Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
dcmaM16D71.exe

Overview

General Information

Sample name:dcmaM16D71.exe
renamed because original name is a hash value
Original sample name:92af1f8423cb9b7a5f08cd752b9c68a7.exe
Analysis ID:1515064
MD5:92af1f8423cb9b7a5f08cd752b9c68a7
SHA1:a5b7de29d25e351b1a0bc20e8861a0a44fdbe73a
SHA256:9c3aa1b46412046cab893f4bd96d15af2dc425c61c21a90755830d7f4df39cb0
Tags:exeRiseProStealeruser-abuse_ch
Infos:

Detection

RisePro Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected RisePro Stealer
AI detected suspicious sample
Connects to many ports of the same IP (likely port scanning)
Found stalling execution ending in API Sleep call
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
Potentially malicious time measurement code found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Uses schtasks.exe or at.exe to add and modify task schedules
Checks for debuggers (devices)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • dcmaM16D71.exe (PID: 6916 cmdline: "C:\Users\user\Desktop\dcmaM16D71.exe" MD5: 92AF1F8423CB9B7A5F08CD752B9C68A7)
    • schtasks.exe (PID: 2944 cmdline: schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 4076 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 5888 cmdline: schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 4320 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • MPGPH131.exe (PID: 3668 cmdline: C:\ProgramData\MPGPH131\MPGPH131.exe MD5: 92AF1F8423CB9B7A5F08CD752B9C68A7)
  • MPGPH131.exe (PID: 4924 cmdline: C:\ProgramData\MPGPH131\MPGPH131.exe MD5: 92AF1F8423CB9B7A5F08CD752B9C68A7)
  • RageMP131.exe (PID: 6024 cmdline: "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe" MD5: 92AF1F8423CB9B7A5F08CD752B9C68A7)
  • RageMP131.exe (PID: 7504 cmdline: "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe" MD5: 92AF1F8423CB9B7A5F08CD752B9C68A7)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: dcmaM16D71.exe PID: 6916JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
    Process Memory Space: MPGPH131.exe PID: 3668JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
      Process Memory Space: MPGPH131.exe PID: 4924JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
        Process Memory Space: RageMP131.exe PID: 6024JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
          Process Memory Space: RageMP131.exe PID: 7504JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security

            System Summary

            barindex
            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\dcmaM16D71.exe, ProcessId: 6916, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RageMP131
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-09-21T15:50:58.347014+020020490601A Network Trojan was detected192.168.2.449730147.45.47.12658709TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-09-21T15:51:01.279661+020020462691A Network Trojan was detected192.168.2.449730147.45.47.12658709TCP
            2024-09-21T15:51:08.723035+020020462691A Network Trojan was detected192.168.2.449731147.45.47.12658709TCP
            2024-09-21T15:51:08.723125+020020462691A Network Trojan was detected192.168.2.449732147.45.47.12658709TCP
            2024-09-21T15:51:13.066855+020020462691A Network Trojan was detected192.168.2.449733147.45.47.12658709TCP
            2024-09-21T15:51:21.676337+020020462691A Network Trojan was detected192.168.2.449740147.45.47.12658709TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: dcmaM16D71.exeAvira: detected
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeAvira: detection malicious, Label: TR/Redcap.vzyra
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeAvira: detection malicious, Label: TR/Redcap.vzyra
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeReversingLabs: Detection: 91%
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeVirustotal: Detection: 77%Perma Link
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeReversingLabs: Detection: 91%
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeVirustotal: Detection: 77%Perma Link
            Source: dcmaM16D71.exeReversingLabs: Detection: 91%
            Source: dcmaM16D71.exeVirustotal: Detection: 77%Perma Link
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeJoe Sandbox ML: detected
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeJoe Sandbox ML: detected
            Source: dcmaM16D71.exeJoe Sandbox ML: detected
            Source: dcmaM16D71.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2049060 - Severity 1 - ET MALWARE RisePro TCP Heartbeat Packet : 192.168.2.4:49730 -> 147.45.47.126:58709
            Source: Network trafficSuricata IDS: 2046269 - Severity 1 - ET MALWARE [ANY.RUN] RisePro TCP (Activity) : 192.168.2.4:49730 -> 147.45.47.126:58709
            Source: Network trafficSuricata IDS: 2046269 - Severity 1 - ET MALWARE [ANY.RUN] RisePro TCP (Activity) : 192.168.2.4:49732 -> 147.45.47.126:58709
            Source: Network trafficSuricata IDS: 2046269 - Severity 1 - ET MALWARE [ANY.RUN] RisePro TCP (Activity) : 192.168.2.4:49731 -> 147.45.47.126:58709
            Source: Network trafficSuricata IDS: 2046269 - Severity 1 - ET MALWARE [ANY.RUN] RisePro TCP (Activity) : 192.168.2.4:49740 -> 147.45.47.126:58709
            Source: Network trafficSuricata IDS: 2046269 - Severity 1 - ET MALWARE [ANY.RUN] RisePro TCP (Activity) : 192.168.2.4:49733 -> 147.45.47.126:58709
            Source: global trafficTCP traffic: 147.45.47.126 ports 0,5,7,8,58709,9
            Source: global trafficTCP traffic: 192.168.2.4:49730 -> 147.45.47.126:58709
            Source: Joe Sandbox ViewIP Address: 147.45.47.126 147.45.47.126
            Source: Joe Sandbox ViewASN Name: FREE-NET-ASFREEnetEU FREE-NET-ASFREEnetEU
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.126
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.126
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.126
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.126
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.126
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.126
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.126
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.126
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.126
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.126
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.126
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.126
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.126
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.126
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.126
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.126
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.126
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.126
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.126
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.126
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.126
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.126
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.126
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.126
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.126
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.126
            Source: C:\Users\user\Desktop\dcmaM16D71.exeCode function: 0_2_001C9280 recv,WSASend,0_2_001C9280
            Source: dcmaM16D71.exe, 00000000.00000002.3452995684.00000000001C1000.00000040.00000001.01000000.00000003.sdmp, dcmaM16D71.exe, 00000000.00000003.1724860101.0000000004B10000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.3452978591.0000000000271000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000005.00000003.1802109842.0000000004E90000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.3453216308.0000000000271000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000006.00000003.1802231508.0000000004A40000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000003.1861832555.0000000005440000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.3453305471.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000B.00000002.3453097183.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000B.00000003.1943556052.0000000005620000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.winimage.com/zLibDll
            Source: RageMP131.exeString found in binary or memory: https://ipinfo.io/
            Source: dcmaM16D71.exe, 00000000.00000002.3452995684.00000000001C1000.00000040.00000001.01000000.00000003.sdmp, dcmaM16D71.exe, 00000000.00000003.1724860101.0000000004B10000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.3452978591.0000000000271000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000005.00000003.1802109842.0000000004E90000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.3453216308.0000000000271000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000006.00000003.1802231508.0000000004A40000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000003.1861832555.0000000005440000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.3453305471.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000B.00000002.3453097183.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000B.00000003.1943556052.0000000005620000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
            Source: dcmaM16D71.exe, 00000000.00000002.3456276074.0000000000E6E000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.3456538284.00000000012AD000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.3456587072.0000000000D6B000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.3455376041.00000000019DE000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3456493535.000000000185B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORT
            Source: MPGPH131.exe, 00000005.00000002.3456538284.00000000012AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORTV
            Source: RageMP131.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address

            System Summary

            barindex
            Source: dcmaM16D71.exeStatic PE information: section name:
            Source: dcmaM16D71.exeStatic PE information: section name: .idata
            Source: dcmaM16D71.exeStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name: .idata
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name: .idata
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: C:\Users\user\Desktop\dcmaM16D71.exeCode function: 0_2_001FA9280_2_001FA928
            Source: C:\Users\user\Desktop\dcmaM16D71.exeCode function: 0_2_001FC9600_2_001FC960
            Source: C:\Users\user\Desktop\dcmaM16D71.exeCode function: 0_2_001F71A00_2_001F71A0
            Source: C:\Users\user\Desktop\dcmaM16D71.exeCode function: 0_2_0020DA860_2_0020DA86
            Source: C:\Users\user\Desktop\dcmaM16D71.exeCode function: 0_2_0020036F0_2_0020036F
            Source: C:\Users\user\Desktop\dcmaM16D71.exeCode function: 0_2_00218BB00_2_00218BB0
            Source: C:\Users\user\Desktop\dcmaM16D71.exeCode function: 0_2_002AFC400_2_002AFC40
            Source: C:\Users\user\Desktop\dcmaM16D71.exeCode function: 0_2_001EF5800_2_001EF580
            Source: C:\Users\user\Desktop\dcmaM16D71.exeCode function: 0_2_002126100_2_00212610
            Source: C:\Users\user\Desktop\dcmaM16D71.exeCode function: 0_2_002147BF0_2_002147BF
            Source: C:\Users\user\Desktop\dcmaM16D71.exeCode function: 0_2_002B2FD00_2_002B2FD0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_002AA9285_2_002AA928
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_002AC9605_2_002AC960
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_002A71A05_2_002A71A0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_002BDA865_2_002BDA86
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_002B036F5_2_002B036F
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_002C8BB05_2_002C8BB0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_0035FC405_2_0035FC40
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_0029F5805_2_0029F580
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_002C26105_2_002C2610
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_002C47BF5_2_002C47BF
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_00362FD05_2_00362FD0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_002AA9286_2_002AA928
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_002AC9606_2_002AC960
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_002A71A06_2_002A71A0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_002BDA866_2_002BDA86
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_002B036F6_2_002B036F
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_002C8BB06_2_002C8BB0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_0035FC406_2_0035FC40
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_0029F5806_2_0029F580
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_002C26106_2_002C2610
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_002C47BF6_2_002C47BF
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00362FD06_2_00362FD0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 7_2_00D571A07_2_00D571A0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 7_2_00D5C9607_2_00D5C960
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 7_2_00D5A9287_2_00D5A928
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 7_2_00D6DA867_2_00D6DA86
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 7_2_00D78BB07_2_00D78BB0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 7_2_00D6036F7_2_00D6036F
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 7_2_00E0FC407_2_00E0FC40
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 7_2_00D4F5807_2_00D4F580
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 7_2_00E12FD07_2_00E12FD0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 7_2_00D747BF7_2_00D747BF
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 11_2_00D571A011_2_00D571A0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 11_2_00D5C96011_2_00D5C960
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 11_2_00D5A92811_2_00D5A928
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 11_2_00D6DA8611_2_00D6DA86
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 11_2_00D78BB011_2_00D78BB0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 11_2_00D6036F11_2_00D6036F
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 11_2_00E0FC4011_2_00E0FC40
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 11_2_00D4F58011_2_00D4F580
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 11_2_00E12FD011_2_00E12FD0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 11_2_00D747BF11_2_00D747BF
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: String function: 00D54380 appears 48 times
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: String function: 002A4380 appears 48 times
            Source: dcmaM16D71.exeBinary or memory string: OriginalFilename vs dcmaM16D71.exe
            Source: dcmaM16D71.exe, 00000000.00000002.3460814793.0000000004B10000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamedotnet.exe6 vs dcmaM16D71.exe
            Source: dcmaM16D71.exe, 00000000.00000002.3454102449.000000000034A000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamedotnet.exe6 vs dcmaM16D71.exe
            Source: dcmaM16D71.exe, 00000000.00000002.3455850718.00000000007AB000.00000080.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamedotnet.exe6 vs dcmaM16D71.exe
            Source: dcmaM16D71.exeBinary or memory string: OriginalFilenamedotnet.exe6 vs dcmaM16D71.exe
            Source: dcmaM16D71.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: dcmaM16D71.exeStatic PE information: Section: ZLIB complexity 0.9979812956204379
            Source: dcmaM16D71.exeStatic PE information: Section: mxeojzwh ZLIB complexity 0.9936875563401443
            Source: RageMP131.exe.0.drStatic PE information: Section: ZLIB complexity 0.9979812956204379
            Source: RageMP131.exe.0.drStatic PE information: Section: mxeojzwh ZLIB complexity 0.9936875563401443
            Source: MPGPH131.exe.0.drStatic PE information: Section: ZLIB complexity 0.9979812956204379
            Source: MPGPH131.exe.0.drStatic PE information: Section: mxeojzwh ZLIB complexity 0.9936875563401443
            Source: classification engineClassification label: mal100.troj.evad.winEXE@11/5@0/1
            Source: C:\Users\user\Desktop\dcmaM16D71.exeFile created: C:\Users\user\AppData\Local\RageMP131Jump to behavior
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4076:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4320:120:WilError_03
            Source: C:\Users\user\Desktop\dcmaM16D71.exeFile created: C:\Users\user\AppData\Local\Temp\rage131MP.tmpJump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: dcmaM16D71.exe, 00000000.00000002.3452995684.00000000001C1000.00000040.00000001.01000000.00000003.sdmp, dcmaM16D71.exe, 00000000.00000003.1724860101.0000000004B10000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.3452978591.0000000000271000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000005.00000003.1802109842.0000000004E90000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.3453216308.0000000000271000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000006.00000003.1802231508.0000000004A40000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000003.1861832555.0000000005440000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.3453305471.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000B.00000002.3453097183.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000B.00000003.1943556052.0000000005620000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
            Source: dcmaM16D71.exe, 00000000.00000002.3452995684.00000000001C1000.00000040.00000001.01000000.00000003.sdmp, dcmaM16D71.exe, 00000000.00000003.1724860101.0000000004B10000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.3452978591.0000000000271000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000005.00000003.1802109842.0000000004E90000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.3453216308.0000000000271000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000006.00000003.1802231508.0000000004A40000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000003.1861832555.0000000005440000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.3453305471.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000B.00000002.3453097183.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000B.00000003.1943556052.0000000005620000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = sqlite_rename_table(sql, %Q), tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
            Source: dcmaM16D71.exeReversingLabs: Detection: 91%
            Source: dcmaM16D71.exeVirustotal: Detection: 77%
            Source: dcmaM16D71.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: dcmaM16D71.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
            Source: MPGPH131.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: MPGPH131.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
            Source: MPGPH131.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: MPGPH131.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
            Source: RageMP131.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: RageMP131.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
            Source: RageMP131.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: RageMP131.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
            Source: C:\Users\user\Desktop\dcmaM16D71.exeFile read: C:\Users\user\Desktop\dcmaM16D71.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\dcmaM16D71.exe "C:\Users\user\Desktop\dcmaM16D71.exe"
            Source: C:\Users\user\Desktop\dcmaM16D71.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\dcmaM16D71.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\ProgramData\MPGPH131\MPGPH131.exe C:\ProgramData\MPGPH131\MPGPH131.exe
            Source: unknownProcess created: C:\ProgramData\MPGPH131\MPGPH131.exe C:\ProgramData\MPGPH131\MPGPH131.exe
            Source: unknownProcess created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
            Source: unknownProcess created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
            Source: C:\Users\user\Desktop\dcmaM16D71.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHESTJump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHESTJump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exeSection loaded: d3d10warp.dllJump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exeSection loaded: dxcore.dllJump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winmm.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: d3d10warp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: dxcore.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winmm.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: d3d10warp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: dxcore.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: d3d10warp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: dxcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: d3d10warp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: dxcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: devobj.dllJump to behavior
            Source: dcmaM16D71.exeStatic file information: File size 2425344 > 1048576
            Source: dcmaM16D71.exeStatic PE information: Raw size of mxeojzwh is bigger than: 0x100000 < 0x1a0000

            Data Obfuscation

            barindex
            Source: C:\Users\user\Desktop\dcmaM16D71.exeUnpacked PE file: 0.2.dcmaM16D71.exe.1c0000.0.unpack :EW;.rsrc:W;.idata :W; :EW;mxeojzwh:EW;qbrinonr:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;mxeojzwh:EW;qbrinonr:EW;.taggant:EW;
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeUnpacked PE file: 5.2.MPGPH131.exe.270000.0.unpack :EW;.rsrc:W;.idata :W; :EW;mxeojzwh:EW;qbrinonr:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;mxeojzwh:EW;qbrinonr:EW;.taggant:EW;
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeUnpacked PE file: 6.2.MPGPH131.exe.270000.0.unpack :EW;.rsrc:W;.idata :W; :EW;mxeojzwh:EW;qbrinonr:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;mxeojzwh:EW;qbrinonr:EW;.taggant:EW;
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeUnpacked PE file: 7.2.RageMP131.exe.d20000.0.unpack :EW;.rsrc:W;.idata :W; :EW;mxeojzwh:EW;qbrinonr:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;mxeojzwh:EW;qbrinonr:EW;.taggant:EW;
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeUnpacked PE file: 11.2.RageMP131.exe.d20000.0.unpack :EW;.rsrc:W;.idata :W; :EW;mxeojzwh:EW;qbrinonr:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;mxeojzwh:EW;qbrinonr:EW;.taggant:EW;
            Source: initial sampleStatic PE information: section where entry point is pointing to: .taggant
            Source: RageMP131.exe.0.drStatic PE information: real checksum: 0x25f7bf should be: 0x25288c
            Source: MPGPH131.exe.0.drStatic PE information: real checksum: 0x25f7bf should be: 0x25288c
            Source: dcmaM16D71.exeStatic PE information: real checksum: 0x25f7bf should be: 0x25288c
            Source: dcmaM16D71.exeStatic PE information: section name:
            Source: dcmaM16D71.exeStatic PE information: section name: .idata
            Source: dcmaM16D71.exeStatic PE information: section name:
            Source: dcmaM16D71.exeStatic PE information: section name: mxeojzwh
            Source: dcmaM16D71.exeStatic PE information: section name: qbrinonr
            Source: dcmaM16D71.exeStatic PE information: section name: .taggant
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name: .idata
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name: mxeojzwh
            Source: RageMP131.exe.0.drStatic PE information: section name: qbrinonr
            Source: RageMP131.exe.0.drStatic PE information: section name: .taggant
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name: .idata
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name: mxeojzwh
            Source: MPGPH131.exe.0.drStatic PE information: section name: qbrinonr
            Source: MPGPH131.exe.0.drStatic PE information: section name: .taggant
            Source: C:\Users\user\Desktop\dcmaM16D71.exeCode function: 0_2_001F3F59 push ecx; ret 0_2_001F3F6C
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_002A3F59 push ecx; ret 5_2_002A3F6C
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_002A3F59 push ecx; ret 6_2_002A3F6C
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 7_2_00D53F59 push ecx; ret 7_2_00D53F6C
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 11_2_00D53F59 push ecx; ret 11_2_00D53F6C
            Source: dcmaM16D71.exeStatic PE information: section name: entropy: 7.977718228075335
            Source: dcmaM16D71.exeStatic PE information: section name: mxeojzwh entropy: 7.953657351690101
            Source: RageMP131.exe.0.drStatic PE information: section name: entropy: 7.977718228075335
            Source: RageMP131.exe.0.drStatic PE information: section name: mxeojzwh entropy: 7.953657351690101
            Source: MPGPH131.exe.0.drStatic PE information: section name: entropy: 7.977718228075335
            Source: MPGPH131.exe.0.drStatic PE information: section name: mxeojzwh entropy: 7.953657351690101
            Source: C:\Users\user\Desktop\dcmaM16D71.exeFile created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeJump to dropped file
            Source: C:\Users\user\Desktop\dcmaM16D71.exeFile created: C:\ProgramData\MPGPH131\MPGPH131.exeJump to dropped file
            Source: C:\Users\user\Desktop\dcmaM16D71.exeFile created: C:\ProgramData\MPGPH131\MPGPH131.exeJump to dropped file

