h 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B80011 second address: B80027 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jl 00007FCBB4EE817Eh 0x0000000e push eax 0x0000000f push edx 0x00000010 je 00007FCBB4EE8166h 0x00000016 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: B80175 second address: B80199 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FCBB4EE8179h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: BA42EB second address: BA42FF instructions: 0x00000000 rdtsc 0x00000002 jp 00007FCBB4EE8166h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jbe 00007FCBB4EE8166h 0x00000012 push edx 0x00000013 pop edx 0x00000014 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: BA42FF second address: BA4309 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FCBB4F3EEA6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: BA4309 second address: BA432A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FCBB4EE816Eh 0x00000008 jng 00007FCBB4EE8166h 0x0000000e push esi 0x0000000f pop esi 0x00000010 popad 0x00000011 pop edx 0x00000012 pop eax 0x00000013 push eax 0x00000014 push eax 0x00000015 push edx 0x00000016 push ecx 0x00000017 pop ecx 0x00000018 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: BA401A second address: BA4029 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 jno 00007FCBB4EE8166h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: BA4029 second address: BA403F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCBB4F3EEB0h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: BA403F second address: BA405B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FCBB4EE816Dh 0x0000000e jns 00007FCBB4EE8166h 0x00000014 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: BA6EE0 second address: BA6EEC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007FCBB4F3EEA6h 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: BA83E1 second address: BA8413 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007FCBB4EE8166h 0x0000000a jns 00007FCBB4EE8166h 0x00000010 popad 0x00000011 push esi 0x00000012 pushad 0x00000013 popad 0x00000014 push edi 0x00000015 pop edi 0x00000016 pop esi 0x00000017 push edi 0x00000018 jmp 00007FCBB4EE816Eh 0x0000001d pop edi 0x0000001e popad 0x0000001f jo 00007FCBB4EE81ABh 0x00000025 push eax 0x00000026 push edx 0x00000027 push eax 0x00000028 push edx 0x00000029 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: BA8413 second address: BA841D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007FCBB4F3EEA6h 0x0000000a rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: BAAF35 second address: BAAF61 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esi 0x00000009 jmp 00007FCBB4EE8176h 0x0000000e pushad 0x0000000f popad 0x00000010 pop esi 0x00000011 push eax 0x00000012 push edx 0x00000013 js 00007FCBB4EE8166h 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: BAD7D6 second address: BAD7F7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBB4F3EEB6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: BAD8C9 second address: BAD8E1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCBB4EE816Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRDTSC instruction interceptor: First address: BB106C second address: BB108F instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 jmp 00007FCBB4EE8173h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop edi 0x0000000c push ecx 0x0000000d push eax 0x0000000e push edx 0x0000000f jns 00007FCBB4EE8166h 0x00000015 rdtsc
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRDTSC instruction interceptor: First address: 59B108 second address: 59B10C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRDTSC instruction interceptor: First address: 59B10C second address: 59B112 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRDTSC instruction interceptor: First address: 714A85 second address: 714A89 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRDTSC instruction interceptor: First address: 714A89 second address: 714AA7 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FCBB4EE8166h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jmp 00007FCBB4EE816Bh 0x00000010 jns 00007FCBB4EE8166h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRDTSC instruction interceptor: First address: 714D4B second address: 714D60 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCBB4F3EEB0h 0x00000009 popad 0x0000000a rdtsc
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRDTSC instruction interceptor: First address: 714D60 second address: 714D7C instructions: 0x00000000 rdtsc 0x00000002 jl 00007FCBB4EE816Eh 0x00000008 pushad 0x00000009 popad 0x0000000a jp 00007FCBB4EE8166h 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push eax 0x00000013 push edx 0x00000014 push ebx 0x00000015 pushad 0x00000016 popad 0x00000017 pop ebx 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b popad 0x0000001c rdtsc
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRDTSC instruction interceptor: First address: 714D7C second address: 714D80 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRDTSC instruction interceptor: First address: 714D80 second address: 714D86 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRDTSC instruction interceptor: First address: 714D86 second address: 714DB4 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jmp 00007FCBB4F3EEB9h 0x00000008 pop ebx 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c jng 00007FCBB4F3EEA6h 0x00000012 jng 00007FCBB4F3EEA6h 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRDTSC instruction interceptor: First address: 714EE4 second address: 714EEE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007FCBB4EE8166h 0x0000000a rdtsc
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRDTSC instruction interceptor: First address: 714EEE second address: 714EFA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRDTSC instruction interceptor: First address: 714EFA second address: 714EFE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRDTSC instruction interceptor: First address: 714EFE second address: 714F0D instructions: 0x00000000 rdtsc 0x00000002 je 00007FCBB4F3EEA6h 0x00000008 push eax 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRDTSC instruction interceptor: First address: 714F0D second address: 714F13 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRDTSC instruction interceptor: First address: 7152FE second address: 715317 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCBB4F3EEB5h 0x00000009 rdtsc
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRDTSC instruction interceptor: First address: 6FF468 second address: 6FF470 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRDTSC instruction interceptor: First address: 7345CE second address: 7345D4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRDTSC instruction interceptor: First address: 7345D4 second address: 7345DA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRDTSC instruction interceptor: First address: 7345DA second address: 7345DE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRDTSC instruction interceptor: First address: 734715 second address: 734719 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRDTSC instruction interceptor: First address: 734719 second address: 73471F instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRDTSC instruction interceptor: First address: 73471F second address: 734725 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRDTSC instruction interceptor: First address: 7348ED second address: 734903 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 jmp 00007FCBB4F3EEAEh 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRDTSC instruction interceptor: First address: 734903 second address: 73490F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pushad 0x00000007 pushad 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRDTSC instruction interceptor: First address: 734BDB second address: 734BE5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007FCBB4F3EEA6h 0x0000000a rdtsc
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRDTSC instruction interceptor: First address: 734EEB second address: 734EFD instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jc 00007FCBB4EE8166h 0x00000009 pop ecx 0x0000000a jbe 00007FCBB4EE817Bh 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRDTSC instruction interceptor: First address: 73507C second address: 73509B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 jne 00007FCBB4F3EEA6h 0x0000000b popad 0x0000000c pushad 0x0000000d jmp 00007FCBB4F3EEB0h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRDTSC instruction interceptor: First address: 7355E2 second address: 7355ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 push esi 0x00000007 push edx 0x00000008 pop edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRDTSC instruction interceptor: First address: 735750 second address: 735757 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 rdtsc
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRDTSC instruction interceptor: First address: 735757 second address: 735770 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FCBB4EE8175h 0x00000009 rdtsc
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRDTSC instruction interceptor: First address: 735770 second address: 735774 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRDTSC instruction interceptor: First address: 72C419 second address: 72C42C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 jp 00007FCBB4EE8166h 0x0000000d jo 00007FCBB4EE8166h 0x00000013 rdtsc
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRDTSC instruction interceptor: First address: 72C42C second address: 72C430 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRDTSC instruction interceptor: First address: 7358C3 second address: 7358C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRDTSC instruction interceptor: First address: 7358C7 second address: 7358D5 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FCBB4F3EEA6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRDTSC instruction interceptor: First address: 7358D5 second address: 7358D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRDTSC instruction interceptor: First address: 739386 second address: 73938B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeSpecial instruction interceptor: First address: D5A897 instructions caused by: Self-modifying code
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeSpecial instruction interceptor: First address: EF949A instructions caused by: Self-modifying code
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeSpecial instruction interceptor: First address: EF9857 instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: 95A897 instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: AF949A instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: AF9857 instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: 59A897 instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: 73949A instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: 739857 instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeCode function: GetCursorPos,GetCursorPos,GetCursorPos,Sleep,Sleep,GetCursorPos,0_2_00C83320
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetCursorPos,GetCursorPos,GetCursorPos,Sleep,Sleep,GetCursorPos,6_2_00883320
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetCursorPos,GetCursorPos,GetCursorPos,Sleep,Sleep,GetCursorPos,7_2_00883320
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: GetCursorPos,GetCursorPos,GetCursorPos,Sleep,Sleep,GetCursorPos,8_2_004C3320
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: GetCursorPos,GetCursorPos,GetCursorPos,Sleep,Sleep,GetCursorPos,12_2_004C3320
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 936Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 524Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 958Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 595Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 1106Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 1178Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 1233Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_8-17288
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exe TID: 6252Thread sleep time: -56028s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exe TID: 5092Thread sleep count: 41 > 30Jump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exe TID: 5092Thread sleep time: -82041s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exe TID: 2852Thread sleep count: 300 > 30Jump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exe TID: 2852Thread sleep time: -30300s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exe TID: 3840Thread sleep count: 258 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7116Thread sleep count: 130 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7116Thread sleep time: -260130s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 2740Thread sleep count: 62 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 2740Thread sleep time: -124062s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 3640Thread sleep count: 936 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 3640Thread sleep time: -94536s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7156Thread sleep count: 524 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7156Thread sleep count: 196 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 612Thread sleep count: 55 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 612Thread sleep time: -110055s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 2704Thread sleep count: 55 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 2704Thread sleep time: -110055s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 3908Thread sleep count: 116 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 3908Thread sleep time: -232116s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 2120Thread sleep count: 958 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 2120Thread sleep time: -96758s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 1968Thread sleep count: 595 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 1968Thread sleep count: 263 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 6456Thread sleep time: -56028s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 4904Thread sleep count: 1106 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 4904Thread sleep time: -2213106s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 5280Thread sleep count: 45 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 5280Thread sleep count: 316 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 5280Thread sleep time: -31916s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 6472Thread sleep count: 270 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 1088Thread sleep time: -58029s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 736Thread sleep count: 1178 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 736Thread sleep time: -2357178s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 5828Thread sleep count: 1233 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 5828Thread sleep time: -2467233s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 2220Thread sleep count: 50 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 2220Thread sleep count: 307 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 2220Thread sleep time: -31007s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7204Thread sleep count: 257 > 30Jump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeLast function: Thread delayed
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeLast function: Thread delayed
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeLast function: Thread delayed
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeLast function: Thread delayed
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeLast function: Thread delayed
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeLast function: Thread delayed
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeLast function: Thread delayed
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeLast function: Thread delayed
            Source: RageMP131.exe, RageMP131.exe, 0000000C.00000002.3375602728.000000000071E000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__
            Source: LisectAVT_2403002B_242.exe, 00000000.00000002.3375441152.00000000004D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Nscsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}owsf
            Source: RageMP131.exe, 00000008.00000002.3376796312.00000000014B0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000K
            Source: RageMP131.exe, 0000000C.00000002.3376567599.0000000000D20000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: LisectAVT_2403002B_242.exe, 00000000.00000002.3375441152.00000000004DE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}A
            Source: LisectAVT_2403002B_242.exe, 00000000.00000002.3375441152.000000000050C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: !M#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: MPGPH131.exe, 00000006.00000002.3377080253.000000000153F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: LisectAVT_2403002B_242.exe, 00000000.00000002.3375441152.000000000050C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: N-c76a-4720-bcdb-53011b87bd06_{a33c7340-61ca-11ee-8c18-806e6f6e6963}_\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}_7B33DA32
            Source: RageMP131.exe, 00000008.00000002.3376796312.00000000014BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}!
            Source: LisectAVT_2403002B_242.exe, 00000000.00000002.3375441152.000000000051E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}3
            Source: MPGPH131.exe, 00000006.00000002.3376693028.00000000012FD000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}85S
            Source: RageMP131.exe, 0000000C.00000003.2362394351.0000000000D32000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: RageMP131.exe, 00000008.00000002.3376796312.00000000014FC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 9e146be9-c76a-4720-bcdb-53011b87bd06_{a33c7340-61ca-11ee-8c18-806e6f6e6963}_\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}_7B33DA32
            Source: LisectAVT_2403002B_242.exe, 00000000.00000003.2143235948.0000000000516000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}2
            Source: RageMP131.exe, 0000000C.00000002.3376567599.0000000000D20000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: MPGPH131.exe, 00000006.00000002.3377080253.00000000014FD000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3376838901.00000000013E0000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000002.3376796312.00000000014BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: MPGPH131.exe, 00000007.00000002.3376838901.00000000013CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}!g
            Source: MPGPH131.exe, 00000007.00000002.3376463341.00000000010FD000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}pe=
            Source: RageMP131.exe, 0000000C.00000002.3376567599.0000000000D20000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&
            Source: RageMP131.exe, 0000000C.00000003.2362394351.0000000000D34000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b})
            Source: MPGPH131.exe, 00000007.00000002.3376838901.00000000013CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}?`
            Source: RageMP131.exe, 00000008.00000002.3376796312.00000000014BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: MPGPH131.exe, 00000006.00000002.3377080253.000000000153F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: -c76a-4720-bcdb-53011b87bd06_{a33c7340-61ca-11ee-8c18-806e6f6e6963}_\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}_7B33DA323
            Source: RageMP131.exe, 00000008.00000002.3376796312.00000000014FE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}h
            Source: LisectAVT_2403002B_242.exe, 00000000.00000002.3375441152.000000000050C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: LisectAVT_2403002B_242.exe, 00000000.00000002.3375441152.000000000050C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll;
            Source: RageMP131.exe, 00000008.00000002.3376796312.00000000014FC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}F
            Source: LisectAVT_2403002B_242.exe, 00000000.00000002.3375441152.000000000050C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&M
            Source: MPGPH131.exe, 00000006.00000002.3377080253.000000000153F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}i]
            Source: MPGPH131.exe, 00000006.00000003.2165077681.0000000001537000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: k&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: RageMP131.exe, 0000000C.00000002.3376567599.0000000000D34000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: -c76a-4720-bcdb-53011b87bd06_{a33c7340-61ca-11ee-8c18-806e6f6e6963}_\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}_7B33DA32
            Source: LisectAVT_2403002B_242.exe, 00000000.00000002.3376159397.0000000000EDE000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3375661862.0000000000ADE000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3375585687.0000000000ADE000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3375547902.000000000071E000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000C.00000002.3375602728.000000000071E000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Restart now?\\.\Oreans.vxd%s\Oreans.vxdXprotEventHARDWARE\ACPI\DSDT\VBOX__SeShutdownPrivilegeSoftware\WinLicenseCreateEvent API Error while extraction the driverGetEnvironmentVariable API Error while extraction the driverOpenSCManager API Error while extraction the driverCreateService API Error while extraction the driverCloseServiceHandle API Error while extraction the driverOpenService API Error while extraction the driverStartService API Error while extraction the driverAPIC error: Cannot find Processors Control Blocks. Please,
            Source: RageMP131.exe, 0000000C.00000002.3376567599.0000000000CF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}M
            Source: MPGPH131.exe, 00000006.00000002.3377080253.000000000153F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeCode function: 0_2_00C39360 LoadLibraryA,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,0_2_00C39360
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeCode function: 0_2_00C83320 mov eax, dword ptr fs:[00000030h]0_2_00C83320
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeCode function: 0_2_00C83320 mov eax, dword ptr fs:[00000030h]0_2_00C83320
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeCode function: 0_2_00C33F10 mov eax, dword ptr fs:[00000030h]0_2_00C33F10
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00883320 mov eax, dword ptr fs:[00000030h]6_2_00883320
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00883320 mov eax, dword ptr fs:[00000030h]6_2_00883320
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00833F10 mov eax, dword ptr fs:[00000030h]6_2_00833F10
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_00883320 mov eax, dword ptr fs:[00000030h]7_2_00883320
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_00883320 mov eax, dword ptr fs:[00000030h]7_2_00883320
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_00833F10 mov eax, dword ptr fs:[00000030h]7_2_00833F10
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_004C3320 mov eax, dword ptr fs:[00000030h]8_2_004C3320
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_004C3320 mov eax, dword ptr fs:[00000030h]8_2_004C3320
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_00473F10 mov eax, dword ptr fs:[00000030h]8_2_00473F10
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_004C3320 mov eax, dword ptr fs:[00000030h]12_2_004C3320
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_004C3320 mov eax, dword ptr fs:[00000030h]12_2_004C3320
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_00473F10 mov eax, dword ptr fs:[00000030h]12_2_00473F10
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeCode function: 0_2_00CFDE2D GetSystemTimePreciseAsFileTime,GetSystemTimePreciseAsFileTime,0_2_00CFDE2D
            Source: C:\Users\user\Desktop\LisectAVT_2403002B_242.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000006.00000003.2153204111.0000000004E00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000003.2342969300.00000000046C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.3375310931.0000000000461000.00000040.00000001.01000000.00000005.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.2128160270.00000000043E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.3375376710.0000000000461000.00000040.00000001.01000000.00000005.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000003.2263129853.0000000004DC0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3375371093.0000000000821000.00000040.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000003.2154011051.0000000004BF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.3375363971.0000000000821000.00000040.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: LisectAVT_2403002B_242.exe PID: 4156, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 2020, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 500, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 1756, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 3220, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000006.00000003.2153204111.0000000004E00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000003.2342969300.00000000046C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.3375310931.0000000000461000.00000040.00000001.01000000.00000005.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.2128160270.00000000043E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.3375376710.0000000000461000.00000040.00000001.01000000.00000005.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000003.2263129853.0000000004DC0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3375371093.0000000000821000.00000040.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000003.2154011051.0000000004BF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.3375363971.0000000000821000.00000040.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: LisectAVT_2403002B_242.exe PID: 4156, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 2020, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 500, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 1756, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 3220, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
            Command and Scripting Interpreter
            1
            Scheduled Task/Job
            1
            Process Injection
            1
            Masquerading
            OS Credential Dumping1
            System Time Discovery
            Remote Services1
            Archive Collected Data
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts1
            Scheduled Task/Job
            1
            Registry Run Keys / Startup Folder
            1
            Scheduled Task/Job
            12
            Virtualization/Sandbox Evasion
            LSASS Memory421
            Security Software Discovery
            Remote Desktop ProtocolData from Removable Media1
            Non-Standard Port
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts11
            Native API
            1
            DLL Side-Loading
            1
            Registry Run Keys / Startup Folder
            1
            Process Injection
            Security Account Manager12
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared Drive1
            Ingress Tool Transfer
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
            DLL Side-Loading
            1
            Deobfuscate/Decode Files or Information
            NTDS1
            Application Window Discovery
            Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
            Obfuscated Files or Information
            LSA Secrets213
            System Information Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts12
            Software Packing
            Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            DLL Side-Loading
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 1481918 Sample: LisectAVT_2403002B_242.exe Startdate: 25/07/2024 Architecture: WINDOWS Score: 100 36 Antivirus / Scanner detection for submitted sample 2->36 38 Yara detected RisePro Stealer 2->38 40 Machine Learning detection for sample 2->40 42 3 other signatures 2->42 7 LisectAVT_2403002B_242.exe 1 9 2->7         started        12 RageMP131.exe 2 2->12         started        14 MPGPH131.exe 2 2->14         started        16 2 other processes 2->16 process3 dnsIp4 34 193.233.132.74, 49710, 49712, 49713 FREE-NET-ASFREEnetEU Russian Federation 7->34 26 C:\Users\user\AppData\Local\...\RageMP131.exe, PE32 7->26 dropped 28 C:\ProgramData\MPGPH131\MPGPH131.exe, PE32 7->28 dropped 30 C:\Users\...\RageMP131.exe:Zone.Identifier, ASCII 7->30 dropped 32 C:\...\MPGPH131.exe:Zone.Identifier, ASCII 7->32 dropped 44 Detected unpacking (changes PE section rights) 7->44 46 Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors) 7->46 48 Found API chain indicative of sandbox detection 7->48 50 Uses schtasks.exe or at.exe to add and modify task schedules 7->50 18 schtasks.exe 1 7->18         started        20 schtasks.exe 1 7->20         started        52 Antivirus detection for dropped file 12->52 54 Machine Learning detection for dropped file 12->54 56 Found stalling execution ending in API Sleep call 12->56 58 Tries to evade debugger and weak emulator (self modifying code) 14->58 60 Tries to detect virtualization through RDTSC time measurements 14->60 62 Tries to detect sandboxes / dynamic malware analysis system (registry check) 14->62 file5 signatures6 process7 process8 22 conhost.exe 18->22         started        24 conhost.exe 20->24         started       

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            LisectAVT_2403002B_242.exe100%AviraTR/Agent.kmrzu
            LisectAVT_2403002B_242.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\RageMP131\RageMP131.exe100%AviraTR/Agent.kmrzu
            C:\ProgramData\MPGPH131\MPGPH131.exe100%AviraTR/Agent.kmrzu
            C:\Users\user\AppData\Local\RageMP131\RageMP131.exe100%Joe Sandbox ML
            C:\ProgramData\MPGPH131\MPGPH131.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://www.winimage.com/zLibDll0%URL Reputationsafe
            https://ipinfo.io/0%URL Reputationsafe
            https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll0%Avira URL Cloudsafe
            https://t.me/RiseProSUPPORTO0%Avira URL Cloudsafe
            https://t.me/RiseProSUPPORT0%Avira URL Cloudsafe
            https://t.me/RiseProSUPPORT50%Avira URL Cloudsafe
            https://t.me/RiseProSUPPORT2F0%Avira URL Cloudsafe
            https://www.maxmind.com/en/locate-my-ip-address0%Avira URL Cloudsafe
            No contacted domains info
            NameSourceMaliciousAntivirus DetectionReputation
            https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dllLisectAVT_2403002B_242.exe, 00000000.00000003.2128160270.00000000043E0000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002B_242.exe, 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000003.2153204111.0000000004E00000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.3375371093.0000000000821000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3375363971.0000000000821000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000003.2154011051.0000000004BF0000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000002.3375310931.0000000000461000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 00000008.00000003.2263129853.0000000004DC0000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000003.2342969300.00000000046C0000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3375376710.0000000000461000.00000040.00000001.01000000.00000005.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.winimage.com/zLibDllLisectAVT_2403002B_242.exe, 00000000.00000003.2128160270.00000000043E0000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002B_242.exe, 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000003.2153204111.0000000004E00000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.3375371093.0000000000821000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3375363971.0000000000821000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000003.2154011051.0000000004BF0000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000002.3375310931.0000000000461000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 00000008.00000003.2263129853.0000000004DC0000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000003.2342969300.00000000046C0000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3375376710.0000000000461000.00000040.00000001.01000000.00000005.sdmpfalse
            • URL Reputation: safe
            unknown
            https://t.me/RiseProSUPPORT5MPGPH131.exe, 00000007.00000002.3376838901.00000000013BA000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://t.me/RiseProSUPPORTLisectAVT_2403002B_242.exe, 00000000.00000002.3375441152.00000000004DE000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.3377080253.00000000014FD000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3376838901.00000000013BA000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000002.3376796312.00000000014BE000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3376567599.0000000000CF8000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://ipinfo.io/RageMP131.exefalse
            • URL Reputation: safe
            unknown
            https://t.me/RiseProSUPPORTOMPGPH131.exe, 00000006.00000002.3377080253.00000000014FD000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://www.maxmind.com/en/locate-my-ip-addressRageMP131.exefalse
            • Avira URL Cloud: safe
            unknown
            https://t.me/RiseProSUPPORT2FRageMP131.exe, 0000000C.00000002.3376567599.0000000000CF8000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            193.233.132.74
            unknownRussian Federation
            2895FREE-NET-ASFREEnetEUtrue
            Joe Sandbox version:40.0.0 Tourmaline
            Analysis ID:1481918
            Start date and time:2024-07-25 16:07:11 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 6m 54s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:15
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:LisectAVT_2403002B_242.exe
            Detection:MAL
            Classification:mal100.troj.evad.winEXE@11/5@0/1
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:Failed
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
            • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            • VT rate limit hit for: LisectAVT_2403002B_242.exe
            TimeTypeDescription
            10:08:33API Interceptor2163432x Sleep call for process: LisectAVT_2403002B_242.exe modified
            10:08:35API Interceptor4564x Sleep call for process: MPGPH131.exe modified
            10:08:46API Interceptor1816670x Sleep call for process: RageMP131.exe modified
            16:08:04Task SchedulerRun new task: MPGPH131 HR path: C:\ProgramData\MPGPH131\MPGPH131.exe
            16:08:04Task SchedulerRun new task: MPGPH131 LG path: C:\ProgramData\MPGPH131\MPGPH131.exe
            16:08:07AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run RageMP131 C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
            16:08:15AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run RageMP131 C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            193.233.132.74LisectAVT_2403002A_224.exeGet hashmaliciousRisePro StealerBrowse
              80OrFCsz0u.exeGet hashmaliciousGCleaner, Glupteba, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                SecuriteInfo.com.Win64.Evo-gen.28136.30716.exeGet hashmaliciousGCleaner, Glupteba, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                  file.exeGet hashmaliciousRisePro StealerBrowse
                    vGDqFBB1Jz.exeGet hashmaliciousRisePro StealerBrowse
                      iKV7MCWDJF.exeGet hashmaliciousRisePro StealerBrowse
                        8TFD6H44Pz.exeGet hashmaliciousRisePro StealerBrowse
                          uRLTbkeYF7.exeGet hashmaliciousRisePro StealerBrowse
                            7mIgg1hm7Q.exeGet hashmaliciousRisePro StealerBrowse
                              mZHCe1PQGn.exeGet hashmaliciousRisePro StealerBrowse
                                No context
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                FREE-NET-ASFREEnetEULisectAVT_2403002B_433.exeGet hashmaliciousAmadeyBrowse
                                • 193.233.132.56
                                Lisect_AVT_24003_G1B_108.exeGet hashmaliciousRisePro StealerBrowse
                                • 193.233.132.62
                                Lisect_AVT_24003_G1A_89.exeGet hashmaliciousBdaejec, RisePro StealerBrowse
                                • 193.233.132.62
                                Lisect_AVT_24003_G1A_37.exeGet hashmaliciousBdaejec, RisePro StealerBrowse
                                • 193.233.132.62
                                LisectAVT_2403002A_262.exeGet hashmaliciousRisePro StealerBrowse
                                • 193.233.132.190
                                LisectAVT_2403002A_224.exeGet hashmaliciousRisePro StealerBrowse
                                • 193.233.132.74
                                hunta[1].exeGet hashmaliciousBdaejec, RisePro StealerBrowse
                                • 193.233.132.62
                                External Own 4.20.exeGet hashmaliciousPureLog Stealer, RedLine, zgRATBrowse
                                • 147.45.47.64
                                Aquantia_Setup 2.11.exeGet hashmaliciousPureLog Stealer, RedLine, zgRATBrowse
                                • 147.45.47.64
                                AdobeUpdaterV131.exeGet hashmaliciousBdaejec, RisePro StealerBrowse
                                • 193.233.132.62
                                No context
                                No context
                                Process:C:\Users\user\Desktop\LisectAVT_2403002B_242.exe
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):2045964
                                Entropy (8bit):7.945861814702523
                                Encrypted:false
                                SSDEEP:49152:Zy5er9fzkC23IfoWxBaVPNb33AVJ6rj3y7JRm1MyV8Wyx:Z4QuJWxBq1b3QXyj3y7JRmCi8Wy
                                MD5:814C7D754DE0A807785F32A643082D2B
                                SHA1:A3F7ABB4D5DC8BD5371F2E176B51E8C157B8F4BF
                                SHA-256:5E4F50A70DEEB3A29049C06B1B3A73ABB6DEF3DDD4BEA47DBCE78E4EAA941333
                                SHA-512:68AD7C541EAD4D551F586D70644B00F33C5FC14FF8EEB881C4DCEF5615BED7B5E196D1D7DD45AAE1945C87B26544F826DE90A2CC72BEF8CCDD4C283594F45486
                                Malicious:true
                                Antivirus:
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                Reputation:low
                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........k..............r......r.. ...r......"......."......."......."......r......r......r........................................~.............Rich............PE..L...eM.f...............'..............O...........@...........................P...........@.........................h.O.L...U`..i....0..X+...................a...................................................................................... . . ..........................@....rsrc...X+...0...,..................@....idata .....`......................@... .@&..p......................@...xdijjraj......9.....................@...xgxezfhn......O.....................@....taggant.0....O.."..................@...........................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\LisectAVT_2403002B_242.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):26
                                Entropy (8bit):3.95006375643621
                                Encrypted:false
                                SSDEEP:3:ggPYV:rPYV
                                MD5:187F488E27DB4AF347237FE461A079AD
                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                Malicious:true
                                Reputation:high, very likely benign file
                                Preview:[ZoneTransfer]....ZoneId=0
                                Process:C:\Users\user\Desktop\LisectAVT_2403002B_242.exe
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):2045964
                                Entropy (8bit):7.945861814702523
                                Encrypted:false
                                SSDEEP:49152:Zy5er9fzkC23IfoWxBaVPNb33AVJ6rj3y7JRm1MyV8Wyx:Z4QuJWxBq1b3QXyj3y7JRmCi8Wy
                                MD5:814C7D754DE0A807785F32A643082D2B
                                SHA1:A3F7ABB4D5DC8BD5371F2E176B51E8C157B8F4BF
                                SHA-256:5E4F50A70DEEB3A29049C06B1B3A73ABB6DEF3DDD4BEA47DBCE78E4EAA941333
                                SHA-512:68AD7C541EAD4D551F586D70644B00F33C5FC14FF8EEB881C4DCEF5615BED7B5E196D1D7DD45AAE1945C87B26544F826DE90A2CC72BEF8CCDD4C283594F45486
                                Malicious:true
                                Antivirus:
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                Reputation:low
                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........k..............r......r.. ...r......"......."......."......."......r......r......r........................................~.............Rich............PE..L...eM.f...............'..............O...........@...........................P...........@.........................h.O.L...U`..i....0..X+...................a...................................................................................... . . ..........................@....rsrc...X+...0...,..................@....idata .....`......................@... .@&..p......................@...xdijjraj......9.....................@...xgxezfhn......O.....................@....taggant.0....O.."..................@...........................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\LisectAVT_2403002B_242.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):26
                                Entropy (8bit):3.95006375643621
                                Encrypted:false
                                SSDEEP:3:ggPYV:rPYV
                                MD5:187F488E27DB4AF347237FE461A079AD
                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                Malicious:true
                                Reputation:high, very likely benign file
                                Preview:[ZoneTransfer]....ZoneId=0
                                Process:C:\Users\user\Desktop\LisectAVT_2403002B_242.exe
                                File Type:ASCII text, with no line terminators
                                Category:modified
                                Size (bytes):13
                                Entropy (8bit):2.8150724101159437
                                Encrypted:false
                                SSDEEP:3:LEWh:lh
                                MD5:E59F175A2F22F7631B47DF3CA82B8168
                                SHA1:62618282F47D86DA64841A2ADB979425F5038D2E
                                SHA-256:91FE24B5954D23C200A1226E15026B0F32776028E7DD77BCE235FDB8EAE646CA
                                SHA-512:1CC836677438977400337FDB02C51DC03C6FE7B87A675C5C3091795CB4AB47D61D6C8E35A0059CC2C0F05DE32C732D2C970E2302B7F8ACC630BBD9536FA830FD
                                Malicious:false
                                Reputation:low
                                Preview:1721922684710
                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Entropy (8bit):7.945861814702523
                                TrID:
                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                • Generic Win/DOS Executable (2004/3) 0.02%
                                • DOS Executable Generic (2002/1) 0.02%
                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                File name:LisectAVT_2403002B_242.exe
                                File size:2'045'964 bytes
                                MD5:814c7d754de0a807785f32a643082d2b
                                SHA1:a3f7abb4d5dc8bd5371f2e176b51e8c157b8f4bf
                                SHA256:5e4f50a70deeb3a29049c06b1b3a73abb6def3ddd4bea47dbce78e4eaa941333
                                SHA512:68ad7c541ead4d551f586d70644b00f33c5fc14ff8eeb881c4dcef5615bed7b5e196d1d7dd45aae1945c87b26544f826de90a2cc72bef8ccdd4c283594f45486
                                SSDEEP:49152:Zy5er9fzkC23IfoWxBaVPNb33AVJ6rj3y7JRm1MyV8Wyx:Z4QuJWxBq1b3QXyj3y7JRmCi8Wy
                                TLSH:039533365C6F9F41CFB69B3556BAA7953E69252205322CDD3BDF2C2B7A2F059E340080
                                File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........k...............r.......r.. ....r......"......."......."......."........r.......r.......r.....................................
                                Icon Hash:c769eccc64f6e2bb
                                Entrypoint:0x8fd000
                                Entrypoint Section:.taggant
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                Time Stamp:0x66004D65 [Sun Mar 24 15:57:25 2024 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:6
                                OS Version Minor:0
                                File Version Major:6
                                File Version Minor:0
                                Subsystem Version Major:6
                                Subsystem Version Minor:0
                                Import Hash:2eabe9054cad5152567f0699947a2c5b
                                Instruction
                                jmp 00007FCBB4DB5BCAh
                                movhps xmm3, qword ptr [edi]
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add cl, ch
                                add byte ptr [eax], ah
                                add byte ptr [eax], al
                                add byte ptr [0000000Ah], al
                                add byte ptr [eax], al
                                add byte ptr [eax], dh
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax+eax], ah
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                and dword ptr [eax], eax
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add eax, 0000000Ah
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax+eax*4], cl
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                adc byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                push es
                                or al, byte ptr [eax]
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x4fb9680x4cxdijjraj
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x1360550x69.idata
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x1330000x2b58.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x1361f80x8.idata
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                0x10000x1320000x8c800506ca0b10816e2fa9e18fe7ab9dc560aFalse0.9939268933496441data7.935474542943052IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .rsrc0x1330000x2b580x2c0017ffeb7a45359e49f443d781e4bac350False0.22487571022727273data3.9670364194177874IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .idata 0x1360000x10000x200ef317f3bcb8069b9baae720ff5459274False0.146484375data0.998472215956371IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                0x1370000x2640000x200be1ab0a0a03526afc4efdc5a401afad0unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                xdijjraj0x39b0000x1610000x160a00832d097713ce25e9dde996859f36503eFalse0.9947976670506913data7.953698825467194IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                xgxezfhn0x4fc0000x10000x400625f6302a2d33d5024ea4589aa2fa001False0.783203125data6.057110716044971IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .taggant0x4fd0000x30000x2200b331e3a0aa851fc9369f524969cbb587False0.06376378676470588DOS executable (COM)0.7027652358713922IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                RT_ICON0x1334180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216RussianRussia0.1892116182572614
                                RT_GROUP_ICON0x1359c00x14dataRussianRussia1.15
                                RT_VERSION0x1331300x2e4dataRussianRussia0.4689189189189189
                                RT_MANIFEST0x1359d80x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                                DLLImport
                                kernel32.dlllstrcpy
                                NameOrdinalAddress
                                Start10x466a40
                                Language of compilation systemCountry where language is spokenMap
                                RussianRussia
                                EnglishUnited States
                                TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                                2024-07-25T16:08:29.865110+0200TCP2046269ET MALWARE [ANY.RUN] RisePro TCP (Activity)4972158709192.168.2.6193.233.132.74
                                2024-07-25T16:08:10.131591+0200TCP2046269ET MALWARE [ANY.RUN] RisePro TCP (Activity)4971258709192.168.2.6193.233.132.74
                                2024-07-25T16:08:21.827803+0200TCP2046269ET MALWARE [ANY.RUN] RisePro TCP (Activity)4971558709192.168.2.6193.233.132.74
                                2024-07-25T16:08:10.225066+0200TCP2046269ET MALWARE [ANY.RUN] RisePro TCP (Activity)4971358709192.168.2.6193.233.132.74
                                2024-07-25T16:08:58.773939+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434972340.68.123.157192.168.2.6
                                2024-07-25T16:08:07.943795+0200TCP2046269ET MALWARE [ANY.RUN] RisePro TCP (Activity)4971058709192.168.2.6193.233.132.74
                                2024-07-25T16:08:21.030816+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434971640.68.123.157192.168.2.6
                                2024-07-25T16:08:04.974720+0200TCP2049060ET MALWARE RisePro TCP Heartbeat Packet4971058709192.168.2.6193.233.132.74
                                TimestampSource PortDest PortSource IPDest IP
                                Jul 25, 2024 16:08:04.946219921 CEST4971058709192.168.2.6193.233.132.74
                                Jul 25, 2024 16:08:04.951667070 CEST5870949710193.233.132.74192.168.2.6
                                Jul 25, 2024 16:08:04.951893091 CEST4971058709192.168.2.6193.233.132.74
                                Jul 25, 2024 16:08:04.974720001 CEST4971058709192.168.2.6193.233.132.74
                                Jul 25, 2024 16:08:04.979816914 CEST5870949710193.233.132.74192.168.2.6
                                Jul 25, 2024 16:08:07.131839991 CEST4971258709192.168.2.6193.233.132.74
                                Jul 25, 2024 16:08:07.136869907 CEST5870949712193.233.132.74192.168.2.6
                                Jul 25, 2024 16:08:07.136954069 CEST4971258709192.168.2.6193.233.132.74
                                Jul 25, 2024 16:08:07.156455994 CEST4971258709192.168.2.6193.233.132.74
                                Jul 25, 2024 16:08:07.161592960 CEST5870949712193.233.132.74192.168.2.6
                                Jul 25, 2024 16:08:07.207293034 CEST4971358709192.168.2.6193.233.132.74
                                Jul 25, 2024 16:08:07.212958097 CEST5870949713193.233.132.74192.168.2.6
                                Jul 25, 2024 16:08:07.213040113 CEST4971358709192.168.2.6193.233.132.74
                                Jul 25, 2024 16:08:07.230529070 CEST4971358709192.168.2.6193.233.132.74
                                Jul 25, 2024 16:08:07.235996962 CEST5870949713193.233.132.74192.168.2.6
                                Jul 25, 2024 16:08:07.943794966 CEST4971058709192.168.2.6193.233.132.74
                                Jul 25, 2024 16:08:07.949724913 CEST5870949710193.233.132.74192.168.2.6
                                Jul 25, 2024 16:08:10.131591082 CEST4971258709192.168.2.6193.233.132.74
                                Jul 25, 2024 16:08:10.145345926 CEST5870949712193.233.132.74192.168.2.6
                                Jul 25, 2024 16:08:10.225065947 CEST4971358709192.168.2.6193.233.132.74
                                Jul 25, 2024 16:08:10.232893944 CEST5870949713193.233.132.74192.168.2.6
                                Jul 25, 2024 16:08:18.800323009 CEST4971558709192.168.2.6193.233.132.74
                                Jul 25, 2024 16:08:18.805346966 CEST5870949715193.233.132.74192.168.2.6
                                Jul 25, 2024 16:08:18.805471897 CEST4971558709192.168.2.6193.233.132.74
                                Jul 25, 2024 16:08:18.833656073 CEST4971558709192.168.2.6193.233.132.74
                                Jul 25, 2024 16:08:18.838560104 CEST5870949715193.233.132.74192.168.2.6
                                Jul 25, 2024 16:08:21.827802896 CEST4971558709192.168.2.6193.233.132.74
                                Jul 25, 2024 16:08:21.834747076 CEST5870949715193.233.132.74192.168.2.6
                                Jul 25, 2024 16:08:26.383692026 CEST5870949710193.233.132.74192.168.2.6
                                Jul 25, 2024 16:08:26.387626886 CEST4971058709192.168.2.6193.233.132.74
                                Jul 25, 2024 16:08:26.861432076 CEST4972158709192.168.2.6193.233.132.74
                                Jul 25, 2024 16:08:26.866545916 CEST5870949721193.233.132.74192.168.2.6
                                Jul 25, 2024 16:08:26.866650105 CEST4972158709192.168.2.6193.233.132.74
                                Jul 25, 2024 16:08:26.888385057 CEST4972158709192.168.2.6193.233.132.74
                                Jul 25, 2024 16:08:26.896083117 CEST5870949721193.233.132.74192.168.2.6
                                Jul 25, 2024 16:08:28.533083916 CEST5870949712193.233.132.74192.168.2.6
                                Jul 25, 2024 16:08:28.533246994 CEST4971258709192.168.2.6193.233.132.74
                                Jul 25, 2024 16:08:28.595839024 CEST5870949713193.233.132.74192.168.2.6
                                Jul 25, 2024 16:08:28.595964909 CEST4971358709192.168.2.6193.233.132.74
                                Jul 25, 2024 16:08:29.865109921 CEST4972158709192.168.2.6193.233.132.74
                                Jul 25, 2024 16:08:29.870203972 CEST5870949721193.233.132.74192.168.2.6
                                Jul 25, 2024 16:08:40.271244049 CEST5870949715193.233.132.74192.168.2.6
                                Jul 25, 2024 16:08:40.271481037 CEST4971558709192.168.2.6193.233.132.74
                                Jul 25, 2024 16:08:48.248692989 CEST5870949721193.233.132.74192.168.2.6
                                Jul 25, 2024 16:08:48.248822927 CEST4972158709192.168.2.6193.233.132.74

                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:10:08:02
                                Start date:25/07/2024
                                Path:C:\Users\user\Desktop\LisectAVT_2403002B_242.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\LisectAVT_2403002B_242.exe"
                                Imagebase:0xc20000
                                File size:2'045'964 bytes
                                MD5 hash:814C7D754DE0A807785F32A643082D2B
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000000.00000003.2128160270.00000000043E0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                Reputation:low
                                Has exited:false

                                Target ID:2
                                Start time:10:08:04
                                Start date:25/07/2024
                                Path:C:\Windows\SysWOW64\schtasks.exe
                                Wow64 process (32bit):true
                                Commandline:schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
                                Imagebase:0xb40000
                                File size:187'904 bytes
                                MD5 hash:48C2FE20575769DE916F48EF0676A965
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:3
                                Start time:10:08:04
                                Start date:25/07/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff66e660000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:4
                                Start time:10:08:04
                                Start date:25/07/2024
                                Path:C:\Windows\SysWOW64\schtasks.exe
                                Wow64 process (32bit):true
                                Commandline:schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
                                Imagebase:0xb40000
                                File size:187'904 bytes
                                MD5 hash:48C2FE20575769DE916F48EF0676A965
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:5
                                Start time:10:08:04
                                Start date:25/07/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff66e660000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:6
                                Start time:10:08:04
                                Start date:25/07/2024
                                Path:C:\ProgramData\MPGPH131\MPGPH131.exe
                                Wow64 process (32bit):true
                                Commandline:C:\ProgramData\MPGPH131\MPGPH131.exe
                                Imagebase:0x820000
                                File size:2'045'964 bytes
                                MD5 hash:814C7D754DE0A807785F32A643082D2B
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000006.00000003.2153204111.0000000004E00000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000006.00000002.3375371093.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Author: Joe Security
                                Antivirus matches:
                                • Detection: 100%, Avira
                                • Detection: 100%, Joe Sandbox ML
                                Reputation:low
                                Has exited:false

                                Target ID:7
                                Start time:10:08:04
                                Start date:25/07/2024
                                Path:C:\ProgramData\MPGPH131\MPGPH131.exe
                                Wow64 process (32bit):true
                                Commandline:C:\ProgramData\MPGPH131\MPGPH131.exe
                                Imagebase:0x820000
                                File size:2'045'964 bytes
                                MD5 hash:814C7D754DE0A807785F32A643082D2B
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000007.00000003.2154011051.0000000004BF0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000007.00000002.3375363971.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Author: Joe Security
                                Reputation:low
                                Has exited:false

                                Target ID:8
                                Start time:10:08:15
                                Start date:25/07/2024
                                Path:C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
                                Imagebase:0x460000
                                File size:2'045'964 bytes
                                MD5 hash:814C7D754DE0A807785F32A643082D2B
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000008.00000002.3375310931.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000008.00000003.2263129853.0000000004DC0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                Antivirus matches:
                                • Detection: 100%, Avira
                                • Detection: 100%, Joe Sandbox ML
                                Reputation:low
                                Has exited:false

                                Target ID:12
                                Start time:10:08:23
                                Start date:25/07/2024
                                Path:C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
                                Imagebase:0x460000
                                File size:2'045'964 bytes
                                MD5 hash:814C7D754DE0A807785F32A643082D2B
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 0000000C.00000003.2342969300.00000000046C0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 0000000C.00000002.3375376710.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Author: Joe Security
                                Reputation:low
                                Has exited:false