            Boot Survival

            barindex
            Source: C:\Users\user\Desktop\dcmaM16D71.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exeWindow searched: window name: RegmonClassJump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exeWindow searched: window name: FilemonclassJump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: RegmonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonclassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: RegmonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonclassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: RegmonClassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: FilemonclassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: RegmonClassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: FilemonclassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RageMP131Jump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RageMP131Jump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\dcmaM16D71.exeStalling execution: Execution stalls by calling Sleepgraph_0-16321
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeStalling execution: Execution stalls by calling Sleepgraph_5-17260
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeStalling execution: Execution stalls by calling Sleep
            Source: C:\Users\user\Desktop\dcmaM16D71.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 350CEF second address: 350CF3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4C5A4E second address: 4C5A60 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007F17510C2656h 0x0000000a popad 0x0000000b pushad 0x0000000c push esi 0x0000000d pop esi 0x0000000e pushad 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4C5A60 second address: 4C5A66 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CACA9 second address: 4CACB9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pushad 0x00000008 jnc 00007F17510C2656h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CAF6A second address: 4CAF70 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CB0FB second address: 4CB105 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pop esi 0x00000006 push ebx 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CB23B second address: 4CB26A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F17510BF1BDh 0x0000000e pushad 0x0000000f pushad 0x00000010 popad 0x00000011 jmp 00007F17510BF1C1h 0x00000016 pushad 0x00000017 popad 0x00000018 push ebx 0x00000019 pop ebx 0x0000001a popad 0x0000001b rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CB26A second address: 4CB278 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F17510C265Ah 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CB278 second address: 4CB281 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CB52C second address: 4CB542 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F17510C2656h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jbe 00007F17510C265Ch 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CB542 second address: 4CB575 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F17510BF1C9h 0x00000008 jmp 00007F17510BF1C1h 0x0000000d push eax 0x0000000e pop eax 0x0000000f popad 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CB575 second address: 4CB58C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F17510C2661h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CB58C second address: 4CB599 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CB599 second address: 4CB5B6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 jmp 00007F17510C265Eh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c jnc 00007F17510C2656h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CB5B6 second address: 4CB5C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007F17510BF1B6h 0x0000000a popad 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CB5C1 second address: 4CB5C9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CB5C9 second address: 4CB5D6 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F17510BF1B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push edi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CDBB5 second address: 4CDBC0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CDBC0 second address: 4CDBDB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510BF1BCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a mov eax, dword ptr [esp+04h] 0x0000000e push eax 0x0000000f push edx 0x00000010 push edx 0x00000011 push edx 0x00000012 pop edx 0x00000013 pop edx 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CDBDB second address: 4CDC81 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510C265Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [eax] 0x0000000b jnc 00007F17510C2662h 0x00000011 mov dword ptr [esp+04h], eax 0x00000015 ja 00007F17510C2671h 0x0000001b pop eax 0x0000001c clc 0x0000001d jmp 00007F17510C265Ch 0x00000022 push 00000003h 0x00000024 call 00007F17510C265Ch 0x00000029 ja 00007F17510C265Ah 0x0000002f pop edi 0x00000030 push 00000000h 0x00000032 push 00000000h 0x00000034 push ecx 0x00000035 call 00007F17510C2658h 0x0000003a pop ecx 0x0000003b mov dword ptr [esp+04h], ecx 0x0000003f add dword ptr [esp+04h], 00000014h 0x00000047 inc ecx 0x00000048 push ecx 0x00000049 ret 0x0000004a pop ecx 0x0000004b ret 0x0000004c push 00000003h 0x0000004e call 00007F17510C2659h 0x00000053 jc 00007F17510C2668h 0x00000059 push eax 0x0000005a push edx 0x0000005b push eax 0x0000005c push edx 0x0000005d rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CDC81 second address: 4CDC85 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CDC85 second address: 4CDCF6 instructions: 0x00000000 rdtsc 0x00000002 js 00007F17510C2656h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b jnp 00007F17510C265Ch 0x00000011 pushad 0x00000012 pushad 0x00000013 popad 0x00000014 pushad 0x00000015 popad 0x00000016 popad 0x00000017 mov eax, dword ptr [esp+04h] 0x0000001b pushad 0x0000001c pushad 0x0000001d pushad 0x0000001e popad 0x0000001f pushad 0x00000020 popad 0x00000021 popad 0x00000022 jmp 00007F17510C265Ch 0x00000027 popad 0x00000028 mov eax, dword ptr [eax] 0x0000002a jmp 00007F17510C265Bh 0x0000002f mov dword ptr [esp+04h], eax 0x00000033 jl 00007F17510C265Ah 0x00000039 push eax 0x0000003a push ebx 0x0000003b pop ebx 0x0000003c pop eax 0x0000003d pop eax 0x0000003e mov ecx, dword ptr [ebp+122D3BFDh] 0x00000044 lea ebx, dword ptr [ebp+124509DFh] 0x0000004a xor edi, 22B2457Fh 0x00000050 push eax 0x00000051 pushad 0x00000052 pushad 0x00000053 jno 00007F17510C2656h 0x00000059 jne 00007F17510C2656h 0x0000005f popad 0x00000060 push eax 0x00000061 push edx 0x00000062 push eax 0x00000063 push edx 0x00000064 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CDCF6 second address: 4CDCFA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CDD6A second address: 4CDD70 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CDEC9 second address: 4CDECD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CDECD second address: 4CDF76 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 xor dword ptr [esp], 4B1FC5EDh 0x0000000e mov edi, ebx 0x00000010 push 00000003h 0x00000012 mov dword ptr [ebp+122D196Bh], ebx 0x00000018 push 00000000h 0x0000001a jmp 00007F17510C2669h 0x0000001f push 00000003h 0x00000021 adc si, B638h 0x00000026 push D55A4F32h 0x0000002b push esi 0x0000002c jmp 00007F17510C2668h 0x00000031 pop esi 0x00000032 xor dword ptr [esp], 155A4F32h 0x00000039 mov dword ptr [ebp+122D595Ah], edi 0x0000003f lea ebx, dword ptr [ebp+124509F3h] 0x00000045 push 00000000h 0x00000047 push ecx 0x00000048 call 00007F17510C2658h 0x0000004d pop ecx 0x0000004e mov dword ptr [esp+04h], ecx 0x00000052 add dword ptr [esp+04h], 00000014h 0x0000005a inc ecx 0x0000005b push ecx 0x0000005c ret 0x0000005d pop ecx 0x0000005e ret 0x0000005f xchg eax, ebx 0x00000060 jmp 00007F17510C2665h 0x00000065 push eax 0x00000066 push eax 0x00000067 push edx 0x00000068 push ecx 0x00000069 jng 00007F17510C2656h 0x0000006f pop ecx 0x00000070 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4EEBAE second address: 4EEBB2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4EEBB2 second address: 4EEBB8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4ECBFD second address: 4ECC01 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4ECC01 second address: 4ECC5D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 js 00007F17510C2656h 0x0000000d pushad 0x0000000e popad 0x0000000f jmp 00007F17510C2666h 0x00000014 ja 00007F17510C2656h 0x0000001a popad 0x0000001b pushad 0x0000001c jbe 00007F17510C2656h 0x00000022 jmp 00007F17510C2664h 0x00000027 popad 0x00000028 jmp 00007F17510C265Ah 0x0000002d popad 0x0000002e pushad 0x0000002f jbe 00007F17510C265Eh 0x00000035 push eax 0x00000036 push edx 0x00000037 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4ECF67 second address: 4ECF6B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4ED10F second address: 4ED11F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007F17510C2656h 0x0000000a jno 00007F17510C2656h 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4ED11F second address: 4ED14B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510BF1BCh 0x00000007 jmp 00007F17510BF1C5h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 push ebx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4ED14B second address: 4ED15E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop ebx 0x00000007 jmp 00007F17510C265Ch 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4ED483 second address: 4ED487 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4ED603 second address: 4ED614 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F17510C265Dh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4ED77A second address: 4ED79B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F17510BF1C3h 0x00000009 pop ecx 0x0000000a pushad 0x0000000b jnp 00007F17510BF1B6h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4ED79B second address: 4ED7A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4EDD08 second address: 4EDD0E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4EE2BF second address: 4EE2D3 instructions: 0x00000000 rdtsc 0x00000002 js 00007F17510C2656h 0x00000008 push edi 0x00000009 pop edi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jno 00007F17510C2662h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4EE2D3 second address: 4EE2DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F17510BF1B6h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4EE48A second address: 4EE494 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F17510C2656h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4EE494 second address: 4EE49A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4EE49A second address: 4EE4A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007F17510C2656h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4EE724 second address: 4EE732 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jl 00007F17510BF1BCh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4EE9F4 second address: 4EE9FE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4EE9FE second address: 4EEA28 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a jnp 00007F17510BF1B6h 0x00000010 jmp 00007F17510BF1C9h 0x00000015 popad 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4F1B47 second address: 4F1B4C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4F44C0 second address: 4F44EA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007F17510BF1B6h 0x0000000a jmp 00007F17510BF1C8h 0x0000000f push edi 0x00000010 pop edi 0x00000011 popad 0x00000012 pop eax 0x00000013 push ecx 0x00000014 push ebx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4FA121 second address: 4FA127 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4FA127 second address: 4FA136 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F17510BF1B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4C3F7F second address: 4C3F8A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jo 00007F17510C2656h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4F9E39 second address: 4F9E3D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4F9FB3 second address: 4F9FBB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4FC09C second address: 4FC0A2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4FC120 second address: 4FC124 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4FC124 second address: 4FC16D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov eax, dword ptr [esp+04h] 0x0000000b push edi 0x0000000c push edi 0x0000000d jng 00007F17510BF1B6h 0x00000013 pop edi 0x00000014 pop edi 0x00000015 mov eax, dword ptr [eax] 0x00000017 jmp 00007F17510BF1BAh 0x0000001c mov dword ptr [esp+04h], eax 0x00000020 push eax 0x00000021 push edx 0x00000022 pushad 0x00000023 jmp 00007F17510BF1C1h 0x00000028 jmp 00007F17510BF1BFh 0x0000002d popad 0x0000002e rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4FC16D second address: 4FC1A4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510C2669h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop eax 0x0000000a push 700B53F8h 0x0000000f push edi 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F17510C2661h 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4FC1A4 second address: 4FC1A8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4FC31C second address: 4FC322 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4FC520 second address: 4FC534 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510BF1C0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4FC5F3 second address: 4FC60D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 jnc 00007F17510C265Ch 0x0000000b popad 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 pushad 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4FC60D second address: 4FC612 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4FC612 second address: 4FC618 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4FCCD1 second address: 4FCCD6 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4FCE76 second address: 4FCE7A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4FD148 second address: 4FD15A instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F17510BF1B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jbe 00007F17510BF1BCh 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4FE17F second address: 4FE194 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 jne 00007F17510C265Ch 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4FDFFD second address: 4FE007 instructions: 0x00000000 rdtsc 0x00000002 js 00007F17510BF1B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4FE194 second address: 4FE200 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 js 00007F17510C2656h 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e nop 0x0000000f mov si, 39FAh 0x00000013 push 00000000h 0x00000015 push 00000000h 0x00000017 push edi 0x00000018 call 00007F17510C2658h 0x0000001d pop edi 0x0000001e mov dword ptr [esp+04h], edi 0x00000022 add dword ptr [esp+04h], 0000001Ah 0x0000002a inc edi 0x0000002b push edi 0x0000002c ret 0x0000002d pop edi 0x0000002e ret 0x0000002f mov dword ptr [ebp+1245F297h], ecx 0x00000035 push 00000000h 0x00000037 jng 00007F17510C2673h 0x0000003d jnp 00007F17510C266Dh 0x00000043 call 00007F17510C2666h 0x00000048 pop esi 0x00000049 mov si, 8AB1h 0x0000004d xchg eax, ebx 0x0000004e push edi 0x0000004f push eax 0x00000050 push edx 0x00000051 push edx 0x00000052 pop edx 0x00000053 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4FE007 second address: 4FE021 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510BF1C1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push esi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4FE200 second address: 4FE21C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510C265Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edi 0x0000000a push eax 0x0000000b js 00007F17510C2664h 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4FE21C second address: 4FE220 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4FF2A3 second address: 4FF2AD instructions: 0x00000000 rdtsc 0x00000002 jns 00007F17510C2656h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4FF2AD second address: 4FF2B3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4FF2B3 second address: 4FF321 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510C2668h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], eax 0x0000000e push eax 0x0000000f jc 00007F17510C265Ch 0x00000015 jg 00007F17510C2656h 0x0000001b pop esi 0x0000001c push 00000000h 0x0000001e movzx esi, si 0x00000021 push 00000000h 0x00000023 push 00000000h 0x00000025 push edx 0x00000026 call 00007F17510C2658h 0x0000002b pop edx 0x0000002c mov dword ptr [esp+04h], edx 0x00000030 add dword ptr [esp+04h], 0000001Dh 0x00000038 inc edx 0x00000039 push edx 0x0000003a ret 0x0000003b pop edx 0x0000003c ret 0x0000003d mov si, DEC1h 0x00000041 xchg eax, ebx 0x00000042 push eax 0x00000043 push edx 0x00000044 jnp 00007F17510C265Ch 0x0000004a rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4FF321 second address: 4FF327 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4FF327 second address: 4FF32B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4FF32B second address: 4FF34B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a pushad 0x0000000b jmp 00007F17510BF1C3h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 501916 second address: 50191E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 501ED2 second address: 501ED7 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 501ED7 second address: 501F49 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 jmp 00007F17510C265Fh 0x0000000d nop 0x0000000e mov dword ptr [ebp+122D1929h], edx 0x00000014 push 00000000h 0x00000016 push 00000000h 0x00000018 push esi 0x00000019 call 00007F17510C2658h 0x0000001e pop esi 0x0000001f mov dword ptr [esp+04h], esi 0x00000023 add dword ptr [esp+04h], 00000014h 0x0000002b inc esi 0x0000002c push esi 0x0000002d ret 0x0000002e pop esi 0x0000002f ret 0x00000030 jmp 00007F17510C265Dh 0x00000035 push 00000000h 0x00000037 push 00000000h 0x00000039 push ebx 0x0000003a call 00007F17510C2658h 0x0000003f pop ebx 0x00000040 mov dword ptr [esp+04h], ebx 0x00000044 add dword ptr [esp+04h], 00000015h 0x0000004c inc ebx 0x0000004d push ebx 0x0000004e ret 0x0000004f pop ebx 0x00000050 ret 0x00000051 xchg eax, ebx 0x00000052 push ebx 0x00000053 push eax 0x00000054 push edx 0x00000055 jne 00007F17510C2656h 0x0000005b rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 505368 second address: 50536E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 507943 second address: 507948 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 507948 second address: 5079A2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510BF1C4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c add dword ptr [ebp+122D1DDAh], edi 0x00000012 mov edi, 0FF04D6Dh 0x00000017 push 00000000h 0x00000019 push 00000000h 0x0000001b push ebp 0x0000001c call 00007F17510BF1B8h 0x00000021 pop ebp 0x00000022 mov dword ptr [esp+04h], ebp 0x00000026 add dword ptr [esp+04h], 00000017h 0x0000002e inc ebp 0x0000002f push ebp 0x00000030 ret 0x00000031 pop ebp 0x00000032 ret 0x00000033 sbb ebx, 0C14193Eh 0x00000039 push 00000000h 0x0000003b xchg eax, esi 0x0000003c jg 00007F17510BF1C4h 0x00000042 push eax 0x00000043 push edx 0x00000044 push eax 0x00000045 push edx 0x00000046 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5079A2 second address: 5079A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 505AD9 second address: 505AE3 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F17510BF1BCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 506B52 second address: 506B56 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 508C35 second address: 508C39 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 505AE3 second address: 505AFD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 pushad 0x00000008 jmp 00007F17510C265Ah 0x0000000d jl 00007F17510C265Ch 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 509CB7 second address: 509CC9 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F17510BF1B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jo 00007F17510BF1B6h 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 507B27 second address: 507B2E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 50BA5E second address: 50BA64 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 50BA64 second address: 50BA77 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F17510C2658h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 pop edx 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 50BA77 second address: 50BA7D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 50BA7D second address: 50BA81 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 50BA81 second address: 50BA85 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 50BDBB second address: 50BDD4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 pushad 0x00000009 jno 00007F17510C2658h 0x0000000f js 00007F17510C265Ch 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 50CD82 second address: 50CE30 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop esi 0x00000006 push eax 0x00000007 push esi 0x00000008 pushad 0x00000009 jmp 00007F17510BF1BEh 0x0000000e jns 00007F17510BF1B6h 0x00000014 popad 0x00000015 pop esi 0x00000016 nop 0x00000017 push 00000000h 0x00000019 push ebx 0x0000001a call 00007F17510BF1B8h 0x0000001f pop ebx 0x00000020 mov dword ptr [esp+04h], ebx 0x00000024 add dword ptr [esp+04h], 00000017h 0x0000002c inc ebx 0x0000002d push ebx 0x0000002e ret 0x0000002f pop ebx 0x00000030 ret 0x00000031 pushad 0x00000032 jmp 00007F17510BF1C6h 0x00000037 mov edx, dword ptr [ebp+124796ADh] 0x0000003d popad 0x0000003e push dword ptr fs:[00000000h] 0x00000045 mov ebx, dword ptr [ebp+122D394Dh] 0x0000004b mov dword ptr fs:[00000000h], esp 0x00000052 mov edi, esi 0x00000054 mov eax, dword ptr [ebp+122D1755h] 0x0000005a mov edi, edx 0x0000005c push FFFFFFFFh 0x0000005e call 00007F17510BF1BCh 0x00000063 call 00007F17510BF1BEh 0x00000068 mov dword ptr [ebp+122D323Dh], esi 0x0000006e pop edi 0x0000006f pop edi 0x00000070 nop 0x00000071 push eax 0x00000072 push edx 0x00000073 jmp 00007F17510BF1BCh 0x00000078 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 50EDA4 second address: 50EDB2 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F17510C2656h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push edx 0x0000000d pop edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 50CE30 second address: 50CE36 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 511C35 second address: 511C42 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push ecx 0x0000000a pushad 0x0000000b popad 0x0000000c pop ecx 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 511C42 second address: 511C56 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F17510BF1C0h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 511C56 second address: 511C5A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 512CDF second address: 512CE9 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F17510BF1B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 512CE9 second address: 512D0A instructions: 0x00000000 rdtsc 0x00000002 jl 00007F17510C2658h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b jo 00007F17510C2669h 0x00000011 pushad 0x00000012 jmp 00007F17510C265Bh 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 50F027 second address: 50F040 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510BF1C5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 50F040 second address: 50F050 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F17510C265Bh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 510DE0 second address: 510DE6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 510DE6 second address: 510E57 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510C265Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c sub edi, 19D66CC4h 0x00000012 push dword ptr fs:[00000000h] 0x00000019 clc 0x0000001a mov dword ptr fs:[00000000h], esp 0x00000021 mov dword ptr [ebp+1245BB12h], esi 0x00000027 xor dword ptr [ebp+122D2F80h], edx 0x0000002d mov eax, dword ptr [ebp+122D0281h] 0x00000033 push 00000000h 0x00000035 push ecx 0x00000036 call 00007F17510C2658h 0x0000003b pop ecx 0x0000003c mov dword ptr [esp+04h], ecx 0x00000040 add dword ptr [esp+04h], 00000018h 0x00000048 inc ecx 0x00000049 push ecx 0x0000004a ret 0x0000004b pop ecx 0x0000004c ret 0x0000004d push FFFFFFFFh 0x0000004f or edi, 5A427127h 0x00000055 add dword ptr [ebp+122D26EDh], ebx 0x0000005b nop 0x0000005c push eax 0x0000005d push edx 0x0000005e pushad 0x0000005f push ebx 0x00000060 pop ebx 0x00000061 push edx 0x00000062 pop edx 0x00000063 popad 0x00000064 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 50DEB2 second address: 50DEB8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 50DEB8 second address: 50DED7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop edx 0x00000005 push ecx 0x00000006 pop ecx 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F17510C2661h 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 513B8E second address: 513B92 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 513B92 second address: 513BDD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510C265Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a mov dword ptr [esp], eax 0x0000000d call 00007F17510C2669h 0x00000012 mov ebx, dword ptr [ebp+122D3C25h] 0x00000018 pop ebx 0x00000019 push 00000000h 0x0000001b mov bl, EEh 0x0000001d push 00000000h 0x0000001f add ebx, dword ptr [ebp+122D1869h] 0x00000025 xchg eax, esi 0x00000026 jbe 00007F17510C2660h 0x0000002c push eax 0x0000002d push edx 0x0000002e push esi 0x0000002f pop esi 0x00000030 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 511E5E second address: 511E68 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jbe 00007F17510BF1B6h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 513E13 second address: 513E19 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 513E19 second address: 513E1D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 517E7F second address: 517EBF instructions: 0x00000000 rdtsc 0x00000002 ja 00007F17510C2682h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push ecx 0x0000000b push eax 0x0000000c js 00007F17510C2656h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 51CAB6 second address: 51CABC instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 520040 second address: 52004A instructions: 0x00000000 rdtsc 0x00000002 jo 00007F17510C2656h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4B8789 second address: 4B879D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F17510BF1BEh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4B879D second address: 4B87B2 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F17510C265Eh 0x00000008 pushad 0x00000009 push esi 0x0000000a pop esi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 51F7F9 second address: 51F811 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F17510BF1C4h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 51F811 second address: 51F846 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 jne 00007F17510C2656h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007F17510C2667h 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007F17510C265Ah 0x00000018 je 00007F17510C2656h 0x0000001e rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 521681 second address: 5216B2 instructions: 0x00000000 rdtsc 0x00000002 js 00007F17510BF1C9h 0x00000008 jmp 00007F17510BF1C3h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 jmp 00007F17510BF1BAh 0x00000017 pushad 0x00000018 popad 0x00000019 popad 0x0000001a push eax 0x0000001b push edx 0x0000001c push ebx 0x0000001d pop ebx 0x0000001e rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5216B2 second address: 5216B8 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 52660B second address: 526615 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 526615 second address: 526619 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 526619 second address: 52661D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 52661D second address: 52666E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 jmp 00007F17510C2669h 0x0000000d mov eax, dword ptr [esp+04h] 0x00000011 jmp 00007F17510C2667h 0x00000016 mov eax, dword ptr [eax] 0x00000018 jmp 00007F17510C265Ah 0x0000001d mov dword ptr [esp+04h], eax 0x00000021 push ebx 0x00000022 push eax 0x00000023 push edx 0x00000024 push ecx 0x00000025 pop ecx 0x00000026 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 52666E second address: 526672 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 526750 second address: 526754 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 52C3EF second address: 52C3FD instructions: 0x00000000 rdtsc 0x00000002 jne 00007F17510BF1B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 52C3FD second address: 52C401 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 52C401 second address: 52C40D instructions: 0x00000000 rdtsc 0x00000002 jo 00007F17510BF1B6h 0x00000008 push edi 0x00000009 pop edi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4AFFDB second address: 4AFFE5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007F17510C2656h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 52BF3D second address: 52BF41 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 52BF41 second address: 52BF51 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F17510C265Ah 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 52BF51 second address: 52BF6E instructions: 0x00000000 rdtsc 0x00000002 jl 00007F17510BF1B8h 0x00000008 push esi 0x00000009 pop esi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d pushad 0x0000000e push edi 0x0000000f pop edi 0x00000010 jno 00007F17510BF1B6h 0x00000016 popad 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a popad 0x0000001b push ebx 0x0000001c pop ebx 0x0000001d rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 52C0B5 second address: 52C0C1 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push edi 0x00000004 pop edi 0x00000005 pop ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 push esi 0x00000009 pop esi 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 52C0C1 second address: 52C0C5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 531A23 second address: 531A41 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop ecx 0x00000009 pushad 0x0000000a jnc 00007F17510C265Ch 0x00000010 js 00007F17510C265Ch 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 531A41 second address: 531A49 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 531A49 second address: 531A6D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510C2662h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jg 00007F17510C2656h 0x00000011 jnp 00007F17510C2656h 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 531A6D second address: 531A71 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 530723 second address: 530727 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 530A00 second address: 530A1D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F17510BF1BEh 0x00000008 jmp 00007F17510BF1BAh 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 530435 second address: 530440 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 push edi 0x0000000a pop edi 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 530440 second address: 530444 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 530444 second address: 53044C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 53044C second address: 530456 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jne 00007F17510BF1B6h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 530456 second address: 530467 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 jnp 00007F17510C2656h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4FFBA0 second address: 4FFBA4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4FFBA4 second address: 4FFBA8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 531221 second address: 53122A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push esi 0x00000004 pop esi 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5313A4 second address: 5313B0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 je 00007F17510C2656h 0x0000000a push edx 0x0000000b pop edx 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5313B0 second address: 5313BA instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F17510BF1B6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5314F0 second address: 5314F4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5314F4 second address: 531511 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007F17510BF1C2h 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 535CDA second address: 535CE0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 536117 second address: 536131 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F17510BF1C6h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 536131 second address: 536135 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 53628F second address: 536298 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 536298 second address: 53629E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 53629E second address: 5362A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5362A4 second address: 5362AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5363DC second address: 5363E6 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5363E6 second address: 5363F9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510C265Fh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5363F9 second address: 536435 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007F17510BF1C5h 0x0000000c jo 00007F17510BF1CDh 0x00000012 jmp 00007F17510BF1C5h 0x00000017 pushad 0x00000018 popad 0x00000019 pushad 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 536435 second address: 53643B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5368CD second address: 5368D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push esi 0x00000008 pop esi 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5368D6 second address: 5368DC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 536A3D second address: 536A43 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 536A43 second address: 536A5E instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 pop edi 0x00000006 pushad 0x00000007 jmp 00007F17510C2662h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 536BE0 second address: 536C08 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 jnc 00007F17510BF1B6h 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f jno 00007F17510BF1B6h 0x00000015 jmp 00007F17510BF1C3h 0x0000001a rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 536C08 second address: 536C23 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510C2667h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 536C23 second address: 536C30 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jng 00007F17510BF1B6h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 537175 second address: 53717B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 535A3A second address: 535A47 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F17510BF1B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 53C150 second address: 53C156 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 53C156 second address: 53C15C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 53C15C second address: 53C189 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510C2661h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007F17510C2661h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 push ecx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 53C189 second address: 