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:3.2%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:2.3%
                                  Total number of Nodes:598
                                  Total number of Limit Nodes:60
                                  execution_graph 16409 c29d90 16440 cfde82 16409->16440 16411 c29dc6 16445 d03f30 16411->16445 16415 c29ede std::_Throw_Cpp_error 16418 c29eb3 16418->16415 16480 d03380 16418->16480 16421 d07d06 4 API calls 16422 c29e63 16421->16422 16427 c29e7c 16422->16427 16460 c8cd30 16422->16460 16471 d0c7af 16427->16471 16442 c22260 Concurrency::cancel_current_task ___std_exception_copy std::_Facet_Register 16440->16442 16441 cfdea1 16441->16411 16442->16441 16483 cff22a 16442->16483 16701 d03e6e 16445->16701 16447 c29e3d 16447->16418 16448 d07d06 16447->16448 16449 d07d19 ___std_exception_copy 16448->16449 16725 d07a5d 16449->16725 16451 d07d2e 16452 d030ac ___std_exception_copy RtlAllocateHeap 16451->16452 16453 c29e51 16452->16453 16454 d03abb 16453->16454 16455 d03ace ___std_exception_copy 16454->16455 16858 d033d1 16455->16858 16457 d03ada 16458 d030ac ___std_exception_copy RtlAllocateHeap 16457->16458 16459 c29e57 16458->16459 16459->16421 16461 c8cd81 16460->16461 16464 c8cd52 __fread_nolock 16460->16464 16462 c8ce87 16461->16462 16467 c8cd90 16461->16467 16920 c22300 16462->16920 16464->16427 16466 d03380 std::_Throw_Cpp_error RtlAllocateHeap 16468 c8ce91 16466->16468 16906 c22d70 16467->16906 16469 c8cdd7 __fread_nolock std::_Locinfo::_Locinfo_ctor 16469->16466 16470 c8ce3e __fread_nolock std::_Throw_Cpp_error std::_Locinfo::_Locinfo_ctor 16469->16470 16470->16427 16942 d0c7cc 16471->16942 16473 c29ead 16474 d077b8 16473->16474 16475 d077cb ___std_exception_copy 16474->16475 17066 d07693 16475->17066 16477 d077d7 16478 d030ac ___std_exception_copy RtlAllocateHeap 16477->16478 16479 d077e3 16478->16479 16479->16418 16481 d032bc ___std_exception_copy RtlAllocateHeap 16480->16481 16482 d0338f __Getctype 16481->16482 16484 cff237 ___std_exception_copy 16483->16484 16488 c222a3 16483->16488 16485 cff264 16484->16485 16484->16488 16489 d14039 16484->16489 16498 d0c3a6 16485->16498 16488->16411 16490 d14047 16489->16490 16491 d14055 16489->16491 16490->16491 16496 d1406d 16490->16496 16501 d0be0f 16491->16501 16493 d1405d 16504 d03370 16493->16504 16495 d14067 16495->16485 16496->16495 16497 d0be0f __dosmaperr RtlAllocateHeap 16496->16497 16497->16493 16499 d15733 ___std_exception_copy RtlAllocateHeap 16498->16499 16500 d0c3be 16499->16500 16500->16488 16507 d146ac 16501->16507 16612 d032bc 16504->16612 16508 d146b6 __dosmaperr 16507->16508 16516 d0be14 16508->16516 16518 d14d73 16508->16518 16510 d146f9 __dosmaperr 16511 d14701 __dosmaperr 16510->16511 16512 d14739 16510->16512 16522 d15733 16511->16522 16526 d14389 16512->16526 16516->16493 16517 d15733 ___std_exception_copy RtlAllocateHeap 16517->16516 16521 d14d80 __dosmaperr std::_Facet_Register 16518->16521 16519 d14dab RtlAllocateHeap 16520 d14dbe __dosmaperr 16519->16520 16519->16521 16520->16510 16521->16519 16521->16520 16523 d1573e __dosmaperr 16522->16523 16525 d15768 16522->16525 16524 d0be0f __dosmaperr RtlAllocateHeap 16523->16524 16523->16525 16524->16525 16525->16516 16527 d143f7 __dosmaperr 16526->16527 16530 d1432f 16527->16530 16529 d14420 16529->16517 16531 d1433b __fread_nolock std::_Lockit::_Lockit 16530->16531 16534 d14510 16531->16534 16533 d1435d __dosmaperr 16533->16529 16535 d1451f __Getctype 16534->16535 16537 d14546 __Getctype 16534->16537 16535->16537 16538 d1c864 16535->16538 16537->16533 16539 d1c8e4 16538->16539 16542 d1c87a 16538->16542 16540 d1c932 16539->16540 16543 d15733 ___std_exception_copy RtlAllocateHeap 16539->16543 16606 d1c9d5 16540->16606 16542->16539 16545 d1c8ad 16542->16545 16550 d15733 ___std_exception_copy RtlAllocateHeap 16542->16550 16544 d1c906 16543->16544 16546 d15733 ___std_exception_copy RtlAllocateHeap 16544->16546 16547 d1c8cf 16545->16547 16552 d15733 ___std_exception_copy RtlAllocateHeap 16545->16552 16548 d1c919 16546->16548 16549 d15733 ___std_exception_copy RtlAllocateHeap 16547->16549 16551 d15733 ___std_exception_copy RtlAllocateHeap 16548->16551 16553 d1c8d9 16549->16553 16555 d1c8a2 16550->16555 16557 d1c927 16551->16557 16558 d1c8c4 16552->16558 16559 d15733 ___std_exception_copy RtlAllocateHeap 16553->16559 16554 d1c9a0 16560 d15733 ___std_exception_copy RtlAllocateHeap 16554->16560 16566 d1bb68 16555->16566 16556 d1c940 16556->16554 16565 d15733 RtlAllocateHeap ___std_exception_copy 16556->16565 16562 d15733 ___std_exception_copy RtlAllocateHeap 16557->16562 16594 d1bfc7 16558->16594 16559->16539 16564 d1c9a6 16560->16564 16562->16540 16564->16537 16565->16556 16567 d1bb79 16566->16567 16593 d1bc62 16566->16593 16568 d1bb8a 16567->16568 16569 d15733 ___std_exception_copy RtlAllocateHeap 16567->16569 16570 d1bb9c 16568->16570 16571 d15733 ___std_exception_copy RtlAllocateHeap 16568->16571 16569->16568 16572 d1bbae 16570->16572 16573 d15733 ___std_exception_copy RtlAllocateHeap 16570->16573 16571->16570 16574 d15733 ___std_exception_copy RtlAllocateHeap 16572->16574 16575 d1bbc0 16572->16575 16573->16572 16574->16575 16576 d15733 ___std_exception_copy RtlAllocateHeap 16575->16576 16578 d1bbd2 16575->16578 16576->16578 16577 d1bbe4 16580 d1bbf6 16577->16580 16582 d15733 ___std_exception_copy RtlAllocateHeap 16577->16582 16578->16577 16579 d15733 ___std_exception_copy RtlAllocateHeap 16578->16579 16579->16577 16581 d1bc08 16580->16581 16583 d15733 ___std_exception_copy RtlAllocateHeap 16580->16583 16584 d1bc1a 16581->16584 16585 d15733 ___std_exception_copy RtlAllocateHeap 16581->16585 16582->16580 16583->16581 16586 d1bc2c 16584->16586 16587 d15733 ___std_exception_copy RtlAllocateHeap 16584->16587 16585->16584 16588 d1bc3e 16586->16588 16590 d15733 ___std_exception_copy RtlAllocateHeap 16586->16590 16587->16586 16589 d1bc50 16588->16589 16591 d15733 ___std_exception_copy RtlAllocateHeap 16588->16591 16592 d15733 ___std_exception_copy RtlAllocateHeap 16589->16592 16589->16593 16590->16588 16591->16589 16592->16593 16593->16545 16595 d1bfd4 16594->16595 16605 d1c02c 16594->16605 16596 d1bfe4 16595->16596 16597 d15733 ___std_exception_copy RtlAllocateHeap 16595->16597 16598 d1bff6 16596->16598 16599 d15733 ___std_exception_copy RtlAllocateHeap 16596->16599 16597->16596 16600 d1c008 16598->16600 16602 d15733 ___std_exception_copy RtlAllocateHeap 16598->16602 16599->16598 16601 d1c01a 16600->16601 16603 d15733 ___std_exception_copy RtlAllocateHeap 16600->16603 16604 d15733 ___std_exception_copy RtlAllocateHeap 16601->16604 16601->16605 16602->16600 16603->16601 16604->16605 16605->16547 16607 d1ca01 16606->16607 16608 d1c9e2 16606->16608 16607->16556 16608->16607 16609 d1c4ee __Getctype RtlAllocateHeap 16608->16609 16610 d1c9fb 16609->16610 16611 d15733 ___std_exception_copy RtlAllocateHeap 16610->16611 16611->16607 16613 d032ce ___std_exception_copy 16612->16613 16618 d032f3 16613->16618 16615 d032e6 16625 d030ac 16615->16625 16619 d03303 16618->16619 16620 d0330a ___std_exception_copy __Getctype 16618->16620 16631 d03111 16619->16631 16622 d03318 16620->16622 16623 d032bc ___std_exception_copy RtlAllocateHeap 16620->16623 16622->16615 16624 d0337c 16623->16624 16624->16615 16626 d030b8 16625->16626 16629 d030cf 16626->16629 16646 d03157 16626->16646 16628 d030e2 16628->16495 16629->16628 16630 d03157 ___std_exception_copy RtlAllocateHeap 16629->16630 16630->16628 16632 d03121 16631->16632 16635 d1475d 16632->16635 16636 d14770 __dosmaperr 16635->16636 16637 d14d73 __dosmaperr RtlAllocateHeap 16636->16637 16645 d03142 16636->16645 16638 d147a0 __dosmaperr 16637->16638 16639 d147dc 16638->16639 16640 d147a8 __dosmaperr 16638->16640 16642 d14389 __dosmaperr RtlAllocateHeap 16639->16642 16641 d15733 ___std_exception_copy RtlAllocateHeap 16640->16641 16641->16645 16643 d147e7 16642->16643 16644 d15733 ___std_exception_copy RtlAllocateHeap 16643->16644 16644->16645 16645->16620 16647 d03161 16646->16647 16648 d0316a 16646->16648 16649 d03111 ___std_exception_copy RtlAllocateHeap 16647->16649 16648->16629 16650 d03166 16649->16650 16650->16648 16653 d0e85a 16650->16653 16652 d03173 16654 d0e85f std::locale::_Setgloballocale 16653->16654 16655 d0e86a std::locale::_Setgloballocale 16654->16655 16659 d19d83 16654->16659 16680 d0ddf2 16655->16680 16658 d0e89d __Getctype std::locale::_Setgloballocale 16658->16652 16664 d19d8f __fread_nolock 16659->16664 16660 d146ac __dosmaperr RtlAllocateHeap 16666 d19dc0 std::locale::_Setgloballocale 16660->16666 16661 d19ddf 16663 d0be0f __dosmaperr RtlAllocateHeap 16661->16663 16662 d19dc9 16662->16655 16665 d19de4 16663->16665 16664->16660 16664->16661 16664->16666 16668 d19df1 std::_Lockit::_Lockit std::locale::_Setgloballocale 16664->16668 16667 d03370 ___std_exception_copy RtlAllocateHeap 16665->16667 16666->16661 16666->16662 16666->16668 16667->16662 16669 d19f61 std::_Lockit::~_Lockit 16668->16669 16670 d19e64 16668->16670 16674 d19e92 std::locale::_Setgloballocale 16668->16674 16671 d0ddf2 std::locale::_Setgloballocale RtlAllocateHeap 16669->16671 16670->16674 16683 d1455b 16670->16683 16673 d19f74 16671->16673 16674->16662 16675 d19ee7 16674->16675 16677 d1455b __Getctype RtlAllocateHeap 16674->16677 16675->16662 16679 d1455b __Getctype RtlAllocateHeap 16675->16679 16677->16675 16678 d1455b __Getctype RtlAllocateHeap 16678->16674 16679->16662 16697 d0dc62 16680->16697 16682 d0de03 16682->16658 16684 d14565 __dosmaperr 16683->16684 16685 d14d73 __dosmaperr RtlAllocateHeap 16684->16685 16686 d1457b 16684->16686 16688 d145a8 __dosmaperr 16685->16688 16687 d1460b 16686->16687 16689 d0e85a __Getctype RtlAllocateHeap 16686->16689 16687->16678 16690 d145e8 16688->16690 16692 d145b0 __dosmaperr 16688->16692 16691 d14615 16689->16691 16694 d14389 __dosmaperr RtlAllocateHeap 16690->16694 16693 d15733 ___std_exception_copy RtlAllocateHeap 16692->16693 16693->16686 16695 d145f3 16694->16695 16696 d15733 ___std_exception_copy RtlAllocateHeap 16695->16696 16696->16686 16699 d0dc8f std::locale::_Setgloballocale 16697->16699 16698 d0daf3 std::locale::_Setgloballocale RtlAllocateHeap 16700 d0dcd8 std::locale::_Setgloballocale 16698->16700 16699->16698 16700->16682 16704 d03e7a __fread_nolock 16701->16704 16702 d03e81 16703 d0be0f __dosmaperr RtlAllocateHeap 16702->16703 16706 d03e86 16703->16706 16704->16702 16705 d03ea1 16704->16705 16707 d03eb3 16705->16707 16708 d03ea6 16705->16708 16709 d03370 ___std_exception_copy RtlAllocateHeap 16706->16709 16715 d15008 16707->16715 16710 d0be0f __dosmaperr RtlAllocateHeap 16708->16710 16714 d03e91 16709->16714 16710->16714 16712 d03ebc 16713 d0be0f __dosmaperr RtlAllocateHeap 16712->16713 16712->16714 16713->16714 16714->16447 16716 d15014 __fread_nolock std::_Lockit::_Lockit 16715->16716 16719 d150ac 16716->16719 16718 d1502f 16718->16712 16724 d150cf __fread_nolock 16719->16724 16720 d14d73 __dosmaperr RtlAllocateHeap 16721 d15130 16720->16721 16722 d15733 ___std_exception_copy RtlAllocateHeap 16721->16722 16723 d15115 __fread_nolock std::locale::_Setgloballocale 16722->16723 16723->16718 16724->16720 16724->16723 16727 d07a69 __fread_nolock 16725->16727 16726 d07a6f 16728 d032f3 ___std_exception_copy RtlAllocateHeap 16726->16728 16727->16726 16729 d07ab2 __fread_nolock 16727->16729 16731 d07a8a 16728->16731 16732 d07be0 16729->16732 16731->16451 16733 d07bf3 16732->16733 16734 d07c06 16732->16734 16733->16731 16741 d07b07 16734->16741 16736 d07c29 16740 d07cb7 16736->16740 16745 d041a1 16736->16745 16740->16731 16742 d07b18 16741->16742 16743 d07b70 16741->16743 16742->16743 16754 d0cd0d 16742->16754 16743->16736 16746 d041e1 16745->16746 16747 d041ba 16745->16747 16751 d0cd4d 16746->16751 16747->16746 16781 d14902 16747->16781 16749 d041d6 16788 d13d0c 16749->16788 16752 d0cc2c __fread_nolock 2 API calls 16751->16752 16753 d0cd66 16752->16753 16753->16740 16755 d0cd21 ___std_exception_copy 16754->16755 16760 d0cc2c 16755->16760 16757 d0cd36 16758 d030ac ___std_exception_copy RtlAllocateHeap 16757->16758 16759 d0cd45 16758->16759 16759->16743 16765 d1905e 16760->16765 16762 d0cc3e 16763 d0cc5a SetFilePointerEx 16762->16763 16764 d0cc46 __fread_nolock 16762->16764 16763->16764 16764->16757 16766 d1906b 16765->16766 16768 d19080 16765->16768 16778 d0bdfc 16766->16778 16770 d0bdfc __dosmaperr RtlAllocateHeap 16768->16770 16772 d190a5 16768->16772 16773 d190b0 16770->16773 16771 d0be0f __dosmaperr RtlAllocateHeap 16774 d19078 16771->16774 16772->16762 16775 d0be0f __dosmaperr RtlAllocateHeap 16773->16775 16774->16762 16776 d190b8 16775->16776 16777 d03370 ___std_exception_copy RtlAllocateHeap 16776->16777 16777->16774 16779 d146ac __dosmaperr RtlAllocateHeap 16778->16779 16780 d0be01 16779->16780 16780->16771 16782 d14923 16781->16782 16783 d1490e 16781->16783 16782->16749 16784 d0be0f __dosmaperr RtlAllocateHeap 16783->16784 16785 d14913 16784->16785 16786 d03370 ___std_exception_copy RtlAllocateHeap 16785->16786 16787 d1491e 16786->16787 16787->16749 16789 d13d18 __fread_nolock 16788->16789 16790 d13d59 16789->16790 16792 d13d9f 16789->16792 16794 d13d20 16789->16794 16791 d032f3 ___std_exception_copy RtlAllocateHeap 16790->16791 16791->16794 16792->16794 16795 d13e1d 16792->16795 16794->16746 16796 d13e45 16795->16796 16808 d13e68 __fread_nolock 16795->16808 16797 d13e49 16796->16797 16799 d13ea4 16796->16799 16798 d032f3 ___std_exception_copy RtlAllocateHeap 16797->16798 16798->16808 16800 d13ec2 16799->16800 16802 d0cd4d 2 API calls 16799->16802 16809 d13962 16800->16809 16802->16800 16804 d13f21 16806 d13f8a WriteFile 16804->16806 16804->16808 16805 d13eda 16805->16808 16814 d13533 16805->16814 16806->16808 16808->16794 16820 d1e301 16809->16820 16811 d13974 16813 d139a2 16811->16813 16829 d088e0 16811->16829 16813->16804 16813->16805 16815 d1359c 16814->16815 16816 d088e0 std::_Locinfo::_Locinfo_ctor 2 API calls 16815->16816 16818 d135ac std::_Locinfo::_Locinfo_ctor 16815->16818 16816->16818 16817 d13862 _ValidateLocalCookies 16817->16808 16818->16817 16819 d16e3e RtlAllocateHeap RtlAllocateHeap 16818->16819 16819->16818 16821 d1e31b 16820->16821 16822 d1e30e 16820->16822 16824 d1e327 16821->16824 16825 d0be0f __dosmaperr RtlAllocateHeap 16821->16825 16823 d0be0f __dosmaperr RtlAllocateHeap 16822->16823 16826 d1e313 16823->16826 16824->16811 16827 d1e348 16825->16827 16826->16811 16828 d03370 ___std_exception_copy RtlAllocateHeap 16827->16828 16828->16826 16830 d03157 ___std_exception_copy RtlAllocateHeap 16829->16830 16831 d088f0 16830->16831 16836 d14873 16831->16836 16837 d0890d 16836->16837 16838 d1488a 16836->16838 16840 d148d1 16837->16840 16838->16837 16844 d1cab0 16838->16844 16841 d148e8 16840->16841 16842 d0891a 16840->16842 16841->16842 16853 d1addb 16841->16853 16842->16813 16845 d1cabc __fread_nolock 16844->16845 16846 d1455b __Getctype RtlAllocateHeap 16845->16846 16848 d1cac5 std::_Lockit::_Lockit 16846->16848 16847 d1cb0b 16847->16837 16848->16847 16849 d1cb31 __Getctype RtlAllocateHeap 16848->16849 16850 d1caf4 __Getctype 16849->16850 16850->16847 16851 d0e85a __Getctype RtlAllocateHeap 16850->16851 16852 d1cb30 16851->16852 16854 d1455b __Getctype RtlAllocateHeap 16853->16854 16855 d1ade0 16854->16855 16856 d1acf3 std::_Throw_Cpp_error RtlAllocateHeap RtlAllocateHeap 16855->16856 16857 d1adeb 16856->16857 16857->16842 16859 d033dd __fread_nolock 16858->16859 16860 d033e4 16859->16860 16861 d03405 __fread_nolock 16859->16861 16862 d032f3 ___std_exception_copy RtlAllocateHeap 16860->16862 16865 d034e0 16861->16865 16864 d033fd 16862->16864 16864->16457 16868 d03512 16865->16868 16867 d034f2 16867->16864 16869 d03521 16868->16869 16870 d03549 16868->16870 16871 d032f3 ___std_exception_copy RtlAllocateHeap 16869->16871 16872 d14902 __fread_nolock RtlAllocateHeap 16870->16872 16879 d0353c __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 16871->16879 16873 d03552 16872->16873 16881 d0ccef 16873->16881 16876 d035fc 16884 d0387e 16876->16884 16878 d03613 16878->16879 16892 d036b3 16878->16892 16879->16867 16899 d0cb07 16881->16899 16883 d03570 16883->16876 16883->16878 16883->16879 16885 d0388d 16884->16885 16886 d14902 __fread_nolock RtlAllocateHeap 16885->16886 16887 d038a9 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 16886->16887 16888 d0ccef 2 API calls 16887->16888 16891 d038b5 _ValidateLocalCookies 16887->16891 16889 d03909 16888->16889 16890 d0ccef 2 API calls 16889->16890 16889->16891 16890->16891 16891->16879 16893 d14902 __fread_nolock RtlAllocateHeap 16892->16893 16894 d036c6 16893->16894 16895 d0ccef 2 API calls 16894->16895 16898 d03710 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 16894->16898 16896 d0376d 16895->16896 16897 d0ccef 2 API calls 16896->16897 16896->16898 16897->16898 16898->16879 16900 d0cb13 __fread_nolock 16899->16900 16901 d0cb56 16900->16901 16903 d0cb9c 16900->16903 16905 d0cb1b 16900->16905 16902 d032f3 ___std_exception_copy RtlAllocateHeap 16901->16902 16902->16905 16904 d0cc2c __fread_nolock 2 API calls 16903->16904 16903->16905 16904->16905 16905->16883 16907 c22d82 16906->16907 16910 c22da6 16906->16910 16908 c22d89 16907->16908 16909 c22dbf 16907->16909 16912 cfde82 std::_Facet_Register RtlAllocateHeap 16908->16912 16929 c22260 16909->16929 16911 c22db8 16910->16911 16913 cfde82 std::_Facet_Register RtlAllocateHeap 16910->16913 16911->16469 16915 c22d8f 16912->16915 16916 c22db0 16913->16916 16917 d03380 std::_Throw_Cpp_error RtlAllocateHeap 16915->16917 16918 c22d98 16915->16918 16916->16469 16919 c22dc9 16917->16919 16918->16469 16933 cfc4f9 16920->16933 16930 c2226e Concurrency::cancel_current_task 16929->16930 16931 cff22a ___std_exception_copy RtlAllocateHeap 16930->16931 16932 c222a3 16931->16932 16932->16915 16936 cfc2bf 16933->16936 16935 cfc50a Concurrency::cancel_current_task 16939 c22fa0 16936->16939 16940 cff22a ___std_exception_copy RtlAllocateHeap 16939->16940 16941 c22fcd 16940->16941 16941->16935 16944 d0c7d8 __fread_nolock 16942->16944 16943 d0c810 __fread_nolock 16943->16473 16944->16943 16946 d0c822 __fread_nolock 16944->16946 16947 d0c7eb __fread_nolock 16944->16947 16945 d0be0f __dosmaperr RtlAllocateHeap 16948 d0c805 16945->16948 16951 d0c5d6 16946->16951 16947->16945 16950 d03370 ___std_exception_copy RtlAllocateHeap 16948->16950 16950->16943 16954 d0c5e8 __fread_nolock 16951->16954 16957 d0c605 16951->16957 16952 d0c5f5 16953 d0be0f __dosmaperr RtlAllocateHeap 16952->16953 16955 d0c5fa 16953->16955 16954->16952 16954->16957 16959 d0c646 __fread_nolock 16954->16959 16956 d03370 ___std_exception_copy RtlAllocateHeap 16955->16956 16956->16957 16957->16943 16958 d0c771 __fread_nolock 16962 d0be0f __dosmaperr RtlAllocateHeap 16958->16962 16959->16957 16959->16958 16961 d14902 __fread_nolock RtlAllocateHeap 16959->16961 16964 d12fa4 16959->16964 17023 d075fb 16959->17023 16961->16959 16962->16955 16965 d12fb6 16964->16965 16966 d12fce 16964->16966 16967 d0bdfc __dosmaperr RtlAllocateHeap 16965->16967 16968 d13310 16966->16968 16972 d13011 16966->16972 16969 d12fbb 16967->16969 16970 d0bdfc __dosmaperr RtlAllocateHeap 16968->16970 16971 d0be0f __dosmaperr RtlAllocateHeap 16969->16971 16973 d13315 16970->16973 16974 d12fc3 16971->16974 16972->16974 16975 d1301c 16972->16975 16981 d1304c 16972->16981 16976 d0be0f __dosmaperr RtlAllocateHeap 16973->16976 16974->16959 16977 d0bdfc __dosmaperr RtlAllocateHeap 16975->16977 16978 d13029 16976->16978 16979 d13021 16977->16979 16980 d03370 ___std_exception_copy RtlAllocateHeap 16978->16980 16982 d0be0f __dosmaperr RtlAllocateHeap 16979->16982 16980->16974 16983 d13065 16981->16983 16984 d130a0 16981->16984 16985 d13072 16981->16985 16982->16978 16983->16985 17012 d1308e 16983->17012 17037 d157ad 16984->17037 16986 d0bdfc __dosmaperr RtlAllocateHeap 16985->16986 16988 d13077 16986->16988 16990 d0be0f __dosmaperr RtlAllocateHeap 16988->16990 16993 d1307e 16990->16993 16991 d1e301 __fread_nolock RtlAllocateHeap 17003 d131ec 16991->17003 16992 d15733 ___std_exception_copy RtlAllocateHeap 16994 d130ba 16992->16994 16995 d03370 ___std_exception_copy RtlAllocateHeap 16993->16995 16997 d15733 ___std_exception_copy RtlAllocateHeap 16994->16997 17022 d13089 __fread_nolock 16995->17022 16996 d13264 ReadFile 16998 d132d8 16996->16998 16999 d1327c 16996->16999 17000 d130c1 16997->17000 17008 d132e5 16998->17008 17009 d13236 16998->17009 16999->16998 17010 d13255 16999->17010 17001 d130e6 17000->17001 17002 d130cb 17000->17002 17006 d0cd0d __fread_nolock 2 API calls 17001->17006 17004 d0be0f __dosmaperr RtlAllocateHeap 17002->17004 17003->16996 17007 d1321c 17003->17007 17011 d130d0 17004->17011 17005 d15733 ___std_exception_copy RtlAllocateHeap 17005->16974 17006->17012 17007->17009 17007->17010 17013 d0be0f __dosmaperr RtlAllocateHeap 17008->17013 17009->17022 17043 d0bdb5 17009->17043 17014 d132a1 17010->17014 17015 d132b8 17010->17015 17010->17022 17016 d0bdfc __dosmaperr RtlAllocateHeap 17011->17016 17012->16991 17017 d132ea 17013->17017 17048 d12cb6 17014->17048 17015->17022 17058 d12afc 17015->17058 17016->17022 17020 d0bdfc __dosmaperr RtlAllocateHeap 17017->17020 17020->17022 17022->17005 17024 d0760c 17023->17024 17032 d07608 std::_Locinfo::_Locinfo_ctor 17023->17032 17025 d07613 17024->17025 17028 d07626 __fread_nolock 17024->17028 17026 d0be0f __dosmaperr RtlAllocateHeap 17025->17026 17027 d07618 17026->17027 17029 d03370 ___std_exception_copy RtlAllocateHeap 17027->17029 17030 d07654 17028->17030 17031 d0765d 17028->17031 17028->17032 17029->17032 17033 d0be0f __dosmaperr RtlAllocateHeap 17030->17033 17031->17032 17035 d0be0f __dosmaperr RtlAllocateHeap 17031->17035 17032->16959 17034 d07659 17033->17034 17036 d03370 ___std_exception_copy RtlAllocateHeap 17034->17036 17035->17034 17036->17032 17038 d157eb 17037->17038 17042 d157bb __dosmaperr std::_Facet_Register 17037->17042 17039 d0be0f __dosmaperr RtlAllocateHeap 17038->17039 17041 d130b1 17039->17041 17040 d157d6 RtlAllocateHeap 17040->17041 17040->17042 17041->16992 17042->17038 17042->17040 17044 d0bdfc __dosmaperr RtlAllocateHeap 17043->17044 17045 d0bdc0 __dosmaperr 17044->17045 17046 d0be0f __dosmaperr RtlAllocateHeap 17045->17046 17047 d0bdd3 17046->17047 17047->17022 17062 d129af 17048->17062 17051 d12d12 __fread_nolock 17054 d12cfe 17051->17054 17057 d0bdb5 __dosmaperr RtlAllocateHeap 17051->17057 17052 d12d58 17052->17051 17056 d0cd0d __fread_nolock 2 API calls 17052->17056 17053 d12d48 17055 d0be0f __dosmaperr RtlAllocateHeap 17053->17055 17054->17022 17055->17054 17056->17051 17057->17054 17060 d12b36 17058->17060 17059 d12bc7 17059->17022 17060->17059 17061 d0cd0d __fread_nolock 2 API calls 17060->17061 17061->17059 17063 d129e3 17062->17063 17064 d12a4f 17063->17064 17065 d0cd0d __fread_nolock 2 API calls 17063->17065 17064->17051 17064->17052 17064->17053 17064->17054 17065->17064 17067 d0769f __fread_nolock 17066->17067 17068 d076a9 17067->17068 17070 d076cc __fread_nolock 17067->17070 17069 d032f3 ___std_exception_copy RtlAllocateHeap 17068->17069 17072 d076c4 17069->17072 17070->17072 17073 d0772a 17070->17073 17072->16477 17074 d07737 17073->17074 17075 d0775a 17073->17075 17076 d032f3 ___std_exception_copy RtlAllocateHeap 17074->17076 17077 d07752 17075->17077 17078 d041a1 4 API calls 17075->17078 17076->17077 17077->17072 17079 d07772 17078->17079 17087 d1576d 17079->17087 17082 d14902 __fread_nolock RtlAllocateHeap 17083 d07786 17082->17083 17091 d133c0 17083->17091 17086 d15733 ___std_exception_copy RtlAllocateHeap 17086->17077 17088 d15784 17087->17088 17089 d0777a 17087->17089 17088->17089 17090 d15733 ___std_exception_copy RtlAllocateHeap 17088->17090 17089->17082 17090->17089 17092 d133e9 17091->17092 17097 d0778d 17091->17097 17093 d13438 17092->17093 17095 d13410 17092->17095 17094 d032f3 ___std_exception_copy RtlAllocateHeap 17093->17094 17094->17097 17098 d1332f 17095->17098 17097->17077 17097->17086 17099 d1333b __fread_nolock 17098->17099 17101 d1337a 17099->17101 17102 d13493 17099->17102 17101->17097 17103 d1905e __fread_nolock RtlAllocateHeap 17102->17103 17105 d134a3 17103->17105 17106 d1905e __fread_nolock RtlAllocateHeap 17105->17106 17112 d134a9 17105->17112 17113 d134db 17105->17113 17108 d134d2 17106->17108 17107 d1905e __fread_nolock RtlAllocateHeap 17109 d134e7 FindCloseChangeNotification 17107->17109 17111 d1905e __fread_nolock RtlAllocateHeap 17108->17111 17109->17112 17110 d13501 __fread_nolock 17110->17101 17111->17113 17114 d18fcd 17112->17114 17113->17107 17113->17112 17115 d18fdc 17114->17115 17116 d0be0f __dosmaperr RtlAllocateHeap 17115->17116 17119 d19006 17115->17119 17117 d19048 17116->17117 17118 d0bdfc __dosmaperr RtlAllocateHeap 17117->17118 17118->17119 17119->17110 17120 c3d4a0 WSAStartup 17121 c3d4d8 17120->17121 17122 c3d5a7 17120->17122 17121->17122 17123 c3d575 socket 17121->17123 17123->17122 17124 c3d58b connect 17123->17124 17124->17122 17125 c3d59d closesocket 17124->17125 17125->17122 17125->17123 17126 c83320 GetCursorPos 17127 c83335 GetCursorPos 17126->17127 17128 c83408 GetPEB 17127->17128 17131 c83347 17127->17131 17128->17131 17129 c83353 GetPEB 17129->17131 17130 c8347d Sleep 17130->17127 17131->17128 17131->17129 17131->17130 17131->17131 17132 c833c8 Sleep 17131->17132 17133 c834a7 17131->17133 17132->17131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 c83320-c83333 GetCursorPos 1 c83335-c83341 GetCursorPos 0->1 2 c83408-c83411 GetPEB 1->2 3 c83347-c8334d 1->3 4 c83414-c83428 2->4 3->2 5 c83353-c8335f GetPEB 3->5 6 c83479-c8347b 4->6 7 c8342a-c8342f 4->7 8 c83360-c83374 5->8 6->4 7->6 9 c83431-c83439 7->9 10 c833c4-c833c6 8->10 11 c83376-c8337b 8->11 12 c83440-c83453 9->12 10->8 11->10 13 c8337d-c83383 11->13 14 c83472-c83477 12->14 15 c83455-c83468 12->15 16 c83385-c83398 13->16 14->6 14->12 15->15 17 c8346a-c83470 15->17 18 c8339a 16->18 19 c833bd-c833c2 16->19 17->14 20 c8347d-c834a2 Sleep 17->20 21 c833a0-c833b3 18->21 19->10 19->16 20->1 21->21 22 c833b5-c833bb 21->22 22->19 23 c833c8-c833ee Sleep 22->23 24 c833f4-c833fa 23->24 24->2 25 c833fc-c83402 24->25 25->2 26 c834a7-c834b8 call c26b80 25->26 29 c834ba-c834bc 26->29 30 c834be 26->30 31 c834c0-c834dd call c26b80 29->31 30->31
                                  APIs
                                  • GetCursorPos.USER32(?), ref: 00C83333
                                  • GetCursorPos.USER32(?), ref: 00C83339
                                  • Sleep.KERNELBASE(000003E9,?,00000001,00000000,?,?,?,?,?,?,?,?,00C83698), ref: 00C833E8
                                  • Sleep.KERNELBASE(00000001,?,00000001,00000000,?,?,?,?,?,?,?,?,00C83698), ref: 00C8349A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                                  • Associated: 00000000.00000002.3375807351.0000000000C20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3375843712.0000000000D4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376118583.0000000000D53000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000D57000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000EDE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F71000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FAD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376742562.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377002468.000000000111C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377050312.000000000111D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_c20000_LisectAVT_2403002B_242.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CursorSleep
                                  • String ID:
                                  • API String ID: 4211308429-0
                                  • Opcode ID: 046bf80c0a0a0cc80de41664d622b55472ecfedc69f65c18595a478a0678613b
                                  • Instruction ID: bf286889cca151cf213766bc6c2c8122b91cc82700135c7eca4703e8c148b8f3
                                  • Opcode Fuzzy Hash: 046bf80c0a0a0cc80de41664d622b55472ecfedc69f65c18595a478a0678613b
                                  • Instruction Fuzzy Hash: D151CD35A042958FCB25DF48C4D0EADBBB1EF85B08B195099D455AB321DB31EF46CB90

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 34 c3d4a0-c3d4d2 WSAStartup 35 c3d5b7-c3d5c0 34->35 36 c3d4d8-c3d502 call c26b80 * 2 34->36 41 c3d504-c3d508 36->41 42 c3d50e-c3d565 36->42 41->35 41->42 44 c3d5b1 42->44 45 c3d567-c3d56d 42->45 44->35 46 c3d5c5-c3d5cf 45->46 47 c3d56f 45->47 46->44 53 c3d5d1-c3d5d9 46->53 48 c3d575-c3d589 socket 47->48 48->44 49 c3d58b-c3d59b connect 48->49 51 c3d5c1 49->51 52 c3d59d-c3d5a5 closesocket 49->52 51->46 52->48 54 c3d5a7-c3d5ab 52->54 54->44
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                                  • Associated: 00000000.00000002.3375807351.0000000000C20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3375843712.0000000000D4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376118583.0000000000D53000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000D57000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000EDE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F71000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FAD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376742562.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377002468.000000000111C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377050312.000000000111D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_c20000_LisectAVT_2403002B_242.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Startupclosesocketconnectsocket
                                  • String ID:
                                  • API String ID: 3098855095-0
                                  • Opcode ID: 62ae8bf3da061c3bfac222b6d4fd5cfa952ff8e134550fab38a6671139d6eed2
                                  • Instruction ID: 09250625cf5c1f4e88000b6498e6973ec79d4f46b85cd75f386355ce0df1c1f8
                                  • Opcode Fuzzy Hash: 62ae8bf3da061c3bfac222b6d4fd5cfa952ff8e134550fab38a6671139d6eed2
                                  • Instruction Fuzzy Hash: 5131C1B15143006BD7209F25EC89B6BB7E4EB85338F005F1DF9B9932D0D3719A088B92

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 55 d12fa4-d12fb4 56 d12fb6-d12fc9 call d0bdfc call d0be0f 55->56 57 d12fce-d12fd0 55->57 73 d13328 56->73 59 d13310-d1331d call d0bdfc call d0be0f 57->59 60 d12fd6-d12fdc 57->60 76 d13323 call d03370 59->76 60->59 62 d12fe2-d1300b 60->62 62->59 65 d13011-d1301a 62->65 68 d13034-d13036 65->68 69 d1301c-d1302f call d0bdfc call d0be0f 65->69 71 d1330c-d1330e 68->71 72 d1303c-d13040 68->72 69->76 78 d1332b-d1332e 71->78 72->71 77 d13046-d1304a 72->77 73->78 76->73 77->69 81 d1304c-d13063 77->81 83 d13065-d13068 81->83 84 d13098-d1309e 81->84 86 d1306a-d13070 83->86 87 d1308e-d13096 83->87 88 d130a0-d130a7 84->88 89 d13072-d13089 call d0bdfc call d0be0f call d03370 84->89 86->87 86->89 93 d1310b-d1312a 87->93 90 d130a9 88->90 91 d130ab-d130ac call d157ad 88->91 120 d13243 89->120 90->91 99 d130b1-d130c9 call d15733 * 2 91->99 94 d13130-d1313c 93->94 95 d131e6-d131ef call d1e301 93->95 94->95 98 d13142-d13144 94->98 109 d131f1-d13203 95->109 110 d13260 95->110 98->95 102 d1314a-d1316b 98->102 124 d130e6-d13109 call d0cd0d 99->124 125 d130cb-d130e1 call d0be0f call d0bdfc 99->125 102->95 106 d1316d-d13183 102->106 106->95 112 d13185-d13187 106->112 109->110 115 d13205-d13214 109->115 111 d13264-d1327a ReadFile 110->111 116 d132d8-d132e3 111->116 117 d1327c-d13282 111->117 112->95 118 d13189-d131ac 112->118 115->110 127 d13216-d1321a 115->127 135 d132e5-d132f7 call d0be0f call d0bdfc 116->135 136 d132fc-d132ff 116->136 117->116 122 d13284 117->122 118->95 123 d131ae-d131c4 118->123 126 d13246-d13250 call d15733 120->126 129 d13287-d13299 122->129 123->95 130 d131c6-d131c8 123->130 124->93 125->120 126->78 127->111 134 d1321c-d13234 127->134 129->126 137 d1329b-d1329f 129->137 130->95 138 d131ca-d131e1 130->138 155 d13255-d1325e 134->155 156 d13236 134->156 135->120 145 d13305-d13307 136->145 146 d1323c-d13242 call d0bdb5 136->146 143 d132a1-d132b1 call d12cb6 137->143 144 d132b8-d132c5 137->144 138->95 163 d132b4-d132b6 143->163 152 d132d1-d132d6 call d12afc 144->152 153 d132c7 call d12e0d 144->153 145->126 146->120 164 d132cc-d132cf 152->164 153->164 155->129 156->146 163->126 164->163
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                                  • Associated: 00000000.00000002.3375807351.0000000000C20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3375843712.0000000000D4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376118583.0000000000D53000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000D57000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000EDE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F71000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FAD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376742562.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377002468.000000000111C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377050312.000000000111D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_c20000_LisectAVT_2403002B_242.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2982756ab328e4202576d05f092469f786babe6fe95e49b537868d92aff26da8
                                  • Instruction ID: 2840f13d7154f6ba35973d5bd6e5f0df742c48b776042f64a643e597905c5dd1
                                  • Opcode Fuzzy Hash: 2982756ab328e4202576d05f092469f786babe6fe95e49b537868d92aff26da8
                                  • Instruction Fuzzy Hash: 50B1D570A08345BFDB11EF98E881BEE7BB1EF45320F184159E9459B382DB719A81CB74

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 166 c29d90-c29e0e call cfde82 169 c29e15-c29e20 166->169 169->169 170 c29e22-c29e2d 169->170 171 c29e32-c29e44 call d03f30 170->171 172 c29e2f 170->172 175 c29e46-c29e6c call d07d06 call d03abb call d07d06 171->175 176 c29eb7-c29ebe 171->176 172->171 194 c29e73-c29e7a 175->194 195 c29e6e 175->195 178 c29ec0-c29ecc 176->178 179 c29ee8-c29ef8 176->179 181 c29ede-c29ee5 call cfe103 178->181 182 c29ece-c29edc 178->182 181->179 182->181 184 c29ef9-c29f0e call d03380 182->184 191 c29f10-c29f1b 184->191 191->191 193 c29f1d-c29f28 191->193 196 c29f2a 193->196 197 c29f2d-c29f3f call d03f30 193->197 198 c29e7c-c29e83 194->198 199 c29e8d-c29e94 call c8cd30 194->199 195->194 196->197 208 c29f41-c29f59 call d07d06 call d03abb call d077b8 197->208 209 c29f5c-c29f63 197->209 202 c29e87-c29e8b 198->202 203 c29e85 198->203 204 c29e99-c29e9f 199->204 202->204 203->202 206 c29ea3-c29eae call d0c7af call d077b8 204->206 207 c29ea1 204->207 224 c29eb3-c29eb6 206->224 207->206 208->209 210 c29f65-c29f71 209->210 211 c29f8d-c29f93 209->211 214 c29f83-c29f8a call cfe103 210->214 215 c29f73-c29f81 210->215 214->211 215->214 218 c29f94-c29fbe call d03380 215->218 231 c29fc0-c29fc4 218->231 232 c29fcf-c29fd4 218->232 224->176 231->232 233 c29fc6-c29fce 231->233
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                                  • Associated: 00000000.00000002.3375807351.0000000000C20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3375843712.0000000000D4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376118583.0000000000D53000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000D57000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000EDE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F71000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FAD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376742562.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377002468.000000000111C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377050312.000000000111D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_c20000_LisectAVT_2403002B_242.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: __fread_nolock
                                  • String ID:
                                  • API String ID: 2638373210-0
                                  • Opcode ID: fcc91c2c94361164b54e1da8234e51ed57b4afa3494182f0f512b20a844b6872
                                  • Instruction ID: c3076d80042ad4678ab00fd9491e3e2eee6cf4418e6fb637e75ecd15963f3cd6
                                  • Opcode Fuzzy Hash: fcc91c2c94361164b54e1da8234e51ed57b4afa3494182f0f512b20a844b6872
                                  • Instruction Fuzzy Hash: BC610671900214ABDB18DF68EC49BAEBBA8EF45310F1481ADF8189F682D775DA41C7F1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 234 d13e1d-d13e3f 235 d14032 234->235 236 d13e45-d13e47 234->236 239 d14034-d14038 235->239 237 d13e73-d13e96 236->237 238 d13e49-d13e68 call d032f3 236->238 241 d13e98-d13e9a 237->241 242 d13e9c-d13ea2 237->242 245 d13e6b-d13e6e 238->245 241->242 244 d13ea4-d13eb5 241->244 242->238 242->244 246 d13eb7-d13ec5 call d0cd4d 244->246 247 d13ec8-d13ed8 call d13962 244->247 245->239 246->247 252 d13f21-d13f33 247->252 253 d13eda-d13ee0 247->253 256 d13f35-d13f3b 252->256 257 d13f8a-d13faa WriteFile 252->257 254 d13ee2-d13ee5 253->254 255 d13f09-d13f1f call d13533 253->255 260 d13ef0-d13eff call d138fa 254->260 261 d13ee7-d13eea 254->261 279 d13f02-d13f04 255->279 258 d13f76-d13f88 call d139df 256->258 259 d13f3d-d13f40 256->259 263 d13fb5 257->263 264 d13fac-d13fb2 257->264 285 d13f5d-d13f60 258->285 266 d13f62-d13f74 call d13ba3 259->266 267 d13f42-d13f45 259->267 260->279 261->260 268 d13fca-d13fcd 261->268 265 d13fb8-d13fc3 263->265 264->263 272 d13fc5-d13fc8 265->272 273 d1402d-d14030 265->273 266->285 274 d13fd0-d13fd2 267->274 275 d13f4b-d13f58 call d13aba 267->275 268->274 272->268 273->239 282 d14000-d1400c 274->282 283 d13fd4-d13fd9 274->283 275->285 279->265 288 d14016-d14028 282->288 289 d1400e-d14014 282->289 286 d13ff2-d13ffb call d0bdd8 283->286 287 d13fdb-d13fed 283->287 285->279 286->245 287->245 288->245 289->235 289->288
                                  APIs
                                  • WriteFile.KERNELBASE(?,00000000,00D07C57,?,00000000,00000000,00000000,?,00000000,?,00C29F4B,00D07C57,00000000,00C29F4B,?,?), ref: 00D13FA3
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                                  • Associated: 00000000.00000002.3375807351.0000000000C20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3375843712.0000000000D4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376118583.0000000000D53000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000D57000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000EDE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F71000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FAD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376742562.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377002468.000000000111C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377050312.000000000111D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_c20000_LisectAVT_2403002B_242.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FileWrite
                                  • String ID:
                                  • API String ID: 3934441357-0
                                  • Opcode ID: cb6cbb70b77c750958dac33954ef20dc8212ea34f417abfc911a20275972b7d6
                                  • Instruction ID: 545278133341c71aabef9b25a6d08cb7162340ea42b016280c07a2169d05d369
                                  • Opcode Fuzzy Hash: cb6cbb70b77c750958dac33954ef20dc8212ea34f417abfc911a20275972b7d6
                                  • Instruction Fuzzy Hash: B161B1B1D04209BFDF11DFA8E845AEEBFB9AF09304F180145F904A7251DB31DA828B70

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 292 d03512-d0351f 293 d03521-d03544 call d032f3 292->293 294 d03549-d0355d call d14902 292->294 299 d036b0-d036b2 293->299 300 d03562-d0356b call d0ccef 294->300 301 d0355f 294->301 303 d03570-d0357f 300->303 301->300 304 d03581 303->304 305 d0358f-d03598 303->305 308 d03587-d03589 304->308 309 d03659-d0365e 304->309 306 d0359a-d035a7 305->306 307 d035ac-d035e0 305->307 310 d036ac 306->310 311 d035e2-d035ec 307->311 312 d0363d-d03649 307->312 308->305 308->309 313 d036ae-d036af 309->313 310->313 314 d03613-d0361f 311->314 315 d035ee-d035fa 311->315 316 d03660-d03663 312->316 317 d0364b-d03652 312->317 313->299 314->316 319 d03621-d0363b call d03a29 314->319 315->314 318 d035fc-d0360e call d0387e 315->318 320 d03666-d0366e 316->320 317->309 318->313 319->320 321 d03670-d03676 320->321 322 d036aa 320->322 325 d03678-d0368c call d036b3 321->325 326 d0368e-d03692 321->326 322->310 325->313 330 d03694-d036a2 call d22870 326->330 331 d036a5-d036a7 326->331 330->331 331->322
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                                  • Associated: 00000000.00000002.3375807351.0000000000C20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3375843712.0000000000D4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376118583.0000000000D53000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000D57000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000EDE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F71000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FAD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376742562.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377002468.000000000111C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377050312.000000000111D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_c20000_LisectAVT_2403002B_242.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7702887673c54bdb1028ff11f274f13f8dba8d83a0e0df4fe120d662ac619c8c
                                  • Instruction ID: 235f8e25eecda2edcc810b378c8d33efda21256c8500688f9861a583925995fa
                                  • Opcode Fuzzy Hash: 7702887673c54bdb1028ff11f274f13f8dba8d83a0e0df4fe120d662ac619c8c
                                  • Instruction Fuzzy Hash: D4519574A00248BFDB14DF58C845BAA7BB5EF49354F688158F84D9B392D372DE41CB60

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 335 d13493-d134a7 call d1905e 338 d134a9-d134ab 335->338 339 d134ad-d134b5 335->339 340 d134fb-d1351b call d18fcd 338->340 341 d134c0-d134c3 339->341 342 d134b7-d134be 339->342 352 d1352d 340->352 353 d1351d-d1352b call d0bdd8 340->353 345 d134e1-d134f1 call d1905e FindCloseChangeNotification 341->345 346 d134c5-d134c9 341->346 342->341 344 d134cb-d134df call d1905e * 2 342->344 344->338 344->345 345->338 356 d134f3-d134f9 345->356 346->344 346->345 354 d1352f-d13532 352->354 353->354 356->340
                                  APIs
                                  • FindCloseChangeNotification.KERNELBASE(00000000,00000000,CF830579,?,00D1337A,00000000,CF830579,00D4B810,0000000C,00D13436,00D0778D,?), ref: 00D134EA
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                                  • Associated: 00000000.00000002.3375807351.0000000000C20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3375843712.0000000000D4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376118583.0000000000D53000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000D57000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000EDE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F71000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FAD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376742562.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377002468.000000000111C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377050312.000000000111D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_c20000_LisectAVT_2403002B_242.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ChangeCloseFindNotification
                                  • String ID:
                                  • API String ID: 2591292051-0
                                  • Opcode ID: e8973fb341140908d11426073c5f6bf4f5adac8896fa44c0dd8d2ba4eb3323e7
                                  • Instruction ID: 333ba9828c48543fc6c0540514ea4f1e8db4f7be8e064d65504f2c1f3acddf3c
                                  • Opcode Fuzzy Hash: e8973fb341140908d11426073c5f6bf4f5adac8896fa44c0dd8d2ba4eb3323e7
                                  • Instruction Fuzzy Hash: BD114C3650822436D6226234B852BFE6349CB83734F290159ED588B1C1DE629DC152B0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 361 d0cc2c-d0cc44 call d1905e 364 d0cc46-d0cc4d 361->364 365 d0cc5a-d0cc70 SetFilePointerEx 361->365 366 d0cc54-d0cc58 364->366 367 d0cc72-d0cc83 call d0bdd8 365->367 368 d0cc85-d0cc8f 365->368 370 d0ccab-d0ccae 366->370 367->366 368->366 369 d0cc91-d0cca6 368->369 369->370
                                  APIs
                                  • SetFilePointerEx.KERNELBASE(00000000,00000000,00D4B4C8,00C29F4B,00000002,00C29F4B,00000000,?,?,?,00D0CD36,00000000,?,00C29F4B,00000002,00D4B4C8), ref: 00D0CC69
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                                  • Associated: 00000000.00000002.3375807351.0000000000C20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3375843712.0000000000D4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376118583.0000000000D53000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000D57000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000EDE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F71000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FAD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376742562.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377002468.000000000111C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377050312.000000000111D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_c20000_LisectAVT_2403002B_242.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FilePointer
                                  • String ID:
                                  • API String ID: 973152223-0
                                  • Opcode ID: 00ecf869aed8c32f58866e46503b0d12e941f32c4a0a70169957347b89bf2d40
                                  • Instruction ID: b261a290eeba4cea0f382177cafac16448ee5f5623e16b3b0fc9aaf866d03bc3
                                  • Opcode Fuzzy Hash: 00ecf869aed8c32f58866e46503b0d12e941f32c4a0a70169957347b89bf2d40
                                  • Instruction Fuzzy Hash: 580104326242056FDB05CF19CC55EAE3B19DB85330B241244E8599B2D0EA71ED8197A0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 374 c22d70-c22d80 375 c22d82-c22d87 374->375 376 c22da6-c22da8 374->376 377 c22d89-c22d8a call cfde82 375->377 378 c22dbf call c22260 375->378 379 c22daa-c22db7 call cfde82 376->379 380 c22db8-c22dbe 376->380 385 c22d8f-c22d96 377->385 384 c22dc4-c22dc9 call d03380 378->384 385->384 388 c22d98-c22da5 385->388
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00C22DBF
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                                  • Associated: 00000000.00000002.3375807351.0000000000C20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3375843712.0000000000D4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376118583.0000000000D53000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000D57000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000EDE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F71000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FAD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376742562.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377002468.000000000111C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377050312.000000000111D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_c20000_LisectAVT_2403002B_242.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID:
                                  • API String ID: 118556049-0
                                  • Opcode ID: 326ee97673e7adb1608e1cb46f795dec6370eba03380352c4d7ae6dd60fbcf19
                                  • Instruction ID: 5f3459924f86113cc29a3098e5ada5d1b5c25d6e9364b540a37ad19550c072f9
                                  • Opcode Fuzzy Hash: 326ee97673e7adb1608e1cb46f795dec6370eba03380352c4d7ae6dd60fbcf19
                                  • Instruction Fuzzy Hash: C2F05972100114ABCB186F60F8018F9B3E8EF24361B14043EF89DC7A42EB36DA80C7D0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 390 d14d73-d14d7e 391 d14d80-d14d8a 390->391 392 d14d8c-d14d92 390->392 391->392 393 d14dc0-d14dcb call d0be0f 391->393 394 d14d94-d14d95 392->394 395 d14dab-d14dbc RtlAllocateHeap 392->395 400 d14dcd-d14dcf 393->400 394->395 396 d14d97-d14d9e call d12914 395->396 397 d14dbe 395->397 396->393 403 d14da0-d14da9 call d1011d 396->403 397->400 403->393 403->395
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000008,00D07DC7,00000000,?,00D146F9,00000001,00000364,00000000,00000006,000000FF,?,00000000,00D0BE14,00D07593,00D07DC7,00000000), ref: 00D14DB5
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                                  • Associated: 00000000.00000002.3375807351.0000000000C20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3375843712.0000000000D4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376118583.0000000000D53000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000D57000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000EDE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F71000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FAD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376742562.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377002468.000000000111C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377050312.000000000111D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_c20000_LisectAVT_2403002B_242.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 2f905872a69d168e32cfdcde4d27bace896a39440db13a1b5d9f3392aa127104
                                  • Instruction ID: f5493be31071db4ab91408ca138d34578be96130d00190cbc5aeafc4587efe49
                                  • Opcode Fuzzy Hash: 2f905872a69d168e32cfdcde4d27bace896a39440db13a1b5d9f3392aa127104
                                  • Instruction Fuzzy Hash: 5AF05E32605625769F667AA6B901BEE3B49DF427B0B294626ED08D7181DF20E8C146F0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 406 d157ad-d157b9 407 d157eb-d157f6 call d0be0f 406->407 408 d157bb-d157bd 406->408 416 d157f8-d157fa 407->416 410 d157d6-d157e7 RtlAllocateHeap 408->410 411 d157bf-d157c0 408->411 412 d157c2-d157c9 call d12914 410->412 413 d157e9 410->413 411->410 412->407 418 d157cb-d157d4 call d1011d 412->418 413->416 418->407 418->410
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000000,00D1ABF2,4D88C033,?,00D1ABF2,00000220,?,00D1416F,4D88C033), ref: 00D157E0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                                  • Associated: 00000000.00000002.3375807351.0000000000C20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3375843712.0000000000D4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376118583.0000000000D53000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000D57000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000EDE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F71000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FAD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376742562.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377002468.000000000111C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377050312.000000000111D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_c20000_LisectAVT_2403002B_242.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: a0b3451b66e720339ff763de1cabcf36929b3405d7d083efc7a12b6a049a7c34
                                  • Instruction ID: 50c2aff34e1e5d4840376d7f779ab52c4f57770a4ef51d75222c124efa3852d1
                                  • Opcode Fuzzy Hash: a0b3451b66e720339ff763de1cabcf36929b3405d7d083efc7a12b6a049a7c34
                                  • Instruction Fuzzy Hash: 66E03935240B21F6E6213665B802FEB2A49DBC27B0F190111FD58961C4DF68D8D0C6F1
                                  APIs
                                  • WriteProcessMemory.KERNEL32(00000000,00000000,?,00000218,00000000), ref: 00C395E1
                                  • WriteProcessMemory.KERNEL32(?,00000218,00C39240,00000110,00000000), ref: 00C39600
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                                  • Associated: 00000000.00000002.3375807351.0000000000C20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3375843712.0000000000D4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376118583.0000000000D53000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000D57000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000EDE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F71000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FAD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376742562.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377002468.000000000111C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377050312.000000000111D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_c20000_LisectAVT_2403002B_242.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: MemoryProcessWrite
                                  • String ID: $$%s|%s$,$,$.$.$131$:$type must be boolean, but is
                                  • API String ID: 3559483778-3347632522
                                  • Opcode ID: 2873073ab1287eaee241319d2bbf5697308c8995eb37cb4f6b3b35e57ccc2c76
                                  • Instruction ID: 9611a134957a752d36f02f4e8662d592f8e941cad9d5811d1863985bb43a68d4
                                  • Opcode Fuzzy Hash: 2873073ab1287eaee241319d2bbf5697308c8995eb37cb4f6b3b35e57ccc2c76
                                  • Instruction Fuzzy Hash: B823CF70D102588FDB29DF68C898BEDBBB0EF05304F148199E459AB292DB719F84DF91
                                  APIs
                                  • GetProcAddress.KERNEL32(00000000,C8D8C5E3), ref: 00CA4D6C
                                  • GetProcAddress.KERNEL32(00000000,C8D8C5E3), ref: 00CA4DAE
                                  • GetProcAddress.KERNEL32(00000000,DDD8DFE2), ref: 00CA4DF6
                                  • GetProcAddress.KERNEL32(00000000,C8D8C5E3), ref: 00CA4E37
                                  • GetProcAddress.KERNEL32(00000000,C8D8C5E3), ref: 00CA4E78
                                  • GetProcAddress.KERNEL32(00000000,DDD8DFE2), ref: 00CA4EB6
                                  • GetProcAddress.KERNEL32(00000000,C8D8C5E3), ref: 00CA4EFE
                                  • GetProcAddress.KERNEL32(00000000,DDD8DFE2), ref: 00CA4F46
                                  • GetProcAddress.KERNEL32(00000000,C8D8C5E3), ref: 00CA4F87
                                  • GetProcAddress.KERNEL32(00000000,C8D8C5E3), ref: 00CA4FCD
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                                  • Associated: 00000000.00000002.3375807351.0000000000C20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3375843712.0000000000D4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376118583.0000000000D53000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000D57000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000EDE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F71000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FAD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376742562.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377002468.000000000111C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377050312.000000000111D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_c20000_LisectAVT_2403002B_242.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressProc
                                  • String ID:
                                  • API String ID: 190572456-0
                                  • Opcode ID: ce1d45acf9e2917cf8a39213021c350821629f7fe9def0f8170005f618f43f97
                                  • Instruction ID: 0d2df47dde116d9f96075a294d2b2792faa141f2582fedb0306e3db009d50414
                                  • Opcode Fuzzy Hash: ce1d45acf9e2917cf8a39213021c350821629f7fe9def0f8170005f618f43f97
                                  • Instruction Fuzzy Hash: E28172B0C1838D9EEF19CFA4D444AEFBBB8EF16304F50409ED841AA751E374520ADB65
                                  APIs
                                  • GetModuleHandleA.KERNEL32(?), ref: 00C2892E
                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00C2893B
                                  • GetModuleHandleA.KERNEL32(?), ref: 00C289A5
                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00C289AC
                                  • CloseHandle.KERNEL32(?), ref: 00C28BB2
                                  • CloseHandle.KERNEL32(?), ref: 00C28C14
                                  • CloseHandle.KERNEL32(00000000), ref: 00C28C41
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                                  • Associated: 00000000.00000002.3375807351.0000000000C20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3375843712.0000000000D4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376118583.0000000000D53000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000D57000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000EDE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F71000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FAD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376742562.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377002468.000000000111C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377050312.000000000111D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_c20000_LisectAVT_2403002B_242.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Handle$Close$AddressModuleProc
                                  • String ID: File
                                  • API String ID: 4110381430-749574446
                                  • Opcode ID: a959bc5f741e780e01aa2276051956cf881a35f8861082b51081309f84509a45
                                  • Instruction ID: e929d965855fe7179c94e1576376ee5ffb8b99a51acc574864bc7d8c2eb68c06
                                  • Opcode Fuzzy Hash: a959bc5f741e780e01aa2276051956cf881a35f8861082b51081309f84509a45
                                  • Instruction Fuzzy Hash: D0C1C170D112699FEF24DFA4DC85BEEBBB8EF05300F100059E504BB682DB749A49CB65
                                  APIs
                                  • Process32Next.KERNEL32(00000000,?), ref: 00C28DC7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                                  • Associated: 00000000.00000002.3375807351.0000000000C20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3375843712.0000000000D4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376118583.0000000000D53000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000D57000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000EDE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F71000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FAD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376742562.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377002468.000000000111C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377050312.000000000111D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_c20000_LisectAVT_2403002B_242.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: NextProcess32
                                  • String ID: /$/\/$\$exists
                                  • API String ID: 1850201408-2061510663
                                  • Opcode ID: 1ca611b26eab8498cbd0d59067e49d84f5cee0718df4a62e92776c6289f79f6f
                                  • Instruction ID: 88ffb420433e39a35b01d3d42e4a6e4fe98760d7fa9594dcc8499d9523a885d6
                                  • Opcode Fuzzy Hash: 1ca611b26eab8498cbd0d59067e49d84f5cee0718df4a62e92776c6289f79f6f
                                  • Instruction Fuzzy Hash: B5A20671D002699FCF18CFA8D8947EEBBB5EF05314F1442ADD459A7682E7305E8ACB60
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                                  • Associated: 00000000.00000002.3375807351.0000000000C20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3375843712.0000000000D4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376118583.0000000000D53000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000D57000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000EDE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F71000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FAD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376742562.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377002468.000000000111C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377050312.000000000111D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_c20000_LisectAVT_2403002B_242.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 61965cb8cb4c3d11271a02d73999b519a6a23ab072505813c3df16f2acd370b1
                                  • Instruction ID: 23919712fccdf2b23e2c85dd7137c1ba6af6864d646b226dc33c70f2c9a2784a
                                  • Opcode Fuzzy Hash: 61965cb8cb4c3d11271a02d73999b519a6a23ab072505813c3df16f2acd370b1
                                  • Instruction Fuzzy Hash: 77022071E052199BDF14CFA9D8807ADBBF1FF48314F158269E919EB380D731A941CBA4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                                  • Associated: 00000000.00000002.3375807351.0000000000C20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3375843712.0000000000D4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376118583.0000000000D53000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000D57000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000EDE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F71000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FAD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376742562.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377002468.000000000111C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377050312.000000000111D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_c20000_LisectAVT_2403002B_242.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: /Kim$/Kim$type must be number, but is $type must be string, but is
                                  • API String ID: 0-1144537432
                                  • Opcode ID: 9bff4615bec79261411965aa824a35715b27b7b3517680924e606401ec6e202e
                                  • Instruction ID: 39f7183d4ce69f7fa011338d2637a447de716b88c96ffd25d2de490c439bcd24
                                  • Opcode Fuzzy Hash: 9bff4615bec79261411965aa824a35715b27b7b3517680924e606401ec6e202e
                                  • Instruction Fuzzy Hash: 87913971E001189FCB08DFACD895BEDB7A9EB48314F14826EE819D7391E7359E06CB90
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00C965E1
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00C96763
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                                  • Associated: 00000000.00000002.3375807351.0000000000C20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3375843712.0000000000D4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376118583.0000000000D53000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000D57000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000EDE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F71000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FAD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376742562.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377002468.000000000111C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377050312.000000000111D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_c20000_LisectAVT_2403002B_242.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID:
                                  • API String ID: 118556049-0
                                  • Opcode ID: d89b2d818de653aaa44d1a7ae7b812e82364a980504facb64532ff4eb0cd38d7
                                  • Instruction ID: 78afaebc4d4f9bdcaec1750a95b2858c1010a8015db96932403dc42c27e5dfe4
                                  • Opcode Fuzzy Hash: d89b2d818de653aaa44d1a7ae7b812e82364a980504facb64532ff4eb0cd38d7
                                  • Instruction Fuzzy Hash: C1E1D3B1A001059FCF18DF6CC9859ADBBE5EF88310B148269E81ADB3D5E730EE51CB91
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                                  • Associated: 00000000.00000002.3375807351.0000000000C20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3375843712.0000000000D4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376118583.0000000000D53000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000D57000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000EDE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F71000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FAD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376742562.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377002468.000000000111C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377050312.000000000111D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_c20000_LisectAVT_2403002B_242.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: @?
                                  • API String ID: 0-130445511
                                  • Opcode ID: 015cf7ccceb20c27d697ebc78c6bb6a97c79c892c93c977b28b4d6205d348e14
                                  • Instruction ID: 5430fce5e6c7c1e17a4f1676f45c96efb58c752546862b43a385dbdab76528ae
                                  • Opcode Fuzzy Hash: 015cf7ccceb20c27d697ebc78c6bb6a97c79c892c93c977b28b4d6205d348e14
                                  • Instruction Fuzzy Hash: 2B628FB1E002069BDF04CF59C5856AEBBB1FF49308F2881ADD814AB392D775DA46CF91
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                                  • Associated: 00000000.00000002.3375807351.0000000000C20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3375843712.0000000000D4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376118583.0000000000D53000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000D57000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000EDE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F71000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FAD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376742562.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377002468.000000000111C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377050312.000000000111D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_c20000_LisectAVT_2403002B_242.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: 0
                                  • API String ID: 0-4108050209
                                  • Opcode ID: 63f2e4b64d22b899263f48541cbdcccf6814e0c466ddcc6a018a8efdd4904dab
                                  • Instruction ID: d6c7741608120f019dfae9710053922e830b09aa7525ab0eca0ac6cc2cd15f1f
                                  • Opcode Fuzzy Hash: 63f2e4b64d22b899263f48541cbdcccf6814e0c466ddcc6a018a8efdd4904dab
                                  • Instruction Fuzzy Hash: 86B18B3490074A8FDB28CF6CC494BAABBB2EF05310F18461DD4AA9B6D1D730E945CB72
                                  APIs
                                  • GetSystemTimePreciseAsFileTime.KERNEL32(?,?,00D2B1A2,000000FF,?,00CFD887,?,?,?,?,00C33EF6,?,00C8350C), ref: 00CFDE65
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                                  • Associated: 00000000.00000002.3375807351.0000000000C20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3375843712.0000000000D4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376118583.0000000000D53000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000D57000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000EDE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F71000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FAD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376742562.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377002468.000000000111C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377050312.000000000111D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_c20000_LisectAVT_2403002B_242.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Time$FilePreciseSystem
                                  • String ID:
                                  • API String ID: 1802150274-0
                                  • Opcode ID: 2c851b5961cc5629725f73b488b2b6987c66e599d41019044971cc0f8528064d
                                  • Instruction ID: 3839ff8eb93fe9a20f14577d5bcd52a2b119bebb71448cfd1e7107701535cd61
                                  • Opcode Fuzzy Hash: 2c851b5961cc5629725f73b488b2b6987c66e599d41019044971cc0f8528064d
                                  • Instruction Fuzzy Hash: 85F0E536A44758EFC7128F44DC00BA9B7A9F704F10F000626EC12D7380C7746D008BA1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                                  • Associated: 00000000.00000002.3375807351.0000000000C20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3375843712.0000000000D4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376118583.0000000000D53000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000D57000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000EDE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F71000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FAD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376742562.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377002468.000000000111C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377050312.000000000111D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_c20000_LisectAVT_2403002B_242.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 14b2aa555127b7cb1f87bd345a9fbc850021cb9a1fde34dd0dca4617e45d9ddc
                                  • Instruction ID: f74c4ab11a0b35a26d15e974990134df9c7a35d18697a919f63a8981be1f61e1
                                  • Opcode Fuzzy Hash: 14b2aa555127b7cb1f87bd345a9fbc850021cb9a1fde34dd0dca4617e45d9ddc
                                  • Instruction Fuzzy Hash: 9DE11772E1122A8FCF15CFA9D5815ADFBF1BF89314F1A42A9D815B7340D630AE45CB90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                                  • Associated: 00000000.00000002.3375807351.0000000000C20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3375843712.0000000000D4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376118583.0000000000D53000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000D57000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000EDE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F71000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FAD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376742562.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377002468.000000000111C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377050312.000000000111D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_c20000_LisectAVT_2403002B_242.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d09f1decbe42e5bdc5c4148c5b77afc9bc1068256c1465d4d5c2b4fa90084641
                                  • Instruction ID: d66f25821f64845c06d12de48029086c6be84206048687805e014e94c4ed39bb
                                  • Opcode Fuzzy Hash: d09f1decbe42e5bdc5c4148c5b77afc9bc1068256c1465d4d5c2b4fa90084641
                                  • Instruction Fuzzy Hash: FBB19E31510609EFD715CF28D486BA47BE0FF05364F298658E8E9CF2A1CB35E981DB50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                                  • Associated: 00000000.00000002.3375807351.0000000000C20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3375843712.0000000000D4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376118583.0000000000D53000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000D57000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000EDE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F71000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FAD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376742562.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377002468.000000000111C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377050312.000000000111D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_c20000_LisectAVT_2403002B_242.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8f6050a3edd7f05d47d2bf4a975f08ca7a5604a4f015a33e39f6b95eac1fd891
                                  • Instruction ID: 7704a077402cbea4c6d170e4f9e979ec424045416c3ad208898e6589b12cd76a
                                  • Opcode Fuzzy Hash: 8f6050a3edd7f05d47d2bf4a975f08ca7a5604a4f015a33e39f6b95eac1fd891
                                  • Instruction Fuzzy Hash: 5D71F8B5D04666AFDB14CF69E8D0BBFBBB4EB16300F044169E96497B42C3349909D7A0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                                  • Associated: 00000000.00000002.3375807351.0000000000C20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3375843712.0000000000D4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376118583.0000000000D53000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000D57000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000EDE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F71000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FAD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376742562.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377002468.000000000111C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377050312.000000000111D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_c20000_LisectAVT_2403002B_242.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f07840e6a471821205a77ecfc5471e14ae8a9aef5a9e9dff233e8ee69453a463
                                  • Instruction ID: 936500f12d06611641a76f2f25e159a9fe38697d42f4923f9686ffbf1c0b5948
                                  • Opcode Fuzzy Hash: f07840e6a471821205a77ecfc5471e14ae8a9aef5a9e9dff233e8ee69453a463
                                  • Instruction Fuzzy Hash: 9D6120B17246698FD728CF5EFCC05363361E78A3013868279EA85CF395C535EA26D6B0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                                  • Associated: 00000000.00000002.3375807351.0000000000C20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3375843712.0000000000D4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376118583.0000000000D53000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000D57000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000EDE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F71000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FAD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376742562.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377002468.000000000111C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377050312.000000000111D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_c20000_LisectAVT_2403002B_242.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5e394c9b314a93df443a701140626de78be947bb89033ef9021eb62f8110a376
                                  • Instruction ID: 674afa15a6a76504e397ad763a82f6cdde3bc5b5291fcc3264f9d032b876f738
                                  • Opcode Fuzzy Hash: 5e394c9b314a93df443a701140626de78be947bb89033ef9021eb62f8110a376
                                  • Instruction Fuzzy Hash: 0D51ABB1E0020A9FCB18DF98C981BEEFBB5FB48310F144569E925A7341D735AA44CBA0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                                  • Associated: 00000000.00000002.3375807351.0000000000C20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3375843712.0000000000D4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376118583.0000000000D53000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000D57000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000EDE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F71000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FAD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376742562.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377002468.000000000111C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377050312.000000000111D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_c20000_LisectAVT_2403002B_242.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bb45bec87b737a7ea1d9f35da19df6ee9abbf0d89f9d6ca8b671d014c107286e
                                  • Instruction ID: 41c7335e926c32aae3124b19c3040bb51d39f7fdff1be41ada85033538b5ed79
                                  • Opcode Fuzzy Hash: bb45bec87b737a7ea1d9f35da19df6ee9abbf0d89f9d6ca8b671d014c107286e
                                  • Instruction Fuzzy Hash: DE518C72D00219AFDF04CF98D840BEEBBB2FF88300F198098E955AB245D7749A40CFA1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                                  • Associated: 00000000.00000002.3375807351.0000000000C20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3375843712.0000000000D4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376118583.0000000000D53000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000D57000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000EDE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F71000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FAD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376742562.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377002468.000000000111C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377050312.000000000111D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_c20000_LisectAVT_2403002B_242.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                  • Instruction ID: 4d86dec6aec91c425b2437633acee359af654495ad855682da68f51bb83ec917
                                  • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                  • Instruction Fuzzy Hash: 49112B7F20019347D605866EE4B47BAE3D5EBC632172D837AD0AA4B7D8D122EA459E20
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00C8F5B3
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00C8F5D5
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00C8F5F5
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00C8F61F
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00C8F68D
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00C8F6D9
                                  • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 00C8F6F3
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00C8F788
                                  • std::_Facet_Register.LIBCPMT ref: 00C8F795
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                                  • Associated: 00000000.00000002.3375807351.0000000000C20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3375843712.0000000000D4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376118583.0000000000D53000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000D57000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000EDE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F71000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FAD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376742562.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377002468.000000000111C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377050312.000000000111D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_c20000_LisectAVT_2403002B_242.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Locinfo::_$Facet_Locinfo_ctorLocinfo_dtorRegister
                                  • String ID: bad locale name$P#
                                  • API String ID: 3375549084-762106057
                                  • Opcode ID: adec29a684abd2514cd257ca39444a3b4e2728f9c5b535c2221e43526ff1c4ec
                                  • Instruction ID: 04f2a6ff2bce7caab1150489d3f1c23661ce1df233b8206c20a77d00e2db4ec5
                                  • Opcode Fuzzy Hash: adec29a684abd2514cd257ca39444a3b4e2728f9c5b535c2221e43526ff1c4ec
                                  • Instruction Fuzzy Hash: 816186B1D002589BDF10EFA4D985BAEBBB4EF14314F144128F914E7391E734EA06CBA5
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00C8DD13
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00C8DD36
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00C8DD56
                                  • std::_Facet_Register.LIBCPMT ref: 00C8DDCB
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00C8DDE3
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00C8DDFB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                                  • Associated: 00000000.00000002.3375807351.0000000000C20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3375843712.0000000000D4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376118583.0000000000D53000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000D57000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000EDE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F71000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FAD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376742562.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377002468.000000000111C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377050312.000000000111D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_c20000_LisectAVT_2403002B_242.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                  • String ID: PdN
                                  • API String ID: 2081738530-50869654
                                  • Opcode ID: 8a45a0bc2f0354c765255265bd166b9b77839e808090d42bc4b6c094774ffc28
                                  • Instruction ID: 626f0675899cab7c0d35c00dc5166ae15037c53e387a1f2bf483a3be330cb64a
                                  • Opcode Fuzzy Hash: 8a45a0bc2f0354c765255265bd166b9b77839e808090d42bc4b6c094774ffc28
                                  • Instruction Fuzzy Hash: 1731E175900329CFCB11EF44D980BAEBBB0FB01724F14425AE816A7391C730AE45CBE1
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00C969A8
                                  • __floor_pentium4.LIBCMT ref: 00C96ACB
                                  Strings
                                  • unordered_map/set too long, xrefs: 00C96B96
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                                  • Associated: 00000000.00000002.3375807351.0000000000C20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3375843712.0000000000D4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376118583.0000000000D53000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000D57000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000EDE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F71000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FAD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376742562.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377002468.000000000111C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377050312.000000000111D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_c20000_LisectAVT_2403002B_242.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task__floor_pentium4
                                  • String ID: unordered_map/set too long
                                  • API String ID: 1502093491-306623848
                                  • Opcode ID: adfce5862f3b549dd515d8895654c79d9189970c84146c8af1e0b80e63069c58
                                  • Instruction ID: 8927a71b33d1120511e679aa2e38c3aa4751b7a2a79ed454f42bdd8d65de3dec
                                  • Opcode Fuzzy Hash: adfce5862f3b549dd515d8895654c79d9189970c84146c8af1e0b80e63069c58
                                  • Instruction Fuzzy Hash: 94F11771A00214DFCF14DF68C985AAEBBB5FF44310F148269E869AB385E731EE51DB90
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                                  • Associated: 00000000.00000002.3375807351.0000000000C20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3375843712.0000000000D4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376118583.0000000000D53000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000D57000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000EDE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F71000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FAD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376742562.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377002468.000000000111C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377050312.000000000111D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_c20000_LisectAVT_2403002B_242.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: ", "$: "$recursive_directory_iterator::operator++
                                  • API String ID: 0-2763324178
                                  • Opcode ID: a043ec08d0746418ecbe0c9e9dd045487b1a55683eaf29a24c69b545d498c805
                                  • Instruction ID: 1dc42e2132a55373fe0671fd064acd086ce00dcf2f37223cc4ba1b4a74c1f35a
                                  • Opcode Fuzzy Hash: a043ec08d0746418ecbe0c9e9dd045487b1a55683eaf29a24c69b545d498c805
                                  • Instruction Fuzzy Hash: 5BC114B1900214AFC718EF64E885BAEBBF8FF05710F10462DF51697B81DB74AA04DBA5
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00C23A08
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00C23A54
                                  • __Getctype.LIBCPMT ref: 00C23A6A
                                  • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 00C23A96
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00C23B2B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                                  • Associated: 00000000.00000002.3375807351.0000000000C20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3375843712.0000000000D4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376118583.0000000000D53000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000D57000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000EDE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F71000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FAD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376742562.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377002468.000000000111C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377050312.000000000111D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_c20000_LisectAVT_2403002B_242.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Locinfo::_Lockit$GetctypeLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                  • String ID: bad locale name
                                  • API String ID: 1840309910-1405518554
                                  • Opcode ID: b07f7e719ebd58af48910af25d3006cfb3ea51edbed7dd085e4a523e061868da
                                  • Instruction ID: 3e26be34f3920bf16b7d08a159f6955573a9433a834c1ac4f000effb50bb62a9
                                  • Opcode Fuzzy Hash: b07f7e719ebd58af48910af25d3006cfb3ea51edbed7dd085e4a523e061868da
                                  • Instruction Fuzzy Hash: 065144B1D00258DFDF10DFD4D985B9EBBB8AF14314F184169E909AB381D779EA04CBA2
                                  APIs
                                  • _ValidateLocalCookies.LIBCMT ref: 00D01A17
                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 00D01A1F
                                  • _ValidateLocalCookies.LIBCMT ref: 00D01AA8
                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 00D01AD3
                                  • _ValidateLocalCookies.LIBCMT ref: 00D01B28
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                                  • Associated: 00000000.00000002.3375807351.0000000000C20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3375843712.0000000000D4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376118583.0000000000D53000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000D57000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000EDE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F71000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FAD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376742562.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377002468.000000000111C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377050312.000000000111D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_c20000_LisectAVT_2403002B_242.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                  • String ID: csm
                                  • API String ID: 1170836740-1018135373
                                  • Opcode ID: 019c9159650e567d97c15c377185220f03aaf72bad0e711e0287eb317477d85d
                                  • Instruction ID: 588dc92b4c2d15d3b0e628677935cc027a871821f2ca7e3cda2dd0d3c30d3058
                                  • Opcode Fuzzy Hash: 019c9159650e567d97c15c377185220f03aaf72bad0e711e0287eb317477d85d
                                  • Instruction Fuzzy Hash: 36419438A01218ABCF10DF68C885BAE7BA5FF45324F188155F8199B3D2D771DA06CBB1
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00C27796
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00C27931
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                                  • Associated: 00000000.00000002.3375807351.0000000000C20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3375843712.0000000000D4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376118583.0000000000D53000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000D57000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000EDE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F71000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FAD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376742562.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377002468.000000000111C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377050312.000000000111D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_c20000_LisectAVT_2403002B_242.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: out_of_range$type_error
                                  • API String ID: 2659868963-3702451861
                                  • Opcode ID: 48aa6c934616db370a1b201f500150b32f2c6d29036cc6b5ebd40df3c2ce56ab
                                  • Instruction ID: 783659a63fcc89793bd5516047a7400a1be74947b9676b182334da7353f8a338
                                  • Opcode Fuzzy Hash: 48aa6c934616db370a1b201f500150b32f2c6d29036cc6b5ebd40df3c2ce56ab
                                  • Instruction Fuzzy Hash: 8FA19FB1D002189FCB18DFA8E884BADBBF5EF49310F14822DE019E7B95D7749A44DB61
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00C2743E
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00C2744D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                                  • Associated: 00000000.00000002.3375807351.0000000000C20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3375843712.0000000000D4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376118583.0000000000D53000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000D57000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000EDE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F71000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FAD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376742562.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377002468.000000000111C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377050312.000000000111D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_c20000_LisectAVT_2403002B_242.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: at line $, column
                                  • API String ID: 4194217158-191570568
                                  • Opcode ID: 5fc687796ace9fb8aae484ab55bdadbd1f57efe9c29485acd431dba55e06b408
                                  • Instruction ID: 51e08f5fea3529b580ff1182a14838d902d759d00ee1e0b12e31832766a27c3d
                                  • Opcode Fuzzy Hash: 5fc687796ace9fb8aae484ab55bdadbd1f57efe9c29485acd431dba55e06b408
                                  • Instruction Fuzzy Hash: 75618EB0D042189FCB18DF68E885BADFBB1FF49310F14826DE419A7782D77499819BA0
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00C23E2F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                                  • Associated: 00000000.00000002.3375807351.0000000000C20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3375843712.0000000000D4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376118583.0000000000D53000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000D57000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000EDE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F71000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FAD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376742562.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377002468.000000000111C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377050312.000000000111D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_c20000_LisectAVT_2403002B_242.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                  • API String ID: 2659868963-1866435925
                                  • Opcode ID: aeb0b8d0aece4fbbba2c5b1fa4af10043b7fabbd4bb6af600f9ba16d5b10c7e7
                                  • Instruction ID: 4a9bb57ecc202aa82f66a276248e70cbb748ec5ae5404a81ea1ec4aa4b9ccd02
                                  • Opcode Fuzzy Hash: aeb0b8d0aece4fbbba2c5b1fa4af10043b7fabbd4bb6af600f9ba16d5b10c7e7
                                  • Instruction Fuzzy Hash: 1341B4B6900258AFC704DF58E841BAEB7F8EF49710F14852EF91997741D774AA05CBA0
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00C23E2F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                                  • Associated: 00000000.00000002.3375807351.0000000000C20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3375843712.0000000000D4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376118583.0000000000D53000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000D57000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000EDE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F71000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FAD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376742562.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377002468.000000000111C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377050312.000000000111D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_c20000_LisectAVT_2403002B_242.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                  • API String ID: 2659868963-1866435925
                                  • Opcode ID: d5f9237bf77a2131fcba5507f9c3f7ae9502d0ab1e6e618f02bce65a370a5366
                                  • Instruction ID: c29496a7bacfaad1ceb4a37abe9cef0a34ee6ac184d5d71c7c7762e977978ff4
                                  • Opcode Fuzzy Hash: d5f9237bf77a2131fcba5507f9c3f7ae9502d0ab1e6e618f02bce65a370a5366
                                  • Instruction Fuzzy Hash: FE21E7B39107186FC714DF58E801B96B7E8EF55310F08886AFA6887741E774EA15CBA1
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 00CFCF40
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00CFCF4B
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00CFCFB9
                                    • Part of subcall function 00CFD09C: std::locale::_Locimp::_Locimp.LIBCPMT ref: 00CFD0B4
                                  • std::locale::_Setgloballocale.LIBCPMT ref: 00CFCF66
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                                  • Associated: 00000000.00000002.3375807351.0000000000C20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3375843712.0000000000D4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376118583.0000000000D53000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000D57000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000EDE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F71000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FAD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376742562.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377002468.000000000111C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377050312.000000000111D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_c20000_LisectAVT_2403002B_242.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                                  • String ID:
                                  • API String ID: 677527491-0
                                  • Opcode ID: 89db6e069501a444935f3a0629f388cc2b4b11538441e3bf6599963cd2a17c48
                                  • Instruction ID: aba94f21605ca3b14b98e1352e839dcf05c970de05976600a7260c38983ae9b5
                                  • Opcode Fuzzy Hash: 89db6e069501a444935f3a0629f388cc2b4b11538441e3bf6599963cd2a17c48
                                  • Instruction Fuzzy Hash: F601DF75A0032D9BDB46EB20D89167D7B72BF94750B180009FA1297391CF346E02DBE7
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00C271A9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                                  • Associated: 00000000.00000002.3375807351.0000000000C20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3375843712.0000000000D4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376118583.0000000000D53000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000D57000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000EDE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F71000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FAD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376742562.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377002468.000000000111C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377050312.000000000111D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_c20000_LisectAVT_2403002B_242.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: parse error$parse_error
                                  • API String ID: 2659868963-1820534363
                                  • Opcode ID: eb7b276d7281b5bcee3830b3825de77fdaed96a8fd3955fe44b14d345723ea3a
                                  • Instruction ID: c7ce4cd8bb7cdabc6f48564e5fc5152d7be5c0e634d5e56b66a83803c45db01e
                                  • Opcode Fuzzy Hash: eb7b276d7281b5bcee3830b3825de77fdaed96a8fd3955fe44b14d345723ea3a
                                  • Instruction Fuzzy Hash: A8B18E70D04219CFDB18CF68EC84BADBBB1FF49300F148269E419AB792D7749A85DB61
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00C961A6
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00C96341
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                                  • Associated: 00000000.00000002.3375807351.0000000000C20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3375843712.0000000000D4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376118583.0000000000D53000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000D57000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000EDE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F71000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FAD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376742562.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377002468.000000000111C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377050312.000000000111D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_c20000_LisectAVT_2403002B_242.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID: Py"v
                                  • API String ID: 118556049-2948403528
                                  • Opcode ID: e7a8cd3e906cd43a7de6ae8cd2f6c2b45c7cc15296be1d2469c0358157dc966d
                                  • Instruction ID: 6054e0f90445eea142096699bf43cc2769b58acfe79f640da2a99bc88a5e95a5
                                  • Opcode Fuzzy Hash: e7a8cd3e906cd43a7de6ae8cd2f6c2b45c7cc15296be1d2469c0358157dc966d
                                  • Instruction Fuzzy Hash: 0C81E3B2A00605AFCB08DF68DD8997EB7A5EB45310B14832DE815D73D1EB30EE55CBA1
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00C26E51
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00C26E60
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                                  • Associated: 00000000.00000002.3375807351.0000000000C20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3375843712.0000000000D4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376118583.0000000000D53000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000D57000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000EDE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F71000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FAD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376742562.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377002468.000000000111C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377050312.000000000111D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_c20000_LisectAVT_2403002B_242.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: [json.exception.
                                  • API String ID: 4194217158-791563284
                                  • Opcode ID: d64613219029a7562e8e838429f3d114631b8fd555c1a9c580699a88d9d26d17
                                  • Instruction ID: 808f2054fe7bc7a1b27e02a369516ed44f982b2a2b9b5c283181e7c95dddc3b4
                                  • Opcode Fuzzy Hash: d64613219029a7562e8e838429f3d114631b8fd555c1a9c580699a88d9d26d17
                                  • Instruction Fuzzy Hash: C971D7709002099FD718DF68E884B6DFBF5FF49310F14825DE4199BB82D774AA84DBA0
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00C9D6B0
                                  Strings
                                  • type must be boolean, but is , xrefs: 00C9D7A2
                                  • type must be string, but is , xrefs: 00C9D718
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3375843712.0000000000C21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                                  • Associated: 00000000.00000002.3375807351.0000000000C20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3375843712.0000000000D4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376118583.0000000000D53000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000D57000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000EDE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F6E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F71000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000F9E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FAD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376159397.0000000000FBB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3376742562.0000000000FBC000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377002468.000000000111C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3377050312.000000000111D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_c20000_LisectAVT_2403002B_242.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID: type must be boolean, but is $type must be string, but is
                                  • API String ID: 118556049-436076039
                                  • Opcode ID: eebccfb98da04d366e154a754904eb12d9f53b5fd833430bf3222ee2a64b55f4
                                  • Instruction ID: 3af3fcbd020b995db32f36c5a1a29dea3e365135be318cdad187c3e1455cb0e5
                                  • Opcode Fuzzy Hash: eebccfb98da04d366e154a754904eb12d9f53b5fd833430bf3222ee2a64b55f4
                                  • Instruction Fuzzy Hash: 15412AB2D00248AFC700EFA8E805B9DF7A8EF14710F14457AF41AD7781E775AA54C7A2