53C196 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push esi 0x00000006 jng 00007F17510BF1B6h 0x0000000c pop esi 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 53C196 second address: 53C19B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 53C19B second address: 53C1A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 53EDFD second address: 53EE01 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 53EE01 second address: 53EE2D instructions: 0x00000000 rdtsc 0x00000002 jl 00007F17510BF1B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jmp 00007F17510BF1C4h 0x00000010 jmp 00007F17510BF1BBh 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 53EE2D second address: 53EE47 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop esi 0x00000006 push eax 0x00000007 push edx 0x00000008 push edi 0x00000009 pushad 0x0000000a popad 0x0000000b pop edi 0x0000000c jmp 00007F17510C265Eh 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 53EE47 second address: 53EE58 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510BF1BBh 0x00000007 push eax 0x00000008 push edx 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4BF119 second address: 4BF135 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510C2661h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e push edi 0x0000000f pop edi 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4BF135 second address: 4BF14E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510BF1C5h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 543003 second address: 543017 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F17510C2656h 0x00000008 jc 00007F17510C2656h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 543017 second address: 54301D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 54301D second address: 54302A instructions: 0x00000000 rdtsc 0x00000002 je 00007F17510C2656h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 54302A second address: 54304E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007F17510BF1B6h 0x0000000a popad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F17510BF1C6h 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 54304E second address: 543055 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4FA9C4 second address: 4FAA03 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F17510BF1C9h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c pushad 0x0000000d je 00007F17510BF1B6h 0x00000013 jmp 00007F17510BF1C3h 0x00000018 popad 0x00000019 pushad 0x0000001a push edx 0x0000001b pop edx 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4FABE7 second address: 4FABEC instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4FAFFC second address: 4FB000 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4FB000 second address: 4FB006 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4FB16E second address: 4FB173 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4FB274 second address: 4FB28D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007F17510C2656h 0x0000000a popad 0x0000000b pop eax 0x0000000c mov eax, dword ptr [esp+04h] 0x00000010 jo 00007F17510C265Eh 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4FB28D second address: 4FB2B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 mov eax, dword ptr [eax] 0x00000007 jmp 00007F17510BF1C9h 0x0000000c mov dword ptr [esp+04h], eax 0x00000010 pushad 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4FB2B5 second address: 4FB2D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F17510C2669h 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4FB2D7 second address: 4FB2DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4FB483 second address: 4FB489 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4FB489 second address: 4FB4AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 pushad 0x00000008 jmp 00007F17510BF1C6h 0x0000000d push edi 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4FB960 second address: 4FB976 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 jl 00007F17510C2662h 0x0000000e jo 00007F17510C265Ch 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4FBA7C second address: 4FBA81 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4FBA81 second address: 4FBA9A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F17510C265Dh 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4FBA9A second address: 4FBAB0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510BF1C2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 54330B second address: 543327 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510C265Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007F17510C265Dh 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5434B6 second address: 5434BA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5434BA second address: 5434C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push ebx 0x0000000a pushad 0x0000000b popad 0x0000000c pushad 0x0000000d popad 0x0000000e pop ebx 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5434C9 second address: 5434CF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5434CF second address: 5434D3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 54361B second address: 54361F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 54361F second address: 543623 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 543623 second address: 543653 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 push eax 0x00000008 pop eax 0x00000009 pushad 0x0000000a popad 0x0000000b pop ebx 0x0000000c pop esi 0x0000000d push edi 0x0000000e pushad 0x0000000f jnl 00007F17510BF1B6h 0x00000015 jmp 00007F17510BF1C5h 0x0000001a push edx 0x0000001b pop edx 0x0000001c popad 0x0000001d push ecx 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 543794 second address: 5437B7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F17510C2669h 0x00000009 jnc 00007F17510C2656h 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 54392C second address: 543934 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 543934 second address: 543951 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007F17510C2656h 0x0000000a popad 0x0000000b pushad 0x0000000c jmp 00007F17510C265Dh 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 543AD0 second address: 543AE9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 pushad 0x00000006 jnp 00007F17510BF1B6h 0x0000000c jp 00007F17510BF1B6h 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 push edi 0x00000016 pop edi 0x00000017 push edi 0x00000018 pop edi 0x00000019 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 543AE9 second address: 543B01 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510C2661h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 543B01 second address: 543B1A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F17510BF1C3h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 543C60 second address: 543C66 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 543C66 second address: 543C81 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F17510BF1BCh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jc 00007F17510BF1BEh 0x00000011 push edx 0x00000012 pop edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 549D1D second address: 549D28 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 550CCF second address: 550CE9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F17510BF1C5h 0x00000009 popad 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 550CE9 second address: 550CEE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 550E4C second address: 550E5C instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F17510BF1C2h 0x00000008 jnc 00007F17510BF1B6h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 554217 second address: 55421F instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 55421F second address: 55423E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F17510BF1C9h 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 55423E second address: 554242 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4B1AE7 second address: 4B1AEB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4B1AEB second address: 4B1B07 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F17510C2662h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4B1B07 second address: 4B1B0B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 559CC7 second address: 559CCB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 559CCB second address: 559CCF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 559CCF second address: 559CDF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jbe 00007F17510C2656h 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 559E5A second address: 559E5E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 559E5E second address: 559E81 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F17510C265Ch 0x00000008 push edi 0x00000009 jo 00007F17510C2656h 0x0000000f push edi 0x00000010 pop edi 0x00000011 pop edi 0x00000012 pop edx 0x00000013 pop eax 0x00000014 push edx 0x00000015 jg 00007F17510C265Eh 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 55A250 second address: 55A27B instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F17510BF1C4h 0x0000000b pop eax 0x0000000c push ebx 0x0000000d jmp 00007F17510BF1BCh 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 560A16 second address: 560A5C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007F17510C2656h 0x0000000a popad 0x0000000b jmp 00007F17510C265Ah 0x00000010 popad 0x00000011 pushad 0x00000012 jmp 00007F17510C2669h 0x00000017 push ebx 0x00000018 jmp 00007F17510C2663h 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 561059 second address: 561064 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 561064 second address: 56106A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 56106A second address: 561070 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 561070 second address: 561078 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 561078 second address: 56107C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 56107C second address: 5610AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnp 00007F17510C2658h 0x0000000c pushad 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 pushad 0x00000011 jmp 00007F17510C265Ch 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007F17510C2660h 0x0000001d rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5613C4 second address: 5613CE instructions: 0x00000000 rdtsc 0x00000002 jo 00007F17510BF1BCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5613CE second address: 5613EA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jmp 00007F17510C2666h 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4B35A9 second address: 4B35BC instructions: 0x00000000 rdtsc 0x00000002 jc 00007F17510BF1B6h 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f pushad 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4B35BC second address: 4B35D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 jmp 00007F17510C2660h 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 56AF2A second address: 56AF30 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 56AF30 second address: 56AF52 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 pushad 0x00000008 pushad 0x00000009 jmp 00007F17510C2667h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 56AF52 second address: 56AF5A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 56AF5A second address: 56AF7C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 jmp 00007F17510C2668h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 56AF7C second address: 56AF9C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F17510BF1C8h 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 56B282 second address: 56B292 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F17510C2656h 0x00000008 ja 00007F17510C2656h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 56B292 second address: 56B2A0 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 push eax 0x00000006 pop eax 0x00000007 pop ebx 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c push eax 0x0000000d pop eax 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 56B3F8 second address: 56B41A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F17510C265Dh 0x00000009 pop ecx 0x0000000a jg 00007F17510C265Ch 0x00000010 jl 00007F17510C2656h 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 56B41A second address: 56B42D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F17510BF1BFh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 56B811 second address: 56B830 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pushad 0x00000006 jmp 00007F17510C2667h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 56B830 second address: 56B838 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5725D3 second address: 5725E0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007F17510C2656h 0x0000000a push esi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 572B6D second address: 572B78 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 pushad 0x00000009 popad 0x0000000a popad 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 572B78 second address: 572B88 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F17510C265Ch 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 572B88 second address: 572B94 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 572B94 second address: 572B9A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 572B9A second address: 572B9E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 572B9E second address: 572BA2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 572E54 second address: 572E5A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5730FE second address: 573108 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F17510C2656h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5733FA second address: 573419 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 jmp 00007F17510BF1C9h 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 573AE8 second address: 573B00 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a jmp 00007F17510C265Eh 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 573B00 second address: 573B04 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 573B04 second address: 573B0D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 57A89D second address: 57A8C7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F17510BF1BDh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jmp 00007F17510BF1C4h 0x00000010 push esi 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 57A8C7 second address: 57A8DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop esi 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b jnp 00007F17510C2656h 0x00000011 pushad 0x00000012 popad 0x00000013 popad 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 57A8DB second address: 57A8E1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 57A2FC second address: 57A306 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F17510C2656h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 57A306 second address: 57A30C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 57A30C second address: 57A331 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510C265Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F17510C2660h 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 588026 second address: 58802A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 58802A second address: 588044 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510C2666h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 58ED62 second address: 58ED66 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 58ED66 second address: 58ED72 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007F17510C2656h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 596050 second address: 59606C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push ebx 0x00000006 jmp 00007F17510BF1C1h 0x0000000b pop ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 59606C second address: 596072 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 596072 second address: 59607C instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push esi 0x00000009 pop esi 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5A77A2 second address: 5A77A6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5A7A80 second address: 5A7A88 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5A7A88 second address: 5A7A8E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5A7C23 second address: 5A7C3E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510BF1C7h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5A7F8E second address: 5A7F92 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5A7F92 second address: 5A7FEF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510BF1BAh 0x00000007 jnp 00007F17510BF1B6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f jmp 00007F17510BF1C7h 0x00000014 popad 0x00000015 push eax 0x00000016 push edx 0x00000017 jbe 00007F17510BF1BEh 0x0000001d push ecx 0x0000001e jmp 00007F17510BF1BEh 0x00000023 jmp 00007F17510BF1C1h 0x00000028 pop ecx 0x00000029 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5A8173 second address: 5A8180 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 jbe 00007F17510C2656h 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5A8CFE second address: 5A8D02 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5A8D02 second address: 5A8D08 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5AC878 second address: 5AC8AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 jnl 00007F17510BF1BCh 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F17510BF1C1h 0x00000012 jmp 00007F17510BF1BEh 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5AC8AA second address: 5AC8AE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5AC8AE second address: 5AC8DE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a jmp 00007F17510BF1BAh 0x0000000f push edx 0x00000010 pop edx 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F17510BF1C5h 0x00000019 pushad 0x0000001a popad 0x0000001b rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5AC8DE second address: 5AC8E8 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F17510C2656h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5AC8E8 second address: 5AC8ED instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5AC8ED second address: 5AC90B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F17510C2668h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5AC468 second address: 5AC46C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5AC46C second address: 5AC472 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5AC472 second address: 5AC478 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5AC5A6 second address: 5AC5AC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5AE042 second address: 5AE04E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jne 00007F17510BF1B6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5AE04E second address: 5AE052 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5C00AC second address: 5C00B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5C00B0 second address: 5C00B6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5CE5DE second address: 5CE5E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5D13EF second address: 5D13FF instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jng 00007F17510C2656h 0x00000009 pop esi 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e push edi 0x0000000f pop edi 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5D13FF second address: 5D1403 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5D111F second address: 5D1123 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5F9BE8 second address: 5F9C0B instructions: 0x00000000 rdtsc 0x00000002 jne 00007F17510BF1B6h 0x00000008 jo 00007F17510BF1B6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F17510BF1BBh 0x00000017 js 00007F17510BF1B6h 0x0000001d rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5F9C0B second address: 5F9C15 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F17510C2656h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5F9EBE second address: 5F9ED9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 jmp 00007F17510BF1C5h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5F9ED9 second address: 5F9EDE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5F9EDE second address: 5F9EE4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5FA02D second address: 5FA033 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5FA033 second address: 5FA037 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5FA037 second address: 5FA042 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ecx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5FA042 second address: 5FA048 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5FA810 second address: 5FA817 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5FA995 second address: 5FA999 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5FA999 second address: 5FA9AB instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F17510C2656h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jnp 00007F17510C2658h 0x00000010 push esi 0x00000011 pop esi 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5FA9AB second address: 5FA9B7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jng 00007F17510BF1B6h 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5FD8A8 second address: 5FD8AC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5FD8AC second address: 5FD8D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b jmp 00007F17510BF1C3h 0x00000010 jmp 00007F17510BF1BAh 0x00000015 popad 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5FD8D5 second address: 5FD950 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jno 00007F17510C2656h 0x00000009 pop esi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c nop 0x0000000d push 00000000h 0x0000000f push ebx 0x00000010 call 00007F17510C2658h 0x00000015 pop ebx 0x00000016 mov dword ptr [esp+04h], ebx 0x0000001a add dword ptr [esp+04h], 00000016h 0x00000022 inc ebx 0x00000023 push ebx 0x00000024 ret 0x00000025 pop ebx 0x00000026 ret 0x00000027 mov dx, di 0x0000002a push 00000004h 0x0000002c add edx, dword ptr [ebp+122D186Fh] 0x00000032 call 00007F17510C2659h 0x00000037 pushad 0x00000038 ja 00007F17510C266Bh 0x0000003e push edi 0x0000003f pushad 0x00000040 popad 0x00000041 pop edi 0x00000042 popad 0x00000043 push eax 0x00000044 jmp 00007F17510C2662h 0x00000049 mov eax, dword ptr [esp+04h] 0x0000004d pushad 0x0000004e push edi 0x0000004f push eax 0x00000050 push edx 0x00000051 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5FDC26 second address: 5FDC35 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F17510BF1BBh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5FEF2F second address: 5FEF39 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F17510C2656h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 5FEF39 second address: 5FEF55 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510BF1C6h 0x00000007 push eax 0x00000008 push edx 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D20656 second address: 4D2066E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F17510C2664h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D2066E second address: 4D20672 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D20672 second address: 4D2076C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ecx 0x00000009 pushad 0x0000000a push ecx 0x0000000b pushfd 0x0000000c jmp 00007F17510C2669h 0x00000011 sub cx, 8A36h 0x00000016 jmp 00007F17510C2661h 0x0000001b popfd 0x0000001c pop ecx 0x0000001d call 00007F17510C2661h 0x00000022 jmp 00007F17510C2660h 0x00000027 pop esi 0x00000028 popad 0x00000029 mov dword ptr [esp], ebp 0x0000002c pushad 0x0000002d pushfd 0x0000002e jmp 00007F17510C2667h 0x00000033 sbb ecx, 5E4714CEh 0x00000039 jmp 00007F17510C2669h 0x0000003e popfd 0x0000003f pushfd 0x00000040 jmp 00007F17510C2660h 0x00000045 adc eax, 5F7F6D48h 0x0000004b jmp 00007F17510C265Bh 0x00000050 popfd 0x00000051 popad 0x00000052 mov ebp, esp 0x00000054 pushad 0x00000055 pushfd 0x00000056 jmp 00007F17510C2664h 0x0000005b and ax, 2FA8h 0x00000060 jmp 00007F17510C265Bh 0x00000065 popfd 0x00000066 movzx eax, dx 0x00000069 popad 0x0000006a pop ebp 0x0000006b push eax 0x0000006c push edx 0x0000006d pushad 0x0000006e mov cx, 8933h 0x00000072 mov ax, 858Fh 0x00000076 popad 0x00000077 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D2076C second address: 4D20780 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F17510BF1C0h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CF0117 second address: 4CF013C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510C2661h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F17510C265Dh 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CF013C second address: 4CF0144 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx ebx, cx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CF0144 second address: 4CF0160 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F17510C2662h 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CF0160 second address: 4CF01B8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop edi 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 jmp 00007F17510BF1C6h 0x0000000e mov ebp, esp 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 pushad 0x00000014 popad 0x00000015 pushfd 0x00000016 jmp 00007F17510BF1C3h 0x0000001b xor cl, FFFFFFDEh 0x0000001e jmp 00007F17510BF1C9h 0x00000023 popfd 0x00000024 popad 0x00000025 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CF01B8 second address: 4CF0202 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510C2661h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d mov cx, bx 0x00000010 pushfd 0x00000011 jmp 00007F17510C265Fh 0x00000016 adc ch, FFFFFF9Eh 0x00000019 jmp 00007F17510C2669h 0x0000001e popfd 0x0000001f popad 0x00000020 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D6028D second address: 4D60293 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D60293 second address: 4D602A9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov cx, 2507h 0x00000007 mov bx, si 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 mov di, si 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D602A9 second address: 4D602AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D602AE second address: 4D602B4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D602B4 second address: 4D602B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CE0C93 second address: 4CE0C99 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CE0C99 second address: 4CE0CBD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edx, esi 0x00000005 mov esi, 5B638D21h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov ebp, esp 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F17510BF1C3h 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CE0CBD second address: 4CE0CC3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CE0CC3 second address: 4CE0CC7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CE0CC7 second address: 4CE0CEF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push dword ptr [ebp+04h] 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F17510C2669h 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CE0CEF second address: 4CE0CF3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CE0CF3 second address: 4CE0CF9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CE0CF9 second address: 4CE0D5A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510BF1BCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push dword ptr [ebp+0Ch] 0x0000000c jmp 00007F17510BF1C0h 0x00000011 push dword ptr [ebp+08h] 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 call 00007F17510BF1BDh 0x0000001c pop eax 0x0000001d pushfd 0x0000001e jmp 00007F17510BF1C1h 0x00000023 sub si, DAC6h 0x00000028 jmp 00007F17510BF1C1h 0x0000002d popfd 0x0000002e popad 0x0000002f rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D50E79 second address: 4D50EA0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bx, 06EAh 0x00000007 mov cl, bh 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F17510C2668h 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D50EA0 second address: 4D50EB2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F17510BF1BEh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D50EB2 second address: 4D50EB6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D50EB6 second address: 4D50EE0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 jmp 00007F17510BF1C7h 0x0000000e mov ebp, esp 0x00000010 pushad 0x00000011 mov cl, 73h 0x00000013 push eax 0x00000014 push edx 0x00000015 mov cx, di 0x00000018 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D30C4A second address: 4D30C66 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F17510C2668h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D30C66 second address: 4D30C7B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F17510BF1BAh 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D30C7B second address: 4D30C8D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F17510C265Eh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D60E0D second address: 4D60E27 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F17510BF1C5h 0x00000009 popad 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CF073F second address: 4CF0743 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CF0743 second address: 4CF0749 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CF0749 second address: 4CF0782 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510C2662h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007F17510C2660h 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F17510C265Dh 0x00000019 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CF0782 second address: 4CF0786 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CF0786 second address: 4CF078C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CF078C second address: 4CF07A3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510BF1BCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CF07A3 second address: 4CF07A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CF07A7 second address: 4CF07AD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D60025 second address: 4D6002B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D6002B second address: 4D6002F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D6002F second address: 4D60033 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D60033 second address: 4D6006D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a pushfd 0x0000000b jmp 00007F17510BF1C7h 0x00000010 jmp 00007F17510BF1C3h 0x00000015 popfd 0x00000016 push eax 0x00000017 push edx 0x00000018 mov ebx, esi 0x0000001a rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D604CB second address: 4D604DD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F17510C265Eh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D604DD second address: 4D604F5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510BF1BBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D604F5 second address: 4D60510 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510C2667h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D60510 second address: 4D60516 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D60516 second address: 4D6051A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D6051A second address: 4D60555 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510BF1BBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c jmp 00007F17510BF1C9h 0x00000011 xchg eax, ebp 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F17510BF1BDh 0x00000019 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D60555 second address: 4D6055B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D6055B second address: 4D6055F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D6055F second address: 4D6057E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F17510C2661h 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D6057E second address: 4D60593 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510BF1C1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D60593 second address: 4D605A3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F17510C265Ch 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D605A3 second address: 4D605A7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D605A7 second address: 4D605B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [ebp+08h] 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D605B8 second address: 4D605BC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D605BC second address: 4D605C2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D605C2 second address: 4D605C8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D605C8 second address: 4D605CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D30B5C second address: 4D30B74 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F17510BF1C4h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D30B74 second address: 4D30BAD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510C265Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c pushad 0x0000000d mov ecx, 2DAD004Bh 0x00000012 mov eax, 6DC95627h 0x00000017 popad 0x00000018 push eax 0x00000019 push eax 0x0000001a push edx 0x0000001b jmp 00007F17510C2668h 0x00000020 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D70024 second address: 4D7006C instructions: 0x00000000 rdtsc 0x00000002 mov si, 862Fh 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov al, 56h 0x0000000a popad 0x0000000b push esi 0x0000000c jmp 00007F17510BF1BCh 0x00000011 mov dword ptr [esp], ebp 0x00000014 pushad 0x00000015 mov ax, 8AEDh 0x00000019 pushfd 0x0000001a jmp 00007F17510BF1BAh 0x0000001f sbb cx, 7A88h 0x00000024 jmp 00007F17510BF1BBh 0x00000029 popfd 0x0000002a popad 0x0000002b mov ebp, esp 0x0000002d push eax 0x0000002e push edx 0x0000002f pushad 0x00000030 mov eax, 291803CDh 0x00000035 popad 0x00000036 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D107F6 second address: 4D108B1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 call 00007F17510C2661h 0x0000000b mov esi, 56FF1A77h 0x00000010 pop esi 0x00000011 popad 0x00000012 push esi 0x00000013 pushad 0x00000014 pushfd 0x00000015 jmp 00007F17510C2666h 0x0000001a xor ax, 5998h 0x0000001f jmp 00007F17510C265Bh 0x00000024 popfd 0x00000025 push ecx 0x00000026 pushfd 0x00000027 jmp 00007F17510C265Fh 0x0000002c and ax, 6A5Eh 0x00000031 jmp 00007F17510C2669h 0x00000036 popfd 0x00000037 pop esi 0x00000038 popad 0x00000039 mov dword ptr [esp], ebp 0x0000003c pushad 0x0000003d call 00007F17510C265Dh 0x00000042 jmp 00007F17510C2660h 0x00000047 pop esi 0x00000048 mov ecx, edx 0x0000004a popad 0x0000004b mov ebp, esp 0x0000004d push eax 0x0000004e push edx 0x0000004f pushad 0x00000050 mov si, EE15h 0x00000054 jmp 00007F17510C2662h 0x00000059 popad 0x0000005a rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D108B1 second address: 4D108C1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop esi 0x00000005 push edi 0x00000006 pop ecx 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop ebp 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e push edx 0x0000000f pop esi 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D70BDF second address: 4D70BE5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D70BE5 second address: 4D70BE9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D70BE9 second address: 4D70BED instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D70BED second address: 4D70C05 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F17510BF1BDh 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D70C05 second address: 4D70C15 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F17510C265Ch 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D70C15 second address: 4D70C19 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D70C19 second address: 4D70C63 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ecx 0x00000009 pushad 0x0000000a mov cx, bx 0x0000000d pushfd 0x0000000e jmp 00007F17510C2669h 0x00000013 add cx, 1CF6h 0x00000018 jmp 00007F17510C2661h 0x0000001d popfd 0x0000001e popad 0x0000001f mov eax, dword ptr [76FB65FCh] 0x00000024 push eax 0x00000025 push edx 0x00000026 push eax 0x00000027 push edx 0x00000028 push eax 0x00000029 push edx 0x0000002a rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D70C63 second address: 4D70C67 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D70C67 second address: 4D70C7A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510C265Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D70C7A second address: 4D70CA8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510BF1C9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test eax, eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F17510BF1BDh 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D70CA8 second address: 4D70CAE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D70CAE second address: 4D70CB2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D70CB2 second address: 4D70CE8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 je 00007F17C3285302h 0x0000000e jmp 00007F17510C265Fh 0x00000013 mov ecx, eax 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007F17510C2665h 0x0000001c rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D70CE8 second address: 4D70CEE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D70CEE second address: 4D70CF2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D70CF2 second address: 4D70D07 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xor eax, dword ptr [ebp+08h] 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e mov bh, 7Fh 0x00000010 mov cx, 7EB9h 0x00000014 popad 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D70D07 second address: 4D70D0D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D70D0D second address: 4D70D11 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D70D11 second address: 4D70D2F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 and ecx, 1Fh 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F17510C265Fh 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D70D2F second address: 4D70D4C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510BF1C9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D30007 second address: 4D3000D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D3000D second address: 4D30012 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D30012 second address: 4D3004E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx ebx, cx 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d pushfd 0x0000000e jmp 00007F17510C2668h 0x00000013 jmp 00007F17510C2665h 0x00000018 popfd 0x00000019 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D3004E second address: 4D30052 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D30052 second address: 4D30075 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 call 00007F17510C265Ah 0x0000000e pop esi 0x0000000f popad 0x00000010 popad 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 mov cx, di 0x00000018 mov ebx, 4A800EDCh 0x0000001d popad 0x0000001e rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D30075 second address: 4D300D5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510BF1C2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007F17510BF1C0h 0x0000000f mov ebp, esp 0x00000011 jmp 00007F17510BF1C0h 0x00000016 and esp, FFFFFFF8h 0x00000019 pushad 0x0000001a push ecx 0x0000001b mov ecx, edi 0x0000001d pop edi 0x0000001e mov cx, 25A5h 0x00000022 popad 0x00000023 xchg eax, ecx 0x00000024 push eax 0x00000025 push edx 0x00000026 jmp 00007F17510BF1C7h 0x0000002b rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D300D5 second address: 4D30182 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510C2669h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b pushfd 0x0000000c jmp 00007F17510C2667h 0x00000011 sub si, A3DEh 0x00000016 jmp 00007F17510C2669h 0x0000001b popfd 0x0000001c pushad 0x0000001d pushfd 0x0000001e jmp 00007F17510C265Eh 0x00000023 adc ax, 8BD8h 0x00000028 jmp 00007F17510C265Bh 0x0000002d popfd 0x0000002e pushfd 0x0000002f jmp 00007F17510C2668h 0x00000034 sbb ecx, 5294D638h 0x0000003a jmp 00007F17510C265Bh 0x0000003f popfd 0x00000040 popad 0x00000041 popad 0x00000042 xchg eax, ecx 0x00000043 push eax 0x00000044 push edx 0x00000045 pushad 0x00000046 mov esi, edx 0x00000048 mov ecx, edi 0x0000004a popad 0x0000004b rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D30182 second address: 4D30195 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F17510BF1BFh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D30195 second address: 4D301BB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510C2669h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D301BB second address: 4D301BF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D301BF second address: 4D301C3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D301C3 second address: 4D301C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D301C9 second address: 4D301DE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F17510C2661h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D301DE second address: 4D3021F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510BF1C1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f pushfd 0x00000010 jmp 00007F17510BF1BDh 0x00000015 and ecx, 666888F6h 0x0000001b jmp 00007F17510BF1C1h 0x00000020 popfd 0x00000021 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D3021F second address: 4D3024C instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F17510C2660h 0x00000008 sbb cx, 9A18h 0x0000000d jmp 00007F17510C265Bh 0x00000012 popfd 0x00000013 pop edx 0x00000014 pop eax 0x00000015 push eax 0x00000016 push edx 0x00000017 mov eax, 47A96665h 0x0000001c rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D3024C second address: 4D3025C instructions: 0x00000000 rdtsc 0x00000002 mov cx, 03E1h 0x00000006 pop edx 0x00000007 pop eax 0x00000008 popad 0x00000009 xchg eax, ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D3025C second address: 4D30262 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D30262 second address: 4D3027F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510BF1C0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebx, dword ptr [ebp+10h] 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D3027F second address: 4D30285 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D30285 second address: 4D3028B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D3028B second address: 4D302D9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510C265Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, esi 0x0000000c jmp 00007F17510C2660h 0x00000011 push eax 0x00000012 pushad 0x00000013 mov cx, bx 0x00000016 mov dx, A750h 0x0000001a popad 0x0000001b xchg eax, esi 0x0000001c pushad 0x0000001d mov ecx, edi 0x0000001f jmp 00007F17510C2661h 0x00000024 popad 0x00000025 mov esi, dword ptr [ebp+08h] 0x00000028 push eax 0x00000029 push edx 0x0000002a push eax 0x0000002b push edx 0x0000002c pushad 0x0000002d popad 0x0000002e rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D302D9 second address: 4D302EC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510BF1BFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D302EC second address: 4D30329 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007F17510C265Fh 0x00000008 pop esi 0x00000009 mov ebx, 506B713Ch 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push esp 0x00000012 jmp 00007F17510C2660h 0x00000017 mov dword ptr [esp], edi 0x0000001a push eax 0x0000001b push edx 0x0000001c push eax 0x0000001d push edx 0x0000001e jmp 00007F17510C265Ah 0x00000023 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D30329 second address: 4D3032F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D3032F second address: 4D3039C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F17510C265Ch 0x00000009 adc eax, 539DF2B8h 0x0000000f jmp 00007F17510C265Bh 0x00000014 popfd 0x00000015 jmp 00007F17510C2668h 0x0000001a popad 0x0000001b pop edx 0x0000001c pop eax 0x0000001d test esi, esi 0x0000001f push eax 0x00000020 push edx 0x00000021 pushad 0x00000022 pushad 0x00000023 popad 0x00000024 pushfd 0x00000025 jmp 00007F17510C2663h 0x0000002a jmp 00007F17510C2663h 0x0000002f popfd 0x00000030 popad 0x00000031 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D3039C second address: 4D303A2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D303A2 second address: 4D3041C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 je 00007F17C32C08C1h 0x0000000e pushad 0x0000000f mov bl, 4Ah 0x00000011 pushad 0x00000012 mov al, 18h 0x00000014 pushfd 0x00000015 jmp 00007F17510C2661h 0x0000001a sbb esi, 2C9A92C6h 0x00000020 jmp 00007F17510C2661h 0x00000025 popfd 0x00000026 popad 0x00000027 popad 0x00000028 cmp dword ptr [esi+08h], DDEEDDEEh 0x0000002f pushad 0x00000030 movzx esi, bx 0x00000033 jmp 00007F17510C2669h 0x00000038 popad 0x00000039 je 00007F17C32C087Ah 0x0000003f push eax 0x00000040 push edx 0x00000041 jmp 00007F17510C265Dh 0x00000046 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D3041C second address: 4D30491 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510BF1C1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov edx, dword ptr [esi+44h] 0x0000000c jmp 00007F17510BF1BEh 0x00000011 or edx, dword ptr [ebp+0Ch] 0x00000014 pushad 0x00000015 pushfd 0x00000016 jmp 00007F17510BF1BEh 0x0000001b or esi, 18FEFB58h 0x00000021 jmp 00007F17510BF1BBh 0x00000026 popfd 0x00000027 push eax 0x00000028 push edx 0x00000029 pushfd 0x0000002a jmp 00007F17510BF1C6h 0x0000002f add cx, 05B8h 0x00000034 jmp 00007F17510BF1BBh 0x00000039 popfd 0x0000003a rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D503D0 second address: 4D503F8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510C265Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F17510C2665h 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D503F8 second address: 4D50408 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F17510BF1BCh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D50408 second address: 4D50433 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510C265Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b and esp, FFFFFFF8h 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F17510C2665h 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D50433 second address: 4D50439 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D50439 second address: 4D50464 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a jmp 00007F17510C2662h 0x0000000f mov ah, 9Fh 0x00000011 popad 0x00000012 mov dword ptr [esp], ebx 0x00000015 push eax 0x00000016 push edx 0x00000017 pushad 0x00000018 mov edi, ecx 0x0000001a mov dx, si 0x0000001d popad 0x0000001e rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D50464 second address: 4D50469 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D50469 second address: 4D50515 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F17510C2663h 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c xchg eax, esi 0x0000000d pushad 0x0000000e pushfd 0x0000000f jmp 00007F17510C2664h 0x00000014 or si, F3B8h 0x00000019 jmp 00007F17510C265Bh 0x0000001e popfd 0x0000001f pushad 0x00000020 jmp 00007F17510C2666h 0x00000025 pushfd 0x00000026 jmp 00007F17510C2662h 0x0000002b sub ch, 00000048h 0x0000002e jmp 00007F17510C265Bh 0x00000033 popfd 0x00000034 popad 0x00000035 popad 0x00000036 push eax 0x00000037 jmp 00007F17510C2669h 0x0000003c xchg eax, esi 0x0000003d pushad 0x0000003e pushad 0x0000003f mov ebx, ecx 0x00000041 push esi 0x00000042 pop ebx 0x00000043 popad 0x00000044 mov ah, A6h 0x00000046 popad 0x00000047 mov esi, dword ptr [ebp+08h] 0x0000004a pushad 0x0000004b mov ecx, edx 0x0000004d push eax 0x0000004e push edx 0x0000004f pushad 0x00000050 popad 0x00000051 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D50515 second address: 4D50536 instructions: 0x00000000 rdtsc 0x00000002 mov bh, BBh 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 sub ebx, ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F17510BF1C6h 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D50536 second address: 4D5053C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D5053C second address: 4D50540 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D50540 second address: 4D505B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 test esi, esi 0x0000000a pushad 0x0000000b pushfd 0x0000000c jmp 00007F17510C265Fh 0x00000011 jmp 00007F17510C2663h 0x00000016 popfd 0x00000017 pushfd 0x00000018 jmp 00007F17510C2668h 0x0000001d add eax, 533B7928h 0x00000023 jmp 00007F17510C265Bh 0x00000028 popfd 0x00000029 popad 0x0000002a je 00007F17C3298449h 0x00000030 push eax 0x00000031 push edx 0x00000032 jmp 00007F17510C2665h 0x00000037 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D505B8 second address: 4D505C8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F17510BF1BCh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D505C8 second address: 4D506A0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510C265Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b cmp dword ptr [esi+08h], DDEEDDEEh 0x00000012 jmp 00007F17510C2666h 0x00000017 mov ecx, esi 0x00000019 pushad 0x0000001a push ecx 0x0000001b mov di, 1B30h 0x0000001f pop ebx 0x00000020 call 00007F17510C2666h 0x00000025 pushfd 0x00000026 jmp 00007F17510C2662h 0x0000002b xor cx, 62A8h 0x00000030 jmp 00007F17510C265Bh 0x00000035 popfd 0x00000036 pop eax 0x00000037 popad 0x00000038 je 00007F17C32983BEh 0x0000003e jmp 00007F17510C265Fh 0x00000043 test byte ptr [76FB6968h], 00000002h 0x0000004a jmp 00007F17510C2666h 0x0000004f jne 00007F17C329839Fh 0x00000055 push eax 0x00000056 push edx 0x00000057 pushad 0x00000058 pushfd 0x00000059 jmp 00007F17510C265Dh 0x0000005e and esi, 43DE2026h 0x00000064 jmp 00007F17510C2661h 0x00000069 popfd 0x0000006a mov dx, cx 0x0000006d popad 0x0000006e rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D506A0 second address: 4D506BC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F17510BF1C8h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D506BC second address: 4D506C0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D506C0 second address: 4D5073A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov edx, dword ptr [ebp+0Ch] 0x0000000b pushad 0x0000000c mov eax, edx 0x0000000e pushfd 0x0000000f jmp 00007F17510BF1C9h 0x00000014 add cx, 5196h 0x00000019 jmp 00007F17510BF1C1h 0x0000001e popfd 0x0000001f popad 0x00000020 xchg eax, ebx 0x00000021 pushad 0x00000022 pushad 0x00000023 pushfd 0x00000024 jmp 00007F17510BF1BAh 0x00000029 sub si, 19B8h 0x0000002e jmp 00007F17510BF1BBh 0x00000033 popfd 0x00000034 popad 0x00000035 push edi 0x00000036 pop edi 0x00000037 popad 0x00000038 push eax 0x00000039 pushad 0x0000003a push eax 0x0000003b push edx 0x0000003c jmp 00007F17510BF1C3h 0x00000041 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D5073A second address: 4D5077A instructions: 0x00000000 rdtsc 0x00000002 mov cx, 6FCFh 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ecx, 105839EBh 0x0000000d popad 0x0000000e xchg eax, ebx 0x0000000f jmp 00007F17510C265Eh 0x00000014 xchg eax, ebx 0x00000015 jmp 00007F17510C2660h 0x0000001a push eax 0x0000001b jmp 00007F17510C265Bh 0x00000020 xchg eax, ebx 0x00000021 pushad 0x00000022 push eax 0x00000023 push edx 0x00000024 push esi 0x00000025 pop edx 0x00000026 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D5077A second address: 4D5079D instructions: 0x00000000 rdtsc 0x00000002 mov ecx, 68A7826Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 call 00007F17510BF1BAh 0x0000000e mov edx, eax 0x00000010 pop ecx 0x00000011 popad 0x00000012 push dword ptr [ebp+14h] 0x00000015 push eax 0x00000016 push edx 0x00000017 pushad 0x00000018 mov bx, ax 0x0000001b push eax 0x0000001c pop edi 0x0000001d popad 0x0000001e rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D5079D second address: 4D507A2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D507A2 second address: 4D507C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov dh, E0h 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push dword ptr [ebp+10h] 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F17510BF1C1h 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D507C1 second address: 4D507D1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F17510C265Ch 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D507EC second address: 4D50857 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 2362FD0Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushfd 0x0000000a jmp 00007F17510BF1BAh 0x0000000f and eax, 3EC11F28h 0x00000015 jmp 00007F17510BF1BBh 0x0000001a popfd 0x0000001b popad 0x0000001c pop esi 0x0000001d jmp 00007F17510BF1C6h 0x00000022 pop ebx 0x00000023 push eax 0x00000024 push edx 0x00000025 pushad 0x00000026 pushfd 0x00000027 jmp 00007F17510BF1BDh 0x0000002c and si, 1DF6h 0x00000031 jmp 00007F17510BF1C1h 0x00000036 popfd 0x00000037 mov bx, si 0x0000003a popad 0x0000003b rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D50857 second address: 4D508A4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F17510C2663h 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov esp, ebp 0x0000000d jmp 00007F17510C2665h 0x00000012 pop ebp 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007F17510C2668h 0x0000001c rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D508A4 second address: 4D508B3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510BF1BBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D401F7 second address: 4D401FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D401FB second address: 4D40218 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510BF1C9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D919A8 second address: 4D919AE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D919AE second address: 4D919B2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D919B2 second address: 4D919D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F17510C2661h 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D919D0 second address: 4D919E5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510BF1C1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4FEBB9 second address: 4FEBBE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CF03BD second address: 4CF03C2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CF03C2 second address: 4CF03EE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F17510C2665h 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c xchg eax, ebp 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F17510C265Dh 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CF03EE second address: 4CF0464 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007F17510BF1C7h 0x00000008 pop esi 0x00000009 call 00007F17510BF1C9h 0x0000000e pop esi 0x0000000f popad 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push eax 0x00000013 pushad 0x00000014 pushfd 0x00000015 jmp 00007F17510BF1BCh 0x0000001a xor cl, FFFFFFD8h 0x0000001d jmp 00007F17510BF1BBh 0x00000022 popfd 0x00000023 jmp 00007F17510BF1C8h 0x00000028 popad 0x00000029 xchg eax, ebp 0x0000002a push eax 0x0000002b push edx 0x0000002c push eax 0x0000002d push edx 0x0000002e pushad 0x0000002f popad 0x00000030 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CF0464 second address: 4CF046A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CF046A second address: 4CF0470 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CF0470 second address: 4CF0474 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CF0474 second address: 4CF0478 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CF0478 second address: 4CF04D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a pushad 0x0000000b mov edx, ecx 0x0000000d pushfd 0x0000000e jmp 00007F17510C2664h 0x00000013 or ax, DCC8h 0x00000018 jmp 00007F17510C265Bh 0x0000001d popfd 0x0000001e popad 0x0000001f xchg eax, ecx 0x00000020 jmp 00007F17510C2666h 0x00000025 push eax 0x00000026 push eax 0x00000027 push edx 0x00000028 push eax 0x00000029 push edx 0x0000002a jmp 00007F17510C265Dh 0x0000002f rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CF04D5 second address: 4CF04D9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CF04D9 second address: 4CF04DF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CF04DF second address: 4CF0554 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bx, ax 0x00000006 pushfd 0x00000007 jmp 00007F17510BF1C6h 0x0000000c sbb ch, FFFFFFB8h 0x0000000f jmp 00007F17510BF1BBh 0x00000014 popfd 0x00000015 popad 0x00000016 pop edx 0x00000017 pop eax 0x00000018 xchg eax, ecx 0x00000019 jmp 00007F17510BF1C6h 0x0000001e and dword ptr [ebp-04h], 00000000h 0x00000022 pushad 0x00000023 mov esi, 4E0A27ADh 0x00000028 pushfd 0x00000029 jmp 00007F17510BF1BAh 0x0000002e and si, 0648h 0x00000033 jmp 00007F17510BF1BBh 0x00000038 popfd 0x00000039 popad 0x0000003a lea eax, dword ptr [ebp-04h] 0x0000003d pushad 0x0000003e push eax 0x0000003f push edx 0x00000040 push eax 0x00000041 pop edx 0x00000042 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CF0614 second address: 4CF0618 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CF0618 second address: 4CF061E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CD0AE7 second address: 4CD0AEB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CD0AEB second address: 4CD0AF1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CD0AF1 second address: 4CD0B05 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510C265Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CD0B05 second address: 4CD0B14 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F17510BF1BAh 0x00000009 popad 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CD0B14 second address: 4CD0B26 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F17510C265Eh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4CD0B26 second address: 4CD0B79 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F17510BF1BBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007F17510BF1C4h 0x00000013 adc cx, 2038h 0x00000018 jmp 00007F17510BF1BBh 0x0000001d popfd 0x0000001e call 00007F17510BF1C8h 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeRDTSC instruction interceptor: First address: 4D8019B second address: 4D80214 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F17510C265Ah 0x00000008 sbb al, 00000018h 0x0000000b jmp 00007F17510C265Bh 0x00000010 popfd 0x00000011 pop edx 0x00000012 pop eax 0x00000013 call 00007F17510C2668h 0x00000018 jmp 00007F17510C2662h 0x0000001d pop eax 0x0000001e popad 0x0000001f mov dword ptr [esp], ebp 0x00000022 jmp 00007F17510C2661h 0x00000027 mov ebp, esp 0x00000029 push eax 0x0000002a push edx 0x0000002b pushad 0x0000002c jmp 00007F17510C2663h 0x00000031 mov edi, eax 0x00000033 popad 0x00000034 rdtsc
            Source: C:\Users\user\Desktop\dcmaM16D71.exeSpecial instruction interceptor: First address: 350D60 instructions caused by: Self-modifying code
            Source: C:\Users\user\Desktop\dcmaM16D71.exeSpecial instruction interceptor: First address: 51CAE9 instructions caused by: Self-modifying code
            Source: C:\Users\user\Desktop\dcmaM16D71.exeSpecial instruction interceptor: First address: 350CA0 instructions caused by: Self-modifying code
            Source: C:\Users\user\Desktop\dcmaM16D71.exeSpecial instruction interceptor: First address: 581FF7 instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: 400D60 instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: 5CCAE9 instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: 400CA0 instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: 631FF7 instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: EB0D60 instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: 107CAE9 instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: EB0CA0 instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: 10E1FF7 instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exeCode function: 0_2_04DA0785 rdtsc 0_2_04DA0785
            Source: C:\Users\user\Desktop\dcmaM16D71.exeWindow / User API: threadDelayed 1334Jump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exeWindow / User API: threadDelayed 1167Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 7729Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 1179Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 1186Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 1109Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 2494Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 2519Jump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_0-16331
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_5-17267
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)
            Source: C:\Users\user\Desktop\dcmaM16D71.exe TID: 7032Thread sleep count: 37 > 30Jump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exe TID: 7032Thread sleep time: -74037s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exe TID: 7028Thread sleep count: 36 > 30Jump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exe TID: 7028Thread sleep time: -72036s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exe TID: 6920Thread sleep count: 85 > 30Jump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exe TID: 7008Thread sleep count: 1334 > 30Jump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exe TID: 7008Thread sleep time: -2669334s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exe TID: 6920Thread sleep count: 252 > 30Jump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exe TID: 2416Thread sleep count: 241 > 30Jump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exe TID: 6968Thread sleep count: 1167 > 30Jump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exe TID: 6968Thread sleep time: -2335167s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 6676Thread sleep count: 56 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 6676Thread sleep time: -112056s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 2852Thread sleep count: 105 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 2852Thread sleep time: -210105s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 2756Thread sleep count: 94 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 1456Thread sleep count: 62 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 1456Thread sleep time: -124062s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 2756Thread sleep count: 236 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 6104Thread sleep count: 249 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 6776Thread sleep count: 72 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 6776Thread sleep time: -144072s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7092Thread sleep count: 7729 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7092Thread sleep time: -15465729s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 5932Thread sleep count: 91 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 5932Thread sleep time: -182091s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 3568Thread sleep count: 92 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 3568Thread sleep time: -184092s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 2692Thread sleep count: 91 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 2832Thread sleep count: 91 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 2832Thread sleep time: -182091s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 2692Thread sleep count: 237 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 2936Thread sleep count: 247 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7088Thread sleep count: 97 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7088Thread sleep time: -194097s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 732Thread sleep count: 36 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 732Thread sleep time: -72036s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7180Thread sleep time: -48024s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 5852Thread sleep count: 1179 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 5852Thread sleep time: -2359179s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 2500Thread sleep count: 236 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7304Thread sleep count: 243 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 6172Thread sleep count: 1186 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 6172Thread sleep time: -2373186s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7176Thread sleep count: 1109 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7176Thread sleep time: -2219109s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7536Thread sleep count: 111 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7536Thread sleep time: -222111s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7540Thread sleep count: 103 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7540Thread sleep time: -206103s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7532Thread sleep count: 105 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7532Thread sleep time: -210105s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7508Thread sleep count: 265 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7624Thread sleep count: 257 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7544Thread sleep count: 71 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7544Thread sleep time: -142071s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7520Thread sleep count: 2494 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7520Thread sleep time: -4990494s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7528Thread sleep count: 2519 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7528Thread sleep time: -5040519s >= -30000sJump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: RageMP131.exe, RageMP131.exe, 0000000B.00000002.3454307049.0000000001034000.00000040.00000001.01000000.00000006.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__
            Source: MPGPH131.exe, 00000006.00000002.3456587072.0000000000D8B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}fJ
            Source: dcmaM16D71.exe, 00000000.00000002.3456276074.0000000000EC6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}ngCommonProgramFiles=C:\Program Files (x86)\Common F
            Source: RageMP131.exe, 0000000B.00000002.3456493535.00000000018A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: MPGPH131.exe, 00000005.00000002.3456538284.0000000001307000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}A
            Source: RageMP131.exe, 0000000B.00000002.3456493535.00000000018C5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 9e146be9-c76a-4720-bcdb-53011b87bd06_{a33c7340-61ca-11ee-8c18-806e6f6e6963}_\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}_87D815F4
            Source: MPGPH131.exe, 00000006.00000002.3456587072.0000000000DBC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}8&{-
            Source: dcmaM16D71.exe, 00000000.00000002.3456276074.0000000000EC1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}:
            Source: RageMP131.exe, 0000000B.00000002.3456493535.00000000018C5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: RageMP131.exe, 0000000B.00000002.3456493535.00000000018A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}l!E
            Source: RageMP131.exe, 0000000B.00000002.3456493535.00000000018A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}:&
            Source: MPGPH131.exe, 00000006.00000002.3456587072.0000000000DBC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: RageMP131.exe, 00000007.00000002.3455376041.00000000019DE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}0
            Source: dcmaM16D71.exe, 00000000.00000002.3456276074.0000000000ED5000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.3456538284.0000000001314000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3456493535.00000000018AD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: RageMP131.exe, 0000000B.00000002.3456493535.0000000001850000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&
            Source: MPGPH131.exe, 00000005.00000002.3456538284.0000000001307000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}`c
            Source: dcmaM16D71.exe, 00000000.00000003.1757121073.0000000000EE8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}*~
            Source: RageMP131.exe, 00000007.00000002.3455376041.0000000001A38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: RageMP131.exe, 00000007.00000002.3455376041.0000000001A38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}6
            Source: dcmaM16D71.exe, 00000000.00000002.3456276074.0000000000EC6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}bem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Wi
            Source: RageMP131.exe, 00000007.00000002.3455376041.00000000019D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: RageMP131.exe, 00000007.00000002.3455376041.00000000019D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}(x86)
            Source: dcmaM16D71.exe, 00000000.00000003.1757121073.0000000000EE8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}rm
            Source: RageMP131.exe, 0000000B.00000002.3456493535.000000000187C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}b
            Source: RageMP131.exe, 00000007.00000002.3455376041.00000000019DE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}\
            Source: RageMP131.exe, 00000007.00000002.3455376041.0000000001A58000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b},
            Source: RageMP131.exe, 0000000B.00000002.3456217201.00000000016FC000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}T
            Source: MPGPH131.exe, 00000005.00000002.3456538284.00000000012AD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&~
            Source: dcmaM16D71.exe, 00000000.00000002.3454237327.00000000004D4000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000005.00000002.3454226179.0000000000584000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000006.00000002.3454414581.0000000000584000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 00000007.00000002.3453590114.0000000001034000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000B.00000002.3454307049.0000000001034000.00000040.00000001.01000000.00000006.sdmpBinary or memory string: Restart now?\\.\Oreans.vxd%s\Oreans.vxdXprotEventHARDWARE\ACPI\DSDT\VBOX__SeShutdownPrivilegeSoftware\WinLicenseCreateEvent API Error while extraction the driverGetEnvironmentVariable API Error while extraction the driverOpenSCManager API Error while extraction the driverCreateService API Error while extraction the driverCloseServiceHandle API Error while extraction the driverOpenService API Error while extraction the driverStartService API Error while extraction the driverAPIC error: Cannot find Processors Control Blocks. Please,
            Source: RageMP131.exe, 0000000B.00000002.3456493535.00000000018C5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 9e146be9-c76a-4720-bcdb-53011b87bd06_{a33c7340-61ca-11ee-8c18-806e6f6e6963}_\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}_87D815F41
            Source: RageMP131.exe, 00000007.00000002.3455376041.0000000001A47000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllrr
            Source: C:\Users\user\Desktop\dcmaM16D71.exeSystem information queried: ModuleInformationJump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exeProcess information queried: ProcessInformationJump to behavior