                                  Execution Graph

                                  Execution Coverage:3.2%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:0%
                                  Total number of Nodes:598
                                  Total number of Limit Nodes:60
                                  execution_graph 16128 829d90 16159 8fde82 16128->16159 16130 829dc6 16164 903f30 16130->16164 16134 829ede std::_Throw_Cpp_error 16137 829eb3 16137->16134 16199 903380 16137->16199 16140 907d06 4 API calls 16141 829e63 16140->16141 16146 829e7c 16141->16146 16179 88cd30 16141->16179 16190 90c7af 16146->16190 16161 822260 Concurrency::cancel_current_task ___std_exception_copy std::_Facet_Register 16159->16161 16160 8fdea1 16160->16130 16161->16160 16202 8ff22a 16161->16202 16420 903e6e 16164->16420 16166 829e3d 16166->16137 16167 907d06 16166->16167 16168 907d19 __fread_nolock 16167->16168 16444 907a5d 16168->16444 16170 907d2e 16171 9030ac __fread_nolock RtlAllocateHeap 16170->16171 16172 829e51 16171->16172 16173 903abb 16172->16173 16174 903ace __fread_nolock 16173->16174 16577 9033d1 16174->16577 16176 903ada 16177 9030ac __fread_nolock RtlAllocateHeap 16176->16177 16178 829e57 16177->16178 16178->16140 16180 88cd81 16179->16180 16183 88cd52 __fread_nolock 16179->16183 16181 88ce87 16180->16181 16184 88cd90 16180->16184 16639 822300 16181->16639 16183->16146 16625 822d70 16184->16625 16186 903380 std::_Throw_Cpp_error RtlAllocateHeap 16187 88ce91 16186->16187 16188 88cdd7 __fread_nolock std::_Locinfo::_Locinfo_ctor 16188->16186 16189 88ce3e __fread_nolock std::_Throw_Cpp_error std::_Locinfo::_Locinfo_ctor 16188->16189 16189->16146 16661 90c7cc 16190->16661 16192 829ead 16193 9077b8 16192->16193 16194 9077cb __fread_nolock 16193->16194 16785 907693 16194->16785 16196 9077d7 16197 9030ac __fread_nolock RtlAllocateHeap 16196->16197 16198 9077e3 16197->16198 16198->16137 16200 9032bc __fread_nolock RtlAllocateHeap 16199->16200 16201 90338f __Getctype 16200->16201 16203 8ff237 ___std_exception_copy 16202->16203 16207 8222a3 16202->16207 16204 8ff264 16203->16204 16203->16207 16208 914039 16203->16208 16217 90c3a6 16204->16217 16207->16130 16209 914047 16208->16209 16210 914055 16208->16210 16209->16210 16215 91406d 16209->16215 16220 90be0f 16210->16220 16212 91405d 16223 903370 16212->16223 16214 914067 16214->16204 16215->16214 16216 90be0f __dosmaperr RtlAllocateHeap 16215->16216 16216->16212 16218 915733 ___std_exception_destroy RtlAllocateHeap 16217->16218 16219 90c3be 16218->16219 16219->16207 16226 9146ac 16220->16226 16331 9032bc 16223->16331 16227 9146b6 __dosmaperr 16226->16227 16234 90be14 16227->16234 16237 914d73 16227->16237 16229 9146f9 __dosmaperr 16230 914701 __dosmaperr 16229->16230 16231 914739 16229->16231 16241 915733 16230->16241 16245 914389 16231->16245 16234->16212 16236 915733 ___std_exception_destroy RtlAllocateHeap 16236->16234 16240 914d80 __dosmaperr std::_Facet_Register 16237->16240 16238 914dab RtlAllocateHeap 16239 914dbe __dosmaperr 16238->16239 16238->16240 16239->16229 16240->16238 16240->16239 16242 91573e __dosmaperr 16241->16242 16244 915768 16241->16244 16243 90be0f __dosmaperr RtlAllocateHeap 16242->16243 16242->16244 16243->16244 16244->16234 16246 9143f7 __dosmaperr 16245->16246 16249 91432f 16246->16249 16248 914420 16248->16236 16250 91433b __fread_nolock std::_Lockit::_Lockit 16249->16250 16253 914510 16250->16253 16252 91435d __dosmaperr 16252->16248 16254 91451f __Getctype 16253->16254 16255 914546 __Getctype 16253->16255 16254->16255 16257 91c864 16254->16257 16255->16252 16259 91c8e4 16257->16259 16261 91c87a 16257->16261 16260 915733 ___std_exception_destroy RtlAllocateHeap 16259->16260 16283 91c932 16259->16283 16262 91c906 16260->16262 16261->16259 16263 91c8ad 16261->16263 16267 915733 ___std_exception_destroy RtlAllocateHeap 16261->16267 16264 915733 ___std_exception_destroy RtlAllocateHeap 16262->16264 16269 915733 ___std_exception_destroy RtlAllocateHeap 16263->16269 16284 91c8cf 16263->16284 16265 91c919 16264->16265 16268 915733 ___std_exception_destroy RtlAllocateHeap 16265->16268 16266 915733 ___std_exception_destroy RtlAllocateHeap 16270 91c8d9 16266->16270 16272 91c8a2 16267->16272 16274 91c927 16268->16274 16275 91c8c4 16269->16275 16276 915733 ___std_exception_destroy RtlAllocateHeap 16270->16276 16271 91c9a0 16277 915733 ___std_exception_destroy RtlAllocateHeap 16271->16277 16285 91bb68 16272->16285 16273 91c940 16273->16271 16281 915733 RtlAllocateHeap ___std_exception_destroy 16273->16281 16279 915733 ___std_exception_destroy RtlAllocateHeap 16274->16279 16313 91bfc7 16275->16313 16276->16259 16282 91c9a6 16277->16282 16279->16283 16281->16273 16282->16255 16325 91c9d5 16283->16325 16284->16266 16286 91bb79 16285->16286 16312 91bc62 16285->16312 16287 91bb8a 16286->16287 16288 915733 ___std_exception_destroy RtlAllocateHeap 16286->16288 16289 91bb9c 16287->16289 16290 915733 ___std_exception_destroy RtlAllocateHeap 16287->16290 16288->16287 16291 91bbae 16289->16291 16292 915733 ___std_exception_destroy RtlAllocateHeap 16289->16292 16290->16289 16293 91bbc0 16291->16293 16294 915733 ___std_exception_destroy RtlAllocateHeap 16291->16294 16292->16291 16295 91bbd2 16293->16295 16296 915733 ___std_exception_destroy RtlAllocateHeap 16293->16296 16294->16293 16297 91bbe4 16295->16297 16298 915733 ___std_exception_destroy RtlAllocateHeap 16295->16298 16296->16295 16299 915733 ___std_exception_destroy RtlAllocateHeap 16297->16299 16300 91bbf6 16297->16300 16298->16297 16299->16300 16301 91bc08 16300->16301 16302 915733 ___std_exception_destroy RtlAllocateHeap 16300->16302 16303 91bc1a 16301->16303 16304 915733 ___std_exception_destroy RtlAllocateHeap 16301->16304 16302->16301 16305 91bc2c 16303->16305 16306 915733 ___std_exception_destroy RtlAllocateHeap 16303->16306 16304->16303 16307 91bc3e 16305->16307 16308 915733 ___std_exception_destroy RtlAllocateHeap 16305->16308 16306->16305 16309 91bc50 16307->16309 16310 915733 ___std_exception_destroy RtlAllocateHeap 16307->16310 16308->16307 16311 915733 ___std_exception_destroy RtlAllocateHeap 16309->16311 16309->16312 16310->16309 16311->16312 16312->16263 16314 91bfd4 16313->16314 16315 91c02c 16313->16315 16316 91bfe4 16314->16316 16317 915733 ___std_exception_destroy RtlAllocateHeap 16314->16317 16315->16284 16318 91bff6 16316->16318 16319 915733 ___std_exception_destroy RtlAllocateHeap 16316->16319 16317->16316 16320 91c008 16318->16320 16321 915733 ___std_exception_destroy RtlAllocateHeap 16318->16321 16319->16318 16322 91c01a 16320->16322 16323 915733 ___std_exception_destroy RtlAllocateHeap 16320->16323 16321->16320 16322->16315 16324 915733 ___std_exception_destroy RtlAllocateHeap 16322->16324 16323->16322 16324->16315 16326 91c9e2 16325->16326 16330 91ca01 16325->16330 16327 91c4ee __Getctype RtlAllocateHeap 16326->16327 16326->16330 16328 91c9fb 16327->16328 16329 915733 ___std_exception_destroy RtlAllocateHeap 16328->16329 16329->16330 16330->16273 16332 9032ce __fread_nolock 16331->16332 16337 9032f3 16332->16337 16334 9032e6 16344 9030ac 16334->16344 16338 903303 16337->16338 16340 90330a __fread_nolock __Getctype 16337->16340 16350 903111 16338->16350 16341 903318 16340->16341 16342 9032bc __fread_nolock RtlAllocateHeap 16340->16342 16341->16334 16343 90337c 16342->16343 16343->16334 16345 9030b8 16344->16345 16348 9030cf 16345->16348 16365 903157 16345->16365 16347 9030e2 16347->16214 16348->16347 16349 903157 __fread_nolock RtlAllocateHeap 16348->16349 16349->16347 16351 903121 16350->16351 16354 91475d 16351->16354 16355 914770 __dosmaperr 16354->16355 16356 914d73 __dosmaperr RtlAllocateHeap 16355->16356 16364 903142 16355->16364 16357 9147a0 __dosmaperr 16356->16357 16358 9147dc 16357->16358 16359 9147a8 __dosmaperr 16357->16359 16360 914389 __dosmaperr RtlAllocateHeap 16358->16360 16361 915733 ___std_exception_destroy RtlAllocateHeap 16359->16361 16362 9147e7 16360->16362 16361->16364 16363 915733 ___std_exception_destroy RtlAllocateHeap 16362->16363 16363->16364 16364->16340 16366 903161 16365->16366 16367 90316a 16365->16367 16368 903111 __fread_nolock RtlAllocateHeap 16366->16368 16367->16348 16369 903166 16368->16369 16369->16367 16372 90e85a 16369->16372 16371 903173 16373 90e85f std::locale::_Setgloballocale 16372->16373 16376 90e86a std::locale::_Setgloballocale 16373->16376 16378 919d83 16373->16378 16399 90ddf2 16376->16399 16377 90e89d __Getctype std::locale::_Setgloballocale 16377->16371 16381 919d8f __fread_nolock 16378->16381 16379 9146ac __dosmaperr RtlAllocateHeap 16385 919dc0 std::locale::_Setgloballocale 16379->16385 16380 919ddf 16383 90be0f __dosmaperr RtlAllocateHeap 16380->16383 16381->16379 16381->16380 16381->16385 16387 919df1 std::_Lockit::_Lockit std::locale::_Setgloballocale 16381->16387 16382 919dc9 16382->16376 16384 919de4 16383->16384 16386 903370 __fread_nolock RtlAllocateHeap 16384->16386 16385->16380 16385->16382 16385->16387 16386->16382 16388 919e64 16387->16388 16389 919f61 std::_Lockit::~_Lockit 16387->16389 16391 919e92 std::locale::_Setgloballocale 16387->16391 16388->16391 16402 91455b 16388->16402 16390 90ddf2 std::locale::_Setgloballocale RtlAllocateHeap 16389->16390 16393 919f74 16390->16393 16391->16382 16394 91455b __Getctype RtlAllocateHeap 16391->16394 16397 919ee7 16391->16397 16394->16397 16396 91455b __Getctype RtlAllocateHeap 16396->16391 16397->16382 16398 91455b __Getctype RtlAllocateHeap 16397->16398 16398->16382 16416 90dc62 16399->16416 16401 90de03 16401->16377 16403 914565 __dosmaperr 16402->16403 16404 914d73 __dosmaperr RtlAllocateHeap 16403->16404 16405 91457b 16403->16405 16407 9145a8 __dosmaperr 16404->16407 16406 91460b 16405->16406 16408 90e85a __Getctype RtlAllocateHeap 16405->16408 16406->16396 16410 9145b0 __dosmaperr 16407->16410 16411 9145e8 16407->16411 16409 914615 16408->16409 16412 915733 ___std_exception_destroy RtlAllocateHeap 16410->16412 16413 914389 __dosmaperr RtlAllocateHeap 16411->16413 16412->16405 16414 9145f3 16413->16414 16415 915733 ___std_exception_destroy RtlAllocateHeap 16414->16415 16415->16405 16417 90dc8f std::locale::_Setgloballocale 16416->16417 16418 90daf3 std::locale::_Setgloballocale RtlAllocateHeap 16417->16418 16419 90dcd8 std::locale::_Setgloballocale 16418->16419 16419->16401 16423 903e7a __fread_nolock 16420->16423 16421 903e81 16422 90be0f __dosmaperr RtlAllocateHeap 16421->16422 16424 903e86 16422->16424 16423->16421 16425 903ea1 16423->16425 16426 903370 __fread_nolock RtlAllocateHeap 16424->16426 16427 903eb3 16425->16427 16428 903ea6 16425->16428 16433 903e91 16426->16433 16434 915008 16427->16434 16429 90be0f __dosmaperr RtlAllocateHeap 16428->16429 16429->16433 16431 903ebc 16432 90be0f __dosmaperr RtlAllocateHeap 16431->16432 16431->16433 16432->16433 16433->16166 16435 915014 __fread_nolock std::_Lockit::_Lockit 16434->16435 16438 9150ac 16435->16438 16437 91502f 16437->16431 16442 9150cf __fread_nolock 16438->16442 16439 914d73 __dosmaperr RtlAllocateHeap 16440 915130 16439->16440 16441 915733 ___std_exception_destroy RtlAllocateHeap 16440->16441 16443 915115 __fread_nolock std::locale::_Setgloballocale 16441->16443 16442->16439 16442->16442 16442->16443 16443->16437 16447 907a69 __fread_nolock 16444->16447 16445 907a6f 16446 9032f3 __fread_nolock RtlAllocateHeap 16445->16446 16450 907a8a 16446->16450 16447->16445 16448 907ab2 __fread_nolock 16447->16448 16451 907be0 16448->16451 16450->16170 16452 907bf3 16451->16452 16453 907c06 16451->16453 16452->16450 16460 907b07 16453->16460 16455 907c29 16459 907cb7 16455->16459 16464 9041a1 16455->16464 16459->16450 16461 907b70 16460->16461 16462 907b18 16460->16462 16461->16455 16462->16461 16473 90cd0d 16462->16473 16465 9041ba 16464->16465 16469 9041e1 16464->16469 16465->16469 16500 914902 16465->16500 16467 9041d6 16507 913d0c 16467->16507 16470 90cd4d 16469->16470 16471 90cc2c __fread_nolock 2 API calls 16470->16471 16472 90cd66 16471->16472 16472->16459 16474 90cd21 __fread_nolock 16473->16474 16479 90cc2c 16474->16479 16476 90cd36 16477 9030ac __fread_nolock RtlAllocateHeap 16476->16477 16478 90cd45 16477->16478 16478->16461 16484 91905e 16479->16484 16481 90cc3e 16482 90cc5a SetFilePointerEx 16481->16482 16483 90cc46 __fread_nolock 16481->16483 16482->16483 16483->16476 16485 91906b 16484->16485 16487 919080 16484->16487 16497 90bdfc 16485->16497 16489 90bdfc __dosmaperr RtlAllocateHeap 16487->16489 16491 9190a5 16487->16491 16492 9190b0 16489->16492 16490 90be0f __dosmaperr RtlAllocateHeap 16493 919078 16490->16493 16491->16481 16494 90be0f __dosmaperr RtlAllocateHeap 16492->16494 16493->16481 16495 9190b8 16494->16495 16496 903370 __fread_nolock RtlAllocateHeap 16495->16496 16496->16493 16498 9146ac __dosmaperr RtlAllocateHeap 16497->16498 16499 90be01 16498->16499 16499->16490 16501 914923 16500->16501 16502 91490e 16500->16502 16501->16467 16503 90be0f __dosmaperr RtlAllocateHeap 16502->16503 16504 914913 16503->16504 16505 903370 __fread_nolock RtlAllocateHeap 16504->16505 16506 91491e 16505->16506 16506->16467 16508 913d18 __fread_nolock 16507->16508 16509 913d59 16508->16509 16511 913d9f 16508->16511 16513 913d20 16508->16513 16510 9032f3 __fread_nolock RtlAllocateHeap 16509->16510 16510->16513 16511->16513 16514 913e1d 16511->16514 16513->16469 16515 913e45 16514->16515 16527 913e68 __fread_nolock 16514->16527 16516 913e49 16515->16516 16518 913ea4 16515->16518 16517 9032f3 __fread_nolock RtlAllocateHeap 16516->16517 16517->16527 16519 913ec2 16518->16519 16520 90cd4d 2 API calls 16518->16520 16528 913962 16519->16528 16520->16519 16523 913f21 16525 913f8a WriteFile 16523->16525 16523->16527 16524 913eda 16524->16527 16533 913533 16524->16533 16525->16527 16527->16513 16539 91e301 16528->16539 16530 913974 16532 9139a2 16530->16532 16548 9088e0 16530->16548 16532->16523 16532->16524 16534 91359c 16533->16534 16535 9088e0 std::_Locinfo::_Locinfo_ctor 2 API calls 16534->16535 16537 9135ac std::_Locinfo::_Locinfo_ctor 16534->16537 16535->16537 16536 913862 _ValidateLocalCookies 16536->16527 16537->16536 16538 916e3e RtlAllocateHeap RtlAllocateHeap 16537->16538 16538->16537 16540 91e31b 16539->16540 16541 91e30e 16539->16541 16543 91e327 16540->16543 16544 90be0f __dosmaperr RtlAllocateHeap 16540->16544 16542 90be0f __dosmaperr RtlAllocateHeap 16541->16542 16545 91e313 16542->16545 16543->16530 16546 91e348 16544->16546 16545->16530 16547 903370 __fread_nolock RtlAllocateHeap 16546->16547 16547->16545 16549 903157 __fread_nolock RtlAllocateHeap 16548->16549 16550 9088f0 16549->16550 16555 914873 16550->16555 16556 90890d 16555->16556 16557 91488a 16555->16557 16559 9148d1 16556->16559 16557->16556 16563 91cab0 16557->16563 16560 9148e8 16559->16560 16562 90891a 16559->16562 16560->16562 16572 91addb 16560->16572 16562->16532 16564 91cabc __fread_nolock 16563->16564 16565 91455b __Getctype RtlAllocateHeap 16564->16565 16567 91cac5 std::_Lockit::_Lockit 16565->16567 16566 91cb0b 16566->16556 16567->16566 16568 91cb31 __Getctype RtlAllocateHeap 16567->16568 16569 91caf4 __Getctype 16568->16569 16569->16566 16570 90e85a __Getctype RtlAllocateHeap 16569->16570 16571 91cb30 16570->16571 16573 91455b __Getctype RtlAllocateHeap 16572->16573 16574 91ade0 16573->16574 16575 91acf3 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 16574->16575 16576 91adeb 16575->16576 16576->16562 16578 9033dd __fread_nolock 16577->16578 16579 9033e4 16578->16579 16581 903405 __fread_nolock 16578->16581 16580 9032f3 __fread_nolock RtlAllocateHeap 16579->16580 16583 9033fd 16580->16583 16584 9034e0 16581->16584 16583->16176 16587 903512 16584->16587 16586 9034f2 16586->16583 16588 903521 16587->16588 16589 903549 16587->16589 16590 9032f3 __fread_nolock RtlAllocateHeap 16588->16590 16591 914902 __fread_nolock RtlAllocateHeap 16589->16591 16599 90353c __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 16590->16599 16592 903552 16591->16592 16600 90ccef 16592->16600 16595 9035fc 16603 90387e 16595->16603 16597 903613 16597->16599 16611 9036b3 16597->16611 16599->16586 16618 90cb07 16600->16618 16602 903570 16602->16595 16602->16597 16602->16599 16604 90388d 16603->16604 16605 914902 __fread_nolock RtlAllocateHeap 16604->16605 16606 9038a9 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 16605->16606 16607 90ccef 2 API calls 16606->16607 16610 9038b5 _ValidateLocalCookies 16606->16610 16608 903909 16607->16608 16609 90ccef 2 API calls 16608->16609 16608->16610 16609->16610 16610->16599 16612 914902 __fread_nolock RtlAllocateHeap 16611->16612 16613 9036c6 16612->16613 16614 90ccef 2 API calls 16613->16614 16617 903710 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 16613->16617 16615 90376d 16614->16615 16616 90ccef 2 API calls 16615->16616 16615->16617 16616->16617 16617->16599 16619 90cb13 __fread_nolock 16618->16619 16620 90cb56 16619->16620 16622 90cb9c 16619->16622 16624 90cb1b 16619->16624 16621 9032f3 __fread_nolock RtlAllocateHeap 16620->16621 16621->16624 16623 90cc2c __fread_nolock 2 API calls 16622->16623 16622->16624 16623->16624 16624->16602 16626 822d82 16625->16626 16629 822da6 16625->16629 16627 822d89 16626->16627 16628 822dbf 16626->16628 16631 8fde82 std::_Facet_Register RtlAllocateHeap 16627->16631 16648 822260 16628->16648 16630 822db8 16629->16630 16632 8fde82 std::_Facet_Register RtlAllocateHeap 16629->16632 16630->16188 16634 822d8f 16631->16634 16635 822db0 16632->16635 16636 822d98 16634->16636 16637 903380 std::_Throw_Cpp_error RtlAllocateHeap 16634->16637 16635->16188 16636->16188 16638 822dc9 16637->16638 16652 8fc4f9 16639->16652 16649 82226e Concurrency::cancel_current_task 16648->16649 16650 8ff22a ___std_exception_copy RtlAllocateHeap 16649->16650 16651 8222a3 16650->16651 16651->16634 16655 8fc2bf 16652->16655 16654 8fc50a Concurrency::cancel_current_task 16658 822fa0 16655->16658 16659 8ff22a ___std_exception_copy RtlAllocateHeap 16658->16659 16660 822fcd 16659->16660 16660->16654 16662 90c7d8 __fread_nolock 16661->16662 16663 90c822 __fread_nolock 16662->16663 16664 90c7eb __fread_nolock 16662->16664 16668 90c810 __fread_nolock 16662->16668 16670 90c5d6 16663->16670 16665 90be0f __dosmaperr RtlAllocateHeap 16664->16665 16667 90c805 16665->16667 16669 903370 __fread_nolock RtlAllocateHeap 16667->16669 16668->16192 16669->16668 16671 90c605 16670->16671 16674 90c5e8 __fread_nolock 16670->16674 16671->16668 16672 90c5f5 16673 90be0f __dosmaperr RtlAllocateHeap 16672->16673 16681 90c5fa 16673->16681 16674->16671 16674->16672 16676 90c646 __fread_nolock 16674->16676 16675 903370 __fread_nolock RtlAllocateHeap 16675->16671 16676->16671 16678 914902 __fread_nolock RtlAllocateHeap 16676->16678 16680 90c771 __fread_nolock 16676->16680 16683 912fa4 16676->16683 16742 9075fb 16676->16742 16678->16676 16679 90be0f __dosmaperr RtlAllocateHeap 16679->16681 16680->16679 16681->16675 16684 912fb6 16683->16684 16685 912fce 16683->16685 16686 90bdfc __dosmaperr RtlAllocateHeap 16684->16686 16687 913310 16685->16687 16692 913011 16685->16692 16688 912fbb 16686->16688 16689 90bdfc __dosmaperr RtlAllocateHeap 16687->16689 16691 90be0f __dosmaperr RtlAllocateHeap 16688->16691 16690 913315 16689->16690 16693 90be0f __dosmaperr RtlAllocateHeap 16690->16693 16696 912fc3 16691->16696 16694 91301c 16692->16694 16692->16696 16701 91304c 16692->16701 16695 913029 16693->16695 16697 90bdfc __dosmaperr RtlAllocateHeap 16694->16697 16700 903370 __fread_nolock RtlAllocateHeap 16695->16700 16696->16676 16698 913021 16697->16698 16699 90be0f __dosmaperr RtlAllocateHeap 16698->16699 16699->16695 16700->16696 16702 913065 16701->16702 16703 9130a0 16701->16703 16704 913072 16701->16704 16702->16704 16708 91308e 16702->16708 16756 9157ad 16703->16756 16705 90bdfc __dosmaperr RtlAllocateHeap 16704->16705 16707 913077 16705->16707 16710 90be0f __dosmaperr RtlAllocateHeap 16707->16710 16711 91e301 __fread_nolock RtlAllocateHeap 16708->16711 16713 91307e 16710->16713 16724 9131ec 16711->16724 16712 915733 ___std_exception_destroy RtlAllocateHeap 16714 9130ba 16712->16714 16715 903370 __fread_nolock RtlAllocateHeap 16713->16715 16717 915733 ___std_exception_destroy RtlAllocateHeap 16714->16717 16741 913089 __fread_nolock 16715->16741 16716 913264 ReadFile 16718 9132d8 16716->16718 16719 91327c 16716->16719 16720 9130c1 16717->16720 16728 9132e5 16718->16728 16739 913236 16718->16739 16719->16718 16738 913255 16719->16738 16721 9130e6 16720->16721 16722 9130cb 16720->16722 16723 90cd0d __fread_nolock 2 API calls 16721->16723 16725 90be0f __dosmaperr RtlAllocateHeap 16722->16725 16723->16708 16724->16716 16727 91321c 16724->16727 16729 9130d0 16725->16729 16726 915733 ___std_exception_destroy RtlAllocateHeap 16726->16696 16727->16738 16727->16739 16730 90be0f __dosmaperr RtlAllocateHeap 16728->16730 16733 90bdfc __dosmaperr RtlAllocateHeap 16729->16733 16734 9132ea 16730->16734 16731 9132a1 16767 912cb6 16731->16767 16732 9132b8 16732->16741 16777 912afc 16732->16777 16733->16741 16740 90bdfc __dosmaperr RtlAllocateHeap 16734->16740 16738->16731 16738->16732 16738->16741 16739->16741 16762 90bdb5 16739->16762 16740->16741 16741->16726 16743 90760c 16742->16743 16746 907608 std::_Locinfo::_Locinfo_ctor 16742->16746 16744 907613 16743->16744 16748 907626 __fread_nolock 16743->16748 16745 90be0f __dosmaperr RtlAllocateHeap 16744->16745 16747 907618 16745->16747 16746->16676 16749 903370 __fread_nolock RtlAllocateHeap 16747->16749 16748->16746 16750 907654 16748->16750 16751 90765d 16748->16751 16749->16746 16752 90be0f __dosmaperr RtlAllocateHeap 16750->16752 16751->16746 16754 90be0f __dosmaperr RtlAllocateHeap 16751->16754 16753 907659 16752->16753 16755 903370 __fread_nolock RtlAllocateHeap 16753->16755 16754->16753 16755->16746 16757 9157eb 16756->16757 16761 9157bb __dosmaperr std::_Facet_Register 16756->16761 16759 90be0f __dosmaperr RtlAllocateHeap 16757->16759 16758 9157d6 RtlAllocateHeap 16760 9130b1 16758->16760 16758->16761 16759->16760 16760->16712 16761->16757 16761->16758 16763 90bdfc __dosmaperr RtlAllocateHeap 16762->16763 16764 90bdc0 __dosmaperr 16763->16764 16765 90be0f __dosmaperr RtlAllocateHeap 16764->16765 16766 90bdd3 16765->16766 16766->16741 16781 9129af 16767->16781 16770 912d48 16771 90be0f __dosmaperr RtlAllocateHeap 16770->16771 16773 912cfe 16771->16773 16772 912d58 16774 90cd0d __fread_nolock 2 API calls 16772->16774 16775 912d12 __fread_nolock 16772->16775 16773->16741 16774->16775 16775->16773 16776 90bdb5 __dosmaperr RtlAllocateHeap 16775->16776 16776->16773 16779 912b36 16777->16779 16778 912bc7 16778->16741 16779->16778 16780 90cd0d __fread_nolock 2 API calls 16779->16780 16780->16778 16782 9129e3 16781->16782 16783 912a4f 16782->16783 16784 90cd0d __fread_nolock 2 API calls 16782->16784 16783->16770 16783->16772 16783->16773 16783->16775 16784->16783 16786 90769f __fread_nolock 16785->16786 16787 9076a9 16786->16787 16790 9076cc __fread_nolock 16786->16790 16788 9032f3 __fread_nolock RtlAllocateHeap 16787->16788 16789 9076c4 16788->16789 16789->16196 16790->16789 16792 90772a 16790->16792 16793 907737 16792->16793 16794 90775a 16792->16794 16795 9032f3 __fread_nolock RtlAllocateHeap 16793->16795 16796 907752 16794->16796 16797 9041a1 4 API calls 16794->16797 16795->16796 16796->16789 16798 907772 16797->16798 16806 91576d 16798->16806 16801 914902 __fread_nolock RtlAllocateHeap 16802 907786 16801->16802 16810 9133c0 16802->16810 16805 915733 ___std_exception_destroy RtlAllocateHeap 16805->16796 16807 915784 16806->16807 16808 90777a 16806->16808 16807->16808 16809 915733 ___std_exception_destroy RtlAllocateHeap 16807->16809 16808->16801 16809->16808 16811 9133e9 16810->16811 16816 90778d 16810->16816 16812 913438 16811->16812 16814 913410 16811->16814 16813 9032f3 __fread_nolock RtlAllocateHeap 16812->16813 16813->16816 16817 91332f 16814->16817 16816->16796 16816->16805 16818 91333b __fread_nolock 16817->16818 16820 91337a 16818->16820 16821 913493 16818->16821 16820->16816 16822 91905e __fread_nolock RtlAllocateHeap 16821->16822 16823 9134a3 16822->16823 16825 9134db 16823->16825 16827 91905e __fread_nolock RtlAllocateHeap 16823->16827 16831 9134a9 16823->16831 16826 91905e __fread_nolock RtlAllocateHeap 16825->16826 16825->16831 16829 9134e7 FindCloseChangeNotification 16826->16829 16828 9134d2 16827->16828 16830 91905e __fread_nolock RtlAllocateHeap 16828->16830 16829->16831 16830->16825 16833 918fcd 16831->16833 16832 913501 __fread_nolock 16832->16820 16836 918fdc 16833->16836 16834 90be0f __dosmaperr RtlAllocateHeap 16835 919048 16834->16835 16837 90bdfc __dosmaperr RtlAllocateHeap 16835->16837 16836->16834 16838 919006 16836->16838 16837->16838 16838->16832 16839 83d4a0 WSAStartup 16840 83d4d8 16839->16840 16844 83d5a7 16839->16844 16841 83d575 socket 16840->16841 16840->16844 16842 83d58b connect 16841->16842 16841->16844 16843 83d59d closesocket 16842->16843 16842->16844 16843->16841 16843->16844 16845 883320 GetCursorPos 16846 883335 GetCursorPos 16845->16846 16847 883408 GetPEB 16846->16847 16849 883347 16846->16849 16847->16849 16848 883353 GetPEB 16848->16849 16849->16847 16849->16848 16850 88347d Sleep 16849->16850 16851 8833c8 Sleep 16849->16851 16852 8834a7 16849->16852 16850->16846 16851->16849

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 883320-883333 GetCursorPos 1 883335-883341 GetCursorPos 0->1 2 883408-883411 GetPEB 1->2 3 883347-88334d 1->3 4 883414-883428 2->4 3->2 5 883353-88335f GetPEB 3->5 6 883479-88347b 4->6 7 88342a-88342f 4->7 8 883360-883374 5->8 6->4 7->6 9 883431-883439 7->9 10 8833c4-8833c6 8->10 11 883376-88337b 8->11 12 883440-883453 9->12 10->8 11->10 13 88337d-883383 11->13 15 883472-883477 12->15 16 883455-883468 12->16 14 883385-883398 13->14 18 88339a 14->18 19 8833bd-8833c2 14->19 15->6 15->12 16->16 17 88346a-883470 16->17 17->15 20 88347d-8834a2 Sleep 17->20 21 8833a0-8833b3 18->21 19->10 19->14 20->1 21->21 22 8833b5-8833bb 21->22 22->19 23 8833c8-8833ee Sleep 22->23 24 8833f4-8833fa 23->24 24->2 25 8833fc-883402 24->25 25->2 26 8834a7-8834b8 call 826b80 25->26 29 8834ba-8834bc 26->29 30 8834be 26->30 31 8834c0-8834dd call 826b80 29->31 30->31
                                  APIs
                                  • GetCursorPos.USER32(?), ref: 00883333
                                  • GetCursorPos.USER32(?), ref: 00883339
                                  • Sleep.KERNELBASE(000003E9,?,00000001,00000000,?,?,?,?,?,?,?,?,00883698), ref: 008833E8
                                  • Sleep.KERNELBASE(00000001,?,00000001,00000000,?,?,?,?,?,?,?,?,00883698), ref: 0088349A
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3375371093.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000006.00000002.3375327883.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375371093.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375631164.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376276910.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376516857.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376587417.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CursorSleep
                                  • String ID:
                                  • API String ID: 4211308429-0
                                  • Opcode ID: f06dc28920d391022b4d5254b4bfc1135cbcf3b442897f179f73cf5ae6c6304f
                                  • Instruction ID: 5059bb6ac6d68ad1b3483a8efe9964c29c3a315b2c54f259c7604df25767b2cc
                                  • Opcode Fuzzy Hash: f06dc28920d391022b4d5254b4bfc1135cbcf3b442897f179f73cf5ae6c6304f
                                  • Instruction Fuzzy Hash: 8151CB35A042198FCB25DF48C8D0EAEB7B1FF55B04B294099D445AB312DB31EE46CB80

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 34 83d4a0-83d4d2 WSAStartup 35 83d5b7-83d5c0 34->35 36 83d4d8-83d502 call 826b80 * 2 34->36 41 83d504-83d508 36->41 42 83d50e-83d565 36->42 41->35 41->42 44 83d5b1 42->44 45 83d567-83d56d 42->45 44->35 46 83d5c5-83d5cf 45->46 47 83d56f 45->47 46->44 53 83d5d1-83d5d9 46->53 48 83d575-83d589 socket 47->48 48->44 49 83d58b-83d59b connect 48->49 51 83d5c1 49->51 52 83d59d-83d5a5 closesocket 49->52 51->46 52->48 54 83d5a7-83d5ab 52->54 54->44
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3375371093.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000006.00000002.3375327883.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375371093.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375631164.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376276910.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376516857.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376587417.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Startupclosesocketconnectsocket
                                  • String ID:
                                  • API String ID: 3098855095-0
                                  • Opcode ID: 02dbdd840bb1bc012a8deed0e07914d48888685b4e7ed124b902c478d4874717
                                  • Instruction ID: 35f088cbc967fa3c9d4ea0bc83f1e0e06b703c8e8a92601576cf6360a9019214
                                  • Opcode Fuzzy Hash: 02dbdd840bb1bc012a8deed0e07914d48888685b4e7ed124b902c478d4874717
                                  • Instruction Fuzzy Hash: 74318E755053006BD7209F699C89B6BB7E4FBC5338F105F19F9A8932D0E37199098B92

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 55 912fa4-912fb4 56 912fb6-912fc9 call 90bdfc call 90be0f 55->56 57 912fce-912fd0 55->57 74 913328 56->74 59 913310-91331d call 90bdfc call 90be0f 57->59 60 912fd6-912fdc 57->60 77 913323 call 903370 59->77 60->59 62 912fe2-91300b 60->62 62->59 66 913011-91301a 62->66 69 913034-913036 66->69 70 91301c-91302f call 90bdfc call 90be0f 66->70 72 91330c-91330e 69->72 73 91303c-913040 69->73 70->77 79 91332b-91332e 72->79 73->72 78 913046-91304a 73->78 74->79 77->74 78->70 82 91304c-913063 78->82 84 913065-913068 82->84 85 913098-91309e 82->85 88 91306a-913070 84->88 89 91308e-913096 84->89 86 9130a0-9130a7 85->86 87 913072-913089 call 90bdfc call 90be0f call 903370 85->87 91 9130a9 86->91 92 9130ab-9130ac call 9157ad 86->92 116 913243 87->116 88->87 88->89 90 91310b-91312a 89->90 94 913130-91313c 90->94 95 9131e6-9131ef call 91e301 90->95 91->92 99 9130b1-9130c9 call 915733 * 2 92->99 94->95 98 913142-913144 94->98 106 9131f1-913203 95->106 107 913260 95->107 98->95 102 91314a-91316b 98->102 124 9130e6-913109 call 90cd0d 99->124 125 9130cb-9130e1 call 90be0f call 90bdfc 99->125 102->95 108 91316d-913183 102->108 106->107 111 913205-913214 106->111 112 913264-91327a ReadFile 107->112 108->95 113 913185-913187 108->113 111->107 128 913216-91321a 111->128 117 9132d8-9132e3 112->117 118 91327c-913282 112->118 113->95 119 913189-9131ac 113->119 126 913246-913250 call 915733 116->126 137 9132e5-9132f7 call 90be0f call 90bdfc 117->137 138 9132fc-9132ff 117->138 118->117 122 913284 118->122 119->95 123 9131ae-9131c4 119->123 130 913287-913299 122->130 123->95 131 9131c6-9131c8 123->131 124->90 125->116 126->79 128->112 136 91321c-913234 128->136 130->126 139 91329b-91329f 130->139 131->95 140 9131ca-9131e1 131->140 156 913255-91325e 136->156 157 913236 136->157 137->116 145 913305-913307 138->145 146 91323c-913242 call 90bdb5 138->146 143 9132a1-9132b1 call 912cb6 139->143 144 9132b8-9132c5 139->144 140->95 164 9132b4-9132b6 143->164 152 9132d1-9132d6 call 912afc 144->152 153 9132c7 call 912e0d 144->153 145->126 146->116 165 9132cc-9132cf 152->165 153->165 156->130 157->146 164->126 165->164
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3375371093.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000006.00000002.3375327883.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375371093.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375631164.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376276910.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376516857.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376587417.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e3ea240951ec3768715b290f158268c088ada7009fffc5a042b469105711ec0e
                                  • Instruction ID: 0dafc8cc022b30edde62c365eb659dfb32340796cd87cfafb54feb312dea0830
                                  • Opcode Fuzzy Hash: e3ea240951ec3768715b290f158268c088ada7009fffc5a042b469105711ec0e
                                  • Instruction Fuzzy Hash: CEB10570F0824DAFDB11EF69C881BED7BB5AF89310F548558E5119B382C7719AC2CBA0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 166 829d90-829e0e call 8fde82 169 829e15-829e20 166->169 169->169 170 829e22-829e2d 169->170 171 829e32-829e44 call 903f30 170->171 172 829e2f 170->172 175 829e46-829e6c call 907d06 call 903abb call 907d06 171->175 176 829eb7-829ebe 171->176 172->171 193 829e73-829e7a 175->193 194 829e6e 175->194 178 829ec0-829ecc 176->178 179 829ee8-829ef8 176->179 181 829ede-829ee5 call 8fe103 178->181 182 829ece-829edc 178->182 181->179 182->181 184 829ef9-829f0e call 903380 182->184 192 829f10-829f1b 184->192 192->192 195 829f1d-829f28 192->195 198 829e7c-829e83 193->198 199 829e8d-829e94 call 88cd30 193->199 194->193 196 829f2a 195->196 197 829f2d-829f3f call 903f30 195->197 196->197 206 829f41-829f59 call 907d06 call 903abb call 9077b8 197->206 207 829f5c-829f63 197->207 201 829e87-829e8b 198->201 202 829e85 198->202 205 829e99-829e9f 199->205 201->205 202->201 208 829ea3-829eae call 90c7af call 9077b8 205->208 209 829ea1 205->209 206->207 212 829f65-829f71 207->212 213 829f8d-829f93 207->213 223 829eb3-829eb6 208->223 209->208 216 829f83-829f8a call 8fe103 212->216 217 829f73-829f81 212->217 216->213 217->216 220 829f94-829fbe call 903380 217->220 231 829fc0-829fc4 220->231 232 829fcf-829fd4 220->232 223->176 231->232 233 829fc6-829fce 231->233
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3375371093.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000006.00000002.3375327883.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375371093.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375631164.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376276910.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376516857.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376587417.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: __fread_nolock
                                  • String ID:
                                  • API String ID: 2638373210-0
                                  • Opcode ID: a2ac1dbf719175a1d18ba90301f8c989f2902b401743bfbe551877e94c5e9117
                                  • Instruction ID: f29c7d7c7ebe2a5bc42a82c9307efc0560173c641d68d0089828b71e3f44343d
                                  • Opcode Fuzzy Hash: a2ac1dbf719175a1d18ba90301f8c989f2902b401743bfbe551877e94c5e9117
                                  • Instruction Fuzzy Hash: 426108719002149FDB14DF68EC45BAEBBA8FF45310F15816DF848DB282D7B5DA81C7A1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 234 913e1d-913e3f 235 914032 234->235 236 913e45-913e47 234->236 237 914034-914038 235->237 238 913e73-913e96 236->238 239 913e49-913e68 call 9032f3 236->239 240 913e98-913e9a 238->240 241 913e9c-913ea2 238->241 247 913e6b-913e6e 239->247 240->241 243 913ea4-913eb5 240->243 241->239 241->243 245 913eb7-913ec5 call 90cd4d 243->245 246 913ec8-913ed8 call 913962 243->246 245->246 252 913f21-913f33 246->252 253 913eda-913ee0 246->253 247->237 254 913f35-913f3b 252->254 255 913f8a-913faa WriteFile 252->255 256 913ee2-913ee5 253->256 257 913f09-913f1f call 913533 253->257 261 913f76-913f88 call 9139df 254->261 262 913f3d-913f40 254->262 258 913fb5 255->258 259 913fac-913fb2 255->259 263 913ef0-913eff call 9138fa 256->263 264 913ee7-913eea 256->264 273 913f02-913f04 257->273 266 913fb8-913fc3 258->266 259->258 281 913f5d-913f60 261->281 267 913f62-913f74 call 913ba3 262->267 268 913f42-913f45 262->268 263->273 264->263 269 913fca-913fcd 264->269 274 913fc5-913fc8 266->274 275 91402d-914030 266->275 267->281 276 913fd0-913fd2 268->276 277 913f4b-913f58 call 913aba 268->277 269->276 273->266 274->269 275->237 283 914000-91400c 276->283 284 913fd4-913fd9 276->284 277->281 281->273 288 914016-914028 283->288 289 91400e-914014 283->289 286 913ff2-913ffb call 90bdd8 284->286 287 913fdb-913fed 284->287 286->247 287->247 288->247 289->235 289->288
                                  APIs
                                  • WriteFile.KERNELBASE(?,00000000,00907C57,?,00000000,00000000,00000000,?,00000000,?,00829F4B,00907C57,00000000,00829F4B,?,?), ref: 00913FA3
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3375371093.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000006.00000002.3375327883.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375371093.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375631164.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376276910.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376516857.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376587417.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FileWrite
                                  • String ID:
                                  • API String ID: 3934441357-0
                                  • Opcode ID: e8f1d9c999dd31e7af0466c7c179d4f15009ac248bcde154c6c779d9395f459b
                                  • Instruction ID: 8902b8e7e8d8f43ab7472f84de3369a3fa18e8a9af241118b064b801edac4f39
                                  • Opcode Fuzzy Hash: e8f1d9c999dd31e7af0466c7c179d4f15009ac248bcde154c6c779d9395f459b
                                  • Instruction Fuzzy Hash: 8361C2B1E0420EAFEF11DFA8C845AEEBFB9AF49304F148595E904A7251D335DA82DB50

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 292 903512-90351f 293 903521-903544 call 9032f3 292->293 294 903549-90355d call 914902 292->294 299 9036b0-9036b2 293->299 300 903562-90356b call 90ccef 294->300 301 90355f 294->301 303 903570-90357f 300->303 301->300 304 903581 303->304 305 90358f-903598 303->305 306 903587-903589 304->306 307 903659-90365e 304->307 308 90359a-9035a7 305->308 309 9035ac-9035e0 305->309 306->305 306->307 310 9036ae-9036af 307->310 311 9036ac 308->311 312 9035e2-9035ec 309->312 313 90363d-903649 309->313 310->299 311->310 316 903613-90361f 312->316 317 9035ee-9035fa 312->317 314 903660-903663 313->314 315 90364b-903652 313->315 318 903666-90366e 314->318 315->307 316->314 320 903621-90363b call 903a29 316->320 317->316 319 9035fc-90360e call 90387e 317->319 321 903670-903676 318->321 322 9036aa 318->322 319->310 320->318 325 903678-90368c call 9036b3 321->325 326 90368e-903692 321->326 322->311 325->310 330 903694-9036a2 call 922870 326->330 331 9036a5-9036a7 326->331 330->331 331->322
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3375371093.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000006.00000002.3375327883.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375371093.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375631164.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376276910.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376516857.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376587417.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 934cc1118b9447de699d8f73b1a6599304b86ce4b433dc4ef55c5dffa635d5c0
                                  • Instruction ID: bc869308d14fe682ce434efad27e84f8e5cc30534a920c51b2d5c1c8cc1f8106
                                  • Opcode Fuzzy Hash: 934cc1118b9447de699d8f73b1a6599304b86ce4b433dc4ef55c5dffa635d5c0
                                  • Instruction Fuzzy Hash: 4251B570A00108BFDB14DF58C846AA97BB9EF89314F24C158F8499B392D332DE41DB50

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 335 913493-9134a7 call 91905e 338 9134a9-9134ab 335->338 339 9134ad-9134b5 335->339 340 9134fb-91351b call 918fcd 338->340 341 9134c0-9134c3 339->341 342 9134b7-9134be 339->342 352 91352d 340->352 353 91351d-91352b call 90bdd8 340->353 345 9134e1-9134f1 call 91905e FindCloseChangeNotification 341->345 346 9134c5-9134c9 341->346 342->341 344 9134cb-9134df call 91905e * 2 342->344 344->338 344->345 345->338 356 9134f3-9134f9 345->356 346->344 346->345 354 91352f-913532 352->354 353->354 356->340
                                  APIs
                                  • FindCloseChangeNotification.KERNELBASE(00000000,00000000,CF830579,?,0091337A,00000000,CF830579,0094B810,0000000C,00913436,0090778D,?), ref: 009134EA
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3375371093.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000006.00000002.3375327883.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375371093.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375631164.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376276910.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376516857.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376587417.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ChangeCloseFindNotification
                                  • String ID:
                                  • API String ID: 2591292051-0
                                  • Opcode ID: f9bfdf770c8343c56ec32a8cd237f445a0988304b092857704c3f5599112231b
                                  • Instruction ID: d55b5eadb1b19c272c60a9d20390764b2c232c4a27a0792a8b0467fada9e8ee9
                                  • Opcode Fuzzy Hash: f9bfdf770c8343c56ec32a8cd237f445a0988304b092857704c3f5599112231b
                                  • Instruction Fuzzy Hash: 82116F3371812C26D6326234A892BFE235D8BC2734F258559F9184F1D1DB629DC15280

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 361 90cc2c-90cc44 call 91905e 364 90cc46-90cc4d 361->364 365 90cc5a-90cc70 SetFilePointerEx 361->365 366 90cc54-90cc58 364->366 367 90cc72-90cc83 call 90bdd8 365->367 368 90cc85-90cc8f 365->368 369 90ccab-90ccae 366->369 367->366 368->366 370 90cc91-90cca6 368->370 370->369
                                  APIs
                                  • SetFilePointerEx.KERNELBASE(00000000,00000000,0094B4C8,00829F4B,00000002,00829F4B,00000000,?,?,?,0090CD36,00000000,?,00829F4B,00000002,0094B4C8), ref: 0090CC69
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3375371093.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000006.00000002.3375327883.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375371093.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375631164.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376276910.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376516857.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376587417.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FilePointer
                                  • String ID:
                                  • API String ID: 973152223-0
                                  • Opcode ID: ca11a3ab13347f43444a33d6ba9f864dce7f4a89db92d1f57403ff87f6279409
                                  • Instruction ID: 1d8ad1ead093b973eb481f8e1bde8e1564e63bbd9eb8128b161e5f4b42b3abb6
                                  • Opcode Fuzzy Hash: ca11a3ab13347f43444a33d6ba9f864dce7f4a89db92d1f57403ff87f6279409
                                  • Instruction Fuzzy Hash: A70126726141196FDF05CF19CC55EAE3B19DB85330B240B44F855AB1D0E671ED8197D0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 374 822d70-822d80 375 822d82-822d87 374->375 376 822da6-822da8 374->376 377 822d89-822d8a call 8fde82 375->377 378 822dbf call 822260 375->378 379 822daa-822db7 call 8fde82 376->379 380 822db8-822dbe 376->380 384 822d8f-822d96 377->384 386 822dc4-822dc9 call 903380 378->386 384->386 387 822d98-822da5 384->387
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00822DBF
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3375371093.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000006.00000002.3375327883.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375371093.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375631164.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376276910.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376516857.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376587417.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID:
                                  • API String ID: 118556049-0
                                  • Opcode ID: 326ee97673e7adb1608e1cb46f795dec6370eba03380352c4d7ae6dd60fbcf19
                                  • Instruction ID: 473fc2a0b49d2e7c2d046f90962b2bdbc082f16bbc3b6476e88e143d1729a00d
                                  • Opcode Fuzzy Hash: 326ee97673e7adb1608e1cb46f795dec6370eba03380352c4d7ae6dd60fbcf19
                                  • Instruction Fuzzy Hash: EDF0B472500218ABCB186F74E8059F9B3A8FF24361754057AE989C7252EB26D9948781

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 390 914d73-914d7e 391 914d80-914d8a 390->391 392 914d8c-914d92 390->392 391->392 393 914dc0-914dcb call 90be0f 391->393 394 914d94-914d95 392->394 395 914dab-914dbc RtlAllocateHeap 392->395 399 914dcd-914dcf 393->399 394->395 396 914d97-914d9e call 912914 395->396 397 914dbe 395->397 396->393 403 914da0-914da9 call 91011d 396->403 397->399 403->393 403->395
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000008,00907DC7,00000000,?,009146F9,00000001,00000364,00000000,00000006,000000FF,?,00000000,0090BE14,00907593,00907DC7,00000000), ref: 00914DB5
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3375371093.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000006.00000002.3375327883.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375371093.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375631164.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376276910.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376516857.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376587417.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: b0d5d3230dff19876d911df2f21e3b6ed4a6886e9db0fc7fa92cf61cd8f84e96
                                  • Instruction ID: 442ab15acf554aaa9348adbade78dbf5dd3e10383f397556d6ae34cec107f758
                                  • Opcode Fuzzy Hash: b0d5d3230dff19876d911df2f21e3b6ed4a6886e9db0fc7fa92cf61cd8f84e96
                                  • Instruction Fuzzy Hash: D7F0BE3934422D669F227AA2B801BEA374DDF8A7B0F254625EC18960C1CB20F8C146E0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 406 9157ad-9157b9 407 9157eb-9157f6 call 90be0f 406->407 408 9157bb-9157bd 406->408 416 9157f8-9157fa 407->416 409 9157d6-9157e7 RtlAllocateHeap 408->409 410 9157bf-9157c0 408->410 412 9157c2-9157c9 call 912914 409->412 413 9157e9 409->413 410->409 412->407 418 9157cb-9157d4 call 91011d 412->418 413->416 418->407 418->409
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000000,0091ABF2,4D88C033,?,0091ABF2,00000220,?,0091416F,4D88C033), ref: 009157E0
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3375371093.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000006.00000002.3375327883.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375371093.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375631164.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376276910.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376516857.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376587417.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: a072f3c1657c4a7adbbff39ef0cecf711989a24365ff1555a10cccf0ddfa1c6d
                                  • Instruction ID: 3bbfd32a7f6ad1d5eaded1873cd519ae5a61ef63a3f472520231ef8157e9e5aa
                                  • Opcode Fuzzy Hash: a072f3c1657c4a7adbbff39ef0cecf711989a24365ff1555a10cccf0ddfa1c6d
                                  • Instruction Fuzzy Hash: 78E03931314B29E6E62136665902FEB2A4DDBC27B0F170511ED29960C0DB6498C086F1
                                  APIs
                                  • GetProcAddress.KERNEL32(00000000,C8D8C5E3), ref: 008A4D6C
                                  • GetProcAddress.KERNEL32(00000000,C8D8C5E3), ref: 008A4DAE
                                  • GetProcAddress.KERNEL32(00000000,DDD8DFE2), ref: 008A4DF6
                                  • GetProcAddress.KERNEL32(00000000,C8D8C5E3), ref: 008A4E37
                                  • GetProcAddress.KERNEL32(00000000,C8D8C5E3), ref: 008A4E78
                                  • GetProcAddress.KERNEL32(00000000,DDD8DFE2), ref: 008A4EB6
                                  • GetProcAddress.KERNEL32(00000000,C8D8C5E3), ref: 008A4EFE
                                  • GetProcAddress.KERNEL32(00000000,DDD8DFE2), ref: 008A4F46
                                  • GetProcAddress.KERNEL32(00000000,C8D8C5E3), ref: 008A4F87
                                  • GetProcAddress.KERNEL32(00000000,C8D8C5E3), ref: 008A4FCD
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3375371093.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000006.00000002.3375327883.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375371093.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375631164.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376276910.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376516857.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376587417.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressProc
                                  • String ID:
                                  • API String ID: 190572456-0
                                  • Opcode ID: 16917071bb3ede117609a139723471ecca915a05d31d4e780ae5c14dd2a35648
                                  • Instruction ID: 2569a414de2ee84eac9b327edc3f33cee247a22069eece0523cd05000bd80107
                                  • Opcode Fuzzy Hash: 16917071bb3ede117609a139723471ecca915a05d31d4e780ae5c14dd2a35648
                                  • Instruction Fuzzy Hash: 118162B0C1C38DAEEF19CFA8D445AEEBBB8EF16304F50409ED841AB651E3745209DB65
                                  APIs
                                  • GetModuleHandleA.KERNEL32(?), ref: 0082892E
                                  • GetProcAddress.KERNEL32(00000000,?), ref: 0082893B
                                  • GetModuleHandleA.KERNEL32(?), ref: 008289A5
                                  • GetProcAddress.KERNEL32(00000000,?), ref: 008289AC
                                  • CloseHandle.KERNEL32(?), ref: 00828BB2
                                  • CloseHandle.KERNEL32(?), ref: 00828C14
                                  • CloseHandle.KERNEL32(00000000), ref: 00828C41
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3375371093.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000006.00000002.3375327883.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375371093.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375631164.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376276910.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376516857.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376587417.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Handle$Close$AddressModuleProc
                                  • String ID: File
                                  • API String ID: 4110381430-749574446
                                  • Opcode ID: ef298c713191e9957478d590150846e0a948a3b6c25727de40aaec925d7432a5
                                  • Instruction ID: 351c63535d3176480f57891a05d43a999cc06f8b1104d6045841cbd1fdcff33d
                                  • Opcode Fuzzy Hash: ef298c713191e9957478d590150846e0a948a3b6c25727de40aaec925d7432a5
                                  • Instruction Fuzzy Hash: 06C1AE70905269DFEF24CBA4DC85BAEBBB8FF05300F144069E504EB282DB759985CB65
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3375371093.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000006.00000002.3375327883.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375371093.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375631164.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376276910.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376516857.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376587417.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 61965cb8cb4c3d11271a02d73999b519a6a23ab072505813c3df16f2acd370b1
                                  • Instruction ID: 20f07ce67db929d53c4cc8f92cd4cf07f51eebd879b1d91e5d944c97b3d6d119
                                  • Opcode Fuzzy Hash: 61965cb8cb4c3d11271a02d73999b519a6a23ab072505813c3df16f2acd370b1
                                  • Instruction Fuzzy Hash: 27022B71E052199FDF14CFA9D8806AEFBF5FF48324F248669E919E7380D731A9418B90
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0088F5B3
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0088F5D5
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0088F5F5
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0088F61F
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0088F68D
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0088F6D9
                                  • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0088F6F3
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0088F788
                                  • std::_Facet_Register.LIBCPMT ref: 0088F795
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3375371093.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000006.00000002.3375327883.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375371093.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375631164.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376276910.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376516857.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376587417.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Locinfo::_$Facet_Locinfo_ctorLocinfo_dtorRegister
                                  • String ID: bad locale name$P#
                                  • API String ID: 3375549084-762106057
                                  • Opcode ID: ddc705bce0d7f527e981eb75e9ae6584dbaa4f12a942b78b09b08fe42a1abd61
                                  • Instruction ID: 7b54c195029383a8384cb886fa2fe78e67ce3c2442888853d1208da2f036331c
                                  • Opcode Fuzzy Hash: ddc705bce0d7f527e981eb75e9ae6584dbaa4f12a942b78b09b08fe42a1abd61
                                  • Instruction Fuzzy Hash: 976142B1D002489BDB10EFA8D945B9EBBB4FF54314F194168EA04E7392E735E905CBA2
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 008969A8
                                  • __floor_pentium4.LIBCMT ref: 00896ACB
                                  Strings
                                  • unordered_map/set too long, xrefs: 00896B96
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3375371093.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000006.00000002.3375327883.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375371093.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375631164.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376276910.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376516857.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376587417.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task__floor_pentium4
                                  • String ID: unordered_map/set too long
                                  • API String ID: 1502093491-306623848
                                  • Opcode ID: c3b215518d4feae5533ce5f328ebba8e2e5a736c9d51b792d1dcc5d02bc1b29c
                                  • Instruction ID: e5897c7b9650ab79ed7038a8f19c67ccb4f8ebf846e671138f473f2cb08efdb5
                                  • Opcode Fuzzy Hash: c3b215518d4feae5533ce5f328ebba8e2e5a736c9d51b792d1dcc5d02bc1b29c
                                  • Instruction Fuzzy Hash: 18F1F871A00218DFCF14EF58C5416AEB7B5FF44354F288269E815EB285E731ED61CB91
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3375371093.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000006.00000002.3375327883.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375371093.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375631164.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376276910.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376516857.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376587417.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: ", "$: "$recursive_directory_iterator::operator++
                                  • API String ID: 0-2763324178
                                  • Opcode ID: 81f1060d6387760c66a9080d2aec7c5e1a24da31d7af9e9377acef4b9a4b3a4a
                                  • Instruction ID: 0ad32d7731ae22d4411274a02b5c468fd20e336968419fdf986ccd6fad822cbd
                                  • Opcode Fuzzy Hash: 81f1060d6387760c66a9080d2aec7c5e1a24da31d7af9e9377acef4b9a4b3a4a
                                  • Instruction Fuzzy Hash: B6C1D0B1900614AFD728EF68E845BAEBBF8FF04710F10462DF516D7681DB74AA44CBA1
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00823A08
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00823A54
                                  • __Getctype.LIBCPMT ref: 00823A6A
                                  • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 00823A96
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00823B2B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3375371093.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000006.00000002.3375327883.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375371093.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375631164.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376276910.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376516857.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376587417.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Locinfo::_Lockit$GetctypeLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                  • String ID: bad locale name
                                  • API String ID: 1840309910-1405518554
                                  • Opcode ID: 7a80625702d55ae32dc3a25cb93bfd9377d36d2e92097448865a4ea1c8d128f7
                                  • Instruction ID: e228040b93c7c91504ba4427e9abf1ce8d905fee1efa5e8a0d9794895d58903a
                                  • Opcode Fuzzy Hash: 7a80625702d55ae32dc3a25cb93bfd9377d36d2e92097448865a4ea1c8d128f7
                                  • Instruction Fuzzy Hash: DE5152B1D002589FDB10DFA8D855B9EBBB8FF14314F144069E909EB381D779DA44CB92
                                  APIs
                                  • _ValidateLocalCookies.LIBCMT ref: 00901A17
                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 00901A1F
                                  • _ValidateLocalCookies.LIBCMT ref: 00901AA8
                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 00901AD3
                                  • _ValidateLocalCookies.LIBCMT ref: 00901B28
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3375371093.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000006.00000002.3375327883.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375371093.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375631164.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376276910.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376516857.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376587417.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                  • String ID: csm
                                  • API String ID: 1170836740-1018135373
                                  • Opcode ID: 9cda3a15b2874522081e198639dd7c57f8e1fbb86036cc7fd3410fc955376c72
                                  • Instruction ID: 09cd776f905c1b58851c7ec3414efc61c6c9501343187b6e983ded7df59e3772
                                  • Opcode Fuzzy Hash: 9cda3a15b2874522081e198639dd7c57f8e1fbb86036cc7fd3410fc955376c72
                                  • Instruction Fuzzy Hash: 5841BF34A01208AFCF10DFA8C885B9EBBB9BF85324F148555F8199B3D2D771EA45CB91
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0088DD13
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0088DD36
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0088DD56
                                  • std::_Facet_Register.LIBCPMT ref: 0088DDCB
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0088DDE3
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0088DDFB
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3375371093.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000006.00000002.3375327883.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375371093.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375631164.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376276910.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376516857.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376587417.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                  • String ID:
                                  • API String ID: 2081738530-0
                                  • Opcode ID: dba012179bdedbe7eec67d7cfe982e1e4fa32f4455f8e4c38c02bfa18d165bd6
                                  • Instruction ID: d3cd25d69e548b68423512bcb8509a9069386b34c49a7e9c150cc417d0b59ef7
                                  • Opcode Fuzzy Hash: dba012179bdedbe7eec67d7cfe982e1e4fa32f4455f8e4c38c02bfa18d165bd6
                                  • Instruction Fuzzy Hash: D531AD71900319DFCB25EF58D980BAEBBB4FB44720F148659E909A7391D730AE41CBD2
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00827796
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00827931
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3375371093.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000006.00000002.3375327883.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375371093.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375631164.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376276910.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376516857.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376587417.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: out_of_range$type_error
                                  • API String ID: 2659868963-3702451861
                                  • Opcode ID: e1e85dc0ff1dcbe18de36f270c21efa943358aa7d416736f9575b1902ff136a8
                                  • Instruction ID: 37f1acb43210a1f89ceaf0ebb026c7aff527adc1d6d279654fd9ce6fa92e4158
                                  • Opcode Fuzzy Hash: e1e85dc0ff1dcbe18de36f270c21efa943358aa7d416736f9575b1902ff136a8
                                  • Instruction Fuzzy Hash: ABA189B19042189FCB18DFA8E884BADBBF5FF48310F148229E059EB795E7749984CB51
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 0082743E
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 0082744D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3375371093.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000006.00000002.3375327883.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375371093.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375631164.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376276910.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376516857.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376587417.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: at line $, column
                                  • API String ID: 4194217158-191570568
                                  • Opcode ID: d31647f921070f8d30a1f2d6d7f61d7e6693aa90f4b1113fd1d9e72377097448
                                  • Instruction ID: 1ae014ae8d295f14c8d11a5d71ad2e31690c5027f6c2985d37876cc3ecd4a066
                                  • Opcode Fuzzy Hash: d31647f921070f8d30a1f2d6d7f61d7e6693aa90f4b1113fd1d9e72377097448
                                  • Instruction Fuzzy Hash: 46617AB0E042189FDB18DF68E884BADBBF1FB49310F14826DE419E7786D77499808B94
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00823E2F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3375371093.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000006.00000002.3375327883.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375371093.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375631164.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376276910.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376516857.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376587417.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                  • API String ID: 2659868963-1866435925
                                  • Opcode ID: e3c2994491292e3253bcaf5ec721d4c693b2ffbf3e476a8de7ba3be8498470e7
                                  • Instruction ID: 6f22e3230b9593a0080b45f7ab06ff63cbe66b8cddaf995f7c77b65a1e484264
                                  • Opcode Fuzzy Hash: e3c2994491292e3253bcaf5ec721d4c693b2ffbf3e476a8de7ba3be8498470e7
                                  • Instruction Fuzzy Hash: 7441C4B2900218AFC714DF68E851BEAB7F8FF48310F14852AF919D7641E774AA44CBA1
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00823E2F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3375371093.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000006.00000002.3375327883.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375371093.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375631164.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376276910.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376516857.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376587417.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                  • API String ID: 2659868963-1866435925
                                  • Opcode ID: 544584d240b00bc8357678f909cbdb413f5f82ab91f73ce18aae5158f54223f7
                                  • Instruction ID: 0ac1b85fe92f6ff8f2546d4d1fb930bafd287e4cd4dfda1d500137c25e9a9e3d
                                  • Opcode Fuzzy Hash: 544584d240b00bc8357678f909cbdb413f5f82ab91f73ce18aae5158f54223f7
                                  • Instruction Fuzzy Hash: 3D21A5B29007286FC714DF58E811B96B7E8FF04310F18886AFA58D7681E774EA54CB91
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 008FCF40
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 008FCF4B
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 008FCFB9
                                    • Part of subcall function 008FD09C: std::locale::_Locimp::_Locimp.LIBCPMT ref: 008FD0B4
                                  • std::locale::_Setgloballocale.LIBCPMT ref: 008FCF66
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3375371093.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000006.00000002.3375327883.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375371093.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375631164.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376276910.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376516857.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376587417.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                                  • String ID:
                                  • API String ID: 677527491-0
                                  • Opcode ID: 004b179a56f36d14e8de2a229c63300246ef87a202ec91829530006f4072754f
                                  • Instruction ID: 30d59514004b32a653b7665fb43f7d7d28afd4c229d522161da0f4f509920e9e
                                  • Opcode Fuzzy Hash: 004b179a56f36d14e8de2a229c63300246ef87a202ec91829530006f4072754f
                                  • Instruction Fuzzy Hash: E101B875A053299BCB06EB34D85167D7BA2FF84750B180009EA01973A2CF386E02DBC6
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 008271A9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3375371093.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000006.00000002.3375327883.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375371093.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375631164.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376276910.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376516857.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376587417.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: parse error$parse_error
                                  • API String ID: 2659868963-1820534363
                                  • Opcode ID: 981316015ba5343b165d9542da5100b4182d74a27b544084ba649e66fc177c98
                                  • Instruction ID: cb221d67a883d262f1e1400f228f0ccaeb4853dc9e9a151971d6c4e8a822de76
                                  • Opcode Fuzzy Hash: 981316015ba5343b165d9542da5100b4182d74a27b544084ba649e66fc177c98
                                  • Instruction Fuzzy Hash: EBB17D70D042198FDB18CF68EC84BADBBB1FF49310F148269E019EB792D7749A85CB91
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 008961A6
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00896341
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3375371093.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000006.00000002.3375327883.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375371093.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375631164.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376276910.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376516857.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376587417.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID: Py"v
                                  • API String ID: 118556049-2948403528
                                  • Opcode ID: c7342fc91b0e48d358dcb7bb4eaa3d37a23a5ffae483882c6c78599f48bc2e25
                                  • Instruction ID: e89728f975fae6b4e30b9718f86984bc36aacacc1b33111f1e45b007ba8b111d
                                  • Opcode Fuzzy Hash: c7342fc91b0e48d358dcb7bb4eaa3d37a23a5ffae483882c6c78599f48bc2e25
                                  • Instruction Fuzzy Hash: BD810372A00205AFCB08EF6CDD8196EB7A5FB85310B18832CE815D7391E730EE65CB91
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00826E51
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00826E60
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3375371093.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000006.00000002.3375327883.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375371093.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375631164.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376276910.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376516857.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376587417.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: [json.exception.
                                  • API String ID: 4194217158-791563284
                                  • Opcode ID: 3df6906ccb5ef33b8b7d2eae077f9a706897bfd70a520094cc8e6d9bc031c9ae
                                  • Instruction ID: 58dbc1c5af74ffc14753f73936435a4f9975bc1b926fddaa691256ee5c0293ac
                                  • Opcode Fuzzy Hash: 3df6906ccb5ef33b8b7d2eae077f9a706897bfd70a520094cc8e6d9bc031c9ae
                                  • Instruction Fuzzy Hash: 1171B1B4A002099FDB18DF68E884BADFBF5FF48310F248259E419DB781D774A990CB91
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0089D6B0
                                  Strings
                                  • type must be string, but is , xrefs: 0089D718
                                  • type must be boolean, but is , xrefs: 0089D7A2
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3375371093.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000006.00000002.3375327883.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375371093.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375631164.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3375661862.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376276910.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376516857.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000006.00000002.3376587417.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID: type must be boolean, but is $type must be string, but is
                                  • API String ID: 118556049-436076039
                                  • Opcode ID: f6f121f828c918919976ecd49bd337efa929f52bd630c926361b201ca5b6eb76
                                  • Instruction ID: 6e692840975c399fdde69c6e023a9633b7fdaf5eb466ca79a4b95d979d311408
                                  • Opcode Fuzzy Hash: f6f121f828c918919976ecd49bd337efa929f52bd630c926361b201ca5b6eb76
                                  • Instruction Fuzzy Hash: AC4125B2900208AFCB00EBACE801B9DB7A8FB54310F14817AE519D7781EB35A940C7D6

                                  Execution Graph

                                  Execution Coverage:3.6%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:0%
                                  Total number of Nodes:640
                                  Total number of Limit Nodes:67
                                  execution_graph 16128 829d90 16159 8fde82 16128->16159 16130 829dc6 16164 903f30 16130->16164 16134 829ede std::_Throw_Cpp_error 16137 829eb3 16137->16134 16199 903380 16137->16199 16140 907d06 4 API calls 16141 829e63 16140->16141 16146 829e7c 16141->16146 16179 88cd30 16141->16179 16190 90c7af 16146->16190 16161 822260 Concurrency::cancel_current_task ___std_exception_copy std::_Facet_Register 16159->16161 16160 8fdea1 16160->16130 16161->16160 16202 8ff22a 16161->16202 16420 903e6e 16164->16420 16166 829e3d 16166->16137 16167 907d06 16166->16167 16168 907d19 __fread_nolock 16167->16168 16444 907a5d 16168->16444 16170 907d2e 16171 9030ac __fread_nolock RtlAllocateHeap 16170->16171 16172 829e51 16171->16172 16173 903abb 16172->16173 16174 903ace __fread_nolock 16173->16174 16577 9033d1 16174->16577 16176 903ada 16177 9030ac __fread_nolock RtlAllocateHeap 16176->16177 16178 829e57 16177->16178 16178->16140 16180 88cd81 16179->16180 16183 88cd52 __fread_nolock 16179->16183 16181 88ce87 16180->16181 16184 88cd90 16180->16184 16639 822300 16181->16639 16183->16146 16625 822d70 16184->16625 16186 903380 std::_Throw_Cpp_error RtlAllocateHeap 16187 88ce91 16186->16187 16188 88cdd7 __fread_nolock std::locale::_Locimp::_Locimp 16188->16186 16189 88ce3e __fread_nolock std::_Throw_Cpp_error std::locale::_Locimp::_Locimp 16188->16189 16189->16146 16661 90c7cc 16190->16661 16192 829ead 16193 9077b8 16192->16193 16194 9077cb __fread_nolock 16193->16194 16785 907693 16194->16785 16196 9077d7 16197 9030ac __fread_nolock RtlAllocateHeap 16196->16197 16198 9077e3 16197->16198 16198->16137 16200 9032bc __fread_nolock RtlAllocateHeap 16199->16200 16201 90338f __Getctype 16200->16201 16203 8ff237 ___std_exception_copy 16202->16203 16207 8222a3 16202->16207 16204 8ff264 16203->16204 16203->16207 16208 914039 16203->16208 16217 90c3a6 16204->16217 16207->16130 16209 914047 16208->16209 16210 914055 16208->16210 16209->16210 16215 91406d 16209->16215 16220 90be0f 16210->16220 16212 91405d 16223 903370 16212->16223 16214 914067 16214->16204 16215->16214 16216 90be0f __dosmaperr RtlAllocateHeap 16215->16216 16216->16212 16218 915733 ___std_exception_destroy RtlAllocateHeap 16217->16218 16219 90c3be 16218->16219 16219->16207 16226 9146ac 16220->16226 16331 9032bc 16223->16331 16227 9146b6 __dosmaperr 16226->16227 16234 90be14 16227->16234 16237 914d73 16227->16237 16229 9146f9 __dosmaperr 16230 914701 __dosmaperr 16229->16230 16231 914739 16229->16231 16241 915733 16230->16241 16245 914389 16231->16245 16234->16212 16236 915733 ___std_exception_destroy RtlAllocateHeap 16236->16234 16240 914d80 __dosmaperr std::_Facet_Register 16237->16240 16238 914dab RtlAllocateHeap 16239 914dbe __dosmaperr 16238->16239 16238->16240 16239->16229 16240->16238 16240->16239 16242 91573e __dosmaperr 16241->16242 16244 915768 16241->16244 16243 90be0f __dosmaperr RtlAllocateHeap 16242->16243 16242->16244 16243->16244 16244->16234 16246 9143f7 __dosmaperr 16245->16246 16249 91432f 16246->16249 16248 914420 16248->16236 16250 91433b __fread_nolock std::_Lockit::_Lockit 16249->16250 16253 914510 16250->16253 16252 91435d __dosmaperr 16252->16248 16254 91451f __Getctype 16253->16254 16255 914546 __Getctype 16253->16255 16254->16255 16257 91c864 16254->16257 16255->16252 16259 91c8e4 16257->16259 16261 91c87a 16257->16261 16260 915733 ___std_exception_destroy RtlAllocateHeap 16259->16260 16283 91c932 16259->16283 16262 91c906 16260->16262 16261->16259 16263 91c8ad 16261->16263 16267 915733 ___std_exception_destroy RtlAllocateHeap 16261->16267 16264 915733 ___std_exception_destroy RtlAllocateHeap 16262->16264 16269 915733 ___std_exception_destroy RtlAllocateHeap 16263->16269 16284 91c8cf 16263->16284 16265 91c919 16264->16265 16268 915733 ___std_exception_destroy RtlAllocateHeap 16265->16268 16266 915733 ___std_exception_destroy RtlAllocateHeap 16270 91c8d9 16266->16270 16272 91c8a2 16267->16272 16274 91c927 16268->16274 16275 91c8c4 16269->16275 16276 915733 ___std_exception_destroy RtlAllocateHeap 16270->16276 16271 91c9a0 16277 915733 ___std_exception_destroy RtlAllocateHeap 16271->16277 16285 91bb68 16272->16285 16273 91c940 16273->16271 16281 915733 RtlAllocateHeap ___std_exception_destroy 16273->16281 16279 915733 ___std_exception_destroy RtlAllocateHeap 16274->16279 16313 91bfc7 16275->16313 16276->16259 16282 91c9a6 16277->16282 16279->16283 16281->16273 16282->16255 16325 91c9d5 16283->16325 16284->16266 16286 91bb79 16285->16286 16312 91bc62 16285->16312 16287 91bb8a 16286->16287 16288 915733 ___std_exception_destroy RtlAllocateHeap 16286->16288 16289 91bb9c 16287->16289 16290 915733 ___std_exception_destroy RtlAllocateHeap 16287->16290 16288->16287 16291 91bbae 16289->16291 16292 915733 ___std_exception_destroy RtlAllocateHeap 16289->16292 16290->16289 16293 91bbc0 16291->16293 16294 915733 ___std_exception_destroy RtlAllocateHeap 16291->16294 16292->16291 16295 91bbd2 16293->16295 16296 915733 ___std_exception_destroy RtlAllocateHeap 16293->16296 16294->16293 16297 91bbe4 16295->16297 16298 915733 ___std_exception_destroy RtlAllocateHeap 16295->16298 16296->16295 16299 915733 ___std_exception_destroy RtlAllocateHeap 16297->16299 16300 91bbf6 16297->16300 16298->16297 16299->16300 16301 91bc08 16300->16301 16302 915733 ___std_exception_destroy RtlAllocateHeap 16300->16302 16303 91bc1a 16301->16303 16304 915733 ___std_exception_destroy RtlAllocateHeap 16301->16304 16302->16301 16305 91bc2c 16303->16305 16306 915733 ___std_exception_destroy RtlAllocateHeap 16303->16306 16304->16303 16307 91bc3e 16305->16307 16308 915733 ___std_exception_destroy RtlAllocateHeap 16305->16308 16306->16305 16309 91bc50 16307->16309 16310 915733 ___std_exception_destroy RtlAllocateHeap 16307->16310 16308->16307 16311 915733 ___std_exception_destroy RtlAllocateHeap 16309->16311 16309->16312 16310->16309 16311->16312 16312->16263 16314 91bfd4 16313->16314 16315 91c02c 16313->16315 16316 91bfe4 16314->16316 16317 915733 ___std_exception_destroy RtlAllocateHeap 16314->16317 16315->16284 16318 91bff6 16316->16318 16319 915733 ___std_exception_destroy RtlAllocateHeap 16316->16319 16317->16316 16320 91c008 16318->16320 16321 915733 ___std_exception_destroy RtlAllocateHeap 16318->16321 16319->16318 16322 91c01a 16320->16322 16323 915733 ___std_exception_destroy RtlAllocateHeap 16320->16323 16321->16320 16322->16315 16324 915733 ___std_exception_destroy RtlAllocateHeap 16322->16324 16323->16322 16324->16315 16326 91c9e2 16325->16326 16330 91ca01 16325->16330 16327 91c4ee __Getctype RtlAllocateHeap 16326->16327 16326->16330 16328 91c9fb 16327->16328 16329 915733 ___std_exception_destroy RtlAllocateHeap 16328->16329 16329->16330 16330->16273 16332 9032ce __fread_nolock 16331->16332 16337 9032f3 16332->16337 16334 9032e6 16344 9030ac 16334->16344 16338 903303 16337->16338 16340 90330a __fread_nolock __Getctype 16337->16340 16350 903111 16338->16350 16341 903318 16340->16341 16342 9032bc __fread_nolock RtlAllocateHeap 16340->16342 16341->16334 16343 90337c 16342->16343 16343->16334 16345 9030b8 16344->16345 16348 9030cf 16345->16348 16365 903157 16345->16365 16347 9030e2 16347->16214 16348->16347 16349 903157 __fread_nolock RtlAllocateHeap 16348->16349 16349->16347 16351 903121 16350->16351 16354 91475d 16351->16354 16355 914770 __dosmaperr 16354->16355 16356 914d73 __dosmaperr RtlAllocateHeap 16355->16356 16364 903142 16355->16364 16357 9147a0 __dosmaperr 16356->16357 16358 9147dc 16357->16358 16359 9147a8 __dosmaperr 16357->16359 16360 914389 __dosmaperr RtlAllocateHeap 16358->16360 16361 915733 ___std_exception_destroy RtlAllocateHeap 16359->16361 16362 9147e7 16360->16362 16361->16364 16363 915733 ___std_exception_destroy RtlAllocateHeap 16362->16363 16363->16364 16364->16340 16366 903161 16365->16366 16367 90316a 16365->16367 16368 903111 __fread_nolock RtlAllocateHeap 16366->16368 16367->16348 16369 903166 16368->16369 16369->16367 16372 90e85a 16369->16372 16371 903173 16373 90e85f std::locale::_Setgloballocale 16372->16373 16376 90e86a std::locale::_Setgloballocale 16373->16376 16378 919d83 16373->16378 16399 90ddf2 16376->16399 16377 90e89d __Getctype std::locale::_Setgloballocale 16377->16371 16381 919d8f __fread_nolock 16378->16381 16379 9146ac __dosmaperr RtlAllocateHeap 16385 919dc0 std::locale::_Setgloballocale 16379->16385 16380 919ddf 16383 90be0f __dosmaperr RtlAllocateHeap 16380->16383 16381->16379 16381->16380 16381->16385 16387 919df1 std::_Lockit::_Lockit std::locale::_Setgloballocale 16381->16387 16382 919dc9 16382->16376 16384 919de4 16383->16384 16386 903370 __fread_nolock RtlAllocateHeap 16384->16386 16385->16380 16385->16382 16385->16387 16386->16382 16388 919e64 16387->16388 16389 919f61 std::_Lockit::~_Lockit 16387->16389 16391 919e92 std::locale::_Setgloballocale 16387->16391 16388->16391 16402 91455b 16388->16402 16390 90ddf2 std::locale::_Setgloballocale RtlAllocateHeap 16389->16390 16393 919f74 16390->16393 16391->16382 16394 91455b __Getctype RtlAllocateHeap 16391->16394 16397 919ee7 16391->16397 16394->16397 16396 91455b __Getctype RtlAllocateHeap 16396->16391 16397->16382 16398 91455b __Getctype RtlAllocateHeap 16397->16398 16398->16382 16416 90dc62 16399->16416 16401 90de03 16401->16377 16403 914565 __dosmaperr 16402->16403 16404 914d73 __dosmaperr RtlAllocateHeap 16403->16404 16405 91457b 16403->16405 16407 9145a8 __dosmaperr 16404->16407 16406 91460b 16405->16406 16408 90e85a __Getctype RtlAllocateHeap 16405->16408 16406->16396 16410 9145b0 __dosmaperr 16407->16410 16411 9145e8 16407->16411 16409 914615 16408->16409 16412 915733 ___std_exception_destroy RtlAllocateHeap 16410->16412 16413 914389 __dosmaperr RtlAllocateHeap 16411->16413 16412->16405 16414 9145f3 16413->16414 16415 915733 ___std_exception_destroy RtlAllocateHeap 16414->16415 16415->16405 16417 90dc8f std::locale::_Setgloballocale 16416->16417 16418 90daf3 std::locale::_Setgloballocale RtlAllocateHeap 16417->16418 16419 90dcd8 std::locale::_Setgloballocale 16418->16419 16419->16401 16423 903e7a __fread_nolock 16420->16423 16421 903e81 16422 90be0f __dosmaperr RtlAllocateHeap 16421->16422 16424 903e86 16422->16424 16423->16421 16425 903ea1 16423->16425 16426 903370 __fread_nolock RtlAllocateHeap 16424->16426 16427 903eb3 16425->16427 16428 903ea6 16425->16428 16433 903e91 16426->16433 16434 915008 16427->16434 16429 90be0f __dosmaperr RtlAllocateHeap 16428->16429 16429->16433 16431 903ebc 16432 90be0f __dosmaperr RtlAllocateHeap 16431->16432 16431->16433 16432->16433 16433->16166 16435 915014 __fread_nolock std::_Lockit::_Lockit 16434->16435 16438 9150ac 16435->16438 16437 91502f 16437->16431 16442 9150cf __fread_nolock 16438->16442 16439 914d73 __dosmaperr RtlAllocateHeap 16440 915130 16439->16440 16441 915733 ___std_exception_destroy RtlAllocateHeap 16440->16441 16443 915115 __fread_nolock std::locale::_Setgloballocale 16441->16443 16442->16439 16442->16442 16442->16443 16443->16437 16447 907a69 __fread_nolock 16444->16447 16445 907a6f 16446 9032f3 __fread_nolock RtlAllocateHeap 16445->16446 16450 907a8a 16446->16450 16447->16445 16448 907ab2 __fread_nolock 16447->16448 16451 907be0 16448->16451 16450->16170 16452 907bf3 16451->16452 16453 907c06 16451->16453 16452->16450 16460 907b07 16453->16460 16455 907c29 16459 907cb7 16455->16459 16464 9041a1 16455->16464 16459->16450 16461 907b70 16460->16461 16462 907b18 16460->16462 16461->16455 16462->16461 16473 90cd0d 16462->16473 16465 9041ba 16464->16465 16469 9041e1 16464->16469 16465->16469 16500 914902 16465->16500 16467 9041d6 16507 913d0c 16467->16507 16470 90cd4d 16469->16470 16471 90cc2c __fread_nolock 2 API calls 16470->16471 16472 90cd66 16471->16472 16472->16459 16474 90cd21 __fread_nolock 16473->16474 16479 90cc2c 16474->16479 16476 90cd36 16477 9030ac __fread_nolock RtlAllocateHeap 16476->16477 16478 90cd45 16477->16478 16478->16461 16484 91905e 16479->16484 16481 90cc3e 16482 90cc5a SetFilePointerEx 16481->16482 16483 90cc46 __fread_nolock 16481->16483 16482->16483 16483->16476 16485 91906b 16484->16485 16487 919080 16484->16487 16497 90bdfc 16485->16497 16489 90bdfc __dosmaperr RtlAllocateHeap 16487->16489 16491 9190a5 16487->16491 16492 9190b0 16489->16492 16490 90be0f __dosmaperr RtlAllocateHeap 16493 919078 16490->16493 16491->16481 16494 90be0f __dosmaperr RtlAllocateHeap 16492->16494 16493->16481 16495 9190b8 16494->16495 16496 903370 __fread_nolock RtlAllocateHeap 16495->16496 16496->16493 16498 9146ac __dosmaperr RtlAllocateHeap 16497->16498 16499 90be01 16498->16499 16499->16490 16501 914923 16500->16501 16502 91490e 16500->16502 16501->16467 16503 90be0f __dosmaperr RtlAllocateHeap 16502->16503 16504 914913 16503->16504 16505 903370 __fread_nolock RtlAllocateHeap 16504->16505 16506 91491e 16505->16506 16506->16467 16508 913d18 __fread_nolock 16507->16508 16509 913d59 16508->16509 16511 913d9f 16508->16511 16513 913d20 16508->16513 16510 9032f3 __fread_nolock RtlAllocateHeap 16509->16510 16510->16513 16511->16513 16514 913e1d 16511->16514 16513->16469 16515 913e45 16514->16515 16527 913e68 __fread_nolock 16514->16527 16516 913e49 16515->16516 16518 913ea4 16515->16518 16517 9032f3 __fread_nolock RtlAllocateHeap 16516->16517 16517->16527 16519 913ec2 16518->16519 16520 90cd4d 2 API calls 16518->16520 16528 913962 16519->16528 16520->16519 16523 913f21 16525 913f8a WriteFile 16523->16525 16523->16527 16524 913eda 16524->16527 16533 913533 16524->16533 16525->16527 16527->16513 16539 91e301 16528->16539 16530 913974 16532 9139a2 16530->16532 16548 9088e0 16530->16548 16532->16523 16532->16524 16534 91359c 16533->16534 16535 9088e0 std::_Locinfo::_Locinfo_dtor 2 API calls 16534->16535 16537 9135ac std::_Locinfo::_Locinfo_dtor std::locale::_Locimp::_Locimp 16534->16537 16535->16537 16536 913862 _ValidateLocalCookies 16536->16527 16537->16536 16538 916e3e RtlAllocateHeap RtlAllocateHeap 16537->16538 16538->16537 16540 91e31b 16539->16540 16541 91e30e 16539->16541 16543 91e327 16540->16543 16544 90be0f __dosmaperr RtlAllocateHeap 16540->16544 16542 90be0f __dosmaperr RtlAllocateHeap 16541->16542 16545 91e313 16542->16545 16543->16530 16546 91e348 16544->16546 16545->16530 16547 903370 __fread_nolock RtlAllocateHeap 16546->16547 16547->16545 16549 903157 __fread_nolock RtlAllocateHeap 16548->16549 16550 9088f0 16549->16550 16555 914873 16550->16555 16556 90890d 16555->16556 16557 91488a 16555->16557 16559 9148d1 16556->16559 16557->16556 16563 91cab0 16557->16563 16560 9148e8 16559->16560 16562 90891a 16559->16562 16560->16562 16572 91addb 16560->16572 16562->16532 16564 91cabc __fread_nolock 16563->16564 16565 91455b __Getctype RtlAllocateHeap 16564->16565 16567 91cac5 std::_Lockit::_Lockit 16565->16567 16566 91cb0b 16566->16556 16567->16566 16568 91cb31 __Getctype RtlAllocateHeap 16567->16568 16569 91caf4 __Getctype 16568->16569 16569->16566 16570 90e85a __Getctype RtlAllocateHeap 16569->16570 16571 91cb30 16570->16571 16573 91455b __Getctype RtlAllocateHeap 16572->16573 16574 91ade0 16573->16574 16575 91acf3 std::_Throw_Cpp_error RtlAllocateHeap RtlAllocateHeap 16574->16575 16576 91adeb 16575->16576 16576->16562 16578 9033dd __fread_nolock 16577->16578 16579 9033e4 16578->16579 16581 903405 __fread_nolock 16578->16581 16580 9032f3 __fread_nolock RtlAllocateHeap 16579->16580 16583 9033fd 16580->16583 16584 9034e0 16581->16584 16583->16176 16587 903512 16584->16587 16586 9034f2 16586->16583 16588 903521 16587->16588 16589 903549 16587->16589 16590 9032f3 __fread_nolock RtlAllocateHeap 16588->16590 16591 914902 __fread_nolock RtlAllocateHeap 16589->16591 16599 90353c __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 16590->16599 16592 903552 16591->16592 16600 90ccef 16592->16600 16595 9035fc 16603 90387e 16595->16603 16597 903613 16597->16599 16611 9036b3 16597->16611 16599->16586 16618 90cb07 16600->16618 16602 903570 16602->16595 16602->16597 16602->16599 16604 90388d 16603->16604 16605 914902 __fread_nolock RtlAllocateHeap 16604->16605 16606 9038a9 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 16605->16606 16607 90ccef 2 API calls 16606->16607 16610 9038b5 _ValidateLocalCookies 16606->16610 16608 903909 16607->16608 16609 90ccef 2 API calls 16608->16609 16608->16610 16609->16610 16610->16599 16612 914902 __fread_nolock RtlAllocateHeap 16611->16612 16613 9036c6 16612->16613 16614 90ccef 2 API calls 16613->16614 16617 903710 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 16613->16617 16615 90376d 16614->16615 16616 90ccef 2 API calls 16615->16616 16615->16617 16616->16617 16617->16599 16619 90cb13 __fread_nolock 16618->16619 16620 90cb56 16619->16620 16622 90cb9c 16619->16622 16624 90cb1b 16619->16624 16621 9032f3 __fread_nolock RtlAllocateHeap 16620->16621 16621->16624 16623 90cc2c __fread_nolock 2 API calls 16622->16623 16622->16624 16623->16624 16624->16602 16626 822d82 16625->16626 16629 822da6 16625->16629 16627 822d89 16626->16627 16628 822dbf 16626->16628 16631 8fde82 std::_Facet_Register RtlAllocateHeap 16627->16631 16648 822260 16628->16648 16630 822db8 16629->16630 16632 8fde82 std::_Facet_Register RtlAllocateHeap 16629->16632 16630->16188 16634 822d8f 16631->16634 16635 822db0 16632->16635 16636 822d98 16634->16636 16637 903380 std::_Throw_Cpp_error RtlAllocateHeap 16634->16637 16635->16188 16636->16188 16638 822dc9 16637->16638 16652 8fc4f9 16639->16652 16649 82226e Concurrency::cancel_current_task 16648->16649 16650 8ff22a ___std_exception_copy RtlAllocateHeap 16649->16650 16651 8222a3 16650->16651 16651->16634 16655 8fc2bf 16652->16655 16654 8fc50a Concurrency::cancel_current_task 16658 822fa0 16655->16658 16659 8ff22a ___std_exception_copy RtlAllocateHeap 16658->16659 16660 822fcd 16659->16660 16660->16654 16662 90c7d8 __fread_nolock 16661->16662 16663 90c822 __fread_nolock 16662->16663 16664 90c7eb __fread_nolock 16662->16664 16668 90c810 __fread_nolock 16662->16668 16670 90c5d6 16663->16670 16665 90be0f __dosmaperr RtlAllocateHeap 16664->16665 16667 90c805 16665->16667 16669 903370 __fread_nolock RtlAllocateHeap 16667->16669 16668->16192 16669->16668 16671 90c605 16670->16671 16674 90c5e8 __fread_nolock 16670->16674 16671->16668 16672 90c5f5 16673 90be0f __dosmaperr RtlAllocateHeap 16672->16673 16681 90c5fa 16673->16681 16674->16671 16674->16672 16676 90c646 __fread_nolock 16674->16676 16675 903370 __fread_nolock RtlAllocateHeap 16675->16671 16676->16671 16678 914902 __fread_nolock RtlAllocateHeap 16676->16678 16680 90c771 __fread_nolock 16676->16680 16683 912fa4 16676->16683 16742 9075fb 16676->16742 16678->16676 16679 90be0f __dosmaperr RtlAllocateHeap 16679->16681 16680->16679 16681->16675 16684 912fb6 16683->16684 16685 912fce 16683->16685 16686 90bdfc __dosmaperr RtlAllocateHeap 16684->16686 16687 913310 16685->16687 16692 913011 16685->16692 16688 912fbb 16686->16688 16689 90bdfc __dosmaperr RtlAllocateHeap 16687->16689 16691 90be0f __dosmaperr RtlAllocateHeap 16688->16691 16690 913315 16689->16690 16693 90be0f __dosmaperr RtlAllocateHeap 16690->16693 16696 912fc3 16691->16696 16694 91301c 16692->16694 16692->16696 16701 91304c 16692->16701 16695 913029 16693->16695 16697 90bdfc __dosmaperr RtlAllocateHeap 16694->16697 16700 903370 __fread_nolock RtlAllocateHeap 16695->16700 16696->16676 16698 913021 16697->16698 16699 90be0f __dosmaperr RtlAllocateHeap 16698->16699 16699->16695 16700->16696 16702 913065 16701->16702 16703 9130a0 16701->16703 16704 913072 16701->16704 16702->16704 16708 91308e 16702->16708 16756 9157ad 16703->16756 16705 90bdfc __dosmaperr RtlAllocateHeap 16704->16705 16707 913077 16705->16707 16710 90be0f __dosmaperr RtlAllocateHeap 16707->16710 16711 91e301 __fread_nolock RtlAllocateHeap 16708->16711 16713 91307e 16710->16713 16724 9131ec 16711->16724 16712 915733 ___std_exception_destroy RtlAllocateHeap 16714 9130ba 16712->16714 16715 903370 __fread_nolock RtlAllocateHeap 16713->16715 16717 915733 ___std_exception_destroy RtlAllocateHeap 16714->16717 16741 913089 __fread_nolock 16715->16741 16716 913264 ReadFile 16718 9132d8 16716->16718 16719 91327c 16716->16719 16720 9130c1 16717->16720 16728 9132e5 16718->16728 16739 913236 16718->16739 16719->16718 16738 913255 16719->16738 16721 9130e6 16720->16721 16722 9130cb 16720->16722 16723 90cd0d __fread_nolock 2 API calls 16721->16723 16725 90be0f __dosmaperr RtlAllocateHeap 16722->16725 16723->16708 16724->16716 16727 91321c 16724->16727 16729 9130d0 16725->16729 16726 915733 ___std_exception_destroy RtlAllocateHeap 16726->16696 16727->16738 16727->16739 16730 90be0f __dosmaperr RtlAllocateHeap 16728->16730 16733 90bdfc __dosmaperr RtlAllocateHeap 16729->16733 16734 9132ea 16730->16734 16731 9132a1 16767 912cb6 16731->16767 16732 9132b8 16732->16741 16777 912afc 16732->16777 16733->16741 16740 90bdfc __dosmaperr RtlAllocateHeap 16734->16740 16738->16731 16738->16732 16738->16741 16739->16741 16762 90bdb5 16739->16762 16740->16741 16741->16726 16743 90760c 16742->16743 16746 907608 std::locale::_Locimp::_Locimp 16742->16746 16744 907613 16743->16744 16748 907626 __fread_nolock 16743->16748 16745 90be0f __dosmaperr RtlAllocateHeap 16744->16745 16747 907618 16745->16747 16746->16676 16749 903370 __fread_nolock RtlAllocateHeap 16747->16749 16748->16746 16750 907654 16748->16750 16751 90765d 16748->16751 16749->16746 16752 90be0f __dosmaperr RtlAllocateHeap 16750->16752 16751->16746 16754 90be0f __dosmaperr RtlAllocateHeap 16751->16754 16753 907659 16752->16753 16755 903370 __fread_nolock RtlAllocateHeap 16753->16755 16754->16753 16755->16746 16757 9157eb 16756->16757 16761 9157bb __dosmaperr std::_Facet_Register 16756->16761 16759 90be0f __dosmaperr RtlAllocateHeap 16757->16759 16758 9157d6 RtlAllocateHeap 16760 9130b1 16758->16760 16758->16761 16759->16760 16760->16712 16761->16757 16761->16758 16763 90bdfc __dosmaperr RtlAllocateHeap 16762->16763 16764 90bdc0 __dosmaperr 16763->16764 16765 90be0f __dosmaperr RtlAllocateHeap 16764->16765 16766 90bdd3 16765->16766 16766->16741 16781 9129af 16767->16781 16770 912d48 16771 90be0f __dosmaperr RtlAllocateHeap 16770->16771 16773 912cfe 16771->16773 16772 912d58 16774 90cd0d __fread_nolock 2 API calls 16772->16774 16775 912d12 __fread_nolock 16772->16775 16773->16741 16774->16775 16775->16773 16776 90bdb5 __dosmaperr RtlAllocateHeap 16775->16776 16776->16773 16779 912b36 16777->16779 16778 912bc7 16778->16741 16779->16778 16780 90cd0d __fread_nolock 2 API calls 16779->16780 16780->16778 16782 9129e3 16781->16782 16783 912a4f 16782->16783 16784 90cd0d __fread_nolock 2 API calls 16782->16784 16783->16770 16783->16772 16783->16773 16783->16775 16784->16783 16786 90769f __fread_nolock 16785->16786 16787 9076a9 16786->16787 16790 9076cc __fread_nolock 16786->16790 16788 9032f3 __fread_nolock RtlAllocateHeap 16787->16788 16789 9076c4 16788->16789 16789->16196 16790->16789 16792 90772a 16790->16792 16793 907737 16792->16793 16794 90775a 16792->16794 16795 9032f3 __fread_nolock RtlAllocateHeap 16793->16795 16796 907752 16794->16796 16797 9041a1 4 API calls 16794->16797 16795->16796 16796->16789 16798 907772 16797->16798 16806 91576d 16798->16806 16801 914902 __fread_nolock RtlAllocateHeap 16802 907786 16801->16802 16810 9133c0 16802->16810 16805 915733 ___std_exception_destroy RtlAllocateHeap 16805->16796 16807 915784 16806->16807 16808 90777a 16806->16808 16807->16808 16809 915733 ___std_exception_destroy RtlAllocateHeap 16807->16809 16808->16801 16809->16808 16811 9133e9 16810->16811 16816 90778d 16810->16816 16812 913438 16811->16812 16814 913410 16811->16814 16813 9032f3 __fread_nolock RtlAllocateHeap 16812->16813 16813->16816 16817 91332f 16814->16817 16816->16796 16816->16805 16818 91333b __fread_nolock 16817->16818 16820 91337a 16818->16820 16821 913493 16818->16821 16820->16816 16822 91905e __fread_nolock RtlAllocateHeap 16821->16822 16823 9134a3 16822->16823 16825 9134db 16823->16825 16827 91905e __fread_nolock RtlAllocateHeap 16823->16827 16831 9134a9 16823->16831 16826 91905e __fread_nolock RtlAllocateHeap 16825->16826 16825->16831 16829 9134e7 FindCloseChangeNotification 16826->16829 16828 9134d2 16827->16828 16830 91905e __fread_nolock RtlAllocateHeap 16828->16830 16829->16831 16830->16825 16833 918fcd 16831->16833 16832 913501 __fread_nolock 16832->16820 16836 918fdc 16833->16836 16834 90be0f __dosmaperr RtlAllocateHeap 16835 919048 16834->16835 16837 90bdfc __dosmaperr RtlAllocateHeap 16835->16837 16836->16834 16838 919006 16836->16838 16837->16838 16838->16832 16839 83d4a0 WSAStartup 16840 83d4d8 16839->16840 16844 83d5a7 16839->16844 16841 83d575 socket 16840->16841 16840->16844 16842 83d58b connect 16841->16842 16841->16844 16843 83d59d closesocket 16842->16843 16842->16844 16843->16841 16843->16844 16845 883320 GetCursorPos 16846 883335 GetCursorPos 16845->16846 16847 883408 GetPEB 16846->16847 16849 883347 16846->16849 16847->16849 16848 883353 GetPEB 16848->16849 16849->16847 16849->16848 16850 88347d Sleep 16849->16850 16851 8833c8 Sleep 16849->16851 16852 8834a7 16849->16852 16850->16846 16851->16849 16853 90bd38 16854 90bd4b __fread_nolock 16853->16854 16859 90bb1a 16854->16859 16856 90bd60 16857 9030ac __fread_nolock RtlAllocateHeap 16856->16857 16858 90bd6d 16857->16858 16860 90bb50 16859->16860 16861 90bb28 16859->16861 16860->16856 16861->16860 16862 90bb35 16861->16862 16863 90bb57 16861->16863 16864 9032f3 __fread_nolock RtlAllocateHeap 16862->16864 16867 90ba73 16863->16867 16864->16860 16866 90bb8f 16866->16856 16868 90ba7f __fread_nolock 16867->16868 16871 90bace 16868->16871 16870 90ba9a 16870->16866 16878 916fc4 16871->16878 16898 916f86 16878->16898 16880 916fd5 16881 90bae6 16880->16881 16882 9157ad __fread_nolock 2 API calls 16880->16882 16885 90bb91 16881->16885 16883 91702e 16882->16883 16884 915733 ___std_exception_destroy RtlAllocateHeap 16883->16884 16884->16881 16888 90bba3 16885->16888 16889 90bb04 16885->16889 16886 90bbb1 16887 9032f3 __fread_nolock RtlAllocateHeap 16886->16887 16887->16889 16888->16886 16888->16889 16892 90bbe7 std::locale::_Locimp::_Locimp 16888->16892 16894 91706f 16889->16894 16890 9041a1 4 API calls 16890->16892 16891 914902 __fread_nolock RtlAllocateHeap 16891->16892 16892->16889 16892->16890 16892->16891 16893 913d0c 4 API calls 16892->16893 16893->16892 16895 90bb10 16894->16895 16896 91707a 16894->16896 16895->16870 16896->16895 16897 9041a1 4 API calls 16896->16897 16897->16895 16899 916f92 16898->16899 16900 916fbc 16899->16900 16901 914902 __fread_nolock RtlAllocateHeap 16899->16901 16900->16880 16902 916fad 16901->16902 16903 91e301 __fread_nolock RtlAllocateHeap 16902->16903 16904 916fb3 16903->16904 16904->16880

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 883320-883333 GetCursorPos 1 883335-883341 GetCursorPos 0->1 2 883408-883411 GetPEB 1->2 3 883347-88334d 1->3 4 883414-883428 2->4 3->2 5 883353-88335f GetPEB 3->5 6 883479-88347b 4->6 7 88342a-88342f 4->7 8 883360-883374 5->8 6->4 7->6 9 883431-883439 7->9 10 8833c4-8833c6 8->10 11 883376-88337b 8->11 12 883440-883453 9->12 10->8 11->10 13 88337d-883383 11->13 15 883472-883477 12->15 16 883455-883468 12->16 14 883385-883398 13->14 18 88339a 14->18 19 8833bd-8833c2 14->19 15->6 15->12 16->16 17 88346a-883470 16->17 17->15 20 88347d-8834a2 Sleep 17->20 21 8833a0-8833b3 18->21 19->10 19->14 20->1 21->21 22 8833b5-8833bb 21->22 22->19 23 8833c8-8833ee Sleep 22->23 24 8833f4-8833fa 23->24 24->2 25 8833fc-883402 24->25 25->2 26 8834a7-8834b8 call 826b80 25->26 29 8834ba-8834bc 26->29 30 8834be 26->30 31 8834c0-8834dd call 826b80 29->31 30->31
                                  APIs
                                  • GetCursorPos.USER32(?), ref: 00883333
                                  • GetCursorPos.USER32(?), ref: 00883339
                                  • Sleep.KERNELBASE(000003E9,?,00000001,00000000,?,?,?,?,?,?,?,?,00883698), ref: 008833E8
                                  • Sleep.KERNELBASE(00000001,?,00000001,00000000,?,?,?,?,?,?,?,?,00883698), ref: 0088349A
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3375363971.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000007.00000002.3375329300.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375363971.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375549813.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376129085.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376340860.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376372410.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CursorSleep
                                  • String ID:
                                  • API String ID: 4211308429-0
                                  • Opcode ID: f06dc28920d391022b4d5254b4bfc1135cbcf3b442897f179f73cf5ae6c6304f
                                  • Instruction ID: 5059bb6ac6d68ad1b3483a8efe9964c29c3a315b2c54f259c7604df25767b2cc
                                  • Opcode Fuzzy Hash: f06dc28920d391022b4d5254b4bfc1135cbcf3b442897f179f73cf5ae6c6304f
                                  • Instruction Fuzzy Hash: 8151CB35A042198FCB25DF48C8D0EAEB7B1FF55B04B294099D445AB312DB31EE46CB80