            Anti Debugging

            barindex
            Source: C:\Users\user\Desktop\dcmaM16D71.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exeCode function: 0_2_04DA09CC Start: 04DA0C7A End: 04DA09E50_2_04DA09CC
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: regmonclass
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: gbdyllo
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: procmon_window_class
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: ollydbg
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: filemonclass
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: NTICE
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: SICE
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: SIWVID
            Source: C:\Users\user\Desktop\dcmaM16D71.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exeCode function: 0_2_04DA0785 rdtsc 0_2_04DA0785
            Source: RageMP131.exe, RageMP131.exe, 0000000B.00000002.3454307049.0000000001034000.00000040.00000001.01000000.00000006.sdmpBinary or memory string: Program Manager
            Source: C:\Users\user\Desktop\dcmaM16D71.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\dcmaM16D71.exeCode function: 0_2_001F361D GetSystemTimePreciseAsFileTime,GetSystemTimePreciseAsFileTime,0_2_001F361D
            Source: C:\Users\user\Desktop\dcmaM16D71.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: Process Memory Space: dcmaM16D71.exe PID: 6916, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 3668, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 4924, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 6024, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 7504, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: Process Memory Space: dcmaM16D71.exe PID: 6916, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 3668, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 4924, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 6024, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 7504, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
            Command and Scripting Interpreter
            1
            Scheduled Task/Job
            2
            Process Injection
            1
            Masquerading
            OS Credential Dumping1
            System Time Discovery
            Remote Services1
            Archive Collected Data
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts1
            Scheduled Task/Job
            1
            Registry Run Keys / Startup Folder
            1
            Scheduled Task/Job
            24
            Virtualization/Sandbox Evasion
            LSASS Memory741
            Security Software Discovery
            Remote Desktop ProtocolData from Removable Media1
            Non-Standard Port
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAt1
            DLL Side-Loading
            1
            Registry Run Keys / Startup Folder
            2
            Process Injection
            Security Account Manager24
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared Drive1
            Ingress Tool Transfer
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
            DLL Side-Loading
            1
            Deobfuscate/Decode Files or Information
            NTDS2
            Process Discovery
            Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
            Obfuscated Files or Information
            LSA Secrets1
            Application Window Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts12
            Software Packing
            Cached Domain Credentials214
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            DLL Side-Loading
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 1515064 Sample: dcmaM16D71.exe Startdate: 21/09/2024 Architecture: WINDOWS Score: 100 36 Suricata IDS alerts for network traffic 2->36 38 Antivirus / Scanner detection for submitted sample 2->38 40 Multi AV Scanner detection for submitted file 2->40 42 5 other signatures 2->42 7 dcmaM16D71.exe 1 9 2->7         started        12 RageMP131.exe 2 2->12         started        14 MPGPH131.exe 2 2->14         started        16 2 other processes 2->16 process3 dnsIp4 34 147.45.47.126, 49730, 49731, 49732 FREE-NET-ASFREEnetEU Russian Federation 7->34 26 C:\Users\user\AppData\Local\...\RageMP131.exe, PE32 7->26 dropped 28 C:\ProgramData\MPGPH131\MPGPH131.exe, PE32 7->28 dropped 30 C:\Users\...\RageMP131.exe:Zone.Identifier, ASCII 7->30 dropped 32 C:\...\MPGPH131.exe:Zone.Identifier, ASCII 7->32 dropped 44 Detected unpacking (changes PE section rights) 7->44 46 Found stalling execution ending in API Sleep call 7->46 48 Uses schtasks.exe or at.exe to add and modify task schedules 7->48 66 2 other signatures 7->66 18 schtasks.exe 1 7->18         started        20 schtasks.exe 1 7->20         started        50 Antivirus detection for dropped file 12->50 52 Multi AV Scanner detection for dropped file 12->52 54 Tries to detect sandboxes and other dynamic analysis tools (window names) 12->54 56 Machine Learning detection for dropped file 14->56 58 Tries to evade debugger and weak emulator (self modifying code) 14->58 60 Hides threads from debuggers 14->60 62 Tries to detect sandboxes / dynamic malware analysis system (registry check) 16->62 64 Tries to detect process monitoring tools (Task Manager, Process Explorer etc.) 16->64 file5 signatures6 process7 process8 22 conhost.exe 18->22         started        24 conhost.exe 20->24         started       