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 34 83d4a0-83d4d2 WSAStartup 35 83d5b7-83d5c0 34->35 36 83d4d8-83d502 call 826b80 * 2 34->36 41 83d504-83d508 36->41 42 83d50e-83d565 36->42 41->35 41->42 44 83d5b1 42->44 45 83d567-83d56d 42->45 44->35 46 83d5c5-83d5cf 45->46 47 83d56f 45->47 46->44 53 83d5d1-83d5d9 46->53 48 83d575-83d589 socket 47->48 48->44 49 83d58b-83d59b connect 48->49 51 83d5c1 49->51 52 83d59d-83d5a5 closesocket 49->52 51->46 52->48 54 83d5a7-83d5ab 52->54 54->44
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3375363971.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000007.00000002.3375329300.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375363971.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375549813.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376129085.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376340860.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376372410.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Startupclosesocketconnectsocket
                                  • String ID:
                                  • API String ID: 3098855095-0
                                  • Opcode ID: 02dbdd840bb1bc012a8deed0e07914d48888685b4e7ed124b902c478d4874717
                                  • Instruction ID: 35f088cbc967fa3c9d4ea0bc83f1e0e06b703c8e8a92601576cf6360a9019214
                                  • Opcode Fuzzy Hash: 02dbdd840bb1bc012a8deed0e07914d48888685b4e7ed124b902c478d4874717
                                  • Instruction Fuzzy Hash: 74318E755053006BD7209F699C89B6BB7E4FBC5338F105F19F9A8932D0E37199098B92

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 55 912fa4-912fb4 56 912fb6-912fc9 call 90bdfc call 90be0f 55->56 57 912fce-912fd0 55->57 74 913328 56->74 59 913310-91331d call 90bdfc call 90be0f 57->59 60 912fd6-912fdc 57->60 77 913323 call 903370 59->77 60->59 62 912fe2-91300b 60->62 62->59 66 913011-91301a 62->66 69 913034-913036 66->69 70 91301c-91302f call 90bdfc call 90be0f 66->70 72 91330c-91330e 69->72 73 91303c-913040 69->73 70->77 79 91332b-91332e 72->79 73->72 78 913046-91304a 73->78 74->79 77->74 78->70 82 91304c-913063 78->82 84 913065-913068 82->84 85 913098-91309e 82->85 88 91306a-913070 84->88 89 91308e-913096 84->89 86 9130a0-9130a7 85->86 87 913072-913089 call 90bdfc call 90be0f call 903370 85->87 91 9130a9 86->91 92 9130ab-9130c9 call 9157ad call 915733 * 2 86->92 116 913243 87->116 88->87 88->89 90 91310b-91312a 89->90 94 913130-91313c 90->94 95 9131e6-9131ef call 91e301 90->95 91->92 124 9130e6-913109 call 90cd0d 92->124 125 9130cb-9130e1 call 90be0f call 90bdfc 92->125 94->95 98 913142-913144 94->98 106 9131f1-913203 95->106 107 913260 95->107 98->95 102 91314a-91316b 98->102 102->95 108 91316d-913183 102->108 106->107 111 913205-913214 106->111 112 913264-91327a ReadFile 107->112 108->95 113 913185-913187 108->113 111->107 128 913216-91321a 111->128 117 9132d8-9132e3 112->117 118 91327c-913282 112->118 113->95 119 913189-9131ac 113->119 126 913246-913250 call 915733 116->126 137 9132e5-9132f7 call 90be0f call 90bdfc 117->137 138 9132fc-9132ff 117->138 118->117 122 913284 118->122 119->95 123 9131ae-9131c4 119->123 130 913287-913299 122->130 123->95 131 9131c6-9131c8 123->131 124->90 125->116 126->79 128->112 136 91321c-913234 128->136 130->126 139 91329b-91329f 130->139 131->95 140 9131ca-9131e1 131->140 156 913255-91325e 136->156 157 913236 136->157 137->116 145 913305-913307 138->145 146 91323c-913242 call 90bdb5 138->146 143 9132a1-9132b1 call 912cb6 139->143 144 9132b8-9132c5 139->144 140->95 164 9132b4-9132b6 143->164 152 9132d1-9132d6 call 912afc 144->152 153 9132c7 call 912e0d 144->153 145->126 146->116 165 9132cc-9132cf 152->165 153->165 156->130 157->146 164->126 165->164
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3375363971.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000007.00000002.3375329300.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375363971.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375549813.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376129085.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376340860.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376372410.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e3ea240951ec3768715b290f158268c088ada7009fffc5a042b469105711ec0e
                                  • Instruction ID: 0dafc8cc022b30edde62c365eb659dfb32340796cd87cfafb54feb312dea0830
                                  • Opcode Fuzzy Hash: e3ea240951ec3768715b290f158268c088ada7009fffc5a042b469105711ec0e
                                  • Instruction Fuzzy Hash: CEB10570F0824DAFDB11EF69C881BED7BB5AF89310F548558E5119B382C7719AC2CBA0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 166 829d90-829e0e call 8fde82 169 829e15-829e20 166->169 169->169 170 829e22-829e2d 169->170 171 829e32-829e44 call 903f30 170->171 172 829e2f 170->172 175 829e46-829e6c call 907d06 call 903abb call 907d06 171->175 176 829eb7-829ebe 171->176 172->171 193 829e73-829e7a 175->193 194 829e6e 175->194 178 829ec0-829ecc 176->178 179 829ee8-829ef8 176->179 181 829ede-829ee5 call 8fe103 178->181 182 829ece-829edc 178->182 181->179 182->181 184 829ef9-829f0e call 903380 182->184 192 829f10-829f1b 184->192 192->192 195 829f1d-829f28 192->195 198 829e7c-829e83 193->198 199 829e8d-829e94 call 88cd30 193->199 194->193 196 829f2a 195->196 197 829f2d-829f3f call 903f30 195->197 196->197 206 829f41-829f59 call 907d06 call 903abb call 9077b8 197->206 207 829f5c-829f63 197->207 201 829e87-829e8b 198->201 202 829e85 198->202 205 829e99-829e9f 199->205 201->205 202->201 208 829ea3-829eae call 90c7af call 9077b8 205->208 209 829ea1 205->209 206->207 212 829f65-829f71 207->212 213 829f8d-829f93 207->213 223 829eb3-829eb6 208->223 209->208 216 829f83-829f8a call 8fe103 212->216 217 829f73-829f81 212->217 216->213 217->216 220 829f94-829fbe call 903380 217->220 231 829fc0-829fc4 220->231 232 829fcf-829fd4 220->232 223->176 231->232 233 829fc6-829fce 231->233
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3375363971.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000007.00000002.3375329300.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375363971.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375549813.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376129085.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376340860.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376372410.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: __fread_nolock
                                  • String ID:
                                  • API String ID: 2638373210-0
                                  • Opcode ID: a2ac1dbf719175a1d18ba90301f8c989f2902b401743bfbe551877e94c5e9117
                                  • Instruction ID: f29c7d7c7ebe2a5bc42a82c9307efc0560173c641d68d0089828b71e3f44343d
                                  • Opcode Fuzzy Hash: a2ac1dbf719175a1d18ba90301f8c989f2902b401743bfbe551877e94c5e9117
                                  • Instruction Fuzzy Hash: 426108719002149FDB14DF68EC45BAEBBA8FF45310F15816DF848DB282D7B5DA81C7A1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 234 913e1d-913e3f 235 914032 234->235 236 913e45-913e47 234->236 237 914034-914038 235->237 238 913e73-913e96 236->238 239 913e49-913e68 call 9032f3 236->239 240 913e98-913e9a 238->240 241 913e9c-913ea2 238->241 247 913e6b-913e6e 239->247 240->241 243 913ea4-913eb5 240->243 241->239 241->243 245 913eb7-913ec5 call 90cd4d 243->245 246 913ec8-913ed8 call 913962 243->246 245->246 252 913f21-913f33 246->252 253 913eda-913ee0 246->253 247->237 254 913f35-913f3b 252->254 255 913f8a-913faa WriteFile 252->255 256 913ee2-913ee5 253->256 257 913f09-913f1f call 913533 253->257 261 913f76-913f88 call 9139df 254->261 262 913f3d-913f40 254->262 258 913fb5 255->258 259 913fac-913fb2 255->259 263 913ef0-913eff call 9138fa 256->263 264 913ee7-913eea 256->264 273 913f02-913f04 257->273 266 913fb8-913fc3 258->266 259->258 281 913f5d-913f60 261->281 267 913f62-913f74 call 913ba3 262->267 268 913f42-913f45 262->268 263->273 264->263 269 913fca-913fcd 264->269 274 913fc5-913fc8 266->274 275 91402d-914030 266->275 267->281 276 913fd0-913fd2 268->276 277 913f4b-913f58 call 913aba 268->277 269->276 273->266 274->269 275->237 283 914000-91400c 276->283 284 913fd4-913fd9 276->284 277->281 281->273 288 914016-914028 283->288 289 91400e-914014 283->289 286 913ff2-913ffb call 90bdd8 284->286 287 913fdb-913fed 284->287 286->247 287->247 288->247 289->235 289->288
                                  APIs
                                  • WriteFile.KERNELBASE(?,00000000,00907C57,?,00000000,00000000,00000000,?,00000000,?,00829F4B,00907C57,00000000,00829F4B,?,?), ref: 00913FA3
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3375363971.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000007.00000002.3375329300.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375363971.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375549813.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376129085.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376340860.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376372410.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FileWrite
                                  • String ID:
                                  • API String ID: 3934441357-0
                                  • Opcode ID: e8f1d9c999dd31e7af0466c7c179d4f15009ac248bcde154c6c779d9395f459b
                                  • Instruction ID: 8902b8e7e8d8f43ab7472f84de3369a3fa18e8a9af241118b064b801edac4f39
                                  • Opcode Fuzzy Hash: e8f1d9c999dd31e7af0466c7c179d4f15009ac248bcde154c6c779d9395f459b
                                  • Instruction Fuzzy Hash: 8361C2B1E0420EAFEF11DFA8C845AEEBFB9AF49304F148595E904A7251D335DA82DB50

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 292 903512-90351f 293 903521-903544 call 9032f3 292->293 294 903549-90355d call 914902 292->294 299 9036b0-9036b2 293->299 300 903562-90356b call 90ccef 294->300 301 90355f 294->301 303 903570-90357f 300->303 301->300 304 903581 303->304 305 90358f-903598 303->305 306 903587-903589 304->306 307 903659-90365e 304->307 308 90359a-9035a7 305->308 309 9035ac-9035e0 305->309 306->305 306->307 310 9036ae-9036af 307->310 311 9036ac 308->311 312 9035e2-9035ec 309->312 313 90363d-903649 309->313 310->299 311->310 316 903613-90361f 312->316 317 9035ee-9035fa 312->317 314 903660-903663 313->314 315 90364b-903652 313->315 318 903666-90366e 314->318 315->307 316->314 320 903621-90363b call 903a29 316->320 317->316 319 9035fc-90360e call 90387e 317->319 321 903670-903676 318->321 322 9036aa 318->322 319->310 320->318 325 903678-90368c call 9036b3 321->325 326 90368e-903692 321->326 322->311 325->310 330 903694-9036a2 call 922870 326->330 331 9036a5-9036a7 326->331 330->331 331->322
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3375363971.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000007.00000002.3375329300.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375363971.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375549813.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376129085.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376340860.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376372410.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 934cc1118b9447de699d8f73b1a6599304b86ce4b433dc4ef55c5dffa635d5c0
                                  • Instruction ID: bc869308d14fe682ce434efad27e84f8e5cc30534a920c51b2d5c1c8cc1f8106
                                  • Opcode Fuzzy Hash: 934cc1118b9447de699d8f73b1a6599304b86ce4b433dc4ef55c5dffa635d5c0
                                  • Instruction Fuzzy Hash: 4251B570A00108BFDB14DF58C846AA97BB9EF89314F24C158F8499B392D332DE41DB50

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 335 913493-9134a7 call 91905e 338 9134a9-9134ab 335->338 339 9134ad-9134b5 335->339 340 9134fb-91351b call 918fcd 338->340 341 9134c0-9134c3 339->341 342 9134b7-9134be 339->342 352 91352d 340->352 353 91351d-91352b call 90bdd8 340->353 345 9134e1-9134f1 call 91905e FindCloseChangeNotification 341->345 346 9134c5-9134c9 341->346 342->341 344 9134cb-9134df call 91905e * 2 342->344 344->338 344->345 345->338 356 9134f3-9134f9 345->356 346->344 346->345 354 91352f-913532 352->354 353->354 356->340
                                  APIs
                                  • FindCloseChangeNotification.KERNELBASE(00000000,00000000,CF830579,?,0091337A,00000000,CF830579,0094B810,0000000C,00913436,0090778D,?), ref: 009134EA
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3375363971.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000007.00000002.3375329300.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375363971.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375549813.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376129085.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376340860.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376372410.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ChangeCloseFindNotification
                                  • String ID:
                                  • API String ID: 2591292051-0
                                  • Opcode ID: f9bfdf770c8343c56ec32a8cd237f445a0988304b092857704c3f5599112231b
                                  • Instruction ID: d55b5eadb1b19c272c60a9d20390764b2c232c4a27a0792a8b0467fada9e8ee9
                                  • Opcode Fuzzy Hash: f9bfdf770c8343c56ec32a8cd237f445a0988304b092857704c3f5599112231b
                                  • Instruction Fuzzy Hash: 82116F3371812C26D6326234A892BFE235D8BC2734F258559F9184F1D1DB629DC15280

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 361 90cc2c-90cc44 call 91905e 364 90cc46-90cc4d 361->364 365 90cc5a-90cc70 SetFilePointerEx 361->365 366 90cc54-90cc58 364->366 367 90cc72-90cc83 call 90bdd8 365->367 368 90cc85-90cc8f 365->368 369 90ccab-90ccae 366->369 367->366 368->366 370 90cc91-90cca6 368->370 370->369
                                  APIs
                                  • SetFilePointerEx.KERNELBASE(00000000,00000000,0094B4C8,00829F4B,00000002,00829F4B,00000000,?,?,?,0090CD36,00000000,?,00829F4B,00000002,0094B4C8), ref: 0090CC69
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3375363971.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000007.00000002.3375329300.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375363971.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375549813.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376129085.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376340860.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376372410.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FilePointer
                                  • String ID:
                                  • API String ID: 973152223-0
                                  • Opcode ID: ca11a3ab13347f43444a33d6ba9f864dce7f4a89db92d1f57403ff87f6279409
                                  • Instruction ID: 1d8ad1ead093b973eb481f8e1bde8e1564e63bbd9eb8128b161e5f4b42b3abb6
                                  • Opcode Fuzzy Hash: ca11a3ab13347f43444a33d6ba9f864dce7f4a89db92d1f57403ff87f6279409
                                  • Instruction Fuzzy Hash: A70126726141196FDF05CF19CC55EAE3B19DB85330B240B44F855AB1D0E671ED8197D0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 374 822d70-822d80 375 822d82-822d87 374->375 376 822da6-822da8 374->376 377 822d89-822d8a call 8fde82 375->377 378 822dbf call 822260 375->378 379 822daa-822db7 call 8fde82 376->379 380 822db8-822dbe 376->380 384 822d8f-822d96 377->384 386 822dc4-822dc9 call 903380 378->386 384->386 387 822d98-822da5 384->387
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00822DBF
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3375363971.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000007.00000002.3375329300.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375363971.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375549813.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376129085.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376340860.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376372410.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID:
                                  • API String ID: 118556049-0
                                  • Opcode ID: 326ee97673e7adb1608e1cb46f795dec6370eba03380352c4d7ae6dd60fbcf19
                                  • Instruction ID: 473fc2a0b49d2e7c2d046f90962b2bdbc082f16bbc3b6476e88e143d1729a00d
                                  • Opcode Fuzzy Hash: 326ee97673e7adb1608e1cb46f795dec6370eba03380352c4d7ae6dd60fbcf19
                                  • Instruction Fuzzy Hash: EDF0B472500218ABCB186F74E8059F9B3A8FF24361754057AE989C7252EB26D9948781

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 390 914d73-914d7e 391 914d80-914d8a 390->391 392 914d8c-914d92 390->392 391->392 393 914dc0-914dcb call 90be0f 391->393 394 914d94-914d95 392->394 395 914dab-914dbc RtlAllocateHeap 392->395 399 914dcd-914dcf 393->399 394->395 396 914d97-914d9e call 912914 395->396 397 914dbe 395->397 396->393 403 914da0-914da9 call 91011d 396->403 397->399 403->393 403->395
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000008,00907DC7,00000000,?,009146F9,00000001,00000364,00000000,00000006,000000FF,?,00000000,0090BE14,00907593,00907DC7,00000000), ref: 00914DB5
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3375363971.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000007.00000002.3375329300.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375363971.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375549813.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376129085.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376340860.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376372410.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: b0d5d3230dff19876d911df2f21e3b6ed4a6886e9db0fc7fa92cf61cd8f84e96
                                  • Instruction ID: 442ab15acf554aaa9348adbade78dbf5dd3e10383f397556d6ae34cec107f758
                                  • Opcode Fuzzy Hash: b0d5d3230dff19876d911df2f21e3b6ed4a6886e9db0fc7fa92cf61cd8f84e96
                                  • Instruction Fuzzy Hash: D7F0BE3934422D669F227AA2B801BEA374DDF8A7B0F254625EC18960C1CB20F8C146E0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 406 9157ad-9157b9 407 9157eb-9157f6 call 90be0f 406->407 408 9157bb-9157bd 406->408 416 9157f8-9157fa 407->416 409 9157d6-9157e7 RtlAllocateHeap 408->409 410 9157bf-9157c0 408->410 412 9157c2-9157c9 call 912914 409->412 413 9157e9 409->413 410->409 412->407 418 9157cb-9157d4 call 91011d 412->418 413->416 418->407 418->409
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000000,0091ABF2,4D88C033,?,0091ABF2,00000220,?,0091416F,4D88C033), ref: 009157E0
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3375363971.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000007.00000002.3375329300.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375363971.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375549813.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376129085.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376340860.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376372410.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: a072f3c1657c4a7adbbff39ef0cecf711989a24365ff1555a10cccf0ddfa1c6d
                                  • Instruction ID: 3bbfd32a7f6ad1d5eaded1873cd519ae5a61ef63a3f472520231ef8157e9e5aa
                                  • Opcode Fuzzy Hash: a072f3c1657c4a7adbbff39ef0cecf711989a24365ff1555a10cccf0ddfa1c6d
                                  • Instruction Fuzzy Hash: 78E03931314B29E6E62136665902FEB2A4DDBC27B0F170511ED29960C0DB6498C086F1
                                  APIs
                                  • GetProcAddress.KERNEL32(00000000,C8D8C5E3), ref: 008A4D6C
                                  • GetProcAddress.KERNEL32(00000000,C8D8C5E3), ref: 008A4DAE
                                  • GetProcAddress.KERNEL32(00000000,DDD8DFE2), ref: 008A4DF6
                                  • GetProcAddress.KERNEL32(00000000,C8D8C5E3), ref: 008A4E37
                                  • GetProcAddress.KERNEL32(00000000,C8D8C5E3), ref: 008A4E78
                                  • GetProcAddress.KERNEL32(00000000,DDD8DFE2), ref: 008A4EB6
                                  • GetProcAddress.KERNEL32(00000000,C8D8C5E3), ref: 008A4EFE
                                  • GetProcAddress.KERNEL32(00000000,DDD8DFE2), ref: 008A4F46
                                  • GetProcAddress.KERNEL32(00000000,C8D8C5E3), ref: 008A4F87
                                  • GetProcAddress.KERNEL32(00000000,C8D8C5E3), ref: 008A4FCD
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3375363971.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000007.00000002.3375329300.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375363971.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375549813.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376129085.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376340860.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376372410.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressProc
                                  • String ID:
                                  • API String ID: 190572456-0
                                  • Opcode ID: 16917071bb3ede117609a139723471ecca915a05d31d4e780ae5c14dd2a35648
                                  • Instruction ID: 2569a414de2ee84eac9b327edc3f33cee247a22069eece0523cd05000bd80107
                                  • Opcode Fuzzy Hash: 16917071bb3ede117609a139723471ecca915a05d31d4e780ae5c14dd2a35648
                                  • Instruction Fuzzy Hash: 118162B0C1C38DAEEF19CFA8D445AEEBBB8EF16304F50409ED841AB651E3745209DB65
                                  APIs
                                  • GetModuleHandleA.KERNEL32(?), ref: 0082892E
                                  • GetProcAddress.KERNEL32(00000000,?), ref: 0082893B
                                  • GetModuleHandleA.KERNEL32(?), ref: 008289A5
                                  • GetProcAddress.KERNEL32(00000000,?), ref: 008289AC
                                  • CloseHandle.KERNEL32(?), ref: 00828BB2
                                  • CloseHandle.KERNEL32(?), ref: 00828C14
                                  • CloseHandle.KERNEL32(00000000), ref: 00828C41
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3375363971.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000007.00000002.3375329300.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375363971.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375549813.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376129085.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376340860.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376372410.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Handle$Close$AddressModuleProc
                                  • String ID: File
                                  • API String ID: 4110381430-749574446
                                  • Opcode ID: ef298c713191e9957478d590150846e0a948a3b6c25727de40aaec925d7432a5
                                  • Instruction ID: 351c63535d3176480f57891a05d43a999cc06f8b1104d6045841cbd1fdcff33d
                                  • Opcode Fuzzy Hash: ef298c713191e9957478d590150846e0a948a3b6c25727de40aaec925d7432a5
                                  • Instruction Fuzzy Hash: 06C1AE70905269DFEF24CBA4DC85BAEBBB8FF05300F144069E504EB282DB759985CB65
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3375363971.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000007.00000002.3375329300.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375363971.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375549813.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376129085.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376340860.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376372410.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 61965cb8cb4c3d11271a02d73999b519a6a23ab072505813c3df16f2acd370b1
                                  • Instruction ID: 20f07ce67db929d53c4cc8f92cd4cf07f51eebd879b1d91e5d944c97b3d6d119
                                  • Opcode Fuzzy Hash: 61965cb8cb4c3d11271a02d73999b519a6a23ab072505813c3df16f2acd370b1
                                  • Instruction Fuzzy Hash: 27022B71E052199FDF14CFA9D8806AEFBF5FF48324F248669E919E7380D731A9418B90
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0088F5B3
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0088F5D5
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0088F5F5
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0088F61F
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0088F68D
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0088F6D9
                                  • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0088F6F3
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0088F788
                                  • std::_Facet_Register.LIBCPMT ref: 0088F795
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3375363971.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000007.00000002.3375329300.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375363971.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375549813.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376129085.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376340860.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376372410.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Locinfo::_$Facet_Locinfo_ctorLocinfo_dtorRegister
                                  • String ID: bad locale name$P#
                                  • API String ID: 3375549084-762106057
                                  • Opcode ID: ddc705bce0d7f527e981eb75e9ae6584dbaa4f12a942b78b09b08fe42a1abd61
                                  • Instruction ID: 7b54c195029383a8384cb886fa2fe78e67ce3c2442888853d1208da2f036331c
                                  • Opcode Fuzzy Hash: ddc705bce0d7f527e981eb75e9ae6584dbaa4f12a942b78b09b08fe42a1abd61
                                  • Instruction Fuzzy Hash: 976142B1D002489BDB10EFA8D945B9EBBB4FF54314F194168EA04E7392E735E905CBA2
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 008969A8
                                  • __floor_pentium4.LIBCMT ref: 00896ACB
                                  Strings
                                  • unordered_map/set too long, xrefs: 00896B96
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3375363971.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000007.00000002.3375329300.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375363971.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375549813.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376129085.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376340860.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376372410.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task__floor_pentium4
                                  • String ID: unordered_map/set too long
                                  • API String ID: 1502093491-306623848
                                  • Opcode ID: c3b215518d4feae5533ce5f328ebba8e2e5a736c9d51b792d1dcc5d02bc1b29c
                                  • Instruction ID: e5897c7b9650ab79ed7038a8f19c67ccb4f8ebf846e671138f473f2cb08efdb5
                                  • Opcode Fuzzy Hash: c3b215518d4feae5533ce5f328ebba8e2e5a736c9d51b792d1dcc5d02bc1b29c
                                  • Instruction Fuzzy Hash: 18F1F871A00218DFCF14EF58C5416AEB7B5FF44354F288269E815EB285E731ED61CB91
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3375363971.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000007.00000002.3375329300.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375363971.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375549813.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376129085.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376340860.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376372410.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: ", "$: "$recursive_directory_iterator::operator++
                                  • API String ID: 0-2763324178
                                  • Opcode ID: 81f1060d6387760c66a9080d2aec7c5e1a24da31d7af9e9377acef4b9a4b3a4a
                                  • Instruction ID: 0ad32d7731ae22d4411274a02b5c468fd20e336968419fdf986ccd6fad822cbd
                                  • Opcode Fuzzy Hash: 81f1060d6387760c66a9080d2aec7c5e1a24da31d7af9e9377acef4b9a4b3a4a
                                  • Instruction Fuzzy Hash: B6C1D0B1900614AFD728EF68E845BAEBBF8FF04710F10462DF516D7681DB74AA44CBA1
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00823A08
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00823A54
                                  • __Getctype.LIBCPMT ref: 00823A6A
                                  • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 00823A96
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00823B2B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3375363971.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000007.00000002.3375329300.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375363971.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375549813.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376129085.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376340860.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376372410.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Locinfo::_Lockit$GetctypeLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                  • String ID: bad locale name
                                  • API String ID: 1840309910-1405518554
                                  • Opcode ID: 7a80625702d55ae32dc3a25cb93bfd9377d36d2e92097448865a4ea1c8d128f7
                                  • Instruction ID: e228040b93c7c91504ba4427e9abf1ce8d905fee1efa5e8a0d9794895d58903a
                                  • Opcode Fuzzy Hash: 7a80625702d55ae32dc3a25cb93bfd9377d36d2e92097448865a4ea1c8d128f7
                                  • Instruction Fuzzy Hash: DE5152B1D002589FDB10DFA8D855B9EBBB8FF14314F144069E909EB381D779DA44CB92
                                  APIs
                                  • _ValidateLocalCookies.LIBCMT ref: 00901A17
                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 00901A1F
                                  • _ValidateLocalCookies.LIBCMT ref: 00901AA8
                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 00901AD3
                                  • _ValidateLocalCookies.LIBCMT ref: 00901B28
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3375363971.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000007.00000002.3375329300.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375363971.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375549813.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376129085.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376340860.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376372410.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                  • String ID: csm
                                  • API String ID: 1170836740-1018135373
                                  • Opcode ID: 9cda3a15b2874522081e198639dd7c57f8e1fbb86036cc7fd3410fc955376c72
                                  • Instruction ID: 09cd776f905c1b58851c7ec3414efc61c6c9501343187b6e983ded7df59e3772
                                  • Opcode Fuzzy Hash: 9cda3a15b2874522081e198639dd7c57f8e1fbb86036cc7fd3410fc955376c72
                                  • Instruction Fuzzy Hash: 5841BF34A01208AFCF10DFA8C885B9EBBB9BF85324F148555F8199B3D2D771EA45CB91
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0088DD13
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0088DD36
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0088DD56
                                  • std::_Facet_Register.LIBCPMT ref: 0088DDCB
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0088DDE3
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0088DDFB
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3375363971.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000007.00000002.3375329300.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375363971.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375549813.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376129085.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376340860.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376372410.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                  • String ID:
                                  • API String ID: 2081738530-0
                                  • Opcode ID: dba012179bdedbe7eec67d7cfe982e1e4fa32f4455f8e4c38c02bfa18d165bd6
                                  • Instruction ID: d3cd25d69e548b68423512bcb8509a9069386b34c49a7e9c150cc417d0b59ef7
                                  • Opcode Fuzzy Hash: dba012179bdedbe7eec67d7cfe982e1e4fa32f4455f8e4c38c02bfa18d165bd6
                                  • Instruction Fuzzy Hash: D531AD71900319DFCB25EF58D980BAEBBB4FB44720F148659E909A7391D730AE41CBD2
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00827796
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00827931
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3375363971.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000007.00000002.3375329300.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375363971.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375549813.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376129085.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376340860.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376372410.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: out_of_range$type_error
                                  • API String ID: 2659868963-3702451861
                                  • Opcode ID: e1e85dc0ff1dcbe18de36f270c21efa943358aa7d416736f9575b1902ff136a8
                                  • Instruction ID: 37f1acb43210a1f89ceaf0ebb026c7aff527adc1d6d279654fd9ce6fa92e4158
                                  • Opcode Fuzzy Hash: e1e85dc0ff1dcbe18de36f270c21efa943358aa7d416736f9575b1902ff136a8
                                  • Instruction Fuzzy Hash: ABA189B19042189FCB18DFA8E884BADBBF5FF48310F148229E059EB795E7749984CB51
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 0082743E
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 0082744D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3375363971.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000007.00000002.3375329300.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375363971.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375549813.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376129085.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376340860.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376372410.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: at line $, column
                                  • API String ID: 4194217158-191570568
                                  • Opcode ID: d31647f921070f8d30a1f2d6d7f61d7e6693aa90f4b1113fd1d9e72377097448
                                  • Instruction ID: 1ae014ae8d295f14c8d11a5d71ad2e31690c5027f6c2985d37876cc3ecd4a066
                                  • Opcode Fuzzy Hash: d31647f921070f8d30a1f2d6d7f61d7e6693aa90f4b1113fd1d9e72377097448
                                  • Instruction Fuzzy Hash: 46617AB0E042189FDB18DF68E884BADBBF1FB49310F14826DE419E7786D77499808B94
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00823E2F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3375363971.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000007.00000002.3375329300.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375363971.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375549813.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376129085.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376340860.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376372410.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                  • API String ID: 2659868963-1866435925
                                  • Opcode ID: e3c2994491292e3253bcaf5ec721d4c693b2ffbf3e476a8de7ba3be8498470e7
                                  • Instruction ID: 6f22e3230b9593a0080b45f7ab06ff63cbe66b8cddaf995f7c77b65a1e484264
                                  • Opcode Fuzzy Hash: e3c2994491292e3253bcaf5ec721d4c693b2ffbf3e476a8de7ba3be8498470e7
                                  • Instruction Fuzzy Hash: 7441C4B2900218AFC714DF68E851BEAB7F8FF48310F14852AF919D7641E774AA44CBA1
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00823E2F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3375363971.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000007.00000002.3375329300.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375363971.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375549813.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376129085.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376340860.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376372410.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                  • API String ID: 2659868963-1866435925
                                  • Opcode ID: 544584d240b00bc8357678f909cbdb413f5f82ab91f73ce18aae5158f54223f7
                                  • Instruction ID: 0ac1b85fe92f6ff8f2546d4d1fb930bafd287e4cd4dfda1d500137c25e9a9e3d
                                  • Opcode Fuzzy Hash: 544584d240b00bc8357678f909cbdb413f5f82ab91f73ce18aae5158f54223f7
                                  • Instruction Fuzzy Hash: 3D21A5B29007286FC714DF58E811B96B7E8FF04310F18886AFA58D7681E774EA54CB91
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 008FCF40
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 008FCF4B
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 008FCFB9
                                    • Part of subcall function 008FD09C: std::locale::_Locimp::_Locimp.LIBCPMT ref: 008FD0B4
                                  • std::locale::_Setgloballocale.LIBCPMT ref: 008FCF66
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3375363971.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000007.00000002.3375329300.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375363971.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375549813.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376129085.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376340860.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376372410.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                                  • String ID:
                                  • API String ID: 677527491-0
                                  • Opcode ID: 004b179a56f36d14e8de2a229c63300246ef87a202ec91829530006f4072754f
                                  • Instruction ID: 30d59514004b32a653b7665fb43f7d7d28afd4c229d522161da0f4f509920e9e
                                  • Opcode Fuzzy Hash: 004b179a56f36d14e8de2a229c63300246ef87a202ec91829530006f4072754f
                                  • Instruction Fuzzy Hash: E101B875A053299BCB06EB34D85167D7BA2FF84750B180009EA01973A2CF386E02DBC6
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 008271A9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3375363971.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000007.00000002.3375329300.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375363971.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375549813.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376129085.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376340860.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376372410.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: parse error$parse_error
                                  • API String ID: 2659868963-1820534363
                                  • Opcode ID: 981316015ba5343b165d9542da5100b4182d74a27b544084ba649e66fc177c98
                                  • Instruction ID: cb221d67a883d262f1e1400f228f0ccaeb4853dc9e9a151971d6c4e8a822de76
                                  • Opcode Fuzzy Hash: 981316015ba5343b165d9542da5100b4182d74a27b544084ba649e66fc177c98
                                  • Instruction Fuzzy Hash: EBB17D70D042198FDB18CF68EC84BADBBB1FF49310F148269E019EB792D7749A85CB91
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 008961A6
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00896341
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3375363971.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000007.00000002.3375329300.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375363971.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375549813.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376129085.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376340860.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376372410.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID: Py"v
                                  • API String ID: 118556049-2948403528
                                  • Opcode ID: c7342fc91b0e48d358dcb7bb4eaa3d37a23a5ffae483882c6c78599f48bc2e25
                                  • Instruction ID: e89728f975fae6b4e30b9718f86984bc36aacacc1b33111f1e45b007ba8b111d
                                  • Opcode Fuzzy Hash: c7342fc91b0e48d358dcb7bb4eaa3d37a23a5ffae483882c6c78599f48bc2e25
                                  • Instruction Fuzzy Hash: BD810372A00205AFCB08EF6CDD8196EB7A5FB85310B18832CE815D7391E730EE65CB91
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00826E51
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00826E60
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3375363971.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000007.00000002.3375329300.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375363971.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375549813.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376129085.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376340860.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376372410.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: [json.exception.
                                  • API String ID: 4194217158-791563284
                                  • Opcode ID: 3df6906ccb5ef33b8b7d2eae077f9a706897bfd70a520094cc8e6d9bc031c9ae
                                  • Instruction ID: 58dbc1c5af74ffc14753f73936435a4f9975bc1b926fddaa691256ee5c0293ac
                                  • Opcode Fuzzy Hash: 3df6906ccb5ef33b8b7d2eae077f9a706897bfd70a520094cc8e6d9bc031c9ae
                                  • Instruction Fuzzy Hash: 1171B1B4A002099FDB18DF68E884BADFBF5FF48310F248259E419DB781D774A990CB91
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0089D6B0
                                  Strings
                                  • type must be boolean, but is , xrefs: 0089D7A2
                                  • type must be string, but is , xrefs: 0089D718
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3375363971.0000000000821000.00000040.00000001.01000000.00000004.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000007.00000002.3375329300.0000000000820000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375363971.000000000094E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375549813.0000000000953000.00000008.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000957000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000ADE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B6E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B71000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000B9E000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BAD000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3375585687.0000000000BBB000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376129085.0000000000BBC000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376340860.0000000000D1C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000007.00000002.3376372410.0000000000D1D000.00000080.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_820000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID: type must be boolean, but is $type must be string, but is
                                  • API String ID: 118556049-436076039
                                  • Opcode ID: f6f121f828c918919976ecd49bd337efa929f52bd630c926361b201ca5b6eb76
                                  • Instruction ID: 6e692840975c399fdde69c6e023a9633b7fdaf5eb466ca79a4b95d979d311408
                                  • Opcode Fuzzy Hash: f6f121f828c918919976ecd49bd337efa929f52bd630c926361b201ca5b6eb76
                                  • Instruction Fuzzy Hash: AC4125B2900208AFCB00EBACE801B9DB7A8FB54310F14817AE519D7781EB35A940C7D6

                                  Execution Graph

                                  Execution Coverage:3.8%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:0%
                                  Total number of Nodes:944
                                  Total number of Limit Nodes:57
                                  execution_graph 17276 47e5c0 17277 47ea72 17276->17277 17288 47e5eb __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 17276->17288 17278 47e645 setsockopt recv 17278->17288 17280 47ea5d Sleep 17280->17277 17280->17288 17282 4ccd30 RtlAllocateHeap 17282->17288 17283 47e6db recv 17285 47e6d8 std::_Throw_Cpp_error 17283->17285 17284 47e6fd recv 17284->17285 17285->17283 17285->17284 17286 47ea4f Sleep 17285->17286 17289 4ccd30 RtlAllocateHeap 17285->17289 17292 47e78b recv 17285->17292 17318 4ca6b0 17285->17318 17327 47ddc0 17285->17327 17286->17280 17288->17277 17288->17278 17288->17280 17288->17282 17288->17283 17288->17285 17288->17286 17294 47d4a0 WSAStartup 17288->17294 17300 53d879 17288->17300 17303 47d9c0 17288->17303 17290 47e753 setsockopt 17289->17290 17290->17285 17290->17292 17292->17285 17295 47d4d8 17294->17295 17297 47d5a7 17294->17297 17296 47d575 socket 17295->17296 17295->17297 17296->17297 17298 47d58b connect 17296->17298 17297->17288 17298->17297 17299 47d59d closesocket 17298->17299 17299->17296 17299->17297 17344 53de2d 17300->17344 17304 4ca6b0 std::_Throw_Cpp_error RtlAllocateHeap 17303->17304 17312 47d9f6 17304->17312 17306 47db68 17307 47ddb1 17306->17307 17308 47db92 std::_Throw_Cpp_error 17306->17308 17309 543380 std::_Throw_Cpp_error RtlAllocateHeap 17307->17309 17310 4ccd30 RtlAllocateHeap 17308->17310 17314 47dbd3 std::locale::_Locimp::_Locimp 17308->17314 17317 47dd24 std::_Throw_Cpp_error 17309->17317 17310->17314 17311 543380 std::_Throw_Cpp_error RtlAllocateHeap 17313 47ddbb 17311->17313 17348 4ca570 17312->17348 17314->17314 17316 47dcee GetModuleHandleA GetProcAddress WSASend 17314->17316 17314->17317 17315 47dd8e std::_Throw_Cpp_error 17315->17288 17316->17314 17316->17317 17317->17311 17317->17315 17319 4ca6d7 17318->17319 17320 4ca75b 17319->17320 17324 4ca6e1 17319->17324 17321 462300 std::_Throw_Cpp_error RtlAllocateHeap 17320->17321 17323 4ca760 17321->17323 17322 4ca6e6 17322->17285 17323->17285 17324->17322 17325 462d70 std::_Throw_Cpp_error RtlAllocateHeap 17324->17325 17326 4ca739 std::locale::_Locimp::_Locimp 17325->17326 17326->17285 17333 47de22 17327->17333 17328 47e566 std::_Throw_Cpp_error 17328->17285 17329 543380 std::_Throw_Cpp_error RtlAllocateHeap 17330 47e586 17329->17330 17353 53cd44 17330->17353 17332 47e58d 17334 53cd44 std::_Throw_Cpp_error 2 API calls 17332->17334 17333->17328 17333->17329 17335 47e59e 17334->17335 17336 543380 std::_Throw_Cpp_error RtlAllocateHeap 17335->17336 17337 47e5a3 17336->17337 17338 543380 std::_Throw_Cpp_error RtlAllocateHeap 17337->17338 17339 47e5a8 17338->17339 17340 543380 std::_Throw_Cpp_error RtlAllocateHeap 17339->17340 17341 47e5ad 17340->17341 17342 543380 std::_Throw_Cpp_error RtlAllocateHeap 17341->17342 17343 47e5b2 17342->17343 17345 53d887 17344->17345 17346 53de5d GetSystemTimePreciseAsFileTime 17344->17346 17345->17288 17346->17345 17349 4ca5a1 std::_Throw_Cpp_error 17348->17349 17350 4ca57e 17348->17350 17349->17306 17350->17349 17351 543380 std::_Throw_Cpp_error RtlAllocateHeap 17350->17351 17352 4ca5fe 17351->17352 17354 53cd5a std::_Throw_Cpp_error 17353->17354 17359 53ccf7 17354->17359 17356 53cd6a __EH_prolog3 std::_Throw_Cpp_error std::_Xinvalid_argument 17367 4cd9a0 17356->17367 17358 53cdd7 std::_Throw_Cpp_error 17358->17332 17360 53cd03 __EH_prolog3_GS 17359->17360 17378 462980 17360->17378 17364 53cd2c 17399 4628d0 17364->17399 17366 53cd34 std::_Throw_Cpp_error 17366->17356 17427 463d90 17367->17427 17369 4cda0f 17370 53de82 std::_Facet_Register RtlAllocateHeap 17369->17370 17371 4cda16 17370->17371 17433 53cf39 17371->17433 17373 4cda29 17441 4cdcf0 17373->17441 17375 4cda5c 17376 4cda9f std::_Throw_Cpp_error 17375->17376 17377 463d90 std::_Throw_Cpp_error RtlAllocateHeap 17375->17377 17376->17358 17377->17376 17379 4629a2 17378->17379 17379->17379 17404 462ba0 17379->17404 17381 4629b4 17382 463120 17381->17382 17383 4ca6b0 std::_Throw_Cpp_error RtlAllocateHeap 17382->17383 17384 463151 17383->17384 17385 463176 17384->17385 17412 4ccea0 17384->17412 17387 4ccea0 std::_Throw_Cpp_error RtlAllocateHeap 17385->17387 17388 46319e 17387->17388 17389 4631c8 std::_Throw_Cpp_error 17388->17389 17391 463293 17388->17391 17390 53f22a ___std_exception_copy RtlAllocateHeap 17389->17390 17394 463233 17390->17394 17392 543380 std::_Throw_Cpp_error RtlAllocateHeap 17391->17392 17392->17394 17393 463262 std::_Throw_Cpp_error 17393->17364 17394->17393 17395 543380 std::_Throw_Cpp_error RtlAllocateHeap 17394->17395 17396 46329d 17395->17396 17423 53f28d 17396->17423 17398 4632b5 std::_Throw_Cpp_error 17398->17364 17400 4628db 17399->17400 17401 4628f6 std::_Throw_Cpp_error 17399->17401 17400->17401 17402 543380 std::_Throw_Cpp_error RtlAllocateHeap 17400->17402 17401->17366 17403 46291a 17402->17403 17405 462c28 17404->17405 17408 462bb2 17404->17408 17406 462300 std::_Throw_Cpp_error RtlAllocateHeap 17405->17406 17407 462c2d 17406->17407 17409 462bb7 std::locale::_Locimp::_Locimp 17408->17409 17410 462d70 std::_Throw_Cpp_error RtlAllocateHeap 17408->17410 17409->17381 17411 462c03 std::locale::_Locimp::_Locimp 17410->17411 17411->17381 17413 4cceef 17412->17413 17416 4ccec2 std::locale::_Locimp::_Locimp 17412->17416 17414 4ccfee 17413->17414 17417 4ccefe 17413->17417 17415 462300 std::_Throw_Cpp_error RtlAllocateHeap 17414->17415 17421 4ccf45 std::locale::_Locimp::_Locimp 17415->17421 17416->17385 17418 462d70 std::_Throw_Cpp_error RtlAllocateHeap 17417->17418 17418->17421 17419 543380 std::_Throw_Cpp_error RtlAllocateHeap 17420 4ccff8 std::_Throw_Cpp_error 17419->17420 17420->17385 17421->17419 17422 4ccfa5 std::_Throw_Cpp_error std::locale::_Locimp::_Locimp 17421->17422 17422->17385 17424 53f2a1 17423->17424 17425 53f29a 17423->17425 17424->17398 17426 54c3a6 __freea RtlAllocateHeap 17425->17426 17426->17424 17428 463daa std::_Throw_Cpp_error std::_Xinvalid_argument 17427->17428 17428->17369 17451 463cc0 17428->17451 17430 463df7 std::_Xinvalid_argument 17431 53f22a ___std_exception_copy RtlAllocateHeap 17430->17431 17432 463e34 17431->17432 17432->17369 17434 53cf45 __EH_prolog3 std::_Lockit::_Lockit 17433->17434 17439 53cf81 std::_Throw_Cpp_error std::_Lockit::~_Lockit 17434->17439 17464 53d09c 17434->17464 17436 53cf63 17470 53d0bf 17436->17470 17439->17373 17442 4cdd18 std::_Throw_Cpp_error std::_Lockit::~_Lockit std::_Lockit::_Lockit 17441->17442 17450 4cdda8 std::_Lockit::~_Lockit 17442->17450 17487 4639a0 17442->17487 17444 4cddb8 17445 4cddfb 17444->17445 17446 4cddc0 17444->17446 17518 463730 17445->17518 17515 53cf07 17446->17515 17450->17375 17452 463d10 17451->17452 17452->17452 17453 462ba0 std::_Throw_Cpp_error RtlAllocateHeap 17452->17453 17454 463d24 17453->17454 17455 463120 std::_Throw_Cpp_error RtlAllocateHeap 17454->17455 17457 463d38 17455->17457 17456 463d5e std::_Throw_Cpp_error 17456->17430 17457->17456 17458 543380 std::_Throw_Cpp_error RtlAllocateHeap 17457->17458 17459 463d88 std::_Throw_Cpp_error std::_Xinvalid_argument 17458->17459 17459->17430 17460 463cc0 std::_Throw_Cpp_error RtlAllocateHeap 17459->17460 17461 463df7 std::_Xinvalid_argument 17460->17461 17462 53f22a ___std_exception_copy RtlAllocateHeap 17461->17462 17463 463e34 17462->17463 17463->17430 17465 53de82 std::_Facet_Register RtlAllocateHeap 17464->17465 17466 53d0a7 17465->17466 17467 53d0bb 17466->17467 17478 53ce21 17466->17478 17467->17436 17471 53d0cb 17470->17471 17473 53cf6b 17470->17473 17481 53db4a 17471->17481 17474 4c9bb0 17473->17474 17475 4c9bc0 17474->17475 17477 4c9bca ___std_exception_copy std::locale::_Locimp::_Locimp 17474->17477 17476 54c3a6 __freea RtlAllocateHeap 17475->17476 17475->17477 17476->17477 17477->17439 17479 4c9bb0 std::locale::_Locimp::_Locimp RtlAllocateHeap 17478->17479 17480 53ce5b 17479->17480 17480->17436 17482 53db5a std::locale::_Setgloballocale 17481->17482 17482->17473 17483 559d83 std::locale::_Setgloballocale RtlAllocateHeap 17482->17483 17485 54e86a std::locale::_Setgloballocale 17482->17485 17483->17485 17484 54ddf2 std::locale::_Setgloballocale RtlAllocateHeap 17486 54e89d __Getctype std::locale::_Setgloballocale 17484->17486 17485->17484 17486->17473 17488 4639c9 17487->17488 17513 463b1e std::_Lockit::~_Lockit 17487->17513 17489 53de82 std::_Facet_Register RtlAllocateHeap 17488->17489 17488->17513 17490 4639d9 std::_Lockit::_Lockit 17489->17490 17491 463b46 17490->17491 17492 463a4f 17490->17492 17547 53c559 17491->17547 17522 53d037 17492->17522 17496 463b50 17550 53d56f 17496->17550 17503 463aab 17504 463ac2 17503->17504 17506 54c3a6 __freea RtlAllocateHeap 17503->17506 17507 463ad9 17504->17507 17508 54c3a6 __freea RtlAllocateHeap 17504->17508 17505 54c3a6 __freea RtlAllocateHeap 17505->17503 17506->17504 17509 463af0 17507->17509 17510 54c3a6 __freea RtlAllocateHeap 17507->17510 17508->17507 17511 54c3a6 __freea RtlAllocateHeap 17509->17511 17514 463b07 17509->17514 17510->17509 17511->17514 17512 54c3a6 __freea RtlAllocateHeap 17512->17513 17513->17444 17514->17512 17514->17513 17516 53de82 std::_Facet_Register RtlAllocateHeap 17515->17516 17517 53cf12 17516->17517 17517->17450 17519 46373e Concurrency::cancel_current_task std::_Xinvalid_argument 17518->17519 17520 53f22a ___std_exception_copy RtlAllocateHeap 17519->17520 17521 463773 17520->17521 17562 54ebaa 17522->17562 17525 4c9bb0 std::locale::_Locimp::_Locimp RtlAllocateHeap 17526 53d05b 17525->17526 17527 53d06b 17526->17527 17528 54ebaa std::_Locinfo::_Locinfo_dtor 2 API calls 17526->17528 17529 4c9bb0 std::locale::_Locimp::_Locimp RtlAllocateHeap 17527->17529 17528->17527 17530 463a59 17529->17530 17531 53d504 17530->17531 17614 54e38c 17531->17614 17533 53d50d __Getctype 17534 53d527 17533->17534 17535 53d545 17533->17535 17619 54ebe2 17534->17619 17536 54ebe2 __Getctype RtlAllocateHeap 17535->17536 17538 53d52e 17536->17538 17624 54e3d6 17538->17624 17541 463a6f 17543 53d082 17541->17543 17544 463a9b 17543->17544 17545 53d08e 17543->17545 17544->17503 17544->17505 17546 54ebaa std::_Locinfo::_Locinfo_dtor 2 API calls 17545->17546 17546->17544 17646 462fe0 17547->17646 17549 53c56a std::_Xinvalid_argument 17549->17496 17551 53d57e 17550->17551 17554 53d58b 17550->17554 17552 54e3d6 __Getctype RtlAllocateHeap 17551->17552 17553 53d583 17552->17553 17555 54e38c __Getctype RtlAllocateHeap 17553->17555 17558 463b71 17554->17558 17559 53d5cc 17554->17559 17560 53d5d7 17554->17560 17649 542fe0 17554->17649 17555->17554 17556 54ebe2 __Getctype RtlAllocateHeap 17556->17560 17558->17444 17559->17556 17559->17558 17559->17560 17560->17558 17658 53d8b9 17560->17658 17563 54ebb7 std::_Lockit::_Lockit 17562->17563 17566 54e955 17563->17566 17565 53d043 17565->17525 17567 54e961 __fread_nolock std::_Lockit::_Lockit 17566->17567 17570 54e9b0 17567->17570 17569 54e97c std::_Locinfo::_Locinfo_dtor 17569->17565 17588 54eb0f 17570->17588 17572 54e9cb 17573 55455b __Getctype RtlAllocateHeap 17572->17573 17579 54ea04 __Getctype 17572->17579 17574 54e9d8 17573->17574 17608 54da89 17574->17608 17577 5557ad std::_Locinfo::_Locinfo_dtor 2 API calls 17578 54ea29 17577->17578 17578->17579 17580 54da89 std::_Locinfo::_Locinfo_dtor 2 API calls 17578->17580 17579->17569 17581 54ea45 17580->17581 17582 54ea67 17581->17582 17583 54ea4c 17581->17583 17585 555733 __freea RtlAllocateHeap 17582->17585 17586 54ea92 17582->17586 17583->17579 17584 555733 __freea RtlAllocateHeap 17583->17584 17584->17579 17585->17586 17586->17579 17587 555733 __freea RtlAllocateHeap 17586->17587 17587->17579 17589 54eb29 17588->17589 17590 54eb1b 17588->17590 17591 559791 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 17589->17591 17592 551c1f std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 17590->17592 17593 54eb40 17591->17593 17594 54eb25 17592->17594 17595 554d73 __Getctype RtlAllocateHeap 17593->17595 17598 54eb9f std::_Lockit::_Lockit __Getctype 17593->17598 17594->17572 17596 54eb5b 17595->17596 17599 559791 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 17596->17599 17606 54eb83 17596->17606 17597 555733 __freea RtlAllocateHeap 17600 54eb98 17597->17600 17604 54e955 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 17598->17604 17601 54eb72 17599->17601 17600->17572 17602 54eb85 17601->17602 17603 54eb79 17601->17603 17605 551c1f std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 17602->17605 17603->17598 17603->17606 17607 54ebe0 17604->17607 17605->17606 17606->17597 17607->17572 17609 54da9d ___std_exception_copy 17608->17609 17610 54d70d std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 17609->17610 17611 54dab5 17610->17611 17612 5430ac ___std_exception_copy RtlAllocateHeap 17611->17612 17613 54dac2 17612->17613 17613->17577 17613->17579 17615 55455b __Getctype RtlAllocateHeap 17614->17615 17616 54e397 17615->17616 17633 554846 17616->17633 17620 55455b __Getctype RtlAllocateHeap 17619->17620 17621 54ebed 17620->17621 17622 554846 __Getctype RtlAllocateHeap 17621->17622 17623 54ebfd 17622->17623 17623->17538 17625 55455b __Getctype RtlAllocateHeap 17624->17625 17626 54e3e1 17625->17626 17627 554846 __Getctype RtlAllocateHeap 17626->17627 17628 53d556 17627->17628 17628->17541 17629 54ec06 17628->17629 17630 54ec13 ___std_exception_copy 17629->17630 17632 54ec47 __Getctype 17629->17632 17630->17632 17637 558a12 17630->17637 17632->17541 17634 554859 17633->17634 17636 54e3a7 17633->17636 17635 55cab0 __Getctype RtlAllocateHeap 17634->17635 17634->17636 17635->17636 17636->17533 17638 558a20 17637->17638 17639 558a2e 17637->17639 17638->17639 17644 558a48 17638->17644 17640 54be0f __dosmaperr RtlAllocateHeap 17639->17640 17641 558a38 17640->17641 17642 543370 ___std_exception_copy RtlAllocateHeap 17641->17642 17643 558a42 17642->17643 17643->17632 17644->17643 17645 54be0f __dosmaperr RtlAllocateHeap 17644->17645 17645->17641 17647 53f22a ___std_exception_copy RtlAllocateHeap 17646->17647 17648 46300d 17647->17648 17648->17549 17650 543011 17649->17650 17654 542ff7 17649->17654 17651 55455b __Getctype RtlAllocateHeap 17650->17651 17652 543016 17651->17652 17653 554846 __Getctype RtlAllocateHeap 17652->17653 17655 543026 17653->17655 17654->17559 17655->17654 17664 554152 17655->17664 17657 543053 17657->17559 17663 53d8d3 std::_Throw_Cpp_error ___std_exception_copy 17658->17663 17659 53da71 _ValidateLocalCookies 17659->17558 17660 53d8a0 std::_Throw_Cpp_error RtlAllocateHeap 17660->17659 17661 53d9a4 17661->17660 17663->17659 17663->17661 17692 53d8a0 17663->17692 17669 543cbe 17664->17669 17666 55417f _ValidateLocalCookies 17666->17657 17670 543cd5 17669->17670 17671 543cdc 17669->17671 17670->17666 17677 559b6b 17670->17677 17671->17670 17672 55455b __Getctype RtlAllocateHeap 17671->17672 17673 543cfd 17672->17673 17674 554846 __Getctype RtlAllocateHeap 17673->17674 17675 543d13 17674->17675 17684 5548a4 17675->17684 17678 543cbe std::_Throw_Cpp_error 2 API calls 17677->17678 17679 559b8b __fread_nolock 17678->17679 17681 5557ad std::_Locinfo::_Locinfo_dtor 2 API calls 17679->17681 17682 559c47 _ValidateLocalCookies 17679->17682 17683 559bdd __fread_nolock std::_Throw_Cpp_error 17679->17683 17681->17683 17682->17666 17688 53da85 17683->17688 17685 5548b7 17684->17685 17686 5548cc 17684->17686 17685->17686 17687 55addb std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 17685->17687 17686->17670 17687->17686 17689 53da8f 17688->17689 17691 53daa0 17688->17691 17690 54c3a6 __freea RtlAllocateHeap 17689->17690 17689->17691 17690->17691 17691->17682 17693 53d8a6 17692->17693 17694 53d8b7 17692->17694 17693->17694 17695 54c3a6 __freea RtlAllocateHeap 17693->17695 17694->17661 17695->17694 16565 469d90 16596 53de82 16565->16596 16567 469dc6 16601 543f30 16567->16601 16570 469ede std::_Throw_Cpp_error 16572 469eb3 16572->16570 16636 543380 16572->16636 16577 547d06 4 API calls 16578 469e63 16577->16578 16583 469e7c 16578->16583 16616 4ccd30 16578->16616 16627 54c7af 16583->16627 16598 462260 Concurrency::cancel_current_task std::_Xinvalid_argument ___std_exception_copy std::_Facet_Register 16596->16598 16597 53dea1 16597->16567 16597->16597 16598->16597 16639 53f22a 16598->16639 16857 543e6e 16601->16857 16603 469e3d 16603->16572 16604 547d06 16603->16604 16605 547d19 ___std_exception_copy 16604->16605 16881 547a5d 16605->16881 16607 547d2e 16608 5430ac ___std_exception_copy RtlAllocateHeap 16607->16608 16609 469e51 16608->16609 16610 543abb 16609->16610 16611 543ace ___std_exception_copy 16610->16611 17014 5433d1 16611->17014 16613 543ada 16614 5430ac ___std_exception_copy RtlAllocateHeap 16613->16614 16615 469e57 16614->16615 16615->16577 16617 4ccd81 16616->16617 16620 4ccd52 __fread_nolock 16616->16620 16618 4cce87 16617->16618 16621 4ccd90 16617->16621 17076 462300 16618->17076 16620->16583 17062 462d70 16621->17062 16623 543380 std::_Throw_Cpp_error RtlAllocateHeap 16624 4cce91 16623->16624 16625 4ccdd7 __fread_nolock std::locale::_Locimp::_Locimp 16625->16623 16626 4cce3e __fread_nolock std::_Throw_Cpp_error std::locale::_Locimp::_Locimp 16625->16626 16626->16583 17098 54c7cc 16627->17098 16629 469ead 16630 5477b8 16629->16630 16631 5477cb ___std_exception_copy 16630->16631 17222 547693 16631->17222 16633 5477d7 16634 5430ac ___std_exception_copy RtlAllocateHeap 16633->16634 16635 5477e3 16634->16635 16635->16572 16637 5432bc ___std_exception_copy RtlAllocateHeap 16636->16637 16638 54338f __Getctype 16637->16638 16640 53f237 ___std_exception_copy 16639->16640 16644 4622a3 16639->16644 16641 53f264 16640->16641 16640->16644 16645 554039 16640->16645 16654 54c3a6 16641->16654 16644->16567 16646 554047 16645->16646 16647 554055 16645->16647 16646->16647 16652 55406d 16646->16652 16657 54be0f 16647->16657 16649 55405d 16660 543370 16649->16660 16651 554067 16651->16641 16652->16651 16653 54be0f __dosmaperr RtlAllocateHeap 16652->16653 16653->16649 16655 555733 __freea RtlAllocateHeap 16654->16655 16656 54c3be 16655->16656 16656->16644 16663 5546ac 16657->16663 16768 5432bc 16660->16768 16665 5546b6 __Getctype 16663->16665 16664 54be14 16664->16649 16665->16664 16674 554d73 16665->16674 16667 554701 __Getctype 16678 555733 16667->16678 16668 5546f9 __Getctype 16668->16667 16669 554739 16668->16669 16682 554389 16669->16682 16673 555733 __freea RtlAllocateHeap 16673->16664 16675 554d80 __Getctype std::_Facet_Register 16674->16675 16676 554dab RtlAllocateHeap 16675->16676 16677 554dbe __dosmaperr 16675->16677 16676->16675 16676->16677 16677->16668 16679 555768 16678->16679 16680 55573e __dosmaperr 16678->16680 16679->16664 16680->16679 16681 54be0f __dosmaperr RtlAllocateHeap 16680->16681 16681->16679 16683 5543f7 __Getctype 16682->16683 16686 55432f 16683->16686 16685 554420 16685->16673 16687 55433b __fread_nolock std::_Lockit::_Lockit 16686->16687 16690 554510 16687->16690 16689 55435d __Getctype 16689->16685 16691 554546 __Getctype 16690->16691 16692 55451f __Getctype 16690->16692 16691->16689 16692->16691 16694 55c864 16692->16694 16695 55c8e4 16694->16695 16697 55c87a 16694->16697 16698 555733 __freea RtlAllocateHeap 16695->16698 16721 55c932 16695->16721 16697->16695 16702 555733 __freea RtlAllocateHeap 16697->16702 16703 55c8ad 16697->16703 16699 55c906 16698->16699 16700 555733 __freea RtlAllocateHeap 16699->16700 16704 55c919 16700->16704 16701 55c940 16707 55c9a0 16701->16707 16719 555733 RtlAllocateHeap __freea 16701->16719 16708 55c8a2 16702->16708 16709 555733 __freea RtlAllocateHeap 16703->16709 16720 55c8cf 16703->16720 16710 555733 __freea RtlAllocateHeap 16704->16710 16705 555733 __freea RtlAllocateHeap 16706 55c8d9 16705->16706 16711 555733 __freea RtlAllocateHeap 16706->16711 16712 555733 __freea RtlAllocateHeap 16707->16712 16722 55bb68 16708->16722 16714 55c8c4 16709->16714 16715 55c927 16710->16715 16711->16695 16716 55c9a6 16712->16716 16750 55bfc7 16714->16750 16718 555733 __freea RtlAllocateHeap 16715->16718 16716->16691 16718->16721 16719->16701 16720->16705 16762 55c9d5 16721->16762 16723 55bc62 16722->16723 16724 55bb79 16722->16724 16723->16703 16725 55bb8a 16724->16725 16726 555733 __freea RtlAllocateHeap 16724->16726 16727 55bb9c 16725->16727 16728 555733 __freea RtlAllocateHeap 16725->16728 16726->16725 16729 55bbae 16727->16729 16731 555733 __freea RtlAllocateHeap 16727->16731 16728->16727 16730 55bbc0 16729->16730 16732 555733 __freea RtlAllocateHeap 16729->16732 16733 55bbd2 16730->16733 16734 555733 __freea RtlAllocateHeap 16730->16734 16731->16729 16732->16730 16735 55bbe4 16733->16735 16736 555733 __freea RtlAllocateHeap 16733->16736 16734->16733 16737 55bbf6 16735->16737 16739 555733 __freea RtlAllocateHeap 16735->16739 16736->16735 16738 55bc08 16737->16738 16740 555733 __freea RtlAllocateHeap 16737->16740 16741 55bc1a 16738->16741 16742 555733 __freea RtlAllocateHeap 16738->16742 16739->16737 16740->16738 16743 55bc2c 16741->16743 16744 555733 __freea RtlAllocateHeap 16741->16744 16742->16741 16745 55bc3e 16743->16745 16747 555733 __freea RtlAllocateHeap 16743->16747 16744->16743 16746 55bc50 16745->16746 16748 555733 __freea RtlAllocateHeap 16745->16748 16746->16723 16749 555733 __freea RtlAllocateHeap 16746->16749 16747->16745 16748->16746 16749->16723 16751 55bfd4 16750->16751 16761 55c02c 16750->16761 16752 55bfe4 16751->16752 16754 555733 __freea RtlAllocateHeap 16751->16754 16753 55bff6 16752->16753 16755 555733 __freea RtlAllocateHeap 16752->16755 16756 555733 __freea RtlAllocateHeap 16753->16756 16757 55c008 16753->16757 16754->16752 16755->16753 16756->16757 16758 55c01a 16757->16758 16759 555733 __freea RtlAllocateHeap 16757->16759 16760 555733 __freea RtlAllocateHeap 16758->16760 16758->16761 16759->16758 16760->16761 16761->16720 16763 55c9e2 16762->16763 16767 55ca01 16762->16767 16764 55c4ee __Getctype RtlAllocateHeap 16763->16764 16763->16767 16765 55c9fb 16764->16765 16766 555733 __freea RtlAllocateHeap 16765->16766 16766->16767 16767->16701 16769 5432ce ___std_exception_copy 16768->16769 16774 5432f3 16769->16774 16771 5432e6 16781 5430ac 16771->16781 16775 543303 16774->16775 16778 54330a ___std_exception_copy __Getctype 16774->16778 16787 543111 16775->16787 16777 543318 16777->16771 16778->16777 16779 5432bc ___std_exception_copy RtlAllocateHeap 16778->16779 16780 54337c 16779->16780 16780->16771 16782 5430b8 16781->16782 16783 5430cf 16782->16783 16802 543157 16782->16802 16785 5430e2 16783->16785 16786 543157 ___std_exception_copy RtlAllocateHeap 16783->16786 16785->16651 16786->16785 16788 543121 16787->16788 16791 55475d 16788->16791 16792 554770 __Getctype 16791->16792 16793 554d73 __Getctype RtlAllocateHeap 16792->16793 16801 543142 16792->16801 16794 5547a0 __Getctype 16793->16794 16795 5547a8 __Getctype 16794->16795 16796 5547dc 16794->16796 16797 555733 __freea RtlAllocateHeap 16795->16797 16798 554389 __Getctype RtlAllocateHeap 16796->16798 16797->16801 16799 5547e7 16798->16799 16800 555733 __freea RtlAllocateHeap 16799->16800 16800->16801 16801->16778 16803 543161 16802->16803 16804 54316a 16802->16804 16805 543111 ___std_exception_copy RtlAllocateHeap 16803->16805 16804->16783 16806 543166 16805->16806 16806->16804 16809 54e85a 16806->16809 16808 543173 16810 54e85f std::locale::_Setgloballocale 16809->16810 16811 54e86a std::locale::_Setgloballocale 16810->16811 16815 559d83 16810->16815 16836 54ddf2 16811->16836 16814 54e89d __Getctype std::locale::_Setgloballocale 16814->16808 16818 559d8f __fread_nolock 16815->16818 16816 5546ac __dosmaperr RtlAllocateHeap 16821 559dc0 std::locale::_Setgloballocale 16816->16821 16817 559ddf 16819 54be0f __dosmaperr RtlAllocateHeap 16817->16819 16818->16816 16818->16817 16818->16821 16823 559df1 std::_Lockit::_Lockit std::locale::_Setgloballocale 16818->16823 16820 559de4 16819->16820 16822 543370 ___std_exception_copy RtlAllocateHeap 16820->16822 16821->16817 16821->16823 16835 559dc9 16821->16835 16822->16835 16824 559e64 16823->16824 16825 559f61 std::_Lockit::~_Lockit 16823->16825 16826 559e92 std::locale::_Setgloballocale 16823->16826 16824->16826 16839 55455b 16824->16839 16827 54ddf2 std::locale::_Setgloballocale RtlAllocateHeap 16825->16827 16830 55455b __Getctype RtlAllocateHeap 16826->16830 16833 559ee7 16826->16833 16826->16835 16829 559f74 16827->16829 16830->16833 16832 55455b __Getctype RtlAllocateHeap 16832->16826 16834 55455b __Getctype RtlAllocateHeap 16833->16834 16833->16835 16834->16835 16835->16811 16853 54dc62 16836->16853 16838 54de03 16838->16814 16840 554565 __Getctype 16839->16840 16841 554d73 __Getctype RtlAllocateHeap 16840->16841 16842 55457b 16840->16842 16844 5545a8 __Getctype 16841->16844 16843 55460b 16842->16843 16845 54e85a __Getctype RtlAllocateHeap 16842->16845 16843->16832 16846 5545b0 __Getctype 16844->16846 16847 5545e8 16844->16847 16848 554615 16845->16848 16849 555733 __freea RtlAllocateHeap 16846->16849 16850 554389 __Getctype RtlAllocateHeap 16847->16850 16849->16842 16851 5545f3 16850->16851 16852 555733 __freea RtlAllocateHeap 16851->16852 16852->16842 16854 54dc8f std::locale::_Setgloballocale 16853->16854 16855 54daf3 std::locale::_Setgloballocale RtlAllocateHeap 16854->16855 16856 54dcd8 std::locale::_Setgloballocale 16855->16856 16856->16838 16858 543e7a __fread_nolock 16857->16858 16859 543e81 16858->16859 16862 543ea1 16858->16862 16860 54be0f __dosmaperr RtlAllocateHeap 16859->16860 16861 543e86 16860->16861 16863 543370 ___std_exception_copy RtlAllocateHeap 16861->16863 16864 543ea6 16862->16864 16865 543eb3 16862->16865 16870 543e91 16863->16870 16866 54be0f __dosmaperr RtlAllocateHeap 16864->16866 16871 555008 16865->16871 16866->16870 16868 543ebc 16869 54be0f __dosmaperr RtlAllocateHeap 16868->16869 16868->16870 16869->16870 16870->16603 16872 555014 __fread_nolock std::_Lockit::_Lockit 16871->16872 16875 5550ac 16872->16875 16874 55502f 16874->16868 16880 5550cf __fread_nolock 16875->16880 16876 555115 __fread_nolock std::locale::_Setgloballocale 16876->16874 16877 554d73 __Getctype RtlAllocateHeap 16878 555130 16877->16878 16879 555733 __freea RtlAllocateHeap 16878->16879 16879->16876 16880->16876 16880->16877 16880->16880 16883 547a69 __fread_nolock 16881->16883 16882 547a6f 16884 5432f3 ___std_exception_copy RtlAllocateHeap 16882->16884 16883->16882 16885 547ab2 __fread_nolock 16883->16885 16887 547a8a 16884->16887 16888 547be0 16885->16888 16887->16607 16889 547c06 16888->16889 16890 547bf3 16888->16890 16897 547b07 16889->16897 16890->16887 16892 547c29 16893 547cb7 16892->16893 16901 5441a1 16892->16901 16893->16887 16898 547b18 16897->16898 16899 547b70 16897->16899 16898->16899 16910 54cd0d 16898->16910 16899->16892 16902 5441ba 16901->16902 16906 5441e1 16901->16906 16902->16906 16937 554902 16902->16937 16904 5441d6 16944 553d0c 16904->16944 16907 54cd4d 16906->16907 16908 54cc2c __fread_nolock 2 API calls 16907->16908 16909 54cd66 16908->16909 16909->16893 16911 54cd21 ___std_exception_copy 16910->16911 16916 54cc2c 16911->16916 16913 54cd36 16914 5430ac ___std_exception_copy RtlAllocateHeap 16913->16914 16915 54cd45 16914->16915 16915->16899 16921 55905e 16916->16921 16918 54cc3e 16919 54cc5a SetFilePointerEx 16918->16919 16920 54cc46 __fread_nolock 16918->16920 16919->16920 16920->16913 16922 559080 16921->16922 16923 55906b 16921->16923 16926 54bdfc __dosmaperr RtlAllocateHeap 16922->16926 16928 5590a5 16922->16928 16934 54bdfc 16923->16934 16929 5590b0 16926->16929 16927 54be0f __dosmaperr RtlAllocateHeap 16930 559078 16927->16930 16928->16918 16931 54be0f __dosmaperr RtlAllocateHeap 16929->16931 16930->16918 16932 5590b8 16931->16932 16933 543370 ___std_exception_copy RtlAllocateHeap 16932->16933 16933->16930 16935 5546ac __dosmaperr RtlAllocateHeap 16934->16935 16936 54be01 16935->16936 16936->16927 16938 554923 16937->16938 16939 55490e 16937->16939 16938->16904 16940 54be0f __dosmaperr RtlAllocateHeap 16939->16940 16941 554913 16940->16941 16942 543370 ___std_exception_copy RtlAllocateHeap 16941->16942 16943 55491e 16942->16943 16943->16904 16945 553d18 __fread_nolock 16944->16945 16946 553d59 16945->16946 16948 553d9f 16945->16948 16950 553d20 16945->16950 16947 5432f3 ___std_exception_copy RtlAllocateHeap 16946->16947 16947->16950 16948->16950 16951 553e1d 16948->16951 16950->16906 16952 553e45 16951->16952 16963 553e68 __fread_nolock 16951->16963 16953 553e49 16952->16953 16955 553ea4 16952->16955 16954 5432f3 ___std_exception_copy RtlAllocateHeap 16953->16954 16954->16963 16956 553ec2 16955->16956 16957 54cd4d 2 API calls 16955->16957 16965 553962 16956->16965 16957->16956 16960 553f21 16962 553f8a WriteFile 16960->16962 16960->16963 16961 553eda 16961->16963 16970 553533 16961->16970 16962->16963 16963->16950 16976 55e301 16965->16976 16967 553974 16968 5539a2 16967->16968 16985 5488e0 16967->16985 16968->16960 16968->16961 16971 55359c 16970->16971 16972 5488e0 std::_Locinfo::_Locinfo_dtor 2 API calls 16971->16972 16975 5535ac std::_Locinfo::_Locinfo_dtor std::locale::_Locimp::_Locimp 16971->16975 16972->16975 16973 556e3e RtlAllocateHeap RtlAllocateHeap 16973->16975 16974 553862 _ValidateLocalCookies 16974->16963 16974->16974 16975->16973 16975->16974 16977 55e30e 16976->16977 16978 55e31b 16976->16978 16979 54be0f __dosmaperr RtlAllocateHeap 16977->16979 16981 55e327 16978->16981 16982 54be0f __dosmaperr RtlAllocateHeap 16978->16982 16980 55e313 16979->16980 16980->16967 16981->16967 16983 55e348 16982->16983 16984 543370 ___std_exception_copy RtlAllocateHeap 16983->16984 16984->16980 16986 543157 ___std_exception_copy RtlAllocateHeap 16985->16986 16987 5488f0 16986->16987 16992 554873 16987->16992 16993 54890d 16992->16993 16994 55488a 16992->16994 16996 5548d1 16993->16996 16994->16993 17000 55cab0 16994->17000 16997 54891a 16996->16997 16998 5548e8 16996->16998 16997->16968 16998->16997 17009 55addb 16998->17009 17001 55cabc __fread_nolock 17000->17001 17002 55455b __Getctype RtlAllocateHeap 17001->17002 17004 55cac5 std::_Lockit::_Lockit 17002->17004 17003 55cb0b 17003->16993 17004->17003 17005 55cb31 __Getctype RtlAllocateHeap 17004->17005 17006 55caf4 __Getctype 17005->17006 17006->17003 17007 54e85a __Getctype RtlAllocateHeap 17006->17007 17008 55cb30 17007->17008 17010 55455b __Getctype RtlAllocateHeap 17009->17010 17011 55ade0 17010->17011 17012 55acf3 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 17011->17012 17013 55adeb 17012->17013 17013->16997 17015 5433dd __fread_nolock 17014->17015 17016 5433e4 17015->17016 17017 543405 __fread_nolock 17015->17017 17018 5432f3 ___std_exception_copy RtlAllocateHeap 17016->17018 17021 5434e0 17017->17021 17020 5433fd 17018->17020 17020->16613 17024 543512 17021->17024 17023 5434f2 17023->17020 17025 543521 17024->17025 17026 543549 17024->17026 17027 5432f3 ___std_exception_copy RtlAllocateHeap 17025->17027 17028 554902 __fread_nolock RtlAllocateHeap 17026->17028 17036 54353c __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 17027->17036 17029 543552 17028->17029 17037 54ccef 17029->17037 17032 5435fc 17040 54387e 17032->17040 17034 543613 17034->17036 17048 5436b3 17034->17048 17036->17023 17055 54cb07 17037->17055 17039 543570 17039->17032 17039->17034 17039->17036 17041 54388d 17040->17041 17042 554902 __fread_nolock RtlAllocateHeap 17041->17042 17043 5438a9 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 17042->17043 17044 54ccef 2 API calls 17043->17044 17047 5438b5 _ValidateLocalCookies 17043->17047 17045 543909 17044->17045 17046 54ccef 2 API calls 17045->17046 17045->17047 17046->17047 17047->17036 17049 554902 __fread_nolock RtlAllocateHeap 17048->17049 17050 5436c6 17049->17050 17051 54ccef 2 API calls 17050->17051 17054 543710 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 17050->17054 17052 54376d 17051->17052 17053 54ccef 2 API calls 17052->17053 17052->17054 17053->17054 17054->17036 17056 54cb13 __fread_nolock 17055->17056 17057 54cb56 17056->17057 17059 54cb1b 17056->17059 17060 54cb9c 17056->17060 17058 5432f3 ___std_exception_copy RtlAllocateHeap 17057->17058 17058->17059 17059->17039 17060->17059 17061 54cc2c __fread_nolock 2 API calls 17060->17061 17061->17059 17063 462da6 17062->17063 17064 462d82 17062->17064 17067 462db8 17063->17067 17070 53de82 std::_Facet_Register RtlAllocateHeap 17063->17070 17065 462dbf 17064->17065 17066 462d89 17064->17066 17085 462260 17065->17085 17069 53de82 std::_Facet_Register RtlAllocateHeap 17066->17069 17067->16625 17072 462d8f 17069->17072 17071 462db0 17070->17071 17071->16625 17073 543380 std::_Throw_Cpp_error RtlAllocateHeap 17072->17073 17074 462d98 17072->17074 17075 462dc9 17073->17075 17074->16625 17089 53c4f9 17076->17089 17086 46226e Concurrency::cancel_current_task std::_Xinvalid_argument 17085->17086 17087 53f22a ___std_exception_copy RtlAllocateHeap 17086->17087 17088 4622a3 17087->17088 17088->17072 17092 53c2bf 17089->17092 17091 53c50a std::_Xinvalid_argument 17095 462fa0 17092->17095 17096 53f22a ___std_exception_copy RtlAllocateHeap 17095->17096 17097 462fcd 17096->17097 17097->17091 17099 54c7d8 __fread_nolock 17098->17099 17100 54c822 __fread_nolock 17099->17100 17101 54c7eb __fread_nolock 17099->17101 17106 54c810 __fread_nolock 17099->17106 17107 54c5d6 17100->17107 17102 54be0f __dosmaperr RtlAllocateHeap 17101->17102 17104 54c805 17102->17104 17105 543370 ___std_exception_copy RtlAllocateHeap 17104->17105 17105->17106 17106->16629 17108 54c605 17107->17108 17111 54c5e8 __fread_nolock 17107->17111 17108->17106 17109 54c5f5 17110 54be0f __dosmaperr RtlAllocateHeap 17109->17110 17118 54c5fa 17110->17118 17111->17108 17111->17109 17113 54c646 __fread_nolock 17111->17113 17112 543370 ___std_exception_copy RtlAllocateHeap 17112->17108 17113->17108 17115 554902 __fread_nolock RtlAllocateHeap 17113->17115 17116 54c771 __fread_nolock 17113->17116 17120 552fa4 17113->17120 17179 5475fb 17113->17179 17115->17113 17117 54be0f __dosmaperr RtlAllocateHeap 17116->17117 17117->17118 17118->17112 17121 552fb6 17120->17121 17122 552fce 17120->17122 17123 54bdfc __dosmaperr RtlAllocateHeap 17121->17123 17124 553310 17122->17124 17127 553011 17122->17127 17126 552fbb 17123->17126 17125 54bdfc __dosmaperr RtlAllocateHeap 17124->17125 17128 553315 17125->17128 17129 54be0f __dosmaperr RtlAllocateHeap 17126->17129 17130 55301c 17127->17130 17134 552fc3 17127->17134 17138 55304c 17127->17138 17131 54be0f __dosmaperr RtlAllocateHeap 17128->17131 17129->17134 17132 54bdfc __dosmaperr RtlAllocateHeap 17130->17132 17133 553029 17131->17133 17135 553021 17132->17135 17137 543370 ___std_exception_copy RtlAllocateHeap 17133->17137 17134->17113 17136 54be0f __dosmaperr RtlAllocateHeap 17135->17136 17136->17133 17137->17134 17139 553065 17138->17139 17140 5530a0 17138->17140 17141 553072 17138->17141 17139->17141 17142 55308e 17139->17142 17193 5557ad 17140->17193 17143 54bdfc __dosmaperr RtlAllocateHeap 17141->17143 17146 55e301 __fread_nolock RtlAllocateHeap 17142->17146 17145 553077 17143->17145 17148 54be0f __dosmaperr RtlAllocateHeap 17145->17148 17162 5531ec 17146->17162 17149 55307e 17148->17149 17151 543370 ___std_exception_copy RtlAllocateHeap 17149->17151 17150 555733 __freea RtlAllocateHeap 17152 5530ba 17150->17152 17178 553089 __fread_nolock 17151->17178 17154 555733 __freea RtlAllocateHeap 17152->17154 17153 553264 ReadFile 17155 55327c 17153->17155 17156 5532d8 17153->17156 17157 5530c1 17154->17157 17155->17156 17167 553255 17155->17167 17165 5532e5 17156->17165 17166 553236 17156->17166 17158 5530e6 17157->17158 17159 5530cb 17157->17159 17161 54cd0d __fread_nolock 2 API calls 17158->17161 17163 54be0f __dosmaperr RtlAllocateHeap 17159->17163 17160 555733 __freea RtlAllocateHeap 17160->17134 17161->17142 17162->17153 17172 55321c 17162->17172 17164 5530d0 17163->17164 17168 54bdfc __dosmaperr RtlAllocateHeap 17164->17168 17169 54be0f __dosmaperr RtlAllocateHeap 17165->17169 17166->17178 17199 54bdb5 17166->17199 17170 5532a1 17167->17170 17171 5532b8 17167->17171 17167->17178 17168->17178 17173 5532ea 17169->17173 17204 552cb6 17170->17204 17171->17178 17214 552afc 17171->17214 17172->17166 17172->17167 17177 54bdfc __dosmaperr RtlAllocateHeap 17173->17177 17177->17178 17178->17160 17180 54760c 17179->17180 17189 547608 std::locale::_Locimp::_Locimp 17179->17189 17181 547613 17180->17181 17184 547626 __fread_nolock 17180->17184 17182 54be0f __dosmaperr RtlAllocateHeap 17181->17182 17183 547618 17182->17183 17185 543370 ___std_exception_copy RtlAllocateHeap 17183->17185 17186 547654 17184->17186 17187 54765d 17184->17187 17184->17189 17185->17189 17188 54be0f __dosmaperr RtlAllocateHeap 17186->17188 17187->17189 17191 54be0f __dosmaperr RtlAllocateHeap 17187->17191 17190 547659 17188->17190 17189->17113 17192 543370 ___std_exception_copy RtlAllocateHeap 17190->17192 17191->17190 17192->17189 17194 5557eb 17193->17194 17198 5557bb __Getctype std::_Facet_Register 17193->17198 17195 54be0f __dosmaperr RtlAllocateHeap 17194->17195 17197 5530b1 17195->17197 17196 5557d6 RtlAllocateHeap 17196->17197 17196->17198 17197->17150 17198->17194 17198->17196 17200 54bdfc __dosmaperr RtlAllocateHeap 17199->17200 17201 54bdc0 __dosmaperr 17200->17201 17202 54be0f __dosmaperr RtlAllocateHeap 17201->17202 17203 54bdd3 17202->17203 17203->17178 17218 5529af 17204->17218 17207 552d58 17210 552d12 __fread_nolock 17207->17210 17212 54cd0d __fread_nolock 2 API calls 17207->17212 17208 552d48 17209 54be0f __dosmaperr RtlAllocateHeap 17208->17209 17211 552cfe 17209->17211 17210->17211 17213 54bdb5 __dosmaperr RtlAllocateHeap 17210->17213 17211->17178 17212->17210 17213->17211 17215 552b36 17214->17215 17216 552bc7 17215->17216 17217 54cd0d __fread_nolock 2 API calls 17215->17217 17216->17178 17217->17216 17219 5529e3 17218->17219 17220 54cd0d __fread_nolock 2 API calls 17219->17220 17221 552a4f 17219->17221 17220->17221 17221->17207 17221->17208 17221->17210 17221->17211 17223 54769f __fread_nolock 17222->17223 17224 5476a9 17223->17224 17226 5476cc __fread_nolock 17223->17226 17225 5432f3 ___std_exception_copy RtlAllocateHeap 17224->17225 17228 5476c4 17225->17228 17226->17228 17229 54772a 17226->17229 17228->16633 17230 547737 17229->17230 17231 54775a 17229->17231 17232 5432f3 ___std_exception_copy RtlAllocateHeap 17230->17232 17233 5441a1 4 API calls 17231->17233 17241 547752 17231->17241 17232->17241 17234 547772 17233->17234 17243 55576d 17234->17243 17237 554902 __fread_nolock RtlAllocateHeap 17238 547786 17237->17238 17247 5533c0 17238->17247 17241->17228 17242 555733 __freea RtlAllocateHeap 17242->17241 17244 555784 17243->17244 17245 54777a 17243->17245 17244->17245 17246 555733 __freea RtlAllocateHeap 17244->17246 17245->17237 17246->17245 17248 5533e9 17247->17248 17253 54778d 17247->17253 17249 553438 17248->17249 17251 553410 17248->17251 17250 5432f3 ___std_exception_copy RtlAllocateHeap 17249->17250 17250->17253 17254 55332f 17251->17254 17253->17241 17253->17242 17255 55333b __fread_nolock 17254->17255 17257 55337a 17255->17257 17258 553493 17255->17258 17257->17253 17259 55905e __fread_nolock RtlAllocateHeap 17258->17259 17261 5534a3 17259->17261 17263 55905e __fread_nolock RtlAllocateHeap 17261->17263 17268 5534db 17261->17268 17269 5534a9 17261->17269 17262 55905e __fread_nolock RtlAllocateHeap 17264 5534e7 FindCloseChangeNotification 17262->17264 17266 5534d2 17263->17266 17264->17269 17265 553501 __fread_nolock 17265->17257 17267 55905e __fread_nolock RtlAllocateHeap 17266->17267 17267->17268 17268->17262 17268->17269 17270 558fcd 17269->17270 17271 558fdc 17270->17271 17272 54be0f __dosmaperr RtlAllocateHeap 17271->17272 17275 559006 17271->17275 17273 559048 17272->17273 17274 54bdfc __dosmaperr RtlAllocateHeap 17273->17274 17274->17275 17275->17265 17696 4c3320 GetCursorPos 17697 4c3335 GetCursorPos 17696->17697 17698 4c3408 GetPEB 17697->17698 17701 4c3347 17697->17701 17698->17701 17699 4c3353 GetPEB 17699->17701 17700 4c347d Sleep 17700->17697 17701->17698 17701->17699 17701->17700 17701->17701 17702 4c33c8 Sleep 17701->17702 17703 4c34a7 17701->17703 17702->17701

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 200 4c3320-4c3333 GetCursorPos 201 4c3335-4c3341 GetCursorPos 200->201 202 4c3408-4c3411 GetPEB 201->202 203 4c3347-4c334d 201->203 204 4c3414-4c3428 202->204 203->202 205 4c3353-4c335f GetPEB 203->205 206 4c3479-4c347b 204->206 207 4c342a-4c342f 204->207 208 4c3360-4c3374 205->208 206->204 207->206 211 4c3431-4c3439 207->211 209 4c33c4-4c33c6 208->209 210 4c3376-4c337b 208->210 209->208 210->209 213 4c337d-4c3383 210->213 212 4c3440-4c3453 211->212 214 4c3455-4c3468 212->214 215 4c3472-4c3477 212->215 216 4c3385-4c3398 213->216 214->214 217 4c346a-4c3470 214->217 215->206 215->212 218 4c33bd-4c33c2 216->218 219 4c339a 216->219 217->215 220 4c347d-4c34a2 Sleep 217->220 218->209 218->216 221 4c33a0-4c33b3 219->221 220->201 221->221 222 4c33b5-4c33bb 221->222 222->218 223 4c33c8-4c33ee Sleep 222->223 224 4c33f4-4c33fa 223->224 224->202 225 4c33fc-4c3402 224->225 225->202 226 4c34a7-4c34b8 call 466b80 225->226 229 4c34be 226->229 230 4c34ba-4c34bc 226->230 231 4c34c0-4c34dd call 466b80 229->231 230->231
                                  APIs
                                  • GetCursorPos.USER32(?), ref: 004C3333
                                  • GetCursorPos.USER32(?), ref: 004C3339
                                  • Sleep.KERNELBASE(000003E9,?,00000001,00000000,?,?,?,?,?,?,?,?,004C3698), ref: 004C33E8
                                  • Sleep.KERNELBASE(00000001,?,00000001,00000000,?,?,?,?,?,?,?,?,004C3698), ref: 004C349A
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3375310931.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 00000008.00000002.3375202386.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375310931.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375514063.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376119794.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376337589.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376371523.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CursorSleep
                                  • String ID:
                                  • API String ID: 4211308429-0
                                  • Opcode ID: b4de5810029956a59720bcf2270dfec89371c70174376176d90aea493a4d671a
                                  • Instruction ID: e278dba0085ff63259e53feaab331d49bc5fdd74d4d8daf24dd467b41a04aef3
                                  • Opcode Fuzzy Hash: b4de5810029956a59720bcf2270dfec89371c70174376176d90aea493a4d671a
                                  • Instruction Fuzzy Hash: D451CB39A042558FCB29CF48C4D0FAAB7B1EF45705B19809ED845AB322DB35EE05CB94

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 47e5c0-47e5e5 1 47ea72-47ea84 0->1 2 47e5eb-47e5f7 0->2 3 47e600-47e608 2->3 4 47e645-47e68a setsockopt recv 3->4 5 47e60a-47e616 3->5 4->1 12 47e690-47e693 4->12 6 47e61e-47e62a 5->6 7 47e618 5->7 9 47e632 call 47d4a0 6->9 10 47e62c 6->10 7->6 13 47e637-47e63f 9->13 10->9 14 47e9d9-47ea00 call 53d879 call 562870 12->14 15 47e699-47e6d6 call 4ccd30 12->15 13->4 16 47ea5d-47ea6c Sleep 13->16 26 47ea02 14->26 27 47ea49 14->27 24 47e6db-47e6eb recv 15->24 25 47e6d8 15->25 16->1 16->3 28 47e983-47e990 24->28 29 47e6f1-47e6f8 24->29 25->24 30 47ea04-47ea0a 26->30 31 47ea0c-47ea35 call 47d9c0 26->31 34 47ea4f-47ea57 Sleep 27->34 28->34 35 47e996-47e9a2 28->35 32 47e6fd-47e70d recv 29->32 33 47e6fa 29->33 30->27 30->31 43 47ea3a-47ea43 31->43 32->28 36 47e713-47e71f 32->36 33->32 34->16 37 47e9a4-47e9b2 35->37 38 47e9b8-47e9c2 call 53e103 35->38 40 47e723-47e747 36->40 41 47e721 36->41 37->38 38->34 44 47e79d-47e7a3 40->44 45 47e749-47e786 call 4ccd30 setsockopt 40->45 41->40 43->27 48 47e7a7-47e7cb call 4ca6b0 44->48 49 47e7a5 44->49 52 47e78b-47e79a recv 45->52 53 47e788 45->53 55 47e8f5-47e955 call 47ddc0 48->55 56 47e7d1-47e7de 48->56 49->48 52->44 53->52 55->28 64 47e957-47e963 55->64 58 47e7e2-47e7ed 56->58 59 47e7e0 56->59 62 47e7f1-47e8e3 58->62 63 47e7ef 58->63 59->58 68 47e8e7-47e8ef 62->68 69 47e8e5 62->69 63->62 66 47e965-47e973 64->66 67 47e979-47e980 call 53e103 64->67 66->67 67->28 68->55 68->56 69->68
                                  APIs
                                  • setsockopt.WS2_32(00000358,0000FFFF,00001006,?,00000008), ref: 0047E664
                                  • recv.WS2_32(?,00000004,00000002), ref: 0047E67B
                                  • recv.WS2_32(?,0000000C,00000002,0000000C), ref: 0047E6E6
                                  • recv.WS2_32(?,0000000C,00000008), ref: 0047E708
                                  • setsockopt.WS2_32(0000FFFF,00001006,?,00000008,?), ref: 0047E77D
                                  • recv.WS2_32(?,?,00000008), ref: 0047E795
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3375310931.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 00000008.00000002.3375202386.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375310931.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375514063.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376119794.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376337589.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376371523.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: recv$setsockopt
                                  • String ID: \"Y
                                  • API String ID: 833079357-803381686
                                  • Opcode ID: 884f003343b1b5e70fe3f4a176718300f533df8d41ba69be50387d13f7ee043f
                                  • Instruction ID: 9a25225df0bc18de12a847be973f98009b81472513c91c925a93da1d22e65554
                                  • Opcode Fuzzy Hash: 884f003343b1b5e70fe3f4a176718300f533df8d41ba69be50387d13f7ee043f
                                  • Instruction Fuzzy Hash: 37C1AEB0D00208AFDB14DFA9DC85BADBBB1FB48310F10866AE419AB391D7746C49DB94

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 72 47d9c0-47da00 call 4ca6b0 75 47da06-47da0d 72->75 76 47db2c-47db6e call 4ca570 72->76 78 47da11-47da22 75->78 79 47da0f 75->79 85 47db70-47db7c 76->85 86 47db9c-47dbd1 call 466b80 76->86 81 47da26-47da2d 78->81 82 47da24 78->82 79->78 83 47da2f-47da31 81->83 84 47da3e-47da40 81->84 82->81 87 47da35-47da39 83->87 88 47da33 83->88 89 47da44-47da4b 84->89 90 47da42 84->90 91 47db92-47db99 call 53e103 85->91 92 47db7e-47db8c 85->92 100 47dbd3-47dbdd 86->100 101 47dbe8-47dbf0 call 4ccd30 86->101 95 47db1d 87->95 88->87 96 47da4d-47da4f 89->96 97 47da5c-47da5e 89->97 90->89 91->86 92->91 98 47ddb1 call 543380 92->98 102 47db20-47db26 95->102 104 47da53-47da57 96->104 105 47da51 96->105 106 47da62-47da69 97->106 107 47da60 97->107 112 47ddb6-47ddbb call 543380 98->112 109 47dbe2-47dbe6 100->109 110 47dbdf 100->110 117 47dbf5-47dbfc 101->117 102->75 102->76 104->95 105->104 113 47da6b-47da6d 106->113 114 47da7a-47da7c 106->114 107->106 109->117 110->109 119 47da71-47da75 113->119 120 47da6f 113->120 115 47da80-47da87 114->115 116 47da7e 114->116 121 47da89-47da8b 115->121 122 47da98-47da9a 115->122 116->115 123 47dc01-47dc11 117->123 124 47dbfe 117->124 119->95 120->119 126 47da8f-47da93 121->126 127 47da8d 121->127 128 47da9e-47daa5 122->128 129 47da9c 122->129 130 47dc16-47dc2f call 466b80 123->130 131 47dc13 123->131 124->123 126->95 127->126 132 47daa7-47daa9 128->132 133 47dab3-47dab5 128->133 129->128 140 47dc34-47dc4b call 466b80 130->140 141 47dc31 130->141 131->130 135 47daad-47dab1 132->135 136 47daab 132->136 138 47dab7 133->138 139 47dab9-47dac0 133->139 135->95 136->135 138->139 142 47dac2-47dac4 139->142 143 47dace-47dad0 139->143 152 47dc81-47dc97 call 466b80 140->152 153 47dc4d-47dc54 140->153 141->140 144 47dac6 142->144 145 47dac8-47dacc 142->145 146 47dad4-47dadb 143->146 147 47dad2 143->147 144->145 145->95 150 47dadd-47dadf 146->150 151 47dae9-47daeb 146->151 147->146 154 47dae3-47dae7 150->154 155 47dae1 150->155 156 47daef-47daf6 151->156 157 47daed 151->157 172 47dd24 152->172 173 47dc9d-47dca9 152->173 158 47dc56 153->158 159 47dc59-47dc60 153->159 154->95 155->154 161 47db04-47db06 156->161 162 47daf8-47dafa 156->162 157->156 158->159 163 47dc65-47dc7e call 466b80 call 53fb40 159->163 164 47dc62 159->164 168 47db0a-47db0e 161->168 169 47db08 161->169 166 47dafe-47db02 162->166 167 47dafc 162->167 163->152 164->163 166->95 167->166 168->102 170 47db10-47db15 168->170 169->168 174 47db17 170->174 175 47db19 170->175 176 47dd26-47dd2c 172->176 178 47dcb0-47dcbe 173->178 174->175 175->95 179 47dd56-47dd6e 176->179 180 47dd2e-47dd3a 176->180 182 47dcc3-47dcdd 178->182 183 47dcc0 178->183 188 47dd70-47dd7c 179->188 189 47dd9e-47ddb0 179->189 185 47dd4c-47dd53 call 53e103 180->185 186 47dd3c-47dd4a 180->186 184 47dce1-47dcec 182->184 183->182 184->184 190 47dcee-47dd18 GetModuleHandleA GetProcAddress WSASend 184->190 185->179 186->112 186->185 192 47dd94-47dd9b call 53e103 188->192 193 47dd7e-47dd8c 188->193 195 47dd90-47dd92 190->195 196 47dd1a-47dd22 190->196 192->189 193->112 198 47dd8e 193->198 195->176 196->172 196->178 198->192
                                  APIs
                                  • GetModuleHandleA.KERNEL32(Ws2_32.dll,?,?,?,?,?,00000000,-005927F8), ref: 0047DCF7
                                  • GetProcAddress.KERNEL32(00000000,FEEDF8FD), ref: 0047DCFE
                                  • WSASend.WS2_32(0000000F,?,00000001,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,-005927F8), ref: 0047DD13
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3375310931.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 00000008.00000002.3375202386.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375310931.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375514063.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376119794.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376337589.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376371523.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressHandleModuleProcSend
                                  • String ID: 131$Ws2_32.dll$\$\"Y$t#Y
                                  • API String ID: 2819740048-2542141955
                                  • Opcode ID: f68b85c2ed489ee7243be54f5fbf67b910d9b898fff704496cd34e91a209d290
                                  • Instruction ID: 740b92406a79477fb821970b768fa2f34c0729e6ad47074b1d4164d49753709d
                                  • Opcode Fuzzy Hash: f68b85c2ed489ee7243be54f5fbf67b910d9b898fff704496cd34e91a209d290
                                  • Instruction Fuzzy Hash: 07D1FF71D142588FCB25CBA4C8857EEBBB0BF06310F19815ED849BB385E3792D46CB99

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 234 47d4a0-47d4d2 WSAStartup 235 47d5b7-47d5c0 234->235 236 47d4d8-47d502 call 466b80 * 2 234->236 241 47d504-47d508 236->241 242 47d50e-47d565 236->242 241->235 241->242 244 47d567-47d56d 242->244 245 47d5b1 242->245 246 47d5c5-47d5cf 244->246 247 47d56f 244->247 245->235 246->245 251 47d5d1-47d5d9 246->251 248 47d575-47d589 socket 247->248 248->245 250 47d58b-47d59b connect 248->250 252 47d5c1 250->252 253 47d59d-47d5a5 closesocket 250->253 252->246 253->248 254 47d5a7-47d5ab 253->254 254->245
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3375310931.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 00000008.00000002.3375202386.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375310931.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375514063.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376119794.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376337589.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376371523.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Startupclosesocketconnectsocket
                                  • String ID:
                                  • API String ID: 3098855095-0
                                  • Opcode ID: 9e068281c3ad265281c45d507b5aa519fc99fca1261778d46c928f27c294a10d
                                  • Instruction ID: d2e22feb16d068cd8fd9ca9774753e3c76a7c4ec6e2007528c76219c44bbb25f
                                  • Opcode Fuzzy Hash: 9e068281c3ad265281c45d507b5aa519fc99fca1261778d46c928f27c294a10d
                                  • Instruction Fuzzy Hash: 1031C271505300ABD7209F258C49B6BB7F4EF85328F005F1EF9A8932D0D37599088B96

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 255 553e1d-553e3f 256 553e45-553e47 255->256 257 554032 255->257 259 553e73-553e96 256->259 260 553e49-553e68 call 5432f3 256->260 258 554034-554038 257->258 262 553e9c-553ea2 259->262 263 553e98-553e9a 259->263 268 553e6b-553e6e 260->268 262->260 264 553ea4-553eb5 262->264 263->262 263->264 266 553eb7-553ec5 call 54cd4d 264->266 267 553ec8-553ed8 call 553962 264->267 266->267 273 553f21-553f33 267->273 274 553eda-553ee0 267->274 268->258 275 553f35-553f3b 273->275 276 553f8a-553faa WriteFile 273->276 277 553ee2-553ee5 274->277 278 553f09-553f1f call 553533 274->278 279 553f76-553f88 call 5539df 275->279 280 553f3d-553f40 275->280 283 553fb5 276->283 284 553fac-553fb2 276->284 281 553ee7-553eea 277->281 282 553ef0-553eff call 5538fa 277->282 294 553f02-553f04 278->294 306 553f5d-553f60 279->306 288 553f62-553f74 call 553ba3 280->288 289 553f42-553f45 280->289 281->282 290 553fca-553fcd 281->290 282->294 287 553fb8-553fc3 283->287 284->283 295 553fc5-553fc8 287->295 296 55402d-554030 287->296 288->306 297 553fd0-553fd2 289->297 298 553f4b-553f58 call 553aba 289->298 290->297 294->287 295->290 296->258 303 553fd4-553fd9 297->303 304 554000-55400c 297->304 298->306 307 553ff2-553ffb call 54bdd8 303->307 308 553fdb-553fed 303->308 309 554016-554028 304->309 310 55400e-554014 304->310 306->294 307->268 308->268 309->268 310->257 310->309
                                  APIs
                                  • WriteFile.KERNELBASE(?,00000000,00547C57,?,00000000,00000000,00000000,?,00000000,?,00469F4B,W|T,00000000,00469F4B,?,?), ref: 00553FA3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3375310931.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 00000008.00000002.3375202386.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375310931.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375514063.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376119794.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376337589.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376371523.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FileWrite
                                  • String ID: W|T
                                  • API String ID: 3934441357-2034123312
                                  • Opcode ID: e749a4aaffcbfb38f7a8b16dfd40fb715e34b0a8c8d94e1024ecf9d9b3e9bde7
                                  • Instruction ID: 0293c524745c6202c46845b1c1bc22630e96d7031ec30680120f9c37065c8dcc
                                  • Opcode Fuzzy Hash: e749a4aaffcbfb38f7a8b16dfd40fb715e34b0a8c8d94e1024ecf9d9b3e9bde7
                                  • Instruction Fuzzy Hash: 686102B1C0410AAFDF11DFA8C895AEEBFB9BF49345F140586ED08AB251D335DA09CB60

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 313 552fa4-552fb4 314 552fb6-552fc9 call 54bdfc call 54be0f 313->314 315 552fce-552fd0 313->315 333 553328 314->333 317 552fd6-552fdc 315->317 318 553310-55331d call 54bdfc call 54be0f 315->318 317->318 321 552fe2-55300b 317->321 336 553323 call 543370 318->336 321->318 322 553011-55301a 321->322 325 553034-553036 322->325 326 55301c-55302f call 54bdfc call 54be0f 322->326 331 55330c-55330e 325->331 332 55303c-553040 325->332 326->336 334 55332b-55332e 331->334 332->331 337 553046-55304a 332->337 333->334 336->333 337->326 340 55304c-553063 337->340 342 553065-553068 340->342 343 553098-55309e 340->343 346 55308e-553096 342->346 347 55306a-553070 342->347 344 5530a0-5530a7 343->344 345 553072-553089 call 54bdfc call 54be0f call 543370 343->345 349 5530a9 344->349 350 5530ab-5530ac call 5557ad 344->350 374 553243 345->374 348 55310b-55312a 346->348 347->345 347->346 352 5531e6-5531ef call 55e301 348->352 353 553130-55313c 348->353 349->350 358 5530b1-5530c9 call 555733 * 2 350->358 365 5531f1-553203 352->365 366 553260 352->366 353->352 357 553142-553144 353->357 357->352 362 55314a-55316b 357->362 383 5530e6-553109 call 54cd0d 358->383 384 5530cb-5530e1 call 54be0f call 54bdfc 358->384 362->352 367 55316d-553183 362->367 365->366 370 553205-553214 365->370 371 553264-55327a ReadFile 366->371 367->352 372 553185-553187 367->372 370->366 387 553216-55321a 370->387 375 55327c-553282 371->375 376 5532d8-5532e3 371->376 372->352 377 553189-5531ac 372->377 379 553246-553250 call 555733 374->379 375->376 381 553284 375->381 396 5532e5-5532f7 call 54be0f call 54bdfc 376->396 397 5532fc-5532ff 376->397 377->352 382 5531ae-5531c4 377->382 379->334 389 553287-553299 381->389 382->352 390 5531c6-5531c8 382->390 383->348 384->374 387->371 395 55321c-553234 387->395 389->379 398 55329b-55329f 389->398 390->352 399 5531ca-5531e1 390->399 415 553255-55325e 395->415 416 553236 395->416 396->374 404 553305-553307 397->404 405 55323c-553242 call 54bdb5 397->405 402 5532a1-5532b1 call 552cb6 398->402 403 5532b8-5532c5 398->403 399->352 423 5532b4-5532b6 402->423 406 5532c7 call 552e0d 403->406 407 5532d1-5532d6 call 552afc 403->407 404->379 405->374 420 5532cc-5532cf 406->420 407->420 415->389 416->405 420->423 423->379
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3375310931.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 00000008.00000002.3375202386.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375310931.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375514063.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376119794.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376337589.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376371523.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 19270a06a8a1005ac99e5dceea41f38d814de2f70999fa3743eeef15cac0c450
                                  • Instruction ID: 1dde382f468cdb04fd93373fbfbf355035a507493b88d6f12014c9eeb72de575
                                  • Opcode Fuzzy Hash: 19270a06a8a1005ac99e5dceea41f38d814de2f70999fa3743eeef15cac0c450
                                  • Instruction Fuzzy Hash: 99B14770A08606AFDB01DFA8C8A4BAD7FB5BF85355F14458AED085B292C770DB09CB50

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 424 469d90-469e0e call 53de82 427 469e15-469e20 424->427 427->427 428 469e22-469e2d 427->428 429 469e32-469e44 call 543f30 428->429 430 469e2f 428->430 433 469e46-469e6c call 547d06 call 543abb call 547d06 429->433 434 469eb7-469ebe 429->434 430->429 451 469e73-469e7a 433->451 452 469e6e 433->452 435 469ec0-469ecc 434->435 436 469ee8-469ef8 434->436 438 469ede-469ee5 call 53e103 435->438 439 469ece-469edc 435->439 438->436 439->438 441 469ef9-469f0e call 543380 439->441 450 469f10-469f1b 441->450 450->450 453 469f1d-469f28 450->453 454 469e7c-469e83 451->454 455 469e8d-469e94 call 4ccd30 451->455 452->451 456 469f2d-469f3f call 543f30 453->456 457 469f2a 453->457 458 469e87-469e8b 454->458 459 469e85 454->459 463 469e99-469e9f 455->463 464 469f41-469f59 call 547d06 call 543abb call 5477b8 456->464 465 469f5c-469f63 456->465 457->456 458->463 459->458 466 469ea3-469eae call 54c7af call 5477b8 463->466 467 469ea1 463->467 464->465 469 469f65-469f71 465->469 470 469f8d-469f93 465->470 481 469eb3-469eb6 466->481 467->466 473 469f83-469f8a call 53e103 469->473 474 469f73-469f81 469->474 473->470 474->473 477 469f94-469fbe call 543380 474->477 489 469fc0-469fc4 477->489 490 469fcf-469fd4 477->490 481->434 489->490 491 469fc6-469fce 489->491
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3375310931.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 00000008.00000002.3375202386.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375310931.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375514063.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376119794.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376337589.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376371523.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: __fread_nolock
                                  • String ID:
                                  • API String ID: 2638373210-0
                                  • Opcode ID: dd8ce95d9f63d4291176967185a86eeef44689c27755c852cf32694b27ed8206
                                  • Instruction ID: 1bf027e2c32559c3e19d0a56edfb4755cd2596841a4ba327c3370cb74a2fef14
                                  • Opcode Fuzzy Hash: dd8ce95d9f63d4291176967185a86eeef44689c27755c852cf32694b27ed8206
                                  • Instruction Fuzzy Hash: 176139719002059BDB18DF54DC49BAFBBA8FF85304F14416EF8089B382E7B99E41C7A6

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 492 543512-54351f 493 543521-543544 call 5432f3 492->493 494 543549-54355d call 554902 492->494 499 5436b0-5436b2 493->499 500 543562-54356b call 54ccef 494->500 501 54355f 494->501 503 543570-54357f 500->503 501->500 504 543581 503->504 505 54358f-543598 503->505 506 543587-543589 504->506 507 543659-54365e 504->507 508 5435ac-5435e0 505->508 509 54359a-5435a7 505->509 506->505 506->507 510 5436ae-5436af 507->510 512 5435e2-5435ec 508->512 513 54363d-543649 508->513 511 5436ac 509->511 510->499 511->510 514 543613-54361f 512->514 515 5435ee-5435fa 512->515 516 543660-543663 513->516 517 54364b-543652 513->517 514->516 520 543621-54363b call 543a29 514->520 515->514 519 5435fc-54360e call 54387e 515->519 518 543666-54366e 516->518 517->507 521 543670-543676 518->521 522 5436aa 518->522 519->510 520->518 525 54368e-543692 521->525 526 543678-54368c call 5436b3 521->526 522->511 530 543694-5436a2 call 562870 525->530 531 5436a5-5436a7 525->531 526->510 530->531 531->522
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3375310931.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 00000008.00000002.3375202386.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375310931.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375514063.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376119794.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376337589.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376371523.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 361addd5ad79db09e9582149397a97babbb045ab946d35af48baa897347d9d5f
                                  • Instruction ID: a9ff0ea1780d214f0ac29d5be9dc12d632e2f20d7a1f6af6fe66899c6bdea504
                                  • Opcode Fuzzy Hash: 361addd5ad79db09e9582149397a97babbb045ab946d35af48baa897347d9d5f
                                  • Instruction Fuzzy Hash: 1A518F70A00209BFDF14DF58C885AE9BFA1BB89368F258159F8499B362D371DE41DB90

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 535 553493-5534a7 call 55905e 538 5534ad-5534b5 535->538 539 5534a9-5534ab 535->539 541 5534b7-5534be 538->541 542 5534c0-5534c3 538->542 540 5534fb-55351b call 558fcd 539->540 551 55352d 540->551 552 55351d-55352b call 54bdd8 540->552 541->542 544 5534cb-5534df call 55905e * 2 541->544 545 5534c5-5534c9 542->545 546 5534e1-5534f1 call 55905e FindCloseChangeNotification 542->546 544->539 544->546 545->544 545->546 546->539 554 5534f3-5534f9 546->554 556 55352f-553532 551->556 552->556 554->540
                                  APIs
                                  • FindCloseChangeNotification.KERNELBASE(00000000,00000000,CF830579,?,0055337A,00000000,CF830579,0058B810,0000000C,00553436,0054778D,?), ref: 005534EA
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3375310931.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 00000008.00000002.3375202386.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375310931.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375514063.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376119794.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376337589.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376371523.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ChangeCloseFindNotification
                                  • String ID:
                                  • API String ID: 2591292051-0
                                  • Opcode ID: 064a5288f1ba5c79ba6821277a6e2dd672e1105fc5a78605dc58e19cf2e07381
                                  • Instruction ID: 5e43142c5915eeb03e970b2f93dea35988b1c41afaeef90806bed3411f53402a
                                  • Opcode Fuzzy Hash: 064a5288f1ba5c79ba6821277a6e2dd672e1105fc5a78605dc58e19cf2e07381
                                  • Instruction Fuzzy Hash: 5D11AF33508124A5CB322234A87EB7E1F4AAFC2776F25054BFC0C4B1D1EB72894C5180

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 561 54cc2c-54cc44 call 55905e 564 54cc46-54cc4d 561->564 565 54cc5a-54cc70 SetFilePointerEx 561->565 566 54cc54-54cc58 564->566 567 54cc85-54cc8f 565->567 568 54cc72-54cc83 call 54bdd8 565->568 570 54ccab-54ccae 566->570 567->566 569 54cc91-54cca6 567->569 568->566 569->570
                                  APIs
                                  • SetFilePointerEx.KERNELBASE(00000000,00000000,0058B4C8,00469F4B,00000002,00469F4B,00000000,?,?,?,0054CD36,00000000,?,00469F4B,00000002,0058B4C8), ref: 0054CC69
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3375310931.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 00000008.00000002.3375202386.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375310931.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375514063.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376119794.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376337589.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376371523.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FilePointer
                                  • String ID:
                                  • API String ID: 973152223-0
                                  • Opcode ID: 524a44269f9114b9fab7fd01fb958f533be35001fa93c01ca02f2fd54cf4e440
                                  • Instruction ID: 8e0d42cac31cb3a532e2c991b6d13498958c8cdea445a8e6f5059095ad138b98
                                  • Opcode Fuzzy Hash: 524a44269f9114b9fab7fd01fb958f533be35001fa93c01ca02f2fd54cf4e440
                                  • Instruction Fuzzy Hash: E7010432614125AECB05CF19CC99DAE3F19EBC5334B250644E8259B290E671ED419790

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 574 462d70-462d80 575 462da6-462da8 574->575 576 462d82-462d87 574->576 579 462daa-462db7 call 53de82 575->579 580 462db8-462dbe 575->580 577 462dbf call 462260 576->577 578 462d89-462d8a call 53de82 576->578 585 462dc4-462dc9 call 543380 577->585 586 462d8f-462d96 578->586 586->585 588 462d98-462da5 586->588
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00462DBF
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3375310931.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 00000008.00000002.3375202386.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375310931.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375514063.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376119794.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376337589.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376371523.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID:
                                  • API String ID: 118556049-0
                                  • Opcode ID: 326ee97673e7adb1608e1cb46f795dec6370eba03380352c4d7ae6dd60fbcf19
                                  • Instruction ID: 80f6fc6e79ab65b91391697d9b6174b75a6875605a37bce379ce23a54221ba6d
                                  • Opcode Fuzzy Hash: 326ee97673e7adb1608e1cb46f795dec6370eba03380352c4d7ae6dd60fbcf19
                                  • Instruction Fuzzy Hash: D2F024B2200505ABCB186F64E9058EAB7FCEF64366714087FE888C7212F76ADA408791

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 590 554d73-554d7e 591 554d80-554d8a 590->591 592 554d8c-554d92 590->592 591->592 593 554dc0-554dcb call 54be0f 591->593 594 554d94-554d95 592->594 595 554dab-554dbc RtlAllocateHeap 592->595 599 554dcd-554dcf 593->599 594->595 596 554d97-554d9e call 552914 595->596 597 554dbe 595->597 596->593 603 554da0-554da9 call 55011d 596->603 597->599 603->593 603->595
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000008,00547DC7,00000000,?,005546F9,00000001,00000364,00000000,00000006,000000FF,?,00000000,0054BE14,00547593,00547DC7,00000000), ref: 00554DB5
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3375310931.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 00000008.00000002.3375202386.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375310931.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375514063.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376119794.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376337589.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376371523.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: e03b72786a83b4e3d290129deb97d6bb0534c912894a56e948c14c6cca5166d0
                                  • Instruction ID: 8fae411ba43f9bb60870c2a8b9e56d0d931287354a458ffc4f7fd6b39da7347d
                                  • Opcode Fuzzy Hash: e03b72786a83b4e3d290129deb97d6bb0534c912894a56e948c14c6cca5166d0
                                  • Instruction Fuzzy Hash: BDF0E93210053567DB226A625C25B6F3F79BF817B6F154213EC08971C1CB20E8894EE4