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            dcmaM16D71.exe92%ReversingLabsWin32.Trojan.RisePro
            dcmaM16D71.exe77%VirustotalBrowse
            dcmaM16D71.exe100%AviraTR/Redcap.vzyra
            dcmaM16D71.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\RageMP131\RageMP131.exe100%AviraTR/Redcap.vzyra
            C:\ProgramData\MPGPH131\MPGPH131.exe100%AviraTR/Redcap.vzyra
            C:\Users\user\AppData\Local\RageMP131\RageMP131.exe100%Joe Sandbox ML
            C:\ProgramData\MPGPH131\MPGPH131.exe100%Joe Sandbox ML
            C:\ProgramData\MPGPH131\MPGPH131.exe92%ReversingLabsWin32.Trojan.RisePro
            C:\ProgramData\MPGPH131\MPGPH131.exe77%VirustotalBrowse
            C:\Users\user\AppData\Local\RageMP131\RageMP131.exe92%ReversingLabsWin32.Trojan.RisePro
            C:\Users\user\AppData\Local\RageMP131\RageMP131.exe77%VirustotalBrowse
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://www.winimage.com/zLibDll0%Avira URL Cloudsafe
            https://t.me/RiseProSUPPORT0%Avira URL Cloudsafe
            https://ipinfo.io/0%Avira URL Cloudsafe
            https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll0%Avira URL Cloudsafe
            https://t.me/RiseProSUPPORTV0%Avira URL Cloudsafe
            https://www.maxmind.com/en/locate-my-ip-address0%Avira URL Cloudsafe
            https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll0%VirustotalBrowse
            https://ipinfo.io/0%VirustotalBrowse
            https://t.me/RiseProSUPPORT0%VirustotalBrowse
            https://www.maxmind.com/en/locate-my-ip-address0%VirustotalBrowse
            https://t.me/RiseProSUPPORTV1%VirustotalBrowse
            http://www.winimage.com/zLibDll1%VirustotalBrowse
            No contacted domains info
            NameSourceMaliciousAntivirus DetectionReputation
            https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dlldcmaM16D71.exe, 00000000.00000002.3452995684.00000000001C1000.00000040.00000001.01000000.00000003.sdmp, dcmaM16D71.exe, 00000000.00000003.1724860101.0000000004B10000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.3452978591.0000000000271000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000005.00000003.1802109842.0000000004E90000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.3453216308.0000000000271000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000006.00000003.1802231508.0000000004A40000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000003.1861832555.0000000005440000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.3453305471.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000B.00000002.3453097183.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000B.00000003.1943556052.0000000005620000.00000004.00001000.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://www.winimage.com/zLibDlldcmaM16D71.exe, 00000000.00000002.3452995684.00000000001C1000.00000040.00000001.01000000.00000003.sdmp, dcmaM16D71.exe, 00000000.00000003.1724860101.0000000004B10000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.3452978591.0000000000271000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000005.00000003.1802109842.0000000004E90000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.3453216308.0000000000271000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000006.00000003.1802231508.0000000004A40000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000003.1861832555.0000000005440000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.3453305471.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000B.00000002.3453097183.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000B.00000003.1943556052.0000000005620000.00000004.00001000.00020000.00000000.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://t.me/RiseProSUPPORTdcmaM16D71.exe, 00000000.00000002.3456276074.0000000000E6E000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.3456538284.00000000012AD000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.3456587072.0000000000D6B000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.3455376041.00000000019DE000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3456493535.000000000185B000.00000004.00000020.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://t.me/RiseProSUPPORTVMPGPH131.exe, 00000005.00000002.3456538284.00000000012AD000.00000004.00000020.00020000.00000000.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://ipinfo.io/RageMP131.exefalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://www.maxmind.com/en/locate-my-ip-addressRageMP131.exefalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            147.45.47.126
            unknownRussian Federation
            2895FREE-NET-ASFREEnetEUtrue
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1515064
            Start date and time:2024-09-21 15:49:58 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 9m 40s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:13
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:dcmaM16D71.exe
            renamed because original name is a hash value
            Original Sample Name:92af1f8423cb9b7a5f08cd752b9c68a7.exe
            Detection:MAL
            Classification:mal100.troj.evad.winEXE@11/5@0/1
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:Failed
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            TimeTypeDescription
            09:51:23API Interceptor1615575x Sleep call for process: dcmaM16D71.exe modified
            09:51:31API Interceptor2101855x Sleep call for process: MPGPH131.exe modified
            09:51:37API Interceptor1749825x Sleep call for process: RageMP131.exe modified
            14:50:57AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run RageMP131 C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
            14:50:59Task SchedulerRun new task: MPGPH131 HR path: C:\ProgramData\MPGPH131\MPGPH131.exe
            14:50:59Task SchedulerRun new task: MPGPH131 LG path: C:\ProgramData\MPGPH131\MPGPH131.exe
            14:51:06AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run RageMP131 C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            147.45.47.126file.exeGet hashmaliciousRisePro StealerBrowse
              4Ip0IVHqJ3.exeGet hashmaliciousRisePro StealerBrowse
                eIbDy5M3wa.exeGet hashmaliciousRisePro StealerBrowse
                  file.exeGet hashmaliciousRisePro StealerBrowse
                    5HynG1dP1V.exeGet hashmaliciousRisePro StealerBrowse
                      YiCcqP1Ltt.exeGet hashmaliciousRisePro StealerBrowse
                        SecuriteInfo.com.Win32.Evo-gen.23207.8804.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                          SecuriteInfo.com.Win32.Evo-gen.8431.6571.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                            2pemMeifDu.exeGet hashmaliciousRisePro StealerBrowse
                              jv9lMYVHh0.exeGet hashmaliciousRisePro StealerBrowse
                                No context
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                FREE-NET-ASFREEnetEUKByiiYyiam.exeGet hashmaliciousLummaCBrowse
                                • 147.45.44.131
                                B0bHdMDGIN.exeGet hashmaliciousLummaCBrowse
                                • 147.45.44.131
                                AD3SI7tuzs.exeGet hashmaliciousLummaCBrowse
                                • 147.45.44.131
                                SecuriteInfo.com.Win32.CrypterX-gen.27124.19662.exeGet hashmaliciousAmadey, Clipboard Hijacker, Cryptbot, Go Injector, LummaC Stealer, PrivateLoader, PureLog StealerBrowse
                                • 193.233.255.84
                                file.exeGet hashmaliciousRedLineBrowse
                                • 193.233.255.84
                                SecuriteInfo.com.Win32.PWSX-gen.29050.19153.exeGet hashmaliciousLummaCBrowse
                                • 147.45.44.131
                                SecuriteInfo.com.Win32.PWSX-gen.10211.1601.exeGet hashmaliciousNetSupport RATBrowse
                                • 147.45.44.131
                                SecuriteInfo.com.Win32.MalwareX-gen.17062.12418.exeGet hashmaliciousLummaCBrowse
                                • 147.45.44.131
                                SecuriteInfo.com.Win32.PWSX-gen.10211.1601.exeGet hashmaliciousNetSupport RATBrowse
                                • 147.45.44.131
                                SecuriteInfo.com.Win32.CrypterX-gen.27124.19662.exeGet hashmaliciousAmadey, Clipboard Hijacker, Cryptbot, Go Injector, LummaC Stealer, PrivateLoader, PureLog StealerBrowse
                                • 147.45.44.104
                                No context
                                No context
                                Process:C:\Users\user\Desktop\dcmaM16D71.exe
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):2425344
                                Entropy (8bit):7.965841133288666
                                Encrypted:false
                                SSDEEP:49152:u3cY854MKaOddKQj2u0WSlg+V7FDWSe1B6V1VXRB15:AcROeQl0Hlg+V7FWSe1B6vVX71
                                MD5:92AF1F8423CB9B7A5F08CD752B9C68A7
                                SHA1:A5B7DE29D25E351B1A0BC20E8861A0A44FDBE73A
                                SHA-256:9C3AA1B46412046CAB893F4BD96D15AF2DC425C61C21A90755830D7F4DF39CB0
                                SHA-512:7C4FF8568DF1770CB5447F0C91B549A69FDC6EAF923401AF8C5B0A5C0DFFC5FACD4D2DC5C88DCF428EB3CD4A344E0F9F8AE044D9A30A5913D620A45C5C1DB050
                                Malicious:true
                                Antivirus:
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: ReversingLabs, Detection: 92%
                                • Antivirus: Virustotal, Detection: 77%, Browse
                                Reputation:low
                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......j.....s...s...s.e.p.%.s.e.v...s.e.t./.s..y..*.s..yw.=.s..yp.4.s..yv.u.s.e.w.6.s.e.u./.s.e.r.5.s...r...s..zz.2.s..z../.s..../.s..zq./.s.Rich..s.................PE..L....iLf...............'.....f........^...........@..........................._.......%...@.................................^...r.......4.....................^.............................T.^..............................6..@................... . ............................@....rsrc...4...........................@....idata ............................@... ..+.........................@...mxeojzwh......D.....................@...qbrinonr......^.......$.............@....taggant.0....^.."....$.............@...........................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\dcmaM16D71.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):26
                                Entropy (8bit):3.95006375643621
                                Encrypted:false
                                SSDEEP:3:ggPYV:rPYV
                                MD5:187F488E27DB4AF347237FE461A079AD
                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                Malicious:true
                                Reputation:high, very likely benign file
                                Preview:[ZoneTransfer]....ZoneId=0
                                Process:C:\Users\user\Desktop\dcmaM16D71.exe
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):2425344
                                Entropy (8bit):7.965841133288666
                                Encrypted:false
                                SSDEEP:49152:u3cY854MKaOddKQj2u0WSlg+V7FDWSe1B6V1VXRB15:AcROeQl0Hlg+V7FWSe1B6vVX71
                                MD5:92AF1F8423CB9B7A5F08CD752B9C68A7
                                SHA1:A5B7DE29D25E351B1A0BC20E8861A0A44FDBE73A
                                SHA-256:9C3AA1B46412046CAB893F4BD96D15AF2DC425C61C21A90755830D7F4DF39CB0
                                SHA-512:7C4FF8568DF1770CB5447F0C91B549A69FDC6EAF923401AF8C5B0A5C0DFFC5FACD4D2DC5C88DCF428EB3CD4A344E0F9F8AE044D9A30A5913D620A45C5C1DB050
                                Malicious:true
                                Antivirus:
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: ReversingLabs, Detection: 92%
                                • Antivirus: Virustotal, Detection: 77%, Browse
                                Reputation:low
                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......j.....s...s...s.e.p.%.s.e.v...s.e.t./.s..y..*.s..yw.=.s..yp.4.s..yv.u.s.e.w.6.s.e.u./.s.e.r.5.s...r...s..zz.2.s..z../.s..../.s..zq./.s.Rich..s.................PE..L....iLf...............'.....f........^...........@..........................._.......%...@.................................^...r.......4.....................^.............................T.^..............................6..@................... . ............................@....rsrc...4...........................@....idata ............................@... ..+.........................@...mxeojzwh......D.....................@...qbrinonr......^.......$.............@....taggant.0....^.."....$.............@...........................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\dcmaM16D71.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):26
                                Entropy (8bit):3.95006375643621
                                Encrypted:false
                                SSDEEP:3:ggPYV:rPYV
                                MD5:187F488E27DB4AF347237FE461A079AD
                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                Malicious:true
                                Reputation:high, very likely benign file
                                Preview:[ZoneTransfer]....ZoneId=0
                                Process:C:\Users\user\Desktop\dcmaM16D71.exe
                                File Type:ASCII text, with no line terminators
                                Category:modified
                                Size (bytes):13
                                Entropy (8bit):2.8731406795131336
                                Encrypted:false
                                SSDEEP:3:LDcW1Y:vni
                                MD5:38C2B78E6E3909259F880E9A924B5D0E
                                SHA1:B1522769B597AD921D7132EE816B09183B8974A2
                                SHA-256:3645E9914E711F3E723271C1F2F1293DE6B0D4609584446F1914172B9B846758
                                SHA-512:89D2F21DAEBD09B003C2E1A18CC5A21C5B3836829E1735809DF429C12D75E983D6D0EACD2F5E601C062425130648F0E29464C6ABB484405F4DB9CFFA224A7940
                                Malicious:false
                                Preview:1726931895512
                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Entropy (8bit):7.965841133288666
                                TrID:
                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                • Generic Win/DOS Executable (2004/3) 0.02%
                                • DOS Executable Generic (2002/1) 0.02%
                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                File name:dcmaM16D71.exe
                                File size:2'425'344 bytes
                                MD5:92af1f8423cb9b7a5f08cd752b9c68a7
                                SHA1:a5b7de29d25e351b1a0bc20e8861a0a44fdbe73a
                                SHA256:9c3aa1b46412046cab893f4bd96d15af2dc425c61c21a90755830d7f4df39cb0
                                SHA512:7c4ff8568df1770cb5447f0c91b549a69fdc6eaf923401af8c5b0a5c0dffc5facd4d2dc5c88dcf428eb3cd4a344e0f9f8ae044d9a30a5913d620a45c5c1db050
                                SSDEEP:49152:u3cY854MKaOddKQj2u0WSlg+V7FDWSe1B6V1VXRB15:AcROeQl0Hlg+V7FWSe1B6vVX71
                                TLSH:7BB533199EE8F2BCD8D025F446D39F51FFF906E448C42966990D22BD26DE30EBD4892C
                                File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......j.....s...s...s.e.p.%.s.e.v...s.e.t./.s..y..*.s..yw.=.s..yp.4.s..yv.u.s.e.w.6.s.e.u./.s.e.r.5.s...r...s..zz.2.s..z../.s...../.s
                                Icon Hash:8596a1a0a1a1b171
                                Entrypoint:0x9ed000
                                Entrypoint Section:.taggant
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                Time Stamp:0x664C6914 [Tue May 21 09:27:48 2024 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:6
                                OS Version Minor:0
                                File Version Major:6
                                File Version Minor:0
                                Subsystem Version Major:6
                                Subsystem Version Minor:0
                                Import Hash:2eabe9054cad5152567f0699947a2c5b
                                Instruction
                                jmp 00007F17513D0F1Ah
                                pavgb mm4, qword ptr [eax+eax]
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                jmp 00007F17513D2F15h
                                add byte ptr [edx+ecx], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                xor byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                aas
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [edx], ah
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], cl
                                add byte ptr [eax], 00000000h
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                adc byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                push es
                                or al, byte ptr [eax]
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], dh
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [edi], bl
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [ecx], ah
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], cl
                                add byte ptr [eax], 00000000h
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                adc byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                push es
                                or al, byte ptr [eax]
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], dh
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                or byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [ecx+00000080h], dh
                                add byte ptr [eax], al
                                add byte ptr [eax], dh
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax+eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                and al, 00h
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add dword ptr [eax+00000000h], eax
                                add byte ptr [eax], al
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x18c05e0x72.idata
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x18a0000x1934.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x5ea6a40x10mxeojzwh
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x5ea6540x18mxeojzwh
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x18369c0x40
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                0x10000x1890000xab4001082fa8135051b1e2eedc39f48bc0c43False0.9979812956204379data7.977718228075335IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .rsrc0x18a0000x19340x1400e23e1552be35389ee3054aa229a72a00False0.97421875data7.8306739257506015IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .idata 0x18c0000x10000x2000e14477ce436cc9ebd87f17a92173639False0.1640625data1.180504109820196IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                0x18d0000x2bf0000x200841e2e8398912c7515a1e73c43b8bad4unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                mxeojzwh0x44c0000x1a00000x1a0000a2601c271eea5b6802beeceadcdbbc5cFalse0.9936875563401443data7.953657351690101IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                qbrinonr0x5ec0000x10000x400f8acc0982b7f4066546b554fabddb9aaFalse0.787109375data6.127950525239502IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .taggant0x5ed0000x30000x220001f92163859ab95d3f8dc41c8ed40429False0.07892922794117647DOS executable (COM)0.8771064636714784IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                RT_ICON0x5ea6b40x1060PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedRussianRussia0.8838263358778626
                                RT_GROUP_ICON0x5eb7140x14dataRussianRussia1.05
                                RT_VERSION0x5eb7280x310dataRussianRussia0.45408163265306123
                                RT_MANIFEST0x5eba380x2e6XML 1.0 document, ASCII text, with CRLF line terminators0.45417789757412397
                                RT_MANIFEST0x5ebd1e0x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                                DLLImport
                                kernel32.dlllstrcpy
                                Language of compilation systemCountry where language is spokenMap
                                RussianRussia
                                EnglishUnited States
                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                2024-09-21T15:50:58.347014+02002049060ET MALWARE RisePro TCP Heartbeat Packet1192.168.2.449730147.45.47.12658709TCP
                                2024-09-21T15:51:01.279661+02002046269ET MALWARE [ANY.RUN] RisePro TCP (Activity)1192.168.2.449730147.45.47.12658709TCP
                                2024-09-21T15:51:08.723035+02002046269ET MALWARE [ANY.RUN] RisePro TCP (Activity)1192.168.2.449731147.45.47.12658709TCP
                                2024-09-21T15:51:08.723125+02002046269ET MALWARE [ANY.RUN] RisePro TCP (Activity)1192.168.2.449732147.45.47.12658709TCP
                                2024-09-21T15:51:13.066855+02002046269ET MALWARE [ANY.RUN] RisePro TCP (Activity)1192.168.2.449733147.45.47.12658709TCP
                                2024-09-21T15:51:21.676337+02002046269ET MALWARE [ANY.RUN] RisePro TCP (Activity)1192.168.2.449740147.45.47.12658709TCP
                                TimestampSource PortDest PortSource IPDest IP
                                Sep 21, 2024 15:50:58.258799076 CEST4973058709192.168.2.4147.45.47.126
                                Sep 21, 2024 15:50:58.263942003 CEST5870949730147.45.47.126192.168.2.4
                                Sep 21, 2024 15:50:58.264065027 CEST4973058709192.168.2.4147.45.47.126
                                Sep 21, 2024 15:50:58.347013950 CEST4973058709192.168.2.4147.45.47.126
                                Sep 21, 2024 15:50:58.351922035 CEST5870949730147.45.47.126192.168.2.4
                                Sep 21, 2024 15:51:01.279660940 CEST4973058709192.168.2.4147.45.47.126
                                Sep 21, 2024 15:51:01.284593105 CEST5870949730147.45.47.126192.168.2.4
                                Sep 21, 2024 15:51:05.713159084 CEST4973158709192.168.2.4147.45.47.126
                                Sep 21, 2024 15:51:05.714031935 CEST4973258709192.168.2.4147.45.47.126
                                Sep 21, 2024 15:51:05.718235970 CEST5870949731147.45.47.126192.168.2.4
                                Sep 21, 2024 15:51:05.718317032 CEST4973158709192.168.2.4147.45.47.126
                                Sep 21, 2024 15:51:05.718822002 CEST5870949732147.45.47.126192.168.2.4
                                Sep 21, 2024 15:51:05.718868971 CEST4973258709192.168.2.4147.45.47.126
                                Sep 21, 2024 15:51:05.776417017 CEST4973258709192.168.2.4147.45.47.126
                                Sep 21, 2024 15:51:05.778399944 CEST4973158709192.168.2.4147.45.47.126
                                Sep 21, 2024 15:51:05.781312943 CEST5870949732147.45.47.126192.168.2.4
                                Sep 21, 2024 15:51:05.783183098 CEST5870949731147.45.47.126192.168.2.4
                                Sep 21, 2024 15:51:08.723035097 CEST4973158709192.168.2.4147.45.47.126
                                Sep 21, 2024 15:51:08.723124981 CEST4973258709192.168.2.4147.45.47.126
                                Sep 21, 2024 15:51:08.728003025 CEST5870949731147.45.47.126192.168.2.4
                                Sep 21, 2024 15:51:08.728018999 CEST5870949732147.45.47.126192.168.2.4
                                Sep 21, 2024 15:51:10.062856913 CEST4973358709192.168.2.4147.45.47.126
                                Sep 21, 2024 15:51:10.067910910 CEST5870949733147.45.47.126192.168.2.4
                                Sep 21, 2024 15:51:10.068049908 CEST4973358709192.168.2.4147.45.47.126
                                Sep 21, 2024 15:51:10.101569891 CEST4973358709192.168.2.4147.45.47.126
                                Sep 21, 2024 15:51:10.106492996 CEST5870949733147.45.47.126192.168.2.4
                                Sep 21, 2024 15:51:13.066854954 CEST4973358709192.168.2.4147.45.47.126
                                Sep 21, 2024 15:51:13.079804897 CEST5870949733147.45.47.126192.168.2.4
                                Sep 21, 2024 15:51:18.660545111 CEST4974058709192.168.2.4147.45.47.126
                                Sep 21, 2024 15:51:18.672312975 CEST5870949740147.45.47.126192.168.2.4
                                Sep 21, 2024 15:51:18.672574997 CEST4974058709192.168.2.4147.45.47.126
                                Sep 21, 2024 15:51:18.688196898 CEST4974058709192.168.2.4147.45.47.126
                                Sep 21, 2024 15:51:18.699950933 CEST5870949740147.45.47.126192.168.2.4
                                Sep 21, 2024 15:51:19.617198944 CEST5870949730147.45.47.126192.168.2.4
                                Sep 21, 2024 15:51:19.617285013 CEST4973058709192.168.2.4147.45.47.126
                                Sep 21, 2024 15:51:21.676337004 CEST4974058709192.168.2.4147.45.47.126
                                Sep 21, 2024 15:51:21.681585073 CEST5870949740147.45.47.126192.168.2.4
                                Sep 21, 2024 15:51:27.104043007 CEST5870949731147.45.47.126192.168.2.4
                                Sep 21, 2024 15:51:27.104206085 CEST4973158709192.168.2.4147.45.47.126
                                Sep 21, 2024 15:51:27.113660097 CEST5870949732147.45.47.126192.168.2.4
                                Sep 21, 2024 15:51:27.113776922 CEST4973258709192.168.2.4147.45.47.126
                                Sep 21, 2024 15:51:31.740155935 CEST5870949733147.45.47.126192.168.2.4
                                Sep 21, 2024 15:51:31.740272045 CEST4973358709192.168.2.4147.45.47.126
                                Sep 21, 2024 15:51:31.741381884 CEST5870949733147.45.47.126192.168.2.4
                                Sep 21, 2024 15:51:31.741434097 CEST4973358709192.168.2.4147.45.47.126
                                Sep 21, 2024 15:51:40.098795891 CEST5870949740147.45.47.126192.168.2.4
                                Sep 21, 2024 15:51:40.099962950 CEST4974058709192.168.2.4147.45.47.126