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 606 5557ad-5557b9 607 5557eb-5557f6 call 54be0f 606->607 608 5557bb-5557bd 606->608 615 5557f8-5557fa 607->615 610 5557d6-5557e7 RtlAllocateHeap 608->610 611 5557bf-5557c0 608->611 612 5557c2-5557c9 call 552914 610->612 613 5557e9 610->613 611->610 612->607 618 5557cb-5557d4 call 55011d 612->618 613->615 618->607 618->610
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000000,0055ABF2,4D88C033,?,0055ABF2,00000220,?,0055416F,4D88C033), ref: 005557E0
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3375310931.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 00000008.00000002.3375202386.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375310931.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375514063.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376119794.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376337589.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376371523.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 32e2cace0bbd8fe1bc636c0c131821d7f043426827f3193c6f5abe75db6958eb
                                  • Instruction ID: 115f416bd69b75c8f80364bc868e070c9da331fe14206b1bfb14f5c7ed9c2c14
                                  • Opcode Fuzzy Hash: 32e2cace0bbd8fe1bc636c0c131821d7f043426827f3193c6f5abe75db6958eb
                                  • Instruction Fuzzy Hash: BBE06D31220F2697E62536765C35FAB3E49FF8A7F2F150523ED18961C0EB10DC4886E9
                                  APIs
                                  • GetProcAddress.KERNEL32(00000000,C8D8C5E3), ref: 004E4D6C
                                  • GetProcAddress.KERNEL32(00000000,C8D8C5E3), ref: 004E4DAE
                                  • GetProcAddress.KERNEL32(00000000,DDD8DFE2), ref: 004E4DF6
                                  • GetProcAddress.KERNEL32(00000000,C8D8C5E3), ref: 004E4E37
                                  • GetProcAddress.KERNEL32(00000000,C8D8C5E3), ref: 004E4E78
                                  • GetProcAddress.KERNEL32(00000000,DDD8DFE2), ref: 004E4EB6
                                  • GetProcAddress.KERNEL32(00000000,C8D8C5E3), ref: 004E4EFE
                                  • GetProcAddress.KERNEL32(00000000,DDD8DFE2), ref: 004E4F46
                                  • GetProcAddress.KERNEL32(00000000,C8D8C5E3), ref: 004E4F87
                                  • GetProcAddress.KERNEL32(00000000,C8D8C5E3), ref: 004E4FCD
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3375310931.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 00000008.00000002.3375202386.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375310931.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375514063.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376119794.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376337589.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376371523.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressProc
                                  • String ID:
                                  • API String ID: 190572456-0
                                  • Opcode ID: 607d8261986945a4c4324970d497c9217e0a31680db26621d3fbdd4d70d00188
                                  • Instruction ID: a60dbe664e6472e00e1a5863635c958c6711d75411534544572e9dd20062ecca
                                  • Opcode Fuzzy Hash: 607d8261986945a4c4324970d497c9217e0a31680db26621d3fbdd4d70d00188
                                  • Instruction Fuzzy Hash: 068154B0C1838DAEEF19CF98D444AEEBBB8EF16304F51409FD441AB651D3745209DBA9
                                  APIs
                                  • GetModuleHandleA.KERNEL32(?), ref: 0046892E
                                  • GetProcAddress.KERNEL32(00000000,?), ref: 0046893B
                                  • GetModuleHandleA.KERNEL32(?), ref: 004689A5
                                  • GetProcAddress.KERNEL32(00000000,?), ref: 004689AC
                                  • CloseHandle.KERNEL32(?), ref: 00468BB2
                                  • CloseHandle.KERNEL32(?), ref: 00468C14
                                  • CloseHandle.KERNEL32(00000000), ref: 00468C41
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3375310931.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 00000008.00000002.3375202386.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375310931.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375514063.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376119794.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376337589.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376371523.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Handle$Close$AddressModuleProc
                                  • String ID: File
                                  • API String ID: 4110381430-749574446
                                  • Opcode ID: 3626a999ed1c01f521b3509838af8904081567d419e15fb4da1978775266c846
                                  • Instruction ID: d097018fc1a966017e7d12abefc5969dcab67f1e98ae584780056f3b66e3ad85
                                  • Opcode Fuzzy Hash: 3626a999ed1c01f521b3509838af8904081567d419e15fb4da1978775266c846
                                  • Instruction Fuzzy Hash: DFC19F70D042599BEF24CFA4CC85BAEBBB4FF05304F10055EE544BB281EB75A945CB6A
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3375310931.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 00000008.00000002.3375202386.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375310931.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375514063.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376119794.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376337589.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376371523.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 61965cb8cb4c3d11271a02d73999b519a6a23ab072505813c3df16f2acd370b1
                                  • Instruction ID: 5bad394fd6efddcbff89a158496ec1f2af2ebc959212b9dcc09242c380e86b36
                                  • Opcode Fuzzy Hash: 61965cb8cb4c3d11271a02d73999b519a6a23ab072505813c3df16f2acd370b1
                                  • Instruction Fuzzy Hash: 66023C71E052199BDF14CFA9C8806EEBBF1FF48318F258669E919E7381D731A941CB90
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 004CF5B3
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 004CF5D5
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 004CF5F5
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 004CF61F
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 004CF68D
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 004CF6D9
                                  • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 004CF6F3
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 004CF788
                                  • std::_Facet_Register.LIBCPMT ref: 004CF795
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3375310931.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 00000008.00000002.3375202386.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375310931.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375514063.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376119794.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376337589.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376371523.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Locinfo::_$Facet_Locinfo_ctorLocinfo_dtorRegister
                                  • String ID: bad locale name$fXW
                                  • API String ID: 3375549084-28943737
                                  • Opcode ID: 0529c43b1f2e310dd24f45cd95d7bcd59bfb46350b0d00096ff075e12e03383e
                                  • Instruction ID: 8dbd80a4c2d8827007839650745c600f066d8a3c91e9f99d6d8297f7a2b87164
                                  • Opcode Fuzzy Hash: 0529c43b1f2e310dd24f45cd95d7bcd59bfb46350b0d00096ff075e12e03383e
                                  • Instruction Fuzzy Hash: 9261EEB5E012499BDF11DFA4C849B9EBFB5BF54310F14402AE804B7341E738E90ACBA5
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00463A08
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00463A54
                                  • __Getctype.LIBCPMT ref: 00463A6A
                                  • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 00463A96
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00463B2B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3375310931.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 00000008.00000002.3375202386.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375310931.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375514063.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376119794.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376337589.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376371523.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Locinfo::_Lockit$GetctypeLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                  • String ID: `<F$bad locale name
                                  • API String ID: 1840309910-1676782154
                                  • Opcode ID: 26054f2eda05760c104a77f682bc948be06a9abc031039b3a060d44a72c8ec7a
                                  • Instruction ID: c2a5368965ea7faed27b406beb3cd4744b9fd03aa4ea87e8206037cb169bd193
                                  • Opcode Fuzzy Hash: 26054f2eda05760c104a77f682bc948be06a9abc031039b3a060d44a72c8ec7a
                                  • Instruction Fuzzy Hash: A85152B1D002489BDF10DF94D845B9EBFB8BF54714F144069E809AB341E779EA04CBA6
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 004D69A8
                                  • __floor_pentium4.LIBCMT ref: 004D6ACB
                                  Strings
                                  • unordered_map/set too long, xrefs: 004D6B96
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3375310931.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 00000008.00000002.3375202386.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375310931.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375514063.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376119794.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376337589.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376371523.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task__floor_pentium4
                                  • String ID: unordered_map/set too long
                                  • API String ID: 1502093491-306623848
                                  • Opcode ID: 1dc2a618929728eeb5ee1ecb2b3358f088344a7ec20300c03261417aa5479c28
                                  • Instruction ID: 816f520e28b79048fb671673f26edf897a4c876c331094ed8c34e46e298d3ed9
                                  • Opcode Fuzzy Hash: 1dc2a618929728eeb5ee1ecb2b3358f088344a7ec20300c03261417aa5479c28
                                  • Instruction Fuzzy Hash: 2AF14771A00214DFCB04DF58C991AAEBBB5FF84314F15826BE859AB385D738EE11CB94
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3375310931.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 00000008.00000002.3375202386.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375310931.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375514063.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376119794.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376337589.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376371523.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: ", "$: "$recursive_directory_iterator::operator++
                                  • API String ID: 0-2763324178
                                  • Opcode ID: a63a110b313988646ea76711894fbdaf5f85e2bbb507c34fbd6c6e7b0e3c5179
                                  • Instruction ID: 77cb15eb4c392e877551054dff70b8dfc5f596555456237ef9c1ca7b9359d245
                                  • Opcode Fuzzy Hash: a63a110b313988646ea76711894fbdaf5f85e2bbb507c34fbd6c6e7b0e3c5179
                                  • Instruction Fuzzy Hash: 4FC102B1900204AFCB18EF64D845B9EBBF8FF45714F04462EF41697781EB78AA04CBA5
                                  APIs
                                  • _ValidateLocalCookies.LIBCMT ref: 00541A17
                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 00541A1F
                                  • _ValidateLocalCookies.LIBCMT ref: 00541AA8
                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 00541AD3
                                  • _ValidateLocalCookies.LIBCMT ref: 00541B28
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3375310931.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 00000008.00000002.3375202386.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375310931.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375514063.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376119794.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376337589.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376371523.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                  • String ID: csm
                                  • API String ID: 1170836740-1018135373
                                  • Opcode ID: 018fb2c0306c60c3331f2db91f0fff85f9f79a08c572489ed6eb8acc2e72a324
                                  • Instruction ID: 4dcebbc1489f744c04d39888856cd7bab131ccadb3fe2688f4587d02ecf59aed
                                  • Opcode Fuzzy Hash: 018fb2c0306c60c3331f2db91f0fff85f9f79a08c572489ed6eb8acc2e72a324
                                  • Instruction Fuzzy Hash: 7E410030A00619ABCF10DF69C889ADE7FB4FF85368F148455E8049B392D731EA85CBD4
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 004CDD13
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 004CDD36
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 004CDD56
                                  • std::_Facet_Register.LIBCPMT ref: 004CDDCB
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 004CDDE3
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 004CDDFB
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3375310931.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 00000008.00000002.3375202386.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375310931.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375514063.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376119794.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376337589.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376371523.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                  • String ID:
                                  • API String ID: 2081738530-0
                                  • Opcode ID: d61c6e6cf72d247dc606c5f8075c81188a27926c6e2f6d0374be2bd87ea6737e
                                  • Instruction ID: fdbf992da7fa01e2078f64fed348b8938cc662f46d386f15a2aeaddb93e147ec
                                  • Opcode Fuzzy Hash: d61c6e6cf72d247dc606c5f8075c81188a27926c6e2f6d0374be2bd87ea6737e
                                  • Instruction Fuzzy Hash: 9031EC79C0022A9FCB51DF54C884BAEBBB0FB80320F15862EE81A67351D734AE45CBD5
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00467796
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00467931
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3375310931.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 00000008.00000002.3375202386.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375310931.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375514063.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376119794.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376337589.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376371523.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: @nF$out_of_range$type_error
                                  • API String ID: 2659868963-1879671698
                                  • Opcode ID: b2f10256b767c38a02ceb83ce414ea9644eab09569d95f14b9feadc99e98a006
                                  • Instruction ID: 4fe945529a8efc2fb04f967d837d4e6a87b93e7024a6e4047e72e0f97e07b98b
                                  • Opcode Fuzzy Hash: b2f10256b767c38a02ceb83ce414ea9644eab09569d95f14b9feadc99e98a006
                                  • Instruction Fuzzy Hash: 97A19DB1D002089FDB18DFA8D885BADBBF1BF49304F14862EE019E7751E778A944CB65
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 004671A9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3375310931.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 00000008.00000002.3375202386.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375310931.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375514063.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376119794.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376337589.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376371523.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: @nF$parse error$parse_error
                                  • API String ID: 2659868963-3223604060
                                  • Opcode ID: 357ba9c27c605872098eaab78fc3261cbff2fdd51396d6d118eb46ff7c3e4f81
                                  • Instruction ID: 60abd793aa98d02ac640e143fbb577c90f9dd408d7f729379ea53fe3f64a153e
                                  • Opcode Fuzzy Hash: 357ba9c27c605872098eaab78fc3261cbff2fdd51396d6d118eb46ff7c3e4f81
                                  • Instruction Fuzzy Hash: D4B1A170D002098FDB08CF68DD95BADFBF1BF49304F14825AE019AB792E7749A80CB65
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 0046743E
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 0046744D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3375310931.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 00000008.00000002.3375202386.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375310931.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375514063.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376119794.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376337589.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376371523.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: at line $, column
                                  • API String ID: 4194217158-191570568
                                  • Opcode ID: 774eec79154162989b73fe2c0a317585b000a1d585bce003fb1a98724dc8c3c9
                                  • Instruction ID: 35be139df3a1e7dd6063b746dc8e0e1a7e31e28afb65b5e8c7ffc8b79b5b5210
                                  • Opcode Fuzzy Hash: 774eec79154162989b73fe2c0a317585b000a1d585bce003fb1a98724dc8c3c9
                                  • Instruction Fuzzy Hash: E66192B0E042059FC718DF68D885BADFBF1BF49314F14826EE419A7782D7789980CB55
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00463E2F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3375310931.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 00000008.00000002.3375202386.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375310931.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375514063.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376119794.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376337589.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376371523.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                  • API String ID: 2659868963-1866435925
                                  • Opcode ID: b36a3dca853737a33933b6aa4071c4aaab78f8aeb2f71137555970123648af1c
                                  • Instruction ID: c4b5763e82ea3b811324ea45073a81c893712f7038fe522839801c2c7566cd6b
                                  • Opcode Fuzzy Hash: b36a3dca853737a33933b6aa4071c4aaab78f8aeb2f71137555970123648af1c
                                  • Instruction Fuzzy Hash: EB41AFB6A00244AFCB04DF58C845BEABBF8FF49710F14852BE91997741E775AA00CBA5
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 004675F8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3375310931.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 00000008.00000002.3375202386.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375310931.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375514063.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376119794.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376337589.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376371523.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: @nF$AqL$invalid_iterator
                                  • API String ID: 2659868963-798898470
                                  • Opcode ID: 3dac7f184fd91c8cc3c8d73f220fe682646c9f044f69d39a5e56f91abf668ff7
                                  • Instruction ID: e6149a1994fca2805a944e458db97dee6a85e28c4271d239daba2f92c8577f3a
                                  • Opcode Fuzzy Hash: 3dac7f184fd91c8cc3c8d73f220fe682646c9f044f69d39a5e56f91abf668ff7
                                  • Instruction Fuzzy Hash: 8A51AFB1D002089FCB18CF68D8847AEFBF5FB48314F14866EE01AA7791E774A944CB95
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00463E2F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3375310931.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 00000008.00000002.3375202386.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375310931.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375514063.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376119794.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376337589.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376371523.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                  • API String ID: 2659868963-1866435925
                                  • Opcode ID: 0de74049617cb03e1e63ed52f899b2d3b691347ec35ecedd7897c75204426b25
                                  • Instruction ID: 596ecd052d6e5dda8c7e8071fdb02a16a92644559a18164d06442d259a2d628c
                                  • Opcode Fuzzy Hash: 0de74049617cb03e1e63ed52f899b2d3b691347ec35ecedd7897c75204426b25
                                  • Instruction Fuzzy Hash: 7C2105B2A00704ABC704DF58D801B96BBECBF04311F18842BF91887341F775EA04CBA6
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 0053CF40
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0053CF4B
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0053CFB9
                                    • Part of subcall function 0053D09C: std::locale::_Locimp::_Locimp.LIBCPMT ref: 0053D0B4
                                  • std::locale::_Setgloballocale.LIBCPMT ref: 0053CF66
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3375310931.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 00000008.00000002.3375202386.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375310931.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375514063.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376119794.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376337589.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376371523.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                                  • String ID:
                                  • API String ID: 677527491-0
                                  • Opcode ID: 8c655635316c435088a6f99dfbe3dd507961bae738bbc066a34ce5d4ab5fc950
                                  • Instruction ID: 633e03158c5dd330446f826f46bd86d46fbccd1216fffa8f33b5d140193348fb
                                  • Opcode Fuzzy Hash: 8c655635316c435088a6f99dfbe3dd507961bae738bbc066a34ce5d4ab5fc950
                                  • Instruction Fuzzy Hash: B801DF76A006229BCB0AEB20E84A57D7FB1FFD4740F19040AE80167391DF746E46DBDA
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 004D61A6
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 004D6341
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3375310931.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 00000008.00000002.3375202386.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375310931.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375514063.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376119794.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376337589.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376371523.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID: Py"v
                                  • API String ID: 118556049-2948403528
                                  • Opcode ID: 10903d2f9587ed01dd017d2e519334c363aaf9660c6c83ace470442a108501ff
                                  • Instruction ID: 8fac0d4fc47538f9e39cf39b289036a5c9f4fe46134165d41ab9c7c7acf38d38
                                  • Opcode Fuzzy Hash: 10903d2f9587ed01dd017d2e519334c363aaf9660c6c83ace470442a108501ff
                                  • Instruction Fuzzy Hash: 8A81F472A00101AFCB08DF6CDDA596EB7A5EB95300B15836FE80987391E734EE55C794
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00466E51
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00466E60
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3375310931.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 00000008.00000002.3375202386.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375310931.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375514063.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376119794.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376337589.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376371523.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: [json.exception.
                                  • API String ID: 4194217158-791563284
                                  • Opcode ID: 13c51f5e1bfe26069c918e20c7e740efdca381c990602d1ed3c9f108a5ef58b1
                                  • Instruction ID: 5bbb1b041e1f438a112a4c5c5aa07e8b7ecb8daa908aa12fa66a10ffc0d60de0
                                  • Opcode Fuzzy Hash: 13c51f5e1bfe26069c918e20c7e740efdca381c990602d1ed3c9f108a5ef58b1
                                  • Instruction Fuzzy Hash: 4D71A3B0A002059FD718DF68D985B9EFBF5FF49310F10821EE4199B781E774A980CB95
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00467AE3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3375310931.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 00000008.00000002.3375202386.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375310931.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375514063.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376119794.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376337589.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376371523.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: @nF$other_error
                                  • API String ID: 2659868963-48232177
                                  • Opcode ID: 2939056cb060dce6d33b3d327a20b260fbfae03af7381f8cd1e396e98783f291
                                  • Instruction ID: 3f2957aba7209f2456b19490f5bdb2141e71df54d06368c692e8d2af4c27694d
                                  • Opcode Fuzzy Hash: 2939056cb060dce6d33b3d327a20b260fbfae03af7381f8cd1e396e98783f291
                                  • Instruction Fuzzy Hash: B671C271E002049FDB14CFA8DC85B9EBBF1FF88314F14826AE419AB791E774A940CB95
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 004DD6B0
                                  Strings
                                  • type must be string, but is , xrefs: 004DD718
                                  • type must be boolean, but is , xrefs: 004DD7A2
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3375310931.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 00000008.00000002.3375202386.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375310931.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375514063.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376119794.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376337589.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376371523.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID: type must be boolean, but is $type must be string, but is
                                  • API String ID: 118556049-436076039
                                  • Opcode ID: a07e3f60a01bef22eec29ac7f8e453f4537be376eac639655353863e89515409
                                  • Instruction ID: d68400627ca2492bc2e45ca604f19d7b5d554e75e6371cb1c00653d9315bb220
                                  • Opcode Fuzzy Hash: a07e3f60a01bef22eec29ac7f8e453f4537be376eac639655353863e89515409
                                  • Instruction Fuzzy Hash: 154135B2E00648AFC700EFA8D801B9EBBE8EB04314F14457BE419D7741EB78A910CBD6
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 004CD04F
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 004CD076
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3375310931.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 00000008.00000002.3375202386.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375310931.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375514063.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376119794.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376337589.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376371523.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: @nF
                                  • API String ID: 2659868963-3944412766
                                  • Opcode ID: d67d042dee8c344cb3842a30f7837767eaba347b3e91cabeb7d478a2a40bb856
                                  • Instruction ID: 464fff5a71d8d2ed677af63581b430ea2977c84de2058947e5c6117d39159c85
                                  • Opcode Fuzzy Hash: d67d042dee8c344cb3842a30f7837767eaba347b3e91cabeb7d478a2a40bb856
                                  • Instruction Fuzzy Hash: 1001E4BAA00706AF8708CF99E405886FBF8FB48310701C52BE51AC7B00E770E518CFA0
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 004DA5FF
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 004DA626
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.3375310931.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 00000008.00000002.3375202386.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375310931.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375514063.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3375547902.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376119794.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376337589.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000008.00000002.3376371523.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: @nF
                                  • API String ID: 2659868963-3944412766
                                  • Opcode ID: 35e4f042faf38721b8adadb45d79be86fe77e401e8f0e3c2f5737c13016f900d
                                  • Instruction ID: 3af50310659dbe6e466b855d05ee4faae631fade1dbc85187a53ad53ec2ac004
                                  • Opcode Fuzzy Hash: 35e4f042faf38721b8adadb45d79be86fe77e401e8f0e3c2f5737c13016f900d
                                  • Instruction Fuzzy Hash: D7F0C9B6A04706AF8708DF55E505886BBF8FA58310701896BE51AC7B10E770E514CFA4

                                  Execution Graph

                                  Execution Coverage:3.8%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:0%
                                  Total number of Nodes:944
                                  Total number of Limit Nodes:57
                                  execution_graph 17276 47e5c0 17277 47ea72 17276->17277 17288 47e5eb __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 17276->17288 17278 47e645 setsockopt recv 17278->17288 17280 47ea5d Sleep 17280->17277 17280->17288 17282 4ccd30 RtlAllocateHeap 17282->17288 17283 47e6db recv 17285 47e6d8 std::_Throw_Cpp_error 17283->17285 17284 47e6fd recv 17284->17285 17285->17283 17285->17284 17286 47ea4f Sleep 17285->17286 17289 4ccd30 RtlAllocateHeap 17285->17289 17292 47e78b recv 17285->17292 17318 4ca6b0 17285->17318 17327 47ddc0 17285->17327 17286->17280 17288->17277 17288->17278 17288->17280 17288->17282 17288->17283 17288->17285 17288->17286 17294 47d4a0 WSAStartup 17288->17294 17300 53d879 17288->17300 17303 47d9c0 17288->17303 17290 47e753 setsockopt 17289->17290 17290->17285 17290->17292 17292->17285 17295 47d4d8 17294->17295 17297 47d5a7 17294->17297 17296 47d575 socket 17295->17296 17295->17297 17296->17297 17298 47d58b connect 17296->17298 17297->17288 17298->17297 17299 47d59d closesocket 17298->17299 17299->17296 17299->17297 17344 53de2d 17300->17344 17304 4ca6b0 std::_Throw_Cpp_error RtlAllocateHeap 17303->17304 17312 47d9f6 17304->17312 17306 47db68 17307 47ddb1 17306->17307 17308 47db92 std::_Throw_Cpp_error 17306->17308 17309 543380 std::_Throw_Cpp_error RtlAllocateHeap 17307->17309 17310 4ccd30 RtlAllocateHeap 17308->17310 17314 47dbd3 std::_Locinfo::_Locinfo_ctor 17308->17314 17317 47dd24 std::_Throw_Cpp_error 17309->17317 17310->17314 17311 543380 std::_Throw_Cpp_error RtlAllocateHeap 17313 47ddbb 17311->17313 17348 4ca570 17312->17348 17314->17314 17316 47dcee GetModuleHandleA GetProcAddress WSASend 17314->17316 17314->17317 17315 47dd8e std::_Throw_Cpp_error 17315->17288 17316->17314 17316->17317 17317->17311 17317->17315 17319 4ca6d7 17318->17319 17320 4ca75b 17319->17320 17324 4ca6e1 17319->17324 17321 462300 std::_Throw_Cpp_error RtlAllocateHeap 17320->17321 17323 4ca760 17321->17323 17322 4ca6e6 17322->17285 17323->17285 17324->17322 17325 462d70 std::_Throw_Cpp_error RtlAllocateHeap 17324->17325 17326 4ca739 std::_Locinfo::_Locinfo_ctor 17325->17326 17326->17285 17333 47de22 17327->17333 17328 47e566 std::_Throw_Cpp_error 17328->17285 17329 543380 std::_Throw_Cpp_error RtlAllocateHeap 17330 47e586 17329->17330 17353 53cd44 17330->17353 17332 47e58d 17334 53cd44 std::_Throw_Cpp_error 2 API calls 17332->17334 17333->17328 17333->17329 17335 47e59e 17334->17335 17336 543380 std::_Throw_Cpp_error RtlAllocateHeap 17335->17336 17337 47e5a3 17336->17337 17338 543380 std::_Throw_Cpp_error RtlAllocateHeap 17337->17338 17339 47e5a8 17338->17339 17340 543380 std::_Throw_Cpp_error RtlAllocateHeap 17339->17340 17341 47e5ad 17340->17341 17342 543380 std::_Throw_Cpp_error RtlAllocateHeap 17341->17342 17343 47e5b2 17342->17343 17345 53d887 17344->17345 17346 53de5d GetSystemTimePreciseAsFileTime 17344->17346 17345->17288 17346->17345 17349 4ca5a1 std::_Throw_Cpp_error 17348->17349 17350 4ca57e 17348->17350 17349->17306 17350->17349 17351 543380 std::_Throw_Cpp_error RtlAllocateHeap 17350->17351 17352 4ca5fe 17351->17352 17354 53cd5a std::_Throw_Cpp_error 17353->17354 17359 53ccf7 17354->17359 17356 53cd6a __EH_prolog3 std::_Throw_Cpp_error 17367 4cd9a0 17356->17367 17358 53cdd7 std::_Throw_Cpp_error 17358->17332 17360 53cd03 __EH_prolog3_GS 17359->17360 17378 462980 17360->17378 17364 53cd2c 17399 4628d0 17364->17399 17366 53cd34 std::_Throw_Cpp_error 17366->17356 17427 463d90 17367->17427 17369 4cda0f 17370 53de82 std::_Facet_Register RtlAllocateHeap 17369->17370 17371 4cda16 17370->17371 17433 53cf39 17371->17433 17373 4cda29 17441 4cdcf0 17373->17441 17375 4cda5c 17376 4cda9f std::_Throw_Cpp_error 17375->17376 17377 463d90 std::_Throw_Cpp_error RtlAllocateHeap 17375->17377 17376->17358 17377->17376 17379 4629a2 17378->17379 17379->17379 17404 462ba0 17379->17404 17381 4629b4 17382 463120 17381->17382 17383 4ca6b0 std::_Throw_Cpp_error RtlAllocateHeap 17382->17383 17384 463151 17383->17384 17385 463176 17384->17385 17412 4ccea0 17384->17412 17387 4ccea0 std::_Throw_Cpp_error RtlAllocateHeap 17385->17387 17388 46319e 17387->17388 17389 4631c8 std::_Throw_Cpp_error 17388->17389 17391 463293 17388->17391 17390 53f22a ___std_exception_copy RtlAllocateHeap 17389->17390 17394 463233 17390->17394 17392 543380 std::_Throw_Cpp_error RtlAllocateHeap 17391->17392 17392->17394 17393 463262 std::_Throw_Cpp_error 17393->17364 17394->17393 17395 543380 std::_Throw_Cpp_error RtlAllocateHeap 17394->17395 17396 46329d 17395->17396 17423 53f28d 17396->17423 17398 4632b5 std::_Throw_Cpp_error 17398->17364 17400 4628db 17399->17400 17401 4628f6 std::_Throw_Cpp_error 17399->17401 17400->17401 17402 543380 std::_Throw_Cpp_error RtlAllocateHeap 17400->17402 17401->17366 17403 46291a 17402->17403 17405 462c28 17404->17405 17408 462bb2 17404->17408 17406 462300 std::_Throw_Cpp_error RtlAllocateHeap 17405->17406 17407 462c2d 17406->17407 17409 462bb7 std::_Locinfo::_Locinfo_ctor 17408->17409 17410 462d70 std::_Throw_Cpp_error RtlAllocateHeap 17408->17410 17409->17381 17411 462c03 std::_Locinfo::_Locinfo_ctor 17410->17411 17411->17381 17413 4cceef 17412->17413 17416 4ccec2 std::_Locinfo::_Locinfo_ctor 17412->17416 17414 4ccfee 17413->17414 17417 4ccefe 17413->17417 17415 462300 std::_Throw_Cpp_error RtlAllocateHeap 17414->17415 17421 4ccf45 std::_Locinfo::_Locinfo_ctor 17415->17421 17416->17385 17418 462d70 std::_Throw_Cpp_error RtlAllocateHeap 17417->17418 17418->17421 17419 543380 std::_Throw_Cpp_error RtlAllocateHeap 17420 4ccff8 std::_Throw_Cpp_error 17419->17420 17420->17385 17421->17419 17422 4ccfa5 std::_Throw_Cpp_error std::_Locinfo::_Locinfo_ctor 17421->17422 17422->17385 17424 53f2a1 17423->17424 17425 53f29a 17423->17425 17424->17398 17426 54c3a6 ___std_exception_destroy RtlAllocateHeap 17425->17426 17426->17424 17428 463daa std::_Throw_Cpp_error 17427->17428 17428->17369 17451 463cc0 17428->17451 17430 463df7 std::_Throw_Cpp_error 17431 53f22a ___std_exception_copy RtlAllocateHeap 17430->17431 17432 463e34 17431->17432 17432->17369 17434 53cf45 __EH_prolog3 std::_Lockit::_Lockit 17433->17434 17439 53cf81 std::_Throw_Cpp_error std::_Lockit::~_Lockit 17434->17439 17464 53d09c 17434->17464 17436 53cf63 17470 53d0bf 17436->17470 17439->17373 17442 4cdd18 std::_Throw_Cpp_error std::_Lockit::~_Lockit std::_Lockit::_Lockit 17441->17442 17450 4cdda8 std::_Lockit::~_Lockit 17442->17450 17487 4639a0 17442->17487 17444 4cddb8 17445 4cddfb 17444->17445 17446 4cddc0 17444->17446 17518 463730 17445->17518 17515 53cf07 17446->17515 17450->17375 17452 463d10 17451->17452 17452->17452 17453 462ba0 std::_Throw_Cpp_error RtlAllocateHeap 17452->17453 17454 463d24 17453->17454 17455 463120 std::_Throw_Cpp_error RtlAllocateHeap 17454->17455 17457 463d38 17455->17457 17456 463d5e std::_Throw_Cpp_error 17456->17430 17457->17456 17458 543380 std::_Throw_Cpp_error RtlAllocateHeap 17457->17458 17459 463d88 std::_Throw_Cpp_error 17458->17459 17459->17430 17460 463cc0 std::_Throw_Cpp_error RtlAllocateHeap 17459->17460 17461 463df7 std::_Throw_Cpp_error 17460->17461 17462 53f22a ___std_exception_copy RtlAllocateHeap 17461->17462 17463 463e34 17462->17463 17463->17430 17465 53de82 std::_Facet_Register RtlAllocateHeap 17464->17465 17466 53d0a7 17465->17466 17467 53d0bb 17466->17467 17478 53ce21 17466->17478 17467->17436 17471 53d0cb 17470->17471 17473 53cf6b 17470->17473 17481 53db4a 17471->17481 17474 4c9bb0 17473->17474 17475 4c9bc0 17474->17475 17477 4c9bca std::_Locinfo::_Locinfo_ctor ___std_exception_copy 17474->17477 17476 54c3a6 ___std_exception_destroy RtlAllocateHeap 17475->17476 17475->17477 17476->17477 17477->17439 17479 4c9bb0 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 17478->17479 17480 53ce5b 17479->17480 17480->17436 17482 53db5a std::locale::_Setgloballocale 17481->17482 17482->17473 17483 559d83 std::locale::_Setgloballocale RtlAllocateHeap 17482->17483 17485 54e86a std::locale::_Setgloballocale 17482->17485 17483->17485 17484 54ddf2 std::locale::_Setgloballocale RtlAllocateHeap 17486 54e89d __Getctype std::locale::_Setgloballocale 17484->17486 17485->17484 17486->17473 17488 4639c9 17487->17488 17513 463b1e std::_Lockit::~_Lockit 17487->17513 17489 53de82 std::_Facet_Register RtlAllocateHeap 17488->17489 17488->17513 17490 4639d9 std::_Lockit::_Lockit 17489->17490 17491 463b46 17490->17491 17492 463a4f 17490->17492 17547 53c559 17491->17547 17522 53d037 17492->17522 17496 463b50 17550 53d56f 17496->17550 17503 463aab 17504 463ac2 17503->17504 17506 54c3a6 ___std_exception_destroy RtlAllocateHeap 17503->17506 17507 463ad9 17504->17507 17508 54c3a6 ___std_exception_destroy RtlAllocateHeap 17504->17508 17505 54c3a6 ___std_exception_destroy RtlAllocateHeap 17505->17503 17506->17504 17509 463af0 17507->17509 17510 54c3a6 ___std_exception_destroy RtlAllocateHeap 17507->17510 17508->17507 17511 54c3a6 ___std_exception_destroy RtlAllocateHeap 17509->17511 17514 463b07 17509->17514 17510->17509 17511->17514 17512 54c3a6 ___std_exception_destroy RtlAllocateHeap 17512->17513 17513->17444 17514->17512 17514->17513 17516 53de82 std::_Facet_Register RtlAllocateHeap 17515->17516 17517 53cf12 17516->17517 17517->17450 17519 46373e Concurrency::cancel_current_task std::_Throw_Cpp_error 17518->17519 17520 53f22a ___std_exception_copy RtlAllocateHeap 17519->17520 17521 463773 17520->17521 17562 54ebaa 17522->17562 17525 4c9bb0 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 17526 53d05b 17525->17526 17527 53d06b 17526->17527 17528 54ebaa std::_Locinfo::_Locinfo_ctor 2 API calls 17526->17528 17529 4c9bb0 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 17527->17529 17528->17527 17530 463a59 17529->17530 17531 53d504 17530->17531 17614 54e38c 17531->17614 17533 53d50d __Getctype 17534 53d527 17533->17534 17535 53d545 17533->17535 17619 54ebe2 17534->17619 17536 54ebe2 __Getctype RtlAllocateHeap 17535->17536 17538 53d52e 17536->17538 17624 54e3d6 17538->17624 17541 463a6f 17543 53d082 17541->17543 17544 463a9b 17543->17544 17545 53d08e 17543->17545 17544->17503 17544->17505 17546 54ebaa std::_Locinfo::_Locinfo_ctor 2 API calls 17545->17546 17546->17544 17646 462fe0 17547->17646 17549 53c56a std::_Throw_Cpp_error 17549->17496 17551 53d57e 17550->17551 17554 53d58b 17550->17554 17552 54e3d6 __Getctype RtlAllocateHeap 17551->17552 17553 53d583 17552->17553 17555 54e38c __Getctype RtlAllocateHeap 17553->17555 17558 463b71 17554->17558 17559 53d5cc 17554->17559 17560 53d5d7 17554->17560 17649 542fe0 17554->17649 17555->17554 17556 54ebe2 __Getctype RtlAllocateHeap 17556->17560 17558->17444 17559->17556 17559->17558 17559->17560 17560->17558 17658 53d8b9 17560->17658 17563 54ebb7 std::_Lockit::_Lockit 17562->17563 17566 54e955 17563->17566 17565 53d043 17565->17525 17567 54e961 __fread_nolock std::_Lockit::_Lockit 17566->17567 17570 54e9b0 17567->17570 17569 54e97c std::_Locinfo::_Locinfo_ctor 17569->17565 17588 54eb0f 17570->17588 17572 54e9cb 17573 55455b __Getctype RtlAllocateHeap 17572->17573 17579 54ea04 __Getctype 17572->17579 17574 54e9d8 17573->17574 17608 54da89 17574->17608 17577 5557ad std::_Locinfo::_Locinfo_ctor 2 API calls 17578 54ea29 17577->17578 17578->17579 17580 54da89 std::_Locinfo::_Locinfo_ctor 2 API calls 17578->17580 17579->17569 17581 54ea45 17580->17581 17582 54ea67 17581->17582 17583 54ea4c 17581->17583 17585 555733 ___std_exception_destroy RtlAllocateHeap 17582->17585 17586 54ea92 17582->17586 17583->17579 17584 555733 ___std_exception_destroy RtlAllocateHeap 17583->17584 17584->17579 17585->17586 17586->17579 17587 555733 ___std_exception_destroy RtlAllocateHeap 17586->17587 17587->17579 17589 54eb29 17588->17589 17590 54eb1b 17588->17590 17591 559791 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 17589->17591 17592 551c1f std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 17590->17592 17593 54eb40 17591->17593 17594 54eb25 17592->17594 17595 554d73 __dosmaperr RtlAllocateHeap 17593->17595 17598 54eb9f std::_Lockit::_Lockit __Getctype 17593->17598 17594->17572 17596 54eb5b 17595->17596 17599 559791 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 17596->17599 17606 54eb83 17596->17606 17597 555733 ___std_exception_destroy RtlAllocateHeap 17600 54eb98 17597->17600 17604 54e955 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 17598->17604 17601 54eb72 17599->17601 17600->17572 17602 54eb85 17601->17602 17603 54eb79 17601->17603 17605 551c1f std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 17602->17605 17603->17598 17603->17606 17607 54ebe0 17604->17607 17605->17606 17606->17597 17607->17572 17609 54da9d ___std_exception_copy 17608->17609 17610 54d70d std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 17609->17610 17611 54dab5 17610->17611 17612 5430ac ___std_exception_copy RtlAllocateHeap 17611->17612 17613 54dac2 17612->17613 17613->17577 17613->17579 17615 55455b __Getctype RtlAllocateHeap 17614->17615 17616 54e397 17615->17616 17633 554846 17616->17633 17620 55455b __Getctype RtlAllocateHeap 17619->17620 17621 54ebed 17620->17621 17622 554846 __Getctype RtlAllocateHeap 17621->17622 17623 54ebfd 17622->17623 17623->17538 17625 55455b __Getctype RtlAllocateHeap 17624->17625 17626 54e3e1 17625->17626 17627 554846 __Getctype RtlAllocateHeap 17626->17627 17628 53d556 17627->17628 17628->17541 17629 54ec06 17628->17629 17630 54ec13 ___std_exception_copy 17629->17630 17632 54ec47 __Getctype 17629->17632 17630->17632 17637 558a12 17630->17637 17632->17541 17634 554859 17633->17634 17636 54e3a7 17633->17636 17635 55cab0 __Getctype RtlAllocateHeap 17634->17635 17634->17636 17635->17636 17636->17533 17638 558a20 17637->17638 17639 558a2e 17637->17639 17638->17639 17644 558a48 17638->17644 17640 54be0f __dosmaperr RtlAllocateHeap 17639->17640 17641 558a38 17640->17641 17642 543370 ___std_exception_copy RtlAllocateHeap 17641->17642 17643 558a42 17642->17643 17643->17632 17644->17643 17645 54be0f __dosmaperr RtlAllocateHeap 17644->17645 17645->17641 17647 53f22a ___std_exception_copy RtlAllocateHeap 17646->17647 17648 46300d 17647->17648 17648->17549 17650 543011 17649->17650 17654 542ff7 17649->17654 17651 55455b __Getctype RtlAllocateHeap 17650->17651 17652 543016 17651->17652 17653 554846 __Getctype RtlAllocateHeap 17652->17653 17655 543026 17653->17655 17654->17559 17655->17654 17664 554152 17655->17664 17657 543053 17657->17559 17663 53d8d3 std::_Throw_Cpp_error ___std_exception_copy 17658->17663 17659 53da71 _ValidateLocalCookies 17659->17558 17660 53d8a0 std::_Throw_Cpp_error RtlAllocateHeap 17660->17659 17661 53d9a4 17661->17660 17663->17659 17663->17661 17692 53d8a0 17663->17692 17669 543cbe 17664->17669 17666 55417f _ValidateLocalCookies 17666->17657 17670 543cd5 17669->17670 17671 543cdc 17669->17671 17670->17666 17677 559b6b 17670->17677 17671->17670 17672 55455b __Getctype RtlAllocateHeap 17671->17672 17673 543cfd 17672->17673 17674 554846 __Getctype RtlAllocateHeap 17673->17674 17675 543d13 17674->17675 17684 5548a4 17675->17684 17678 543cbe std::_Throw_Cpp_error 2 API calls 17677->17678 17679 559b8b __fread_nolock 17678->17679 17681 5557ad std::_Locinfo::_Locinfo_ctor 2 API calls 17679->17681 17682 559c47 _ValidateLocalCookies 17679->17682 17683 559bdd __fread_nolock std::_Throw_Cpp_error 17679->17683 17681->17683 17682->17666 17688 53da85 17683->17688 17685 5548b7 17684->17685 17686 5548cc 17684->17686 17685->17686 17687 55addb std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 17685->17687 17686->17670 17687->17686 17689 53da8f 17688->17689 17691 53daa0 17688->17691 17690 54c3a6 ___std_exception_destroy RtlAllocateHeap 17689->17690 17689->17691 17690->17691 17691->17682 17693 53d8a6 17692->17693 17694 53d8b7 17692->17694 17693->17694 17695 54c3a6 ___std_exception_destroy RtlAllocateHeap 17693->17695 17694->17661 17695->17694 16565 469d90 16596 53de82 16565->16596 16567 469dc6 16601 543f30 16567->16601 16570 469ede std::_Throw_Cpp_error 16572 469eb3 16572->16570 16636 543380 16572->16636 16577 547d06 4 API calls 16578 469e63 16577->16578 16583 469e7c 16578->16583 16616 4ccd30 16578->16616 16627 54c7af 16583->16627 16598 462260 Concurrency::cancel_current_task std::_Throw_Cpp_error ___std_exception_copy std::_Facet_Register 16596->16598 16597 53dea1 16597->16567 16597->16597 16598->16597 16639 53f22a 16598->16639 16857 543e6e 16601->16857 16603 469e3d 16603->16572 16604 547d06 16603->16604 16605 547d19 ___std_exception_copy 16604->16605 16881 547a5d 16605->16881 16607 547d2e 16608 5430ac ___std_exception_copy RtlAllocateHeap 16607->16608 16609 469e51 16608->16609 16610 543abb 16609->16610 16611 543ace ___std_exception_copy 16610->16611 17014 5433d1 16611->17014 16613 543ada 16614 5430ac ___std_exception_copy RtlAllocateHeap 16613->16614 16615 469e57 16614->16615 16615->16577 16617 4ccd81 16616->16617 16620 4ccd52 __fread_nolock 16616->16620 16618 4cce87 16617->16618 16621 4ccd90 16617->16621 17076 462300 16618->17076 16620->16583 17062 462d70 16621->17062 16623 543380 std::_Throw_Cpp_error RtlAllocateHeap 16624 4cce91 16623->16624 16625 4ccdd7 __fread_nolock std::_Locinfo::_Locinfo_ctor 16625->16623 16626 4cce3e __fread_nolock std::_Throw_Cpp_error std::_Locinfo::_Locinfo_ctor 16625->16626 16626->16583 17098 54c7cc 16627->17098 16629 469ead 16630 5477b8 16629->16630 16631 5477cb ___std_exception_copy 16630->16631 17222 547693 16631->17222 16633 5477d7 16634 5430ac ___std_exception_copy RtlAllocateHeap 16633->16634 16635 5477e3 16634->16635 16635->16572 16637 5432bc ___std_exception_copy RtlAllocateHeap 16636->16637 16638 54338f __Getctype 16637->16638 16640 53f237 ___std_exception_copy 16639->16640 16644 4622a3 16639->16644 16641 53f264 16640->16641 16640->16644 16645 554039 16640->16645 16654 54c3a6 16641->16654 16644->16567 16646 554047 16645->16646 16647 554055 16645->16647 16646->16647 16652 55406d 16646->16652 16657 54be0f 16647->16657 16649 55405d 16660 543370 16649->16660 16651 554067 16651->16641 16652->16651 16653 54be0f __dosmaperr RtlAllocateHeap 16652->16653 16653->16649 16655 555733 ___std_exception_destroy RtlAllocateHeap 16654->16655 16656 54c3be 16655->16656 16656->16644 16663 5546ac 16657->16663 16768 5432bc 16660->16768 16665 5546b6 __dosmaperr 16663->16665 16664 54be14 16664->16649 16665->16664 16674 554d73 16665->16674 16667 554701 __dosmaperr 16678 555733 16667->16678 16668 5546f9 __dosmaperr 16668->16667 16669 554739 16668->16669 16682 554389 16669->16682 16673 555733 ___std_exception_destroy RtlAllocateHeap 16673->16664 16675 554d80 __dosmaperr std::_Facet_Register 16674->16675 16676 554dab RtlAllocateHeap 16675->16676 16677 554dbe __dosmaperr 16675->16677 16676->16675 16676->16677 16677->16668 16679 555768 16678->16679 16680 55573e __dosmaperr 16678->16680 16679->16664 16680->16679 16681 54be0f __dosmaperr RtlAllocateHeap 16680->16681 16681->16679 16683 5543f7 __dosmaperr 16682->16683 16686 55432f 16683->16686 16685 554420 16685->16673 16687 55433b __fread_nolock std::_Lockit::_Lockit 16686->16687 16690 554510 16687->16690 16689 55435d __dosmaperr 16689->16685 16691 554546 __Getctype 16690->16691 16692 55451f __Getctype 16690->16692 16691->16689 16692->16691 16694 55c864 16692->16694 16695 55c8e4 16694->16695 16697 55c87a 16694->16697 16698 555733 ___std_exception_destroy RtlAllocateHeap 16695->16698 16721 55c932 16695->16721 16697->16695 16702 555733 ___std_exception_destroy RtlAllocateHeap 16697->16702 16703 55c8ad 16697->16703 16699 55c906 16698->16699 16700 555733 ___std_exception_destroy RtlAllocateHeap 16699->16700 16704 55c919 16700->16704 16701 55c940 16707 55c9a0 16701->16707 16719 555733 RtlAllocateHeap ___std_exception_destroy 16701->16719 16708 55c8a2 16702->16708 16709 555733 ___std_exception_destroy RtlAllocateHeap 16703->16709 16720 55c8cf 16703->16720 16710 555733 ___std_exception_destroy RtlAllocateHeap 16704->16710 16705 555733 ___std_exception_destroy RtlAllocateHeap 16706 55c8d9 16705->16706 16711 555733 ___std_exception_destroy RtlAllocateHeap 16706->16711 16712 555733 ___std_exception_destroy RtlAllocateHeap 16707->16712 16722 55bb68 16708->16722 16714 55c8c4 16709->16714 16715 55c927 16710->16715 16711->16695 16716 55c9a6 16712->16716 16750 55bfc7 16714->16750 16718 555733 ___std_exception_destroy RtlAllocateHeap 16715->16718 16716->16691 16718->16721 16719->16701 16720->16705 16762 55c9d5 16721->16762 16723 55bc62 16722->16723 16724 55bb79 16722->16724 16723->16703 16725 55bb8a 16724->16725 16726 555733 ___std_exception_destroy RtlAllocateHeap 16724->16726 16727 55bb9c 16725->16727 16728 555733 ___std_exception_destroy RtlAllocateHeap 16725->16728 16726->16725 16729 55bbae 16727->16729 16731 555733 ___std_exception_destroy RtlAllocateHeap 16727->16731 16728->16727 16730 55bbc0 16729->16730 16732 555733 ___std_exception_destroy RtlAllocateHeap 16729->16732 16733 55bbd2 16730->16733 16734 555733 ___std_exception_destroy RtlAllocateHeap 16730->16734 16731->16729 16732->16730 16735 55bbe4 16733->16735 16736 555733 ___std_exception_destroy RtlAllocateHeap 16733->16736 16734->16733 16737 55bbf6 16735->16737 16739 555733 ___std_exception_destroy RtlAllocateHeap 16735->16739 16736->16735 16738 55bc08 16737->16738 16740 555733 ___std_exception_destroy RtlAllocateHeap 16737->16740 16741 55bc1a 16738->16741 16742 555733 ___std_exception_destroy RtlAllocateHeap 16738->16742 16739->16737 16740->16738 16743 55bc2c 16741->16743 16744 555733 ___std_exception_destroy RtlAllocateHeap 16741->16744 16742->16741 16745 55bc3e 16743->16745 16747 555733 ___std_exception_destroy RtlAllocateHeap 16743->16747 16744->16743 16746 55bc50 16745->16746 16748 555733 ___std_exception_destroy RtlAllocateHeap 16745->16748 16746->16723 16749 555733 ___std_exception_destroy RtlAllocateHeap 16746->16749 16747->16745 16748->16746 16749->16723 16751 55bfd4 16750->16751 16761 55c02c 16750->16761 16752 55bfe4 16751->16752 16754 555733 ___std_exception_destroy RtlAllocateHeap 16751->16754 16753 55bff6 16752->16753 16755 555733 ___std_exception_destroy RtlAllocateHeap 16752->16755 16756 555733 ___std_exception_destroy RtlAllocateHeap 16753->16756 16757 55c008 16753->16757 16754->16752 16755->16753 16756->16757 16758 55c01a 16757->16758 16759 555733 ___std_exception_destroy RtlAllocateHeap 16757->16759 16760 555733 ___std_exception_destroy RtlAllocateHeap 16758->16760 16758->16761 16759->16758 16760->16761 16761->16720 16763 55c9e2 16762->16763 16767 55ca01 16762->16767 16764 55c4ee __Getctype RtlAllocateHeap 16763->16764 16763->16767 16765 55c9fb 16764->16765 16766 555733 ___std_exception_destroy RtlAllocateHeap 16765->16766 16766->16767 16767->16701 16769 5432ce ___std_exception_copy 16768->16769 16774 5432f3 16769->16774 16771 5432e6 16781 5430ac 16771->16781 16775 543303 16774->16775 16778 54330a ___std_exception_copy __Getctype 16774->16778 16787 543111 16775->16787 16777 543318 16777->16771 16778->16777 16779 5432bc ___std_exception_copy RtlAllocateHeap 16778->16779 16780 54337c 16779->16780 16780->16771 16782 5430b8 16781->16782 16783 5430cf 16782->16783 16802 543157 16782->16802 16785 5430e2 16783->16785 16786 543157 ___std_exception_copy RtlAllocateHeap 16783->16786 16785->16651 16786->16785 16788 543121 16787->16788 16791 55475d 16788->16791 16792 554770 __dosmaperr 16791->16792 16793 554d73 __dosmaperr RtlAllocateHeap 16792->16793 16801 543142 16792->16801 16794 5547a0 __dosmaperr 16793->16794 16795 5547a8 __dosmaperr 16794->16795 16796 5547dc 16794->16796 16797 555733 ___std_exception_destroy RtlAllocateHeap 16795->16797 16798 554389 __dosmaperr RtlAllocateHeap 16796->16798 16797->16801 16799 5547e7 16798->16799 16800 555733 ___std_exception_destroy RtlAllocateHeap 16799->16800 16800->16801 16801->16778 16803 543161 16802->16803 16804 54316a 16802->16804 16805 543111 ___std_exception_copy RtlAllocateHeap 16803->16805 16804->16783 16806 543166 16805->16806 16806->16804 16809 54e85a 16806->16809 16808 543173 16810 54e85f std::locale::_Setgloballocale 16809->16810 16811 54e86a std::locale::_Setgloballocale 16810->16811 16815 559d83 16810->16815 16836 54ddf2 16811->16836 16814 54e89d __Getctype std::locale::_Setgloballocale 16814->16808 16818 559d8f __fread_nolock 16815->16818 16816 5546ac __dosmaperr RtlAllocateHeap 16821 559dc0 std::locale::_Setgloballocale 16816->16821 16817 559ddf 16819 54be0f __dosmaperr RtlAllocateHeap 16817->16819 16818->16816 16818->16817 16818->16821 16823 559df1 std::_Lockit::_Lockit std::locale::_Setgloballocale 16818->16823 16820 559de4 16819->16820 16822 543370 ___std_exception_copy RtlAllocateHeap 16820->16822 16821->16817 16821->16823 16835 559dc9 16821->16835 16822->16835 16824 559e64 16823->16824 16825 559f61 std::_Lockit::~_Lockit 16823->16825 16826 559e92 std::locale::_Setgloballocale 16823->16826 16824->16826 16839 55455b 16824->16839 16827 54ddf2 std::locale::_Setgloballocale RtlAllocateHeap 16825->16827 16830 55455b __Getctype RtlAllocateHeap 16826->16830 16833 559ee7 16826->16833 16826->16835 16829 559f74 16827->16829 16830->16833 16832 55455b __Getctype RtlAllocateHeap 16832->16826 16834 55455b __Getctype RtlAllocateHeap 16833->16834 16833->16835 16834->16835 16835->16811 16853 54dc62 16836->16853 16838 54de03 16838->16814 16840 554565 __dosmaperr 16839->16840 16841 554d73 __dosmaperr RtlAllocateHeap 16840->16841 16842 55457b 16840->16842 16844 5545a8 __dosmaperr 16841->16844 16843 55460b 16842->16843 16845 54e85a __Getctype RtlAllocateHeap 16842->16845 16843->16832 16846 5545b0 __dosmaperr 16844->16846 16847 5545e8 16844->16847 16848 554615 16845->16848 16849 555733 ___std_exception_destroy RtlAllocateHeap 16846->16849 16850 554389 __dosmaperr RtlAllocateHeap 16847->16850 16849->16842 16851 5545f3 16850->16851 16852 555733 ___std_exception_destroy RtlAllocateHeap 16851->16852 16852->16842 16854 54dc8f std::locale::_Setgloballocale 16853->16854 16855 54daf3 std::locale::_Setgloballocale RtlAllocateHeap 16854->16855 16856 54dcd8 std::locale::_Setgloballocale 16855->16856 16856->16838 16858 543e7a __fread_nolock 16857->16858 16859 543e81 16858->16859 16862 543ea1 16858->16862 16860 54be0f __dosmaperr RtlAllocateHeap 16859->16860 16861 543e86 16860->16861 16863 543370 ___std_exception_copy RtlAllocateHeap 16861->16863 16864 543ea6 16862->16864 16865 543eb3 16862->16865 16870 543e91 16863->16870 16866 54be0f __dosmaperr RtlAllocateHeap 16864->16866 16871 555008 16865->16871 16866->16870 16868 543ebc 16869 54be0f __dosmaperr RtlAllocateHeap 16868->16869 16868->16870 16869->16870 16870->16603 16872 555014 __fread_nolock std::_Lockit::_Lockit 16871->16872 16875 5550ac 16872->16875 16874 55502f 16874->16868 16880 5550cf __fread_nolock 16875->16880 16876 555115 __fread_nolock std::locale::_Setgloballocale 16876->16874 16877 554d73 __dosmaperr RtlAllocateHeap 16878 555130 16877->16878 16879 555733 ___std_exception_destroy RtlAllocateHeap 16878->16879 16879->16876 16880->16876 16880->16877 16880->16880 16883 547a69 __fread_nolock 16881->16883 16882 547a6f 16884 5432f3 ___std_exception_copy RtlAllocateHeap 16882->16884 16883->16882 16885 547ab2 __fread_nolock 16883->16885 16887 547a8a 16884->16887 16888 547be0 16885->16888 16887->16607 16889 547c06 16888->16889 16890 547bf3 16888->16890 16897 547b07 16889->16897 16890->16887 16892 547c29 16893 547cb7 16892->16893 16901 5441a1 16892->16901 16893->16887 16898 547b18 16897->16898 16899 547b70 16897->16899 16898->16899 16910 54cd0d 16898->16910 16899->16892 16902 5441ba 16901->16902 16906 5441e1 16901->16906 16902->16906 16937 554902 16902->16937 16904 5441d6 16944 553d0c 16904->16944 16907 54cd4d 16906->16907 16908 54cc2c __fread_nolock 2 API calls 16907->16908 16909 54cd66 16908->16909 16909->16893 16911 54cd21 ___std_exception_copy 16910->16911 16916 54cc2c 16911->16916 16913 54cd36 16914 5430ac ___std_exception_copy RtlAllocateHeap 16913->16914 16915 54cd45 16914->16915 16915->16899 16921 55905e 16916->16921 16918 54cc3e 16919 54cc5a SetFilePointerEx 16918->16919 16920 54cc46 __fread_nolock 16918->16920 16919->16920 16920->16913 16922 559080 16921->16922 16923 55906b 16921->16923 16926 54bdfc __dosmaperr RtlAllocateHeap 16922->16926 16928 5590a5 16922->16928 16934 54bdfc 16923->16934 16929 5590b0 16926->16929 16927 54be0f __dosmaperr RtlAllocateHeap 16930 559078 16927->16930 16928->16918 16931 54be0f __dosmaperr RtlAllocateHeap 16929->16931 16930->16918 16932 5590b8 16931->16932 16933 543370 ___std_exception_copy RtlAllocateHeap 16932->16933 16933->16930 16935 5546ac __dosmaperr RtlAllocateHeap 16934->16935 16936 54be01 16935->16936 16936->16927 16938 554923 16937->16938 16939 55490e 16937->16939 16938->16904 16940 54be0f __dosmaperr RtlAllocateHeap 16939->16940 16941 554913 16940->16941 16942 543370 ___std_exception_copy RtlAllocateHeap 16941->16942 16943 55491e 16942->16943 16943->16904 16945 553d18 __fread_nolock 16944->16945 16946 553d59 16945->16946 16948 553d9f 16945->16948 16950 553d20 16945->16950 16947 5432f3 ___std_exception_copy RtlAllocateHeap 16946->16947 16947->16950 16948->16950 16951 553e1d 16948->16951 16950->16906 16952 553e45 16951->16952 16963 553e68 __fread_nolock 16951->16963 16953 553e49 16952->16953 16955 553ea4 16952->16955 16954 5432f3 ___std_exception_copy RtlAllocateHeap 16953->16954 16954->16963 16956 553ec2 16955->16956 16957 54cd4d 2 API calls 16955->16957 16965 553962 16956->16965 16957->16956 16960 553f21 16962 553f8a WriteFile 16960->16962 16960->16963 16961 553eda 16961->16963 16970 553533 16961->16970 16962->16963 16963->16950 16976 55e301 16965->16976 16967 553974 16968 5539a2 16967->16968 16985 5488e0 16967->16985 16968->16960 16968->16961 16971 55359c 16970->16971 16972 5488e0 std::_Locinfo::_Locinfo_ctor 2 API calls 16971->16972 16975 5535ac std::_Locinfo::_Locinfo_ctor 16971->16975 16972->16975 16973 556e3e RtlAllocateHeap RtlAllocateHeap 16973->16975 16974 553862 _ValidateLocalCookies 16974->16963 16974->16974 16975->16973 16975->16974 16977 55e30e 16976->16977 16978 55e31b 16976->16978 16979 54be0f __dosmaperr RtlAllocateHeap 16977->16979 16981 55e327 16978->16981 16982 54be0f __dosmaperr RtlAllocateHeap 16978->16982 16980 55e313 16979->16980 16980->16967 16981->16967 16983 55e348 16982->16983 16984 543370 ___std_exception_copy RtlAllocateHeap 16983->16984 16984->16980 16986 543157 ___std_exception_copy RtlAllocateHeap 16985->16986 16987 5488f0 16986->16987 16992 554873 16987->16992 16993 54890d 16992->16993 16994 55488a 16992->16994 16996 5548d1 16993->16996 16994->16993 17000 55cab0 16994->17000 16997 54891a 16996->16997 16998 5548e8 16996->16998 16997->16968 16998->16997 17009 55addb 16998->17009 17001 55cabc __fread_nolock 17000->17001 17002 55455b __Getctype RtlAllocateHeap 17001->17002 17004 55cac5 std::_Lockit::_Lockit 17002->17004 17003 55cb0b 17003->16993 17004->17003 17005 55cb31 __Getctype RtlAllocateHeap 17004->17005 17006 55caf4 __Getctype 17005->17006 17006->17003 17007 54e85a __Getctype RtlAllocateHeap 17006->17007 17008 55cb30 17007->17008 17010 55455b __Getctype RtlAllocateHeap 17009->17010 17011 55ade0 17010->17011 17012 55acf3 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 17011->17012 17013 55adeb 17012->17013 17013->16997 17015 5433dd __fread_nolock 17014->17015 17016 5433e4 17015->17016 17017 543405 __fread_nolock 17015->17017 17018 5432f3 ___std_exception_copy RtlAllocateHeap 17016->17018 17021 5434e0 17017->17021 17020 5433fd 17018->17020 17020->16613 17024 543512 17021->17024 17023 5434f2 17023->17020 17025 543521 17024->17025 17026 543549 17024->17026 17027 5432f3 ___std_exception_copy RtlAllocateHeap 17025->17027 17028 554902 __fread_nolock RtlAllocateHeap 17026->17028 17036 54353c __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 17027->17036 17029 543552 17028->17029 17037 54ccef 17029->17037 17032 5435fc 17040 54387e 17032->17040 17034 543613 17034->17036 17048 5436b3 17034->17048 17036->17023 17055 54cb07 17037->17055 17039 543570 17039->17032 17039->17034 17039->17036 17041 54388d 17040->17041 17042 554902 __fread_nolock RtlAllocateHeap 17041->17042 17043 5438a9 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 17042->17043 17044 54ccef 2 API calls 17043->17044 17047 5438b5 _ValidateLocalCookies 17043->17047 17045 543909 17044->17045 17046 54ccef 2 API calls 17045->17046 17045->17047 17046->17047 17047->17036 17049 554902 __fread_nolock RtlAllocateHeap 17048->17049 17050 5436c6 17049->17050 17051 54ccef 2 API calls 17050->17051 17054 543710 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 17050->17054 17052 54376d 17051->17052 17053 54ccef 2 API calls 17052->17053 17052->17054 17053->17054 17054->17036 17056 54cb13 __fread_nolock 17055->17056 17057 54cb56 17056->17057 17059 54cb1b 17056->17059 17060 54cb9c 17056->17060 17058 5432f3 ___std_exception_copy RtlAllocateHeap 17057->17058 17058->17059 17059->17039 17060->17059 17061 54cc2c __fread_nolock 2 API calls 17060->17061 17061->17059 17063 462da6 17062->17063 17064 462d82 17062->17064 17067 462db8 17063->17067 17070 53de82 std::_Facet_Register RtlAllocateHeap 17063->17070 17065 462dbf 17064->17065 17066 462d89 17064->17066 17085 462260 17065->17085 17069 53de82 std::_Facet_Register RtlAllocateHeap 17066->17069 17067->16625 17072 462d8f 17069->17072 17071 462db0 17070->17071 17071->16625 17073 543380 std::_Throw_Cpp_error RtlAllocateHeap 17072->17073 17074 462d98 17072->17074 17075 462dc9 17073->17075 17074->16625 17089 53c4f9 17076->17089 17086 46226e Concurrency::cancel_current_task std::_Throw_Cpp_error 17085->17086 17087 53f22a ___std_exception_copy RtlAllocateHeap 17086->17087 17088 4622a3 17087->17088 17088->17072 17092 53c2bf 17089->17092 17091 53c50a std::_Throw_Cpp_error 17095 462fa0 17092->17095 17096 53f22a ___std_exception_copy RtlAllocateHeap 17095->17096 17097 462fcd 17096->17097 17097->17091 17099 54c7d8 __fread_nolock 17098->17099 17100 54c822 __fread_nolock 17099->17100 17101 54c7eb __fread_nolock 17099->17101 17106 54c810 __fread_nolock 17099->17106 17107 54c5d6 17100->17107 17102 54be0f __dosmaperr RtlAllocateHeap 17101->17102 17104 54c805 17102->17104 17105 543370 ___std_exception_copy RtlAllocateHeap 17104->17105 17105->17106 17106->16629 17108 54c605 17107->17108 17111 54c5e8 __fread_nolock 17107->17111 17108->17106 17109 54c5f5 17110 54be0f __dosmaperr RtlAllocateHeap 17109->17110 17118 54c5fa 17110->17118 17111->17108 17111->17109 17113 54c646 __fread_nolock 17111->17113 17112 543370 ___std_exception_copy RtlAllocateHeap 17112->17108 17113->17108 17115 554902 __fread_nolock RtlAllocateHeap 17113->17115 17116 54c771 __fread_nolock 17113->17116 17120 552fa4 17113->17120 17179 5475fb 17113->17179 17115->17113 17117 54be0f __dosmaperr RtlAllocateHeap 17116->17117 17117->17118 17118->17112 17121 552fb6 17120->17121 17122 552fce 17120->17122 17123 54bdfc __dosmaperr RtlAllocateHeap 17121->17123 17124 553310 17122->17124 17127 553011 17122->17127 17126 552fbb 17123->17126 17125 54bdfc __dosmaperr RtlAllocateHeap 17124->17125 17128 553315 17125->17128 17129 54be0f __dosmaperr RtlAllocateHeap 17126->17129 17130 55301c 17127->17130 17134 552fc3 17127->17134 17138 55304c 17127->17138 17131 54be0f __dosmaperr RtlAllocateHeap 17128->17131 17129->17134 17132 54bdfc __dosmaperr RtlAllocateHeap 17130->17132 17133 553029 17131->17133 17135 553021 17132->17135 17137 543370 ___std_exception_copy RtlAllocateHeap 17133->17137 17134->17113 17136 54be0f __dosmaperr RtlAllocateHeap 17135->17136 17136->17133 17137->17134 17139 553065 17138->17139 17140 5530a0 17138->17140 17141 553072 17138->17141 17139->17141 17142 55308e 17139->17142 17193 5557ad 17140->17193 17143 54bdfc __dosmaperr RtlAllocateHeap 17141->17143 17146 55e301 __fread_nolock RtlAllocateHeap 17142->17146 17145 553077 17143->17145 17148 54be0f __dosmaperr RtlAllocateHeap 17145->17148 17162 5531ec 17146->17162 17149 55307e 17148->17149 17151 543370 ___std_exception_copy RtlAllocateHeap 17149->17151 17150 555733 ___std_exception_destroy RtlAllocateHeap 17152 5530ba 17150->17152 17178 553089 __fread_nolock 17151->17178 17154 555733 ___std_exception_destroy RtlAllocateHeap 17152->17154 17153 553264 ReadFile 17155 55327c 17153->17155 17156 5532d8 17153->17156 17157 5530c1 17154->17157 17155->17156 17167 553255 17155->17167 17165 5532e5 17156->17165 17166 553236 17156->17166 17158 5530e6 17157->17158 17159 5530cb 17157->17159 17161 54cd0d __fread_nolock 2 API calls 17158->17161 17163 54be0f __dosmaperr RtlAllocateHeap 17159->17163 17160 555733 ___std_exception_destroy RtlAllocateHeap 17160->17134 17161->17142 17162->17153 17172 55321c 17162->17172 17164 5530d0 17163->17164 17168 54bdfc __dosmaperr RtlAllocateHeap 17164->17168 17169 54be0f __dosmaperr RtlAllocateHeap 17165->17169 17166->17178 17199 54bdb5 17166->17199 17170 5532a1 17167->17170 17171 5532b8 17167->17171 17167->17178 17168->17178 17173 5532ea 17169->17173 17204 552cb6 17170->17204 17171->17178 17214 552afc 17171->17214 17172->17166 17172->17167 17177 54bdfc __dosmaperr RtlAllocateHeap 17173->17177 17177->17178 17178->17160 17180 54760c 17179->17180 17189 547608 std::_Locinfo::_Locinfo_ctor 17179->17189 17181 547613 17180->17181 17184 547626 __fread_nolock 17180->17184 17182 54be0f __dosmaperr RtlAllocateHeap 17181->17182 17183 547618 17182->17183 17185 543370 ___std_exception_copy RtlAllocateHeap 17183->17185 17186 547654 17184->17186 17187 54765d 17184->17187 17184->17189 17185->17189 17188 54be0f __dosmaperr RtlAllocateHeap 17186->17188 17187->17189 17191 54be0f __dosmaperr RtlAllocateHeap 17187->17191 17190 547659 17188->17190 17189->17113 17192 543370 ___std_exception_copy RtlAllocateHeap 17190->17192 17191->17190 17192->17189 17194 5557eb 17193->17194 17198 5557bb __dosmaperr std::_Facet_Register 17193->17198 17195 54be0f __dosmaperr RtlAllocateHeap 17194->17195 17197 5530b1 17195->17197 17196 5557d6 RtlAllocateHeap 17196->17197 17196->17198 17197->17150 17198->17194 17198->17196 17200 54bdfc __dosmaperr RtlAllocateHeap 17199->17200 17201 54bdc0 __dosmaperr 17200->17201 17202 54be0f __dosmaperr RtlAllocateHeap 17201->17202 17203 54bdd3 17202->17203 17203->17178 17218 5529af 17204->17218 17207 552d58 17210 552d12 __fread_nolock 17207->17210 17212 54cd0d __fread_nolock 2 API calls 17207->17212 17208 552d48 17209 54be0f __dosmaperr RtlAllocateHeap 17208->17209 17211 552cfe 17209->17211 17210->17211 17213 54bdb5 __dosmaperr RtlAllocateHeap 17210->17213 17211->17178 17212->17210 17213->17211 17215 552b36 17214->17215 17216 552bc7 17215->17216 17217 54cd0d __fread_nolock 2 API calls 17215->17217 17216->17178 17217->17216 17219 5529e3 17218->17219 17220 54cd0d __fread_nolock 2 API calls 17219->17220 17221 552a4f 17219->17221 17220->17221 17221->17207 17221->17208 17221->17210 17221->17211 17223 54769f __fread_nolock 17222->17223 17224 5476a9 17223->17224 17226 5476cc __fread_nolock 17223->17226 17225 5432f3 ___std_exception_copy RtlAllocateHeap 17224->17225 17228 5476c4 17225->17228 17226->17228 17229 54772a 17226->17229 17228->16633 17230 547737 17229->17230 17231 54775a 17229->17231 17232 5432f3 ___std_exception_copy RtlAllocateHeap 17230->17232 17233 5441a1 4 API calls 17231->17233 17241 547752 17231->17241 17232->17241 17234 547772 17233->17234 17243 55576d 17234->17243 17237 554902 __fread_nolock RtlAllocateHeap 17238 547786 17237->17238 17247 5533c0 17238->17247 17241->17228 17242 555733 ___std_exception_destroy RtlAllocateHeap 17242->17241 17244 555784 17243->17244 17245 54777a 17243->17245 17244->17245 17246 555733 ___std_exception_destroy RtlAllocateHeap 17244->17246 17245->17237 17246->17245 17248 5533e9 17247->17248 17253 54778d 17247->17253 17249 553438 17248->17249 17251 553410 17248->17251 17250 5432f3 ___std_exception_copy RtlAllocateHeap 17249->17250 17250->17253 17254 55332f 17251->17254 17253->17241 17253->17242 17255 55333b __fread_nolock 17254->17255 17257 55337a 17255->17257 17258 553493 17255->17258 17257->17253 17259 55905e __fread_nolock RtlAllocateHeap 17258->17259 17261 5534a3 17259->17261 17263 55905e __fread_nolock RtlAllocateHeap 17261->17263 17268 5534db 17261->17268 17269 5534a9 17261->17269 17262 55905e __fread_nolock RtlAllocateHeap 17264 5534e7 FindCloseChangeNotification 17262->17264 17266 5534d2 17263->17266 17264->17269 17265 553501 __fread_nolock 17265->17257 17267 55905e __fread_nolock RtlAllocateHeap 17266->17267 17267->17268 17268->17262 17268->17269 17270 558fcd 17269->17270 17271 558fdc 17270->17271 17272 54be0f __dosmaperr RtlAllocateHeap 17271->17272 17275 559006 17271->17275 17273 559048 17272->17273 17274 54bdfc __dosmaperr RtlAllocateHeap 17273->17274 17274->17275 17275->17265 17696 4c3320 GetCursorPos 17697 4c3335 GetCursorPos 17696->17697 17698 4c3408 GetPEB 17697->17698 17701 4c3347 17697->17701 17698->17701 17699 4c3353 GetPEB 17699->17701 17700 4c347d Sleep 17700->17697 17701->17698 17701->17699 17701->17700 17701->17701 17702 4c33c8 Sleep 17701->17702 17703 4c34a7 17701->17703 17702->17701

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 200 4c3320-4c3333 GetCursorPos 201 4c3335-4c3341 GetCursorPos 200->201 202 4c3408-4c3411 GetPEB 201->202 203 4c3347-4c334d 201->203 204 4c3414-4c3428 202->204 203->202 205 4c3353-4c335f GetPEB 203->205 206 4c3479-4c347b 204->206 207 4c342a-4c342f 204->207 208 4c3360-4c3374 205->208 206->204 207->206 211 4c3431-4c3439 207->211 209 4c33c4-4c33c6 208->209 210 4c3376-4c337b 208->210 209->208 210->209 213 4c337d-4c3383 210->213 212 4c3440-4c3453 211->212 214 4c3455-4c3468 212->214 215 4c3472-4c3477 212->215 216 4c3385-4c3398 213->216 214->214 217 4c346a-4c3470 214->217 215->206 215->212 218 4c33bd-4c33c2 216->218 219 4c339a 216->219 217->215 220 4c347d-4c34a2 Sleep 217->220 218->209 218->216 221 4c33a0-4c33b3 219->221 220->201 221->221 222 4c33b5-4c33bb 221->222 222->218 223 4c33c8-4c33ee Sleep 222->223 224 4c33f4-4c33fa 223->224 224->202 225 4c33fc-4c3402 224->225 225->202 226 4c34a7-4c34b8 call 466b80 225->226 229 4c34be 226->229 230 4c34ba-4c34bc 226->230 231 4c34c0-4c34dd call 466b80 229->231 230->231
                                  APIs
                                  • GetCursorPos.USER32(?), ref: 004C3333
                                  • GetCursorPos.USER32(?), ref: 004C3339
                                  • Sleep.KERNELBASE(000003E9,?,00000001,00000000,?,?,?,?,?,?,?,?,004C3698), ref: 004C33E8
                                  • Sleep.KERNELBASE(00000001,?,00000001,00000000,?,?,?,?,?,?,?,?,004C3698), ref: 004C349A
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3375376710.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 0000000C.00000002.3375348356.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375376710.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375571059.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376116862.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376304167.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376338358.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CursorSleep
                                  • String ID:
                                  • API String ID: 4211308429-0
                                  • Opcode ID: b4de5810029956a59720bcf2270dfec89371c70174376176d90aea493a4d671a
                                  • Instruction ID: e278dba0085ff63259e53feaab331d49bc5fdd74d4d8daf24dd467b41a04aef3
                                  • Opcode Fuzzy Hash: b4de5810029956a59720bcf2270dfec89371c70174376176d90aea493a4d671a
                                  • Instruction Fuzzy Hash: D451CB39A042558FCB29CF48C4D0FAAB7B1EF45705B19809ED845AB322DB35EE05CB94

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 47e5c0-47e5e5 1 47ea72-47ea84 0->1 2 47e5eb-47e5f7 0->2 3 47e600-47e608 2->3 4 47e645-47e68a setsockopt recv 3->4 5 47e60a-47e616 3->5 4->1 12 47e690-47e693 4->12 6 47e61e-47e62a 5->6 7 47e618 5->7 9 47e632 call 47d4a0 6->9 10 47e62c 6->10 7->6 13 47e637-47e63f 9->13 10->9 14 47e9d9-47ea00 call 53d879 call 562870 12->14 15 47e699-47e6d6 call 4ccd30 12->15 13->4 16 47ea5d-47ea6c Sleep 13->16 26 47ea02 14->26 27 47ea49 14->27 24 47e6db-47e6eb recv 15->24 25 47e6d8 15->25 16->1 16->3 28 47e983-47e990 24->28 29 47e6f1-47e6f8 24->29 25->24 30 47ea04-47ea0a 26->30 31 47ea0c-47ea35 call 47d9c0 26->31 34 47ea4f-47ea57 Sleep 27->34 28->34 35 47e996-47e9a2 28->35 32 47e6fd-47e70d recv 29->32 33 47e6fa 29->33 30->27 30->31 43 47ea3a-47ea43 31->43 32->28 36 47e713-47e71f 32->36 33->32 34->16 37 47e9a4-47e9b2 35->37 38 47e9b8-47e9c2 call 53e103 35->38 40 47e723-47e747 36->40 41 47e721 36->41 37->38 38->34 44 47e79d-47e7a3 40->44 45 47e749-47e786 call 4ccd30 setsockopt 40->45 41->40 43->27 48 47e7a7-47e7cb call 4ca6b0 44->48 49 47e7a5 44->49 52 47e78b-47e79a recv 45->52 53 47e788 45->53 55 47e8f5-47e955 call 47ddc0 48->55 56 47e7d1-47e7de 48->56 49->48 52->44 53->52 55->28 64 47e957-47e963 55->64 58 47e7e2-47e7ed 56->58 59 47e7e0 56->59 62 47e7f1-47e8e3 58->62 63 47e7ef 58->63 59->58 68 47e8e7-47e8ef 62->68 69 47e8e5 62->69 63->62 66 47e965-47e973 64->66 67 47e979-47e980 call 53e103 64->67 66->67 67->28 68->55 68->56 69->68
                                  APIs
                                  • setsockopt.WS2_32(000002DC,0000FFFF,00001006,?,00000008), ref: 0047E664
                                  • recv.WS2_32(?,00000004,00000002), ref: 0047E67B
                                  • recv.WS2_32(?,0000000C,00000002,0000000C), ref: 0047E6E6
                                  • recv.WS2_32(?,0000000C,00000008), ref: 0047E708
                                  • setsockopt.WS2_32(0000FFFF,00001006,?,00000008,?), ref: 0047E77D
                                  • recv.WS2_32(?,?,00000008), ref: 0047E795
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3375376710.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 0000000C.00000002.3375348356.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375376710.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375571059.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376116862.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376304167.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376338358.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: recv$setsockopt
                                  • String ID: \"Y
                                  • API String ID: 833079357-803381686
                                  • Opcode ID: 884f003343b1b5e70fe3f4a176718300f533df8d41ba69be50387d13f7ee043f
                                  • Instruction ID: 9a25225df0bc18de12a847be973f98009b81472513c91c925a93da1d22e65554
                                  • Opcode Fuzzy Hash: 884f003343b1b5e70fe3f4a176718300f533df8d41ba69be50387d13f7ee043f
                                  • Instruction Fuzzy Hash: 37C1AEB0D00208AFDB14DFA9DC85BADBBB1FB48310F10866AE419AB391D7746C49DB94

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 72 47d9c0-47da00 call 4ca6b0 75 47da06-47da0d 72->75 76 47db2c-47db6e call 4ca570 72->76 78 47da11-47da22 75->78 79 47da0f 75->79 85 47db70-47db7c 76->85 86 47db9c-47dbd1 call 466b80 76->86 81 47da26-47da2d 78->81 82 47da24 78->82 79->78 83 47da2f-47da31 81->83 84 47da3e-47da40 81->84 82->81 87 47da35-47da39 83->87 88 47da33 83->88 89 47da44-47da4b 84->89 90 47da42 84->90 91 47db92-47db99 call 53e103 85->91 92 47db7e-47db8c 85->92 100 47dbd3-47dbdd 86->100 101 47dbe8-47dbf0 call 4ccd30 86->101 95 47db1d 87->95 88->87 96 47da4d-47da4f 89->96 97 47da5c-47da5e 89->97 90->89 91->86 92->91 98 47ddb1 call 543380 92->98 102 47db20-47db26 95->102 104 47da53-47da57 96->104 105 47da51 96->105 106 47da62-47da69 97->106 107 47da60 97->107 112 47ddb6-47ddbb call 543380 98->112 109 47dbe2-47dbe6 100->109 110 47dbdf 100->110 117 47dbf5-47dbfc 101->117 102->75 102->76 104->95 105->104 113 47da6b-47da6d 106->113 114 47da7a-47da7c 106->114 107->106 109->117 110->109 119 47da71-47da75 113->119 120 47da6f 113->120 115 47da80-47da87 114->115 116 47da7e 114->116 121 47da89-47da8b 115->121 122 47da98-47da9a 115->122 116->115 123 47dc01-47dc11 117->123 124 47dbfe 117->124 119->95 120->119 126 47da8f-47da93 121->126 127 47da8d 121->127 128 47da9e-47daa5 122->128 129 47da9c 122->129 130 47dc16-47dc2f call 466b80 123->130 131 47dc13 123->131 124->123 126->95 127->126 132 47daa7-47daa9 128->132 133 47dab3-47dab5 128->133 129->128 140 47dc34-47dc4b call 466b80 130->140 141 47dc31 130->141 131->130 135 47daad-47dab1 132->135 136 47daab 132->136 138 47dab7 133->138 139 47dab9-47dac0 133->139 135->95 136->135 138->139 142 47dac2-47dac4 139->142 143 47dace-47dad0 139->143 152 47dc81-47dc97 call 466b80 140->152 153 47dc4d-47dc54 140->153 141->140 144 47dac6 142->144 145 47dac8-47dacc 142->145 146 47dad4-47dadb 143->146 147 47dad2 143->147 144->145 145->95 150 47dadd-47dadf 146->150 151 47dae9-47daeb 146->151 147->146 154 47dae3-47dae7 150->154 155 47dae1 150->155 156 47daef-47daf6 151->156 157 47daed 151->157 172 47dd24 152->172 173 47dc9d-47dca9 152->173 158 47dc56 153->158 159 47dc59-47dc60 153->159 154->95 155->154 161 47db04-47db06 156->161 162 47daf8-47dafa 156->162 157->156 158->159 163 47dc65-47dc7e call 466b80 call 53fb40 159->163 164 47dc62 159->164 168 47db0a-47db0e 161->168 169 47db08 161->169 166 47dafe-47db02 162->166 167 47dafc 162->167 163->152 164->163 166->95 167->166 168->102 170 47db10-47db15 168->170 169->168 174 47db17 170->174 175 47db19 170->175 176 47dd26-47dd2c 172->176 178 47dcb0-47dcbe 173->178 174->175 175->95 179 47dd56-47dd6e 176->179 180 47dd2e-47dd3a 176->180 182 47dcc3-47dcdd 178->182 183 47dcc0 178->183 188 47dd70-47dd7c 179->188 189 47dd9e-47ddb0 179->189 185 47dd4c-47dd53 call 53e103 180->185 186 47dd3c-47dd4a 180->186 184 47dce1-47dcec 182->184 183->182 184->184 190 47dcee-47dd18 GetModuleHandleA GetProcAddress WSASend 184->190 185->179 186->112 186->185 192 47dd94-47dd9b call 53e103 188->192 193 47dd7e-47dd8c 188->193 195 47dd90-47dd92 190->195 196 47dd1a-47dd22 190->196 192->189 193->112 198 47dd8e 193->198 195->176 196->172 196->178 198->192
                                  APIs
                                  • GetModuleHandleA.KERNEL32(Ws2_32.dll,?,?,?,?,?,00000000,-005927F8), ref: 0047DCF7
                                  • GetProcAddress.KERNEL32(00000000,FEEDF8FD), ref: 0047DCFE
                                  • WSASend.WS2_32(0000000F,?,00000001,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,-005927F8), ref: 0047DD13
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3375376710.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 0000000C.00000002.3375348356.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375376710.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375571059.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376116862.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376304167.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376338358.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressHandleModuleProcSend
                                  • String ID: 131$Ws2_32.dll$\$\"Y$t#Y
                                  • API String ID: 2819740048-2542141955
                                  • Opcode ID: f68b85c2ed489ee7243be54f5fbf67b910d9b898fff704496cd34e91a209d290
                                  • Instruction ID: 740b92406a79477fb821970b768fa2f34c0729e6ad47074b1d4164d49753709d
                                  • Opcode Fuzzy Hash: f68b85c2ed489ee7243be54f5fbf67b910d9b898fff704496cd34e91a209d290
                                  • Instruction Fuzzy Hash: 07D1FF71D142588FCB25CBA4C8857EEBBB0BF06310F19815ED849BB385E3792D46CB99

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 234 47d4a0-47d4d2 WSAStartup 235 47d5b7-47d5c0 234->235 236 47d4d8-47d502 call 466b80 * 2 234->236 241 47d504-47d508 236->241 242 47d50e-47d565 236->242 241->235 241->242 244 47d567-47d56d 242->244 245 47d5b1 242->245 246 47d5c5-47d5cf 244->246 247 47d56f 244->247 245->235 246->245 251 47d5d1-47d5d9 246->251 248 47d575-47d589 socket 247->248 248->245 250 47d58b-47d59b connect 248->250 252 47d5c1 250->252 253 47d59d-47d5a5 closesocket 250->253 252->246 253->248 254 47d5a7-47d5ab 253->254 254->245
                                  APIs
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3375376710.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 0000000C.00000002.3375348356.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375376710.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375571059.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376116862.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376304167.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376338358.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Startupclosesocketconnectsocket
                                  • String ID:
                                  • API String ID: 3098855095-0
                                  • Opcode ID: 9e068281c3ad265281c45d507b5aa519fc99fca1261778d46c928f27c294a10d
                                  • Instruction ID: d2e22feb16d068cd8fd9ca9774753e3c76a7c4ec6e2007528c76219c44bbb25f
                                  • Opcode Fuzzy Hash: 9e068281c3ad265281c45d507b5aa519fc99fca1261778d46c928f27c294a10d
                                  • Instruction Fuzzy Hash: 1031C271505300ABD7209F258C49B6BB7F4EF85328F005F1EF9A8932D0D37599088B96

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 255 553e1d-553e3f 256 553e45-553e47 255->256 257 554032 255->257 259 553e73-553e96 256->259 260 553e49-553e68 call 5432f3 256->260 258 554034-554038 257->258 262 553e9c-553ea2 259->262 263 553e98-553e9a 259->263 268 553e6b-553e6e 260->268 262->260 264 553ea4-553eb5 262->264 263->262 263->264 266 553eb7-553ec5 call 54cd4d 264->266 267 553ec8-553ed8 call 553962 264->267 266->267 273 553f21-553f33 267->273 274 553eda-553ee0 267->274 268->258 275 553f35-553f3b 273->275 276 553f8a-553faa WriteFile 273->276 277 553ee2-553ee5 274->277 278 553f09-553f1f call 553533 274->278 279 553f76-553f88 call 5539df 275->279 280 553f3d-553f40 275->280 283 553fb5 276->283 284 553fac-553fb2 276->284 281 553ee7-553eea 277->281 282 553ef0-553eff call 5538fa 277->282 294 553f02-553f04 278->294 306 553f5d-553f60 279->306 288 553f62-553f74 call 553ba3 280->288 289 553f42-553f45 280->289 281->282 290 553fca-553fcd 281->290 282->294 287 553fb8-553fc3 283->287 284->283 295 553fc5-553fc8 287->295 296 55402d-554030 287->296 288->306 297 553fd0-553fd2 289->297 298 553f4b-553f58 call 553aba 289->298 290->297 294->287 295->290 296->258 303 553fd4-553fd9 297->303 304 554000-55400c 297->304 298->306 307 553ff2-553ffb call 54bdd8 303->307 308 553fdb-553fed 303->308 309 554016-554028 304->309 310 55400e-554014 304->310 306->294 307->268 308->268 309->268 310->257 310->309
                                  APIs
                                  • WriteFile.KERNELBASE(?,00000000,00547C57,?,00000000,00000000,00000000,?,00000000,?,00469F4B,W|T,00000000,00469F4B,?,?), ref: 00553FA3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3375376710.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 0000000C.00000002.3375348356.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375376710.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375571059.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376116862.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376304167.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376338358.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FileWrite
                                  • String ID: W|T
                                  • API String ID: 3934441357-2034123312
                                  • Opcode ID: e749a4aaffcbfb38f7a8b16dfd40fb715e34b0a8c8d94e1024ecf9d9b3e9bde7
                                  • Instruction ID: 0293c524745c6202c46845b1c1bc22630e96d7031ec30680120f9c37065c8dcc
                                  • Opcode Fuzzy Hash: e749a4aaffcbfb38f7a8b16dfd40fb715e34b0a8c8d94e1024ecf9d9b3e9bde7
                                  • Instruction Fuzzy Hash: 686102B1C0410AAFDF11DFA8C895AEEBFB9BF49345F140586ED08AB251D335DA09CB60

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 313 552fa4-552fb4 314 552fb6-552fc9 call 54bdfc call 54be0f 313->314 315 552fce-552fd0 313->315 333 553328 314->333 317 552fd6-552fdc 315->317 318 553310-55331d call 54bdfc call 54be0f 315->318 317->318 321 552fe2-55300b 317->321 336 553323 call 543370 318->336 321->318 322 553011-55301a 321->322 325 553034-553036 322->325 326 55301c-55302f call 54bdfc call 54be0f 322->326 331 55330c-55330e 325->331 332 55303c-553040 325->332 326->336 334 55332b-55332e 331->334 332->331 337 553046-55304a 332->337 333->334 336->333 337->326 340 55304c-553063 337->340 342 553065-553068 340->342 343 553098-55309e 340->343 346 55308e-553096 342->346 347 55306a-553070 342->347 344 5530a0-5530a7 343->344 345 553072-553089 call 54bdfc call 54be0f call 543370 343->345 349 5530a9 344->349 350 5530ab-5530ac call 5557ad 344->350 374 553243 345->374 348 55310b-55312a 346->348 347->345 347->346 352 5531e6-5531ef call 55e301 348->352 353 553130-55313c 348->353 349->350 358 5530b1-5530c9 call 555733 * 2 350->358 365 5531f1-553203 352->365 366 553260 352->366 353->352 357 553142-553144 353->357 357->352 362 55314a-55316b 357->362 383 5530e6-553109 call 54cd0d 358->383 384 5530cb-5530e1 call 54be0f call 54bdfc 358->384 362->352 367 55316d-553183 362->367 365->366 370 553205-553214 365->370 371 553264-55327a ReadFile 366->371 367->352 372 553185-553187 367->372 370->366 387 553216-55321a 370->387 375 55327c-553282 371->375 376 5532d8-5532e3 371->376 372->352 377 553189-5531ac 372->377 379 553246-553250 call 555733 374->379 375->376 381 553284 375->381 396 5532e5-5532f7 call 54be0f call 54bdfc 376->396 397 5532fc-5532ff 376->397 377->352 382 5531ae-5531c4 377->382 379->334 389 553287-553299 381->389 382->352 390 5531c6-5531c8 382->390 383->348 384->374 387->371 395 55321c-553234 387->395 389->379 398 55329b-55329f 389->398 390->352 399 5531ca-5531e1 390->399 415 553255-55325e 395->415 416 553236 395->416 396->374 404 553305-553307 397->404 405 55323c-553242 call 54bdb5 397->405 402 5532a1-5532b1 call 552cb6 398->402 403 5532b8-5532c5 398->403 399->352 423 5532b4-5532b6 402->423 406 5532c7 call 552e0d 403->406 407 5532d1-5532d6 call 552afc 403->407 404->379 405->374 420 5532cc-5532cf 406->420 407->420 415->389 416->405 420->423 423->379
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3375376710.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 0000000C.00000002.3375348356.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375376710.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375571059.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376116862.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376304167.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376338358.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 19270a06a8a1005ac99e5dceea41f38d814de2f70999fa3743eeef15cac0c450
                                  • Instruction ID: 1dde382f468cdb04fd93373fbfbf355035a507493b88d6f12014c9eeb72de575
                                  • Opcode Fuzzy Hash: 19270a06a8a1005ac99e5dceea41f38d814de2f70999fa3743eeef15cac0c450
                                  • Instruction Fuzzy Hash: 99B14770A08606AFDB01DFA8C8A4BAD7FB5BF85355F14458AED085B292C770DB09CB50

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 424 469d90-469e0e call 53de82 427 469e15-469e20 424->427 427->427 428 469e22-469e2d 427->428 429 469e32-469e44 call 543f30 428->429 430 469e2f 428->430 433 469e46-469e6c call 547d06 call 543abb call 547d06 429->433 434 469eb7-469ebe 429->434 430->429 451 469e73-469e7a 433->451 452 469e6e 433->452 435 469ec0-469ecc 434->435 436 469ee8-469ef8 434->436 438 469ede-469ee5 call 53e103 435->438 439 469ece-469edc 435->439 438->436 439->438 441 469ef9-469f0e call 543380 439->441 450 469f10-469f1b 441->450 450->450 453 469f1d-469f28 450->453 454 469e7c-469e83 451->454 455 469e8d-469e94 call 4ccd30 451->455 452->451 456 469f2d-469f3f call 543f30 453->456 457 469f2a 453->457 458 469e87-469e8b 454->458 459 469e85 454->459 463 469e99-469e9f 455->463 464 469f41-469f59 call 547d06 call 543abb call 5477b8 456->464 465 469f5c-469f63 456->465 457->456 458->463 459->458 466 469ea3-469eae call 54c7af call 5477b8 463->466 467 469ea1 463->467 464->465 469 469f65-469f71 465->469 470 469f8d-469f93 465->470 481 469eb3-469eb6 466->481 467->466 473 469f83-469f8a call 53e103 469->473 474 469f73-469f81 469->474 473->470 474->473 477 469f94-469fbe call 543380 474->477 489 469fc0-469fc4 477->489 490 469fcf-469fd4 477->490 481->434 489->490 491 469fc6-469fce 489->491
                                  APIs
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3375376710.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 0000000C.00000002.3375348356.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375376710.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375571059.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376116862.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376304167.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376338358.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: __fread_nolock
                                  • String ID:
                                  • API String ID: 2638373210-0
                                  • Opcode ID: dd8ce95d9f63d4291176967185a86eeef44689c27755c852cf32694b27ed8206
                                  • Instruction ID: 1bf027e2c32559c3e19d0a56edfb4755cd2596841a4ba327c3370cb74a2fef14
                                  • Opcode Fuzzy Hash: dd8ce95d9f63d4291176967185a86eeef44689c27755c852cf32694b27ed8206
                                  • Instruction Fuzzy Hash: 176139719002059BDB18DF54DC49BAFBBA8FF85304F14416EF8089B382E7B99E41C7A6

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 492 543512-54351f 493 543521-543544 call 5432f3 492->493 494 543549-54355d call 554902 492->494 499 5436b0-5436b2 493->499 500 543562-54356b call 54ccef 494->500 501 54355f 494->501 503 543570-54357f 500->503 501->500 504 543581 503->504 505 54358f-543598 503->505 506 543587-543589 504->506 507 543659-54365e 504->507 508 5435ac-5435e0 505->508 509 54359a-5435a7 505->509 506->505 506->507 510 5436ae-5436af 507->510 512 5435e2-5435ec 508->512 513 54363d-543649 508->513 511 5436ac 509->511 510->499 511->510 514 543613-54361f 512->514 515 5435ee-5435fa 512->515 516 543660-543663 513->516 517 54364b-543652 513->517 514->516 520 543621-54363b call 543a29 514->520 515->514 519 5435fc-54360e call 54387e 515->519 518 543666-54366e 516->518 517->507 521 543670-543676 518->521 522 5436aa 518->522 519->510 520->518 525 54368e-543692 521->525 526 543678-54368c call 5436b3 521->526 522->511 530 543694-5436a2 call 562870 525->530 531 5436a5-5436a7 525->531 526->510 530->531 531->522
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3375376710.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 0000000C.00000002.3375348356.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375376710.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375571059.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376116862.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376304167.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376338358.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 361addd5ad79db09e9582149397a97babbb045ab946d35af48baa897347d9d5f
                                  • Instruction ID: a9ff0ea1780d214f0ac29d5be9dc12d632e2f20d7a1f6af6fe66899c6bdea504
                                  • Opcode Fuzzy Hash: 361addd5ad79db09e9582149397a97babbb045ab946d35af48baa897347d9d5f
                                  • Instruction Fuzzy Hash: 1A518F70A00209BFDF14DF58C885AE9BFA1BB89368F258159F8499B362D371DE41DB90

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 535 553493-5534a7 call 55905e 538 5534ad-5534b5 535->538 539 5534a9-5534ab 535->539 541 5534b7-5534be 538->541 542 5534c0-5534c3 538->542 540 5534fb-55351b call 558fcd 539->540 551 55352d 540->551 552 55351d-55352b call 54bdd8 540->552 541->542 544 5534cb-5534df call 55905e * 2 541->544 545 5534c5-5534c9 542->545 546 5534e1-5534f1 call 55905e FindCloseChangeNotification 542->546 544->539 544->546 545->544 545->546 546->539 554 5534f3-5534f9 546->554 556 55352f-553532 551->556 552->556 554->540
                                  APIs
                                  • FindCloseChangeNotification.KERNELBASE(00000000,00000000,CF830579,?,0055337A,00000000,CF830579,0058B810,0000000C,00553436,0054778D,?), ref: 005534EA
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3375376710.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 0000000C.00000002.3375348356.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375376710.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375571059.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376116862.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376304167.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376338358.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ChangeCloseFindNotification
                                  • String ID:
                                  • API String ID: 2591292051-0
                                  • Opcode ID: 064a5288f1ba5c79ba6821277a6e2dd672e1105fc5a78605dc58e19cf2e07381
                                  • Instruction ID: 5e43142c5915eeb03e970b2f93dea35988b1c41afaeef90806bed3411f53402a
                                  • Opcode Fuzzy Hash: 064a5288f1ba5c79ba6821277a6e2dd672e1105fc5a78605dc58e19cf2e07381
                                  • Instruction Fuzzy Hash: 5D11AF33508124A5CB322234A87EB7E1F4AAFC2776F25054BFC0C4B1D1EB72894C5180

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 561 54cc2c-54cc44 call 55905e 564 54cc46-54cc4d 561->564 565 54cc5a-54cc70 SetFilePointerEx 561->565 566 54cc54-54cc58 564->566 567 54cc85-54cc8f 565->567 568 54cc72-54cc83 call 54bdd8 565->568 570 54ccab-54ccae 566->570 567->566 569 54cc91-54cca6 567->569 568->566 569->570
                                  APIs
                                  • SetFilePointerEx.KERNELBASE(00000000,00000000,0058B4C8,00469F4B,00000002,00469F4B,00000000,?,?,?,0054CD36,00000000,?,00469F4B,00000002,0058B4C8), ref: 0054CC69
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3375376710.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 0000000C.00000002.3375348356.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375376710.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375571059.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376116862.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376304167.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376338358.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FilePointer
                                  • String ID:
                                  • API String ID: 973152223-0
                                  • Opcode ID: 524a44269f9114b9fab7fd01fb958f533be35001fa93c01ca02f2fd54cf4e440
                                  • Instruction ID: 8e0d42cac31cb3a532e2c991b6d13498958c8cdea445a8e6f5059095ad138b98
                                  • Opcode Fuzzy Hash: 524a44269f9114b9fab7fd01fb958f533be35001fa93c01ca02f2fd54cf4e440
                                  • Instruction Fuzzy Hash: E7010432614125AECB05CF19CC99DAE3F19EBC5334B250644E8259B290E671ED419790

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 574 462d70-462d80 575 462da6-462da8 574->575 576 462d82-462d87 574->576 579 462daa-462db7 call 53de82 575->579 580 462db8-462dbe 575->580 577 462dbf call 462260 576->577 578 462d89-462d8a call 53de82 576->578 585 462dc4-462dc9 call 543380 577->585 586 462d8f-462d96 578->586 586->585 588 462d98-462da5 586->588
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00462DBF
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3375376710.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 0000000C.00000002.3375348356.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375376710.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375571059.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376116862.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376304167.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376338358.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID:
                                  • API String ID: 118556049-0
                                  • Opcode ID: 326ee97673e7adb1608e1cb46f795dec6370eba03380352c4d7ae6dd60fbcf19
                                  • Instruction ID: 80f6fc6e79ab65b91391697d9b6174b75a6875605a37bce379ce23a54221ba6d
                                  • Opcode Fuzzy Hash: 326ee97673e7adb1608e1cb46f795dec6370eba03380352c4d7ae6dd60fbcf19
                                  • Instruction Fuzzy Hash: D2F024B2200505ABCB186F64E9058EAB7FCEF64366714087FE888C7212F76ADA408791

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 590 554d73-554d7e 591 554d80-554d8a 590->591 592 554d8c-554d92 590->592 591->592 593 554dc0-554dcb call 54be0f 591->593 594 554d94-554d95 592->594 595 554dab-554dbc RtlAllocateHeap 592->595 599 554dcd-554dcf 593->599 594->595 596 554d97-554d9e call 552914 595->596 597 554dbe 595->597 596->593 603 554da0-554da9 call 55011d 596->603 597->599 603->593 603->595
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000008,00547DC7,00000000,?,005546F9,00000001,00000364,00000000,00000006,000000FF,?,00000000,0054BE14,00547593,00547DC7,00000000), ref: 00554DB5
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3375376710.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 0000000C.00000002.3375348356.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375376710.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375571059.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376116862.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376304167.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376338358.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: e03b72786a83b4e3d290129deb97d6bb0534c912894a56e948c14c6cca5166d0
                                  • Instruction ID: 8fae411ba43f9bb60870c2a8b9e56d0d931287354a458ffc4f7fd6b39da7347d
                                  • Opcode Fuzzy Hash: e03b72786a83b4e3d290129deb97d6bb0534c912894a56e948c14c6cca5166d0
                                  • Instruction Fuzzy Hash: BDF0E93210053567DB226A625C25B6F3F79BF817B6F154213EC08971C1CB20E8894EE4

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 606 5557ad-5557b9 607 5557eb-5557f6 call 54be0f 606->607 608 5557bb-5557bd 606->608 615 5557f8-5557fa 607->615 610 5557d6-5557e7 RtlAllocateHeap 608->610 611 5557bf-5557c0 608->611 612 5557c2-5557c9 call 552914 610->612 613 5557e9 610->613 611->610 612->607 618 5557cb-5557d4 call 55011d 612->618 613->615 618->607 618->610
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000000,0055ABF2,4D88C033,?,0055ABF2,00000220,?,0055416F,4D88C033), ref: 005557E0
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3375376710.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 0000000C.00000002.3375348356.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375376710.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375571059.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376116862.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376304167.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376338358.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 32e2cace0bbd8fe1bc636c0c131821d7f043426827f3193c6f5abe75db6958eb
                                  • Instruction ID: 115f416bd69b75c8f80364bc868e070c9da331fe14206b1bfb14f5c7ed9c2c14
                                  • Opcode Fuzzy Hash: 32e2cace0bbd8fe1bc636c0c131821d7f043426827f3193c6f5abe75db6958eb
                                  • Instruction Fuzzy Hash: BBE06D31220F2697E62536765C35FAB3E49FF8A7F2F150523ED18961C0EB10DC4886E9
                                  APIs
                                  • GetProcAddress.KERNEL32(00000000,C8D8C5E3), ref: 004E4D6C
                                  • GetProcAddress.KERNEL32(00000000,C8D8C5E3), ref: 004E4DAE
                                  • GetProcAddress.KERNEL32(00000000,DDD8DFE2), ref: 004E4DF6
                                  • GetProcAddress.KERNEL32(00000000,C8D8C5E3), ref: 004E4E37
                                  • GetProcAddress.KERNEL32(00000000,C8D8C5E3), ref: 004E4E78
                                  • GetProcAddress.KERNEL32(00000000,DDD8DFE2), ref: 004E4EB6
                                  • GetProcAddress.KERNEL32(00000000,C8D8C5E3), ref: 004E4EFE
                                  • GetProcAddress.KERNEL32(00000000,DDD8DFE2), ref: 004E4F46
                                  • GetProcAddress.KERNEL32(00000000,C8D8C5E3), ref: 004E4F87
                                  • GetProcAddress.KERNEL32(00000000,C8D8C5E3), ref: 004E4FCD
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3375376710.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 0000000C.00000002.3375348356.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375376710.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375571059.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376116862.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376304167.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376338358.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressProc
                                  • String ID:
                                  • API String ID: 190572456-0
                                  • Opcode ID: 607d8261986945a4c4324970d497c9217e0a31680db26621d3fbdd4d70d00188
                                  • Instruction ID: a60dbe664e6472e00e1a5863635c958c6711d75411534544572e9dd20062ecca
                                  • Opcode Fuzzy Hash: 607d8261986945a4c4324970d497c9217e0a31680db26621d3fbdd4d70d00188
                                  • Instruction Fuzzy Hash: 068154B0C1838DAEEF19CF98D444AEEBBB8EF16304F51409FD441AB651D3745209DBA9
                                  APIs
                                  • GetModuleHandleA.KERNEL32(?), ref: 0046892E
                                  • GetProcAddress.KERNEL32(00000000,?), ref: 0046893B
                                  • GetModuleHandleA.KERNEL32(?), ref: 004689A5
                                  • GetProcAddress.KERNEL32(00000000,?), ref: 004689AC
                                  • CloseHandle.KERNEL32(?), ref: 00468BB2
                                  • CloseHandle.KERNEL32(?), ref: 00468C14
                                  • CloseHandle.KERNEL32(00000000), ref: 00468C41
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3375376710.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 0000000C.00000002.3375348356.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375376710.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375571059.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376116862.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376304167.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376338358.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Handle$Close$AddressModuleProc
                                  • String ID: File
                                  • API String ID: 4110381430-749574446
                                  • Opcode ID: 3626a999ed1c01f521b3509838af8904081567d419e15fb4da1978775266c846
                                  • Instruction ID: d097018fc1a966017e7d12abefc5969dcab67f1e98ae584780056f3b66e3ad85
                                  • Opcode Fuzzy Hash: 3626a999ed1c01f521b3509838af8904081567d419e15fb4da1978775266c846
                                  • Instruction Fuzzy Hash: DFC19F70D042599BEF24CFA4CC85BAEBBB4FF05304F10055EE544BB281EB75A945CB6A
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3375376710.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 0000000C.00000002.3375348356.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375376710.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375571059.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376116862.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376304167.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376338358.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 61965cb8cb4c3d11271a02d73999b519a6a23ab072505813c3df16f2acd370b1
                                  • Instruction ID: 5bad394fd6efddcbff89a158496ec1f2af2ebc959212b9dcc09242c380e86b36
                                  • Opcode Fuzzy Hash: 61965cb8cb4c3d11271a02d73999b519a6a23ab072505813c3df16f2acd370b1
                                  • Instruction Fuzzy Hash: 66023C71E052199BDF14CFA9C8806EEBBF1FF48318F258669E919E7381D731A941CB90
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 004CF5B3
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 004CF5D5
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 004CF5F5
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 004CF61F
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 004CF68D
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 004CF6D9
                                  • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 004CF6F3
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 004CF788
                                  • std::_Facet_Register.LIBCPMT ref: 004CF795
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3375376710.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 0000000C.00000002.3375348356.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375376710.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375571059.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376116862.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376304167.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376338358.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Locinfo::_$Facet_Locinfo_ctorLocinfo_dtorRegister
                                  • String ID: bad locale name$fXW
                                  • API String ID: 3375549084-28943737
                                  • Opcode ID: 0529c43b1f2e310dd24f45cd95d7bcd59bfb46350b0d00096ff075e12e03383e
                                  • Instruction ID: 8dbd80a4c2d8827007839650745c600f066d8a3c91e9f99d6d8297f7a2b87164
                                  • Opcode Fuzzy Hash: 0529c43b1f2e310dd24f45cd95d7bcd59bfb46350b0d00096ff075e12e03383e
                                  • Instruction Fuzzy Hash: 9261EEB5E012499BDF11DFA4C849B9EBFB5BF54310F14402AE804B7341E738E90ACBA5
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00463A08
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00463A54
                                  • __Getctype.LIBCPMT ref: 00463A6A
                                  • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 00463A96
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00463B2B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3375376710.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 0000000C.00000002.3375348356.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375376710.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375571059.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376116862.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376304167.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376338358.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Locinfo::_Lockit$GetctypeLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                  • String ID: `<F$bad locale name
                                  • API String ID: 1840309910-1676782154
                                  • Opcode ID: 26054f2eda05760c104a77f682bc948be06a9abc031039b3a060d44a72c8ec7a
                                  • Instruction ID: c2a5368965ea7faed27b406beb3cd4744b9fd03aa4ea87e8206037cb169bd193
                                  • Opcode Fuzzy Hash: 26054f2eda05760c104a77f682bc948be06a9abc031039b3a060d44a72c8ec7a
                                  • Instruction Fuzzy Hash: A85152B1D002489BDF10DF94D845B9EBFB8BF54714F144069E809AB341E779EA04CBA6
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 004D69A8
                                  • __floor_pentium4.LIBCMT ref: 004D6ACB
                                  Strings
                                  • unordered_map/set too long, xrefs: 004D6B96
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3375376710.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 0000000C.00000002.3375348356.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375376710.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375571059.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376116862.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376304167.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376338358.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task__floor_pentium4
                                  • String ID: unordered_map/set too long
                                  • API String ID: 1502093491-306623848
                                  • Opcode ID: 1dc2a618929728eeb5ee1ecb2b3358f088344a7ec20300c03261417aa5479c28
                                  • Instruction ID: 816f520e28b79048fb671673f26edf897a4c876c331094ed8c34e46e298d3ed9
                                  • Opcode Fuzzy Hash: 1dc2a618929728eeb5ee1ecb2b3358f088344a7ec20300c03261417aa5479c28
                                  • Instruction Fuzzy Hash: 2AF14771A00214DFCB04DF58C991AAEBBB5FF84314F15826BE859AB385D738EE11CB94
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3375376710.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 0000000C.00000002.3375348356.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375376710.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375571059.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376116862.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376304167.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376338358.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: ", "$: "$recursive_directory_iterator::operator++
                                  • API String ID: 0-2763324178
                                  • Opcode ID: a63a110b313988646ea76711894fbdaf5f85e2bbb507c34fbd6c6e7b0e3c5179
                                  • Instruction ID: 77cb15eb4c392e877551054dff70b8dfc5f596555456237ef9c1ca7b9359d245
                                  • Opcode Fuzzy Hash: a63a110b313988646ea76711894fbdaf5f85e2bbb507c34fbd6c6e7b0e3c5179
                                  • Instruction Fuzzy Hash: 4FC102B1900204AFCB18EF64D845B9EBBF8FF45714F04462EF41697781EB78AA04CBA5
                                  APIs
                                  • _ValidateLocalCookies.LIBCMT ref: 00541A17
                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 00541A1F
                                  • _ValidateLocalCookies.LIBCMT ref: 00541AA8
                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 00541AD3
                                  • _ValidateLocalCookies.LIBCMT ref: 00541B28
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3375376710.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 0000000C.00000002.3375348356.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375376710.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375571059.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376116862.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376304167.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376338358.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                  • String ID: csm
                                  • API String ID: 1170836740-1018135373
                                  • Opcode ID: 018fb2c0306c60c3331f2db91f0fff85f9f79a08c572489ed6eb8acc2e72a324
                                  • Instruction ID: 4dcebbc1489f744c04d39888856cd7bab131ccadb3fe2688f4587d02ecf59aed
                                  • Opcode Fuzzy Hash: 018fb2c0306c60c3331f2db91f0fff85f9f79a08c572489ed6eb8acc2e72a324
                                  • Instruction Fuzzy Hash: 7E410030A00619ABCF10DF69C889ADE7FB4FF85368F148455E8049B392D731EA85CBD4
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 004CDD13
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 004CDD36
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 004CDD56
                                  • std::_Facet_Register.LIBCPMT ref: 004CDDCB
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 004CDDE3
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 004CDDFB
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3375376710.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 0000000C.00000002.3375348356.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375376710.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375571059.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376116862.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376304167.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376338358.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                  • String ID:
                                  • API String ID: 2081738530-0
                                  • Opcode ID: d61c6e6cf72d247dc606c5f8075c81188a27926c6e2f6d0374be2bd87ea6737e
                                  • Instruction ID: fdbf992da7fa01e2078f64fed348b8938cc662f46d386f15a2aeaddb93e147ec
                                  • Opcode Fuzzy Hash: d61c6e6cf72d247dc606c5f8075c81188a27926c6e2f6d0374be2bd87ea6737e
                                  • Instruction Fuzzy Hash: 9031EC79C0022A9FCB51DF54C884BAEBBB0FB80320F15862EE81A67351D734AE45CBD5
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00467796
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00467931
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3375376710.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 0000000C.00000002.3375348356.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375376710.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375571059.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376116862.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376304167.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376338358.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: @nF$out_of_range$type_error
                                  • API String ID: 2659868963-1879671698
                                  • Opcode ID: b2f10256b767c38a02ceb83ce414ea9644eab09569d95f14b9feadc99e98a006
                                  • Instruction ID: 4fe945529a8efc2fb04f967d837d4e6a87b93e7024a6e4047e72e0f97e07b98b
                                  • Opcode Fuzzy Hash: b2f10256b767c38a02ceb83ce414ea9644eab09569d95f14b9feadc99e98a006
                                  • Instruction Fuzzy Hash: 97A19DB1D002089FDB18DFA8D885BADBBF1BF49304F14862EE019E7751E778A944CB65
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 004671A9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3375376710.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 0000000C.00000002.3375348356.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375376710.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375571059.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376116862.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376304167.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376338358.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: @nF$parse error$parse_error
                                  • API String ID: 2659868963-3223604060
                                  • Opcode ID: 357ba9c27c605872098eaab78fc3261cbff2fdd51396d6d118eb46ff7c3e4f81
                                  • Instruction ID: 60abd793aa98d02ac640e143fbb577c90f9dd408d7f729379ea53fe3f64a153e
                                  • Opcode Fuzzy Hash: 357ba9c27c605872098eaab78fc3261cbff2fdd51396d6d118eb46ff7c3e4f81
                                  • Instruction Fuzzy Hash: D4B1A170D002098FDB08CF68DD95BADFBF1BF49304F14825AE019AB792E7749A80CB65
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 0046743E
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 0046744D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3375376710.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 0000000C.00000002.3375348356.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375376710.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375571059.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376116862.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376304167.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376338358.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: at line $, column
                                  • API String ID: 4194217158-191570568
                                  • Opcode ID: 774eec79154162989b73fe2c0a317585b000a1d585bce003fb1a98724dc8c3c9
                                  • Instruction ID: 35be139df3a1e7dd6063b746dc8e0e1a7e31e28afb65b5e8c7ffc8b79b5b5210
                                  • Opcode Fuzzy Hash: 774eec79154162989b73fe2c0a317585b000a1d585bce003fb1a98724dc8c3c9
                                  • Instruction Fuzzy Hash: E66192B0E042059FC718DF68D885BADFBF1BF49314F14826EE419A7782D7789980CB55
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00463E2F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3375376710.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 0000000C.00000002.3375348356.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375376710.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375571059.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376116862.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376304167.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376338358.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                  • API String ID: 2659868963-1866435925
                                  • Opcode ID: b36a3dca853737a33933b6aa4071c4aaab78f8aeb2f71137555970123648af1c
                                  • Instruction ID: c4b5763e82ea3b811324ea45073a81c893712f7038fe522839801c2c7566cd6b
                                  • Opcode Fuzzy Hash: b36a3dca853737a33933b6aa4071c4aaab78f8aeb2f71137555970123648af1c
                                  • Instruction Fuzzy Hash: EB41AFB6A00244AFCB04DF58C845BEABBF8FF49710F14852BE91997741E775AA00CBA5
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 004675F8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3375376710.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 0000000C.00000002.3375348356.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375376710.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375571059.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376116862.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376304167.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376338358.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: @nF$AqL$invalid_iterator
                                  • API String ID: 2659868963-798898470
                                  • Opcode ID: 3dac7f184fd91c8cc3c8d73f220fe682646c9f044f69d39a5e56f91abf668ff7
                                  • Instruction ID: e6149a1994fca2805a944e458db97dee6a85e28c4271d239daba2f92c8577f3a
                                  • Opcode Fuzzy Hash: 3dac7f184fd91c8cc3c8d73f220fe682646c9f044f69d39a5e56f91abf668ff7
                                  • Instruction Fuzzy Hash: 8A51AFB1D002089FCB18CF68D8847AEFBF5FB48314F14866EE01AA7791E774A944CB95
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00463E2F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3375376710.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 0000000C.00000002.3375348356.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375376710.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375571059.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376116862.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376304167.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376338358.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                  • API String ID: 2659868963-1866435925
                                  • Opcode ID: 0de74049617cb03e1e63ed52f899b2d3b691347ec35ecedd7897c75204426b25
                                  • Instruction ID: 596ecd052d6e5dda8c7e8071fdb02a16a92644559a18164d06442d259a2d628c
                                  • Opcode Fuzzy Hash: 0de74049617cb03e1e63ed52f899b2d3b691347ec35ecedd7897c75204426b25
                                  • Instruction Fuzzy Hash: 7C2105B2A00704ABC704DF58D801B96BBECBF04311F18842BF91887341F775EA04CBA6
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 0053CF40
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0053CF4B
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0053CFB9
                                    • Part of subcall function 0053D09C: std::locale::_Locimp::_Locimp.LIBCPMT ref: 0053D0B4
                                  • std::locale::_Setgloballocale.LIBCPMT ref: 0053CF66
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3375376710.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 0000000C.00000002.3375348356.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375376710.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375571059.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376116862.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376304167.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376338358.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                                  • String ID:
                                  • API String ID: 677527491-0
                                  • Opcode ID: 8c655635316c435088a6f99dfbe3dd507961bae738bbc066a34ce5d4ab5fc950
                                  • Instruction ID: 633e03158c5dd330446f826f46bd86d46fbccd1216fffa8f33b5d140193348fb
                                  • Opcode Fuzzy Hash: 8c655635316c435088a6f99dfbe3dd507961bae738bbc066a34ce5d4ab5fc950
                                  • Instruction Fuzzy Hash: B801DF76A006229BCB0AEB20E84A57D7FB1FFD4740F19040AE80167391DF746E46DBDA
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 004D61A6
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 004D6341
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3375376710.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 0000000C.00000002.3375348356.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375376710.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375571059.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376116862.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376304167.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376338358.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID: Py"v
                                  • API String ID: 118556049-2948403528
                                  • Opcode ID: 10903d2f9587ed01dd017d2e519334c363aaf9660c6c83ace470442a108501ff
                                  • Instruction ID: 8fac0d4fc47538f9e39cf39b289036a5c9f4fe46134165d41ab9c7c7acf38d38
                                  • Opcode Fuzzy Hash: 10903d2f9587ed01dd017d2e519334c363aaf9660c6c83ace470442a108501ff
                                  • Instruction Fuzzy Hash: 8A81F472A00101AFCB08DF6CDDA596EB7A5EB95300B15836FE80987391E734EE55C794
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00466E51
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00466E60
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3375376710.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 0000000C.00000002.3375348356.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375376710.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375571059.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376116862.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376304167.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376338358.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: [json.exception.
                                  • API String ID: 4194217158-791563284
                                  • Opcode ID: 13c51f5e1bfe26069c918e20c7e740efdca381c990602d1ed3c9f108a5ef58b1
                                  • Instruction ID: 5bbb1b041e1f438a112a4c5c5aa07e8b7ecb8daa908aa12fa66a10ffc0d60de0
                                  • Opcode Fuzzy Hash: 13c51f5e1bfe26069c918e20c7e740efdca381c990602d1ed3c9f108a5ef58b1
                                  • Instruction Fuzzy Hash: 4D71A3B0A002059FD718DF68D985B9EFBF5FF49310F10821EE4199B781E774A980CB95
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00467AE3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3375376710.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 0000000C.00000002.3375348356.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375376710.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375571059.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376116862.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376304167.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376338358.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: @nF$other_error
                                  • API String ID: 2659868963-48232177
                                  • Opcode ID: 2939056cb060dce6d33b3d327a20b260fbfae03af7381f8cd1e396e98783f291
                                  • Instruction ID: 3f2957aba7209f2456b19490f5bdb2141e71df54d06368c692e8d2af4c27694d
                                  • Opcode Fuzzy Hash: 2939056cb060dce6d33b3d327a20b260fbfae03af7381f8cd1e396e98783f291
                                  • Instruction Fuzzy Hash: B671C271E002049FDB14CFA8DC85B9EBBF1FF88314F14826AE419AB791E774A940CB95
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 004DD6B0
                                  Strings
                                  • type must be string, but is , xrefs: 004DD718
                                  • type must be boolean, but is , xrefs: 004DD7A2
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3375376710.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 0000000C.00000002.3375348356.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375376710.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375571059.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376116862.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376304167.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376338358.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID: type must be boolean, but is $type must be string, but is
                                  • API String ID: 118556049-436076039
                                  • Opcode ID: a07e3f60a01bef22eec29ac7f8e453f4537be376eac639655353863e89515409
                                  • Instruction ID: d68400627ca2492bc2e45ca604f19d7b5d554e75e6371cb1c00653d9315bb220
                                  • Opcode Fuzzy Hash: a07e3f60a01bef22eec29ac7f8e453f4537be376eac639655353863e89515409
                                  • Instruction Fuzzy Hash: 154135B2E00648AFC700EFA8D801B9EBBE8EB04314F14457BE419D7741EB78A910CBD6
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 004CD04F
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 004CD076
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3375376710.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 0000000C.00000002.3375348356.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375376710.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375571059.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376116862.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376304167.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376338358.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: @nF
                                  • API String ID: 2659868963-3944412766
                                  • Opcode ID: d67d042dee8c344cb3842a30f7837767eaba347b3e91cabeb7d478a2a40bb856
                                  • Instruction ID: 464fff5a71d8d2ed677af63581b430ea2977c84de2058947e5c6117d39159c85
                                  • Opcode Fuzzy Hash: d67d042dee8c344cb3842a30f7837767eaba347b3e91cabeb7d478a2a40bb856
                                  • Instruction Fuzzy Hash: 1001E4BAA00706AF8708CF99E405886FBF8FB48310701C52BE51AC7B00E770E518CFA0
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 004DA5FF
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 004DA626
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.3375376710.0000000000461000.00000040.00000001.01000000.00000005.sdmp, Offset: 00460000, based on PE: true
                                  • Associated: 0000000C.00000002.3375348356.0000000000460000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375376710.000000000058E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375571059.0000000000593000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.0000000000597000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007AE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007B1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007DE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007ED000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3375602728.00000000007FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376116862.00000000007FC000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376304167.000000000095C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 0000000C.00000002.3376338358.000000000095D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_460000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: @nF
                                  • API String ID: 2659868963-3944412766
                                  • Opcode ID: 35e4f042faf38721b8adadb45d79be86fe77e401e8f0e3c2f5737c13016f900d
                                  • Instruction ID: 3af50310659dbe6e466b855d05ee4faae631fade1dbc85187a53ad53ec2ac004
                                  • Opcode Fuzzy Hash: 35e4f042faf38721b8adadb45d79be86fe77e401e8f0e3c2f5737c13016f900d
                                  • Instruction Fuzzy Hash: D7F0C9B6A04706AF8708DF55E505886BBF8FA58310701896BE51AC7B10E770E514CFA4