                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:09:50:52
                                Start date:21/09/2024
                                Path:C:\Users\user\Desktop\dcmaM16D71.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\dcmaM16D71.exe"
                                Imagebase:0x1c0000
                                File size:2'425'344 bytes
                                MD5 hash:92AF1F8423CB9B7A5F08CD752B9C68A7
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low
                                Has exited:false

                                Target ID:1
                                Start time:09:50:57
                                Start date:21/09/2024
                                Path:C:\Windows\SysWOW64\schtasks.exe
                                Wow64 process (32bit):true
                                Commandline:schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
                                Imagebase:0x7c0000
                                File size:187'904 bytes
                                MD5 hash:48C2FE20575769DE916F48EF0676A965
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:2
                                Start time:09:50:57
                                Start date:21/09/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff7699e0000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:3
                                Start time:09:50:57
                                Start date:21/09/2024
                                Path:C:\Windows\SysWOW64\schtasks.exe
                                Wow64 process (32bit):true
                                Commandline:schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
                                Imagebase:0x7c0000
                                File size:187'904 bytes
                                MD5 hash:48C2FE20575769DE916F48EF0676A965
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:4
                                Start time:09:50:57
                                Start date:21/09/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff7699e0000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:5
                                Start time:09:50:59
                                Start date:21/09/2024
                                Path:C:\ProgramData\MPGPH131\MPGPH131.exe
                                Wow64 process (32bit):true
                                Commandline:C:\ProgramData\MPGPH131\MPGPH131.exe
                                Imagebase:0x270000
                                File size:2'425'344 bytes
                                MD5 hash:92AF1F8423CB9B7A5F08CD752B9C68A7
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Antivirus matches:
                                • Detection: 100%, Avira
                                • Detection: 100%, Joe Sandbox ML
                                • Detection: 92%, ReversingLabs
                                • Detection: 77%, Virustotal, Browse
                                Reputation:low
                                Has exited:false

                                Target ID:6
                                Start time:09:50:59
                                Start date:21/09/2024
                                Path:C:\ProgramData\MPGPH131\MPGPH131.exe
                                Wow64 process (32bit):true
                                Commandline:C:\ProgramData\MPGPH131\MPGPH131.exe
                                Imagebase:0x270000
                                File size:2'425'344 bytes
                                MD5 hash:92AF1F8423CB9B7A5F08CD752B9C68A7
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low
                                Has exited:false

                                Target ID:7
                                Start time:09:51:06
                                Start date:21/09/2024
                                Path:C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
                                Imagebase:0xd20000
                                File size:2'425'344 bytes
                                MD5 hash:92AF1F8423CB9B7A5F08CD752B9C68A7
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Antivirus matches:
                                • Detection: 100%, Avira
                                • Detection: 100%, Joe Sandbox ML
                                • Detection: 92%, ReversingLabs
                                • Detection: 77%, Virustotal, Browse
                                Reputation:low
                                Has exited:false

                                Target ID:11
                                Start time:09:51:14
                                Start date:21/09/2024
                                Path:C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
                                Imagebase:0xd20000
                                File size:2'425'344 bytes
                                MD5 hash:92AF1F8423CB9B7A5F08CD752B9C68A7
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Reputation:low
                                Has exited:false

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:3.5%
                                  Dynamic/Decrypted Code Coverage:0.3%
                                  Signature Coverage:3.7%
                                  Total number of Nodes:1285
                                  Total number of Limit Nodes:21
                                  execution_graph 17538 4da0856 17539 4da0878 17538->17539 17540 4da0a1d GetCurrentHwProfileW 17539->17540 17541 4da0a42 17540->17541 17553 1e0ad0 17558 1e14a0 17553->17558 17555 1e0ae0 17556 1e0b2a 17555->17556 17557 1e9e20 RtlAllocateHeap 17555->17557 17557->17556 17559 1e14cb 17558->17559 17560 1e14ee 17559->17560 17561 1e9e20 RtlAllocateHeap 17559->17561 17560->17555 17562 1e150b 17561->17562 17562->17555 17563 2128f1 17564 212910 std::_Locinfo::_Locinfo_ctor __Getctype 17563->17564 17565 20f8d3 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 17564->17565 17566 212939 std::_Locinfo::_Locinfo_ctor _ValidateLocalCookies __Getctype 17564->17566 17565->17566 17664 212f77 17665 212f97 std::_Locinfo::_Locinfo_ctor __Getctype 17664->17665 17666 20f8d3 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 17665->17666 17667 2130fe _ValidateLocalCookies 17665->17667 17668 212fef 17666->17668 17668->17667 17669 20f8d3 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 17668->17669 17671 213032 std::_Locinfo::_Locinfo_ctor 17668->17671 17669->17671 17670 20f8d3 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 17672 2130f8 17670->17672 17671->17667 17671->17670 17672->17667 17673 20f8d3 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 17672->17673 17673->17667 17567 1e78c0 17568 1e790a 17567->17568 17569 1e7997 17568->17569 17570 1e1990 RtlAllocateHeap 17568->17570 17571 1e79e2 17570->17571 16317 287b00 16318 287ecc std::_Throw_Cpp_error 16317->16318 16322 287b3e std::ios_base::_Ios_base_dtor __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 16317->16322 16319 287b87 setsockopt recv 16319->16322 16321 287eb7 Sleep 16321->16318 16321->16322 16322->16318 16322->16319 16322->16321 16323 287e15 recv 16322->16323 16326 287eaf Sleep 16322->16326 16331 287cb3 16322->16331 16335 288590 WSAStartup 16322->16335 16341 1d8dc0 16322->16341 16347 1d63b0 16322->16347 16352 287ef0 16322->16352 16406 1f3069 16322->16406 16409 1c9280 16322->16409 16323->16326 16326->16321 16327 287c2d recv 16327->16322 16328 287c4e recv 16327->16328 16328->16322 16332 1d8dc0 RtlAllocateHeap 16331->16332 16333 287d06 recv 16331->16333 16332->16331 16333->16322 16336 2885c8 16335->16336 16340 288686 16335->16340 16337 288654 socket 16336->16337 16336->16340 16338 28866a connect 16337->16338 16337->16340 16339 28867c closesocket 16338->16339 16338->16340 16339->16337 16339->16340 16340->16322 16343 1d8de2 std::locale::_Setgloballocale 16341->16343 16344 1d8e11 16341->16344 16342 1d8ef8 16343->16327 16344->16342 16416 1c32d0 16344->16416 16346 1d8e66 std::_Throw_Cpp_error std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 16346->16327 16349 1d63d8 16347->16349 16348 1d63e7 16348->16322 16349->16348 16350 1c32d0 std::_Throw_Cpp_error RtlAllocateHeap 16349->16350 16351 1d642a std::locale::_Locimp::_Locimp 16350->16351 16351->16322 16353 287f6c 16352->16353 16354 287f3e 16352->16354 16356 287f8e 16353->16356 16357 287f74 16353->16357 16355 1c2cf0 std::_Throw_Cpp_error RtlAllocateHeap 16354->16355 16361 287f50 16355->16361 16359 287fb0 16356->16359 16360 287f96 16356->16360 16477 1d6290 16357->16477 16363 287fb8 16359->16363 16364 287fd5 16359->16364 16362 1d6290 RtlAllocateHeap 16360->16362 16365 1c9280 2 API calls 16361->16365 16403 287f64 16362->16403 16368 1d6290 RtlAllocateHeap 16363->16368 16363->16403 16366 287ffb 16364->16366 16367 287fdd 16364->16367 16365->16403 16370 28801b 16366->16370 16371 2882c0 16366->16371 16366->16403 16481 2012b7 16367->16481 16368->16403 16447 1c5400 16370->16447 16373 2882c8 16371->16373 16374 28831b 16371->16374 16501 1db430 16373->16501 16375 288323 16374->16375 16376 288376 16374->16376 16378 1db430 2 API calls 16375->16378 16379 28837e 16376->16379 16380 2883d1 16376->16380 16378->16403 16381 1db430 2 API calls 16379->16381 16382 2883d9 16380->16382 16383 28842c 16380->16383 16381->16403 16387 1db430 2 API calls 16382->16387 16384 288484 16383->16384 16385 288434 16383->16385 16384->16403 16508 218b00 16384->16508 16388 1db430 2 API calls 16385->16388 16387->16403 16388->16403 16391 288040 16392 28810b 16391->16392 16391->16403 16455 1c2cf0 16391->16455 16459 1dace0 16391->16459 16462 1c2d30 16392->16462 16396 288140 16397 2881b2 16396->16397 16401 2881e5 16396->16401 16398 1d63b0 std::_Throw_Cpp_error RtlAllocateHeap 16397->16398 16399 2881ce 16398->16399 16485 28f280 16399->16485 16401->16403 16493 201628 16401->16493 16403->16322 16404 288273 16497 1fd0a8 16404->16497 17445 1f361d 16406->17445 16410 1d63b0 std::_Throw_Cpp_error RtlAllocateHeap 16409->16410 16411 1c92d4 16410->16411 16412 1d8dc0 RtlAllocateHeap 16411->16412 16413 1c9523 std::locale::_Locimp::_Locimp 16411->16413 16412->16413 16414 1c96b6 WSASend 16413->16414 16415 1c96e2 std::ios_base::_Ios_base_dtor std::_Throw_Cpp_error 16413->16415 16414->16413 16414->16415 16415->16322 16417 1c32e2 16416->16417 16421 1c3306 16416->16421 16418 1c331f 16417->16418 16419 1c32e9 16417->16419 16435 1c2b50 16418->16435 16427 1f3672 16419->16427 16420 1c3318 16420->16346 16421->16420 16423 1f3672 std::_Facet_Register RtlAllocateHeap 16421->16423 16426 1c3310 16423->16426 16425 1c32ef std::_Throw_Cpp_error 16425->16346 16426->16346 16429 1f3677 std::_Facet_Register 16427->16429 16430 1f3691 16429->16430 16432 1c2b50 Concurrency::cancel_current_task std::_Throw_Cpp_error 16429->16432 16439 2023ec 16429->16439 16430->16425 16431 1f369d 16431->16431 16432->16431 16443 1f4b15 16432->16443 16434 1c2bac 16434->16425 16436 1c2b5e Concurrency::cancel_current_task std::_Throw_Cpp_error 16435->16436 16437 1f4b15 ___std_exception_copy RtlAllocateHeap 16436->16437 16438 1c2bac 16437->16438 16438->16425 16442 20b094 __Getctype std::_Facet_Register 16439->16442 16440 20b0bd RtlAllocateHeap 16441 20b0d0 ___std_exception_copy 16440->16441 16440->16442 16441->16429 16442->16440 16442->16441 16444 1f4b22 16443->16444 16446 1f4b3f ___std_exception_copy 16443->16446 16444->16444 16445 2023ec ___std_exception_copy RtlAllocateHeap 16444->16445 16444->16446 16445->16446 16446->16434 16513 1f2b99 16447->16513 16450 1c5410 16451 1c5419 16450->16451 16453 1f2534 std::_Throw_Cpp_error 2 API calls 16450->16453 16451->16391 16454 1c5430 16453->16454 16454->16391 16456 1c2d13 16455->16456 16456->16456 16457 1c3040 std::_Throw_Cpp_error RtlAllocateHeap 16456->16457 16458 1c2d25 16457->16458 16458->16391 16460 1dad10 16459->16460 16460->16460 16670 1dfbf0 16460->16670 16463 1c3040 std::_Throw_Cpp_error RtlAllocateHeap 16462->16463 16464 1c2d55 16463->16464 16465 2962c0 16464->16465 16466 296358 16465->16466 16476 296361 std::locale::_Setgloballocale 16465->16476 16676 1de4b0 16466->16676 16469 29654f 16473 296553 std::_Throw_Cpp_error 16469->16473 16750 1d6130 16469->16750 16472 296580 std::ios_base::_Ios_base_dtor 16472->16396 16473->16472 16474 1f3069 __Xtime_get_ticks GetSystemTimePreciseAsFileTime 16473->16474 16475 2965d6 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 16474->16475 16475->16396 16476->16469 16476->16473 16697 2b4760 16476->16697 16702 1e4160 16476->16702 16478 1d629d 16477->16478 16479 1d62b1 16477->16479 16480 1d6130 RtlAllocateHeap 16478->16480 16479->16403 16480->16479 16482 2012ca ___std_exception_copy 16481->16482 16809 1fd6a5 16482->16809 16484 2012e4 ___std_exception_copy 16484->16403 16486 28f2f6 std::locale::_Setgloballocale 16485->16486 16879 1dab20 16486->16879 16489 1d8f00 std::_Throw_Cpp_error RtlAllocateHeap 16490 28f47f 16489->16490 16884 1c3440 16490->16884 16492 28f4fa std::ios_base::_Ios_base_dtor std::_Throw_Cpp_error 16492->16403 16494 20163b ___std_exception_copy 16493->16494 17032 20140a 16494->17032 16496 201650 ___std_exception_copy 16496->16404 16498 1fd0bb ___std_exception_copy 16497->16498 17097 1fcf83 16498->17097 16500 1fd0c7 ___std_exception_copy 16500->16403 17119 1d7ef0 16501->17119 16503 1db48d 17136 1e2100 16503->17136 16507 1db503 16507->16403 17421 218bb0 16508->17421 16510 218b31 std::locale::_Locimp::_Locimp 16511 1c3040 std::_Throw_Cpp_error RtlAllocateHeap 16510->16511 16512 218b7c 16511->16512 16512->16403 16522 1f2bc8 16513->16522 16515 1c5409 16515->16450 16516 1f2534 16515->16516 16517 1f254a std::_Throw_Cpp_error 16516->16517 16529 1f24e7 16517->16529 16519 1f255a __EH_prolog3 std::_Throw_Cpp_error 16535 1d9cb0 16519->16535 16521 1f25c7 std::_Throw_Cpp_error 16521->16450 16523 1f2be1 16522->16523 16524 1f2bf2 _ValidateLocalCookies 16523->16524 16526 1f302b 16523->16526 16524->16515 16527 1f3069 __Xtime_get_ticks GetSystemTimePreciseAsFileTime 16526->16527 16528 1f3036 __aulldiv __aullrem 16527->16528 16528->16523 16530 1f24f3 __EH_prolog3_GS 16529->16530 16531 1c2cf0 std::_Throw_Cpp_error RtlAllocateHeap 16530->16531 16532 1f2507 16531->16532 16546 1c36e0 16532->16546 16534 1f251c std::_Throw_Cpp_error 16534->16519 16561 1c4900 16535->16561 16537 1d9d26 16538 1f3672 std::_Facet_Register RtlAllocateHeap 16537->16538 16539 1d9d2d 16538->16539 16566 1f2729 16539->16566 16541 1d9d39 16572 1da060 16541->16572 16543 1d9d76 16544 1d9dc7 std::_Throw_Cpp_error 16543->16544 16545 1c4900 std::_Throw_Cpp_error RtlAllocateHeap 16543->16545 16544->16521 16545->16544 16547 1d63b0 std::_Throw_Cpp_error RtlAllocateHeap 16546->16547 16548 1c3731 16547->16548 16549 1c375a 16548->16549 16555 1d8f00 16548->16555 16551 1d8f00 std::_Throw_Cpp_error RtlAllocateHeap 16549->16551 16552 1c378a 16551->16552 16553 1f4b15 ___std_exception_copy RtlAllocateHeap 16552->16553 16554 1c381e std::ios_base::_Ios_base_dtor std::_Throw_Cpp_error ___std_exception_destroy 16553->16554 16554->16534 16556 1d8f4f 16555->16556 16557 1d8f22 std::locale::_Locimp::_Locimp 16555->16557 16558 1c32d0 std::_Throw_Cpp_error RtlAllocateHeap 16556->16558 16559 1d902f std::ios_base::_Ios_base_dtor 16556->16559 16557->16549 16560 1d8fa4 std::_Throw_Cpp_error std::locale::_Locimp::_Locimp 16558->16560 16559->16549 16560->16549 16562 1c4922 16561->16562 16563 1c491a std::_Throw_Cpp_error 16561->16563 16562->16537 16584 1c47f0 16563->16584 16565 1c4968 std::ios_base::_Ios_base_dtor std::_Throw_Cpp_error 16565->16537 16567 1f2735 __EH_prolog3 std::_Lockit::_Lockit 16566->16567 16570 1f2771 std::_Throw_Cpp_error std::_Lockit::~_Lockit 16567->16570 16599 1f288c 16567->16599 16569 1f2753 std::locale::_Setgloballocale 16605 1d5a60 16569->16605 16570->16541 16574 1da0a2 std::_Throw_Cpp_error std::_Lockit::~_Lockit std::_Lockit::_Lockit 16572->16574 16573 1da144 std::_Lockit::~_Lockit 16573->16543 16574->16573 16575 1f3672 std::_Facet_Register RtlAllocateHeap 16574->16575 16576 1da152 16575->16576 16612 1c4040 16576->16612 16582 1da1f1 16627 1f26f7 16582->16627 16585 1c4851 16584->16585 16585->16585 16593 1c3040 16585->16593 16587 1c4865 16588 1c36e0 std::_Throw_Cpp_error RtlAllocateHeap 16587->16588 16590 1c487b std::_Throw_Cpp_error 16588->16590 16589 1c48a5 std::ios_base::_Ios_base_dtor 16589->16565 16590->16589 16591 1c47f0 std::_Throw_Cpp_error RtlAllocateHeap 16590->16591 16592 1c4968 std::ios_base::_Ios_base_dtor std::_Throw_Cpp_error 16591->16592 16592->16565 16595 1c30c8 16593->16595 16596 1c3052 16593->16596 16594 1c3057 std::locale::_Locimp::_Locimp 16594->16587 16595->16587 16596->16594 16597 1c32d0 std::_Throw_Cpp_error RtlAllocateHeap 16596->16597 16598 1c30a3 std::locale::_Locimp::_Locimp 16597->16598 16598->16587 16600 1f3672 std::_Facet_Register RtlAllocateHeap 16599->16600 16601 1f2897 16600->16601 16602 1f28ab 16601->16602 16609 1f2611 16601->16609 16602->16569 16606 1d5ab3 std::locale::_Locimp::_Locimp 16605->16606 16607 1d5a86 ___std_exception_copy 16605->16607 16606->16570 16607->16606 16608 2023ec ___std_exception_copy RtlAllocateHeap 16607->16608 16608->16606 16610 1d5a60 std::locale::_Locimp::_Locimp RtlAllocateHeap 16609->16610 16611 1f264b 16610->16611 16611->16569 16613 1c4066 std::_Lockit::_Lockit 16612->16613 16614 1c40e6 16613->16614 16615 1c40c2 16613->16615 16639 1f1d4a 16614->16639 16630 1f2827 16615->16630 16618 1c40f0 16620 1f2cf4 16621 1f2cfd __Getctype 16620->16621 16623 1da1ca 16621->16623 16662 204572 16621->16662 16624 1c4100 16623->16624 16666 1f2872 16624->16666 16626 1c412c std::_Lockit::~_Lockit ___std_exception_copy 16626->16582 16628 1f3672 std::_Facet_Register RtlAllocateHeap 16627->16628 16629 1f2702 16628->16629 16629->16573 16642 204516 16630->16642 16633 1d5a60 std::locale::_Locimp::_Locimp RtlAllocateHeap 16634 1f284b 16633->16634 16635 1f285b 16634->16635 16636 204516 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 16634->16636 16637 1d5a60 std::locale::_Locimp::_Locimp RtlAllocateHeap 16635->16637 16636->16635 16638 1c40c9 16637->16638 16638->16620 16659 1c3540 16639->16659 16641 1f1d5b std::_Throw_Cpp_error 16641->16618 16643 204523 std::_Lockit::_Lockit 16642->16643 16646 2042c1 16643->16646 16645 1f2833 16645->16633 16647 2042cd std::_Lockit::_Lockit std::locale::_Setgloballocale 16646->16647 16650 20431c 16647->16650 16649 2042e8 std::_Locinfo::_Locinfo_ctor 16649->16645 16651 20447b std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 16650->16651 16652 204337 __Getctype 16651->16652 16653 203379 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 16652->16653 16658 204370 __Getctype ___std_exception_copy 16652->16658 16654 204369 16653->16654 16655 20b094 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 16654->16655 16654->16658 16656 204395 16655->16656 16657 203379 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 16656->16657 16656->16658 16657->16658 16658->16649 16660 1f4b15 ___std_exception_copy RtlAllocateHeap 16659->16660 16661 1c3585 16660->16661 16661->16641 16663 20457f 16662->16663 16665 2045a2 __Getctype 16662->16665 16664 2023ec ___std_exception_copy RtlAllocateHeap 16663->16664 16664->16665 16665->16623 16667 1f287e 16666->16667 16668 1f2888 16666->16668 16669 204516 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 16667->16669 16668->16626 16669->16668 16671 1dfc8d 16670->16671 16674 1dfc12 std::locale::_Locimp::_Locimp 16670->16674 16672 1dfd5e 16671->16672 16673 1c32d0 std::_Throw_Cpp_error RtlAllocateHeap 16671->16673 16675 1dfce1 std::_Throw_Cpp_error std::locale::_Locimp::_Locimp 16673->16675 16677 1de528 16676->16677 16678 1de4c2 16676->16678 16759 1c3330 16677->16759 16680 1de4f9 16678->16680 16681 1de4ca 16678->16681 16682 1de516 16680->16682 16685 1f3672 std::_Facet_Register RtlAllocateHeap 16680->16685 16683 1de52d 16681->16683 16684 1de4d1 16681->16684 16682->16476 16686 1c2b50 Concurrency::cancel_current_task RtlAllocateHeap 16683->16686 16687 1f3672 std::_Facet_Register RtlAllocateHeap 16684->16687 16688 1de503 16685->16688 16690 1de4d7 std::_Throw_Cpp_error 16686->16690 16687->16690 16688->16476 16689 1de4e0 16689->16476 16690->16689 16762 1d6ad0 16690->16762 16692 1de574 16693 1c4900 std::_Throw_Cpp_error RtlAllocateHeap 16692->16693 16694 1de5fb 16693->16694 16695 1de613 16694->16695 16766 1d9b60 16694->16766 16695->16476 16698 2b4767 16697->16698 16699 2b476c 16697->16699 16698->16476 16700 2023ec ___std_exception_copy RtlAllocateHeap 16699->16700 16701 2b47af ___std_exception_copy 16699->16701 16700->16701 16701->16476 16703 1e4288 16702->16703 16704 1e4195 16702->16704 16705 1c3330 RtlAllocateHeap 16703->16705 16706 1e41b1 16704->16706 16707 1e4202 16704->16707 16708 1e41f2 16704->16708 16709 1e428d 16705->16709 16710 1f3672 std::_Facet_Register RtlAllocateHeap 16706->16710 16712 1f3672 std::_Facet_Register RtlAllocateHeap 16707->16712 16718 1e41cf std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 16707->16718 16708->16706 16708->16709 16711 1c2b50 Concurrency::cancel_current_task RtlAllocateHeap 16709->16711 16713 1e41c4 std::_Throw_Cpp_error 16710->16713 16711->16713 16712->16718 16714 1e42fa 16713->16714 16715 1e43e9 16713->16715 16713->16718 16801 1e6ff0 16714->16801 16716 1c3330 RtlAllocateHeap 16715->16716 16717 1e43ee 16716->16717 16720 1e445a 16717->16720 16721 1e4549 16717->16721 16718->16476 16723 1e6ff0 RtlAllocateHeap 16720->16723 16722 1c3330 RtlAllocateHeap 16721->16722 16729 1e454e 16722->16729 16725 1e4496 16723->16725 16724 1e470b 16727 1c3330 RtlAllocateHeap 16724->16727 16728 1d63b0 std::_Throw_Cpp_error RtlAllocateHeap 16725->16728 16726 1e4706 16730 1c2b50 Concurrency::cancel_current_task RtlAllocateHeap 16726->16730 16738 1e45ff std::_Throw_Cpp_error 16727->16738 16737 1e44c4 16728->16737 16729->16724 16729->16726 16731 1e45ee 16729->16731 16732 1e4615 16729->16732 16730->16724 16731->16726 16733 1e45f9 16731->16733 16736 1f3672 std::_Facet_Register RtlAllocateHeap 16732->16736 16732->16738 16734 1f3672 std::_Facet_Register RtlAllocateHeap 16733->16734 16734->16738 16735 1e4336 16735->16476 16736->16738 16737->16476 16739 1e4798 16738->16739 16740 1e46d1 std::ios_base::_Ios_base_dtor 16738->16740 16741 1e477f 16738->16741 16742 1e475b 16738->16742 16743 1c2b50 Concurrency::cancel_current_task RtlAllocateHeap 16739->16743 16740->16476 16745 1e4791 16741->16745 16748 1f3672 std::_Facet_Register RtlAllocateHeap 16741->16748 16742->16739 16744 1e4762 16742->16744 16746 1e4768 std::_Throw_Cpp_error 16743->16746 16747 1f3672 std::_Facet_Register RtlAllocateHeap 16744->16747 16745->16476 16746->16476 16747->16746 16749 1e4789 16748->16749 16749->16476 16751 1d6174 16750->16751 16754 1d6143 std::locale::_Locimp::_Locimp 16750->16754 16752 1d6200 16751->16752 16753 1d6180 16751->16753 16756 1d8f00 std::_Throw_Cpp_error RtlAllocateHeap 16752->16756 16755 1c32d0 std::_Throw_Cpp_error RtlAllocateHeap 16753->16755 16754->16473 16758 1d61bf std::_Throw_Cpp_error std::locale::_Locimp::_Locimp 16755->16758 16757 1d6232 16756->16757 16757->16473 16758->16473 16770 1f1cea 16759->16770 16763 1d6b02 16762->16763 16764 1d6b1d 16763->16764 16790 1d50e0 16763->16790 16764->16692 16767 1d9bbb 16766->16767 16768 1d9b96 16766->16768 16767->16695 16768->16767 16798 1d88a0 16768->16798 16777 1f1a9f 16770->16777 16772 1f1cfb std::_Throw_Cpp_error 16780 1f1af4 16772->16780 16774 1f1d1b std::_Throw_Cpp_error 16783 1f1b37 16774->16783 16776 1f1d3b std::_Throw_Cpp_error 16787 1c34e0 16777->16787 16781 1c34e0 std::invalid_argument::invalid_argument RtlAllocateHeap 16780->16781 16782 1f1b06 16781->16782 16782->16774 16784 1f1b4b std::regex_error::regex_error 16783->16784 16785 1c34e0 std::invalid_argument::invalid_argument RtlAllocateHeap 16784->16785 16786 1f1b54 16785->16786 16786->16776 16788 1f4b15 ___std_exception_copy RtlAllocateHeap 16787->16788 16789 1c3522 16788->16789 16789->16772 16791 1d5117 16790->16791 16795 1d51b5 16790->16795 16792 1d6ad0 RtlAllocateHeap 16791->16792 16794 1d5120 16792->16794 16793 1d519d 16793->16795 16797 1d9b60 RtlAllocateHeap 16793->16797 16794->16793 16796 1c4900 std::_Throw_Cpp_error RtlAllocateHeap 16794->16796 16795->16764 16796->16793 16797->16795 16799 1c4900 std::_Throw_Cpp_error RtlAllocateHeap 16798->16799 16800 1d88bf 16799->16800 16800->16767 16802 1e703c 16801->16802 16804 1e6ff9 16801->16804 16802->16802 16803 1e7013 16805 1e701c 16803->16805 16807 1f3672 std::_Facet_Register RtlAllocateHeap 16803->16807 16804->16802 16804->16803 16806 1f3672 std::_Facet_Register RtlAllocateHeap 16804->16806 16805->16735 16806->16803 16808 1e7035 16807->16808 16808->16735 16810 1fd6b7 std::_Locinfo::_Locinfo_ctor 16809->16810 16813 1fd723 16810->16813 16814 1fd6cc std::_Locinfo::_Locinfo_ctor ___std_exception_copy 16810->16814 16815 1fe1d0 16810->16815 16813->16814 16819 1fce94 16813->16819 16814->16484 16816 1fe1e0 std::_Locinfo::_Locinfo_ctor ___std_exception_copy 16815->16816 16824 20a1b8 16816->16824 16820 1fcea0 std::_Locinfo::_Locinfo_ctor __Getctype 16819->16820 16822 1fceb6 16819->16822 16820->16813 16821 1fcec6 16821->16813 16822->16821 16869 209a39 16822->16869 16825 1fe20a 16824->16825 16826 20a1cf 16824->16826 16825->16813 16826->16825 16828 2106bd 16826->16828 16829 2106c2 __Getctype 16828->16829 16832 2105d5 16829->16832 16834 2105e1 std::_Lockit::_Lockit std::_Locinfo::_Locinfo_ctor __Getctype ___std_exception_copy std::locale::_Setgloballocale 16832->16834 16833 210602 16833->16825 16834->16833 16836 210480 16834->16836 16837 2105d5 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 16836->16837 16838 2104aa 16837->16838 16845 210207 16838->16845 16842 2104d4 16844 2104c3 std::_Locinfo::_Locinfo_ctor ___std_exception_copy 16842->16844 16852 2106d0 16842->16852 16844->16833 16857 1f95ae 16845->16857 16848 20b094 16850 20b0d0 ___std_exception_copy 16848->16850 16851 20b0a2 __Getctype std::_Facet_Register 16848->16851 16849 20b0bd RtlAllocateHeap 16849->16850 16849->16851 16850->16842 16851->16849 16851->16850 16853 210207 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 16852->16853 16854 2106f0 std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 16853->16854 16855 2107f5 std::_Locinfo::_Locinfo_ctor _ValidateLocalCookies 16854->16855 16861 2102db 16854->16861 16855->16844 16858 1f95c5 16857->16858 16859 1f95cc __Getctype 16857->16859 16858->16844 16858->16848 16859->16858 16860 20a18b std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 16859->16860 16860->16858 16863 210303 16861->16863 16868 2103cc _ValidateLocalCookies 16861->16868 16862 20f44d std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 16864 210383 16862->16864 16863->16862 16863->16868 16865 20a8a6 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 16864->16865 16866 2103a4 16865->16866 16867 20a8a6 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 16866->16867 16867->16868 16868->16855 16870 1f95ae std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 16869->16870 16871 209a56 16870->16871 16873 209a66 _ValidateLocalCookies 16871->16873 16874 20f44d 16871->16874 16873->16821 16875 1f95ae std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 16874->16875 16877 20f46d std::_Locinfo::_Locinfo_ctor 16875->16877 16876 20f4bf __freea std::_Locinfo::_Locinfo_ctor _ValidateLocalCookies std::locale::_Setgloballocale 16876->16873 16877->16876 16878 20b094 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 16877->16878 16878->16876 16881 1dab55 16879->16881 16880 1daba3 16881->16880 16888 1de8a0 16881->16888 16883 1dab83 16883->16489 16885 1c3459 16884->16885 16892 200dd7 16885->16892 16887 1c3467 16887->16492 16889 1de8ce 16888->16889 16890 1de8f8 std::locale::_Locimp::_Locimp 16888->16890 16891 1c32d0 std::_Throw_Cpp_error RtlAllocateHeap 16889->16891 16890->16883 16891->16890 16893 200deb ___std_exception_copy 16892->16893 16896 1fe565 16893->16896 16895 200e06 ___std_exception_copy 16895->16887 16897 1fe5b4 16896->16897 16899 1fe591 _ValidateLocalCookies ___std_exception_copy 16896->16899 16897->16899 16900 1ffaa7 16897->16900 16899->16895 16902 1ffac1 std::_Locinfo::_Locinfo_ctor 16900->16902 16904 1fe1d0 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 16902->16904 16905 1ffacc ___std_exception_copy 16902->16905 16906 1ffed4 16902->16906 16932 20036f 16902->16932 16904->16902 16905->16899 16907 1ffedb 16906->16907 16918 1ffef2 ___std_exception_copy 16906->16918 16908 2003f4 16907->16908 16909 200394 16907->16909 16907->16918 16912 2003f9 16908->16912 16913 20042d 16908->16913 16910 20040a 16909->16910 16911 20039a 16909->16911 16929 2003c5 16910->16929 16974 1febfc 16910->16974 16924 20039f 16911->16924 16925 2003eb 16911->16925 16914 200426 16912->16914 16915 2003fb 16912->16915 16916 200432 16913->16916 16917 20044a 16913->16917 16978 200a30 16914->16978 16915->16910 16920 2003ae 16915->16920 16916->16910 16916->16925 16916->16929 16982 200a4d 16917->16982 16918->16902 16931 200453 _ValidateLocalCookies 16920->16931 16956 200785 16920->16956 16924->16920 16927 2003d8 16924->16927 16924->16929 16925->16931 16970 1fed89 16925->16970 16927->16931 16966 200916 16927->16966 16929->16931 16985 20c5ba 16929->16985 16931->16902 16933 2003f4 16932->16933 16934 200394 16932->16934 16937 2003f9 16933->16937 16938 20042d 16933->16938 16935 20040a 16934->16935 16936 20039a 16934->16936 16944 1febfc RtlAllocateHeap 16935->16944 16954 2003c5 16935->16954 16948 20039f 16936->16948 16949 2003eb 16936->16949 16939 200426 16937->16939 16940 2003fb 16937->16940 16941 200432 16938->16941 16942 20044a 16938->16942 16945 200a30 RtlAllocateHeap 16939->16945 16940->16935 16946 2003ae 16940->16946 16941->16935 16941->16949 16941->16954 16943 200a4d RtlAllocateHeap 16942->16943 16943->16954 16944->16954 16945->16954 16947 200785 RtlAllocateHeap 16946->16947 16955 200453 _ValidateLocalCookies 16946->16955 16947->16954 16948->16946 16950 2003d8 16948->16950 16948->16954 16951 1fed89 RtlAllocateHeap 16949->16951 16949->16955 16952 200916 RtlAllocateHeap 16950->16952 16950->16955 16951->16954 16952->16954 16953 20c5ba RtlAllocateHeap 16953->16954 16954->16953 16954->16955 16955->16902 16957 20079f 16956->16957 16989 1fe790 16957->16989 16959 2007de 16993 20c439 16959->16993 16961 200871 16962 1fe1d0 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 16961->16962 16963 200895 16961->16963 16962->16963 16964 1fe1d0 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 16963->16964 16965 2008c8 16963->16965 16964->16965 16965->16929 16965->16965 16967 200931 16966->16967 16968 200967 16967->16968 16969 20c5ba RtlAllocateHeap 16967->16969 16968->16929 16969->16968 16971 1fed9e 16970->16971 16972 1fe790 RtlAllocateHeap 16971->16972 16973 1fedc0 ___std_exception_copy 16971->16973 16972->16973 16973->16929 16975 1fec11 16974->16975 16976 1fe790 RtlAllocateHeap 16975->16976 16977 1fec33 ___std_exception_copy 16975->16977 16976->16977 16977->16929 16979 200a3c 16978->16979 17028 1fea6f 16979->17028 16981 200a4c 16981->16929 16983 1fed89 RtlAllocateHeap 16982->16983 16984 200a62 16983->16984 16984->16929 16986 20c5cf 16985->16986 16987 1fe1d0 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 16986->16987 16988 20c5d3 std::_Locinfo::_Locinfo_ctor ___std_exception_copy std::locale::_Setgloballocale 16986->16988 16987->16988 16988->16929 16990 1fe7b7 16989->16990 16992 1fe7a5 ___std_exception_copy 16989->16992 16991 20b094 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 16990->16991 16990->16992 16991->16992 16992->16959 16995 20c46e 16993->16995 16997 20c44a ___std_exception_copy 16993->16997 16994 20c532 16998 20c599 16994->16998 16999 20c55f 16994->16999 16995->16994 16996 20c537 16995->16996 16995->16997 17006 20bb66 16996->17006 16997->16961 17024 20be93 16998->17024 17001 20c564 16999->17001 17002 20c57f 16999->17002 17013 20c20e 17001->17013 17020 20c08a 17002->17020 17007 20bb79 17006->17007 17008 20bbbf 17007->17008 17010 20bc12 17007->17010 17012 20bb88 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z ___std_exception_copy std::locale::_Setgloballocale __allrem _strrchr 17007->17012 17009 20be93 RtlAllocateHeap 17008->17009 17009->17012 17011 1fe1d0 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 17010->17011 17010->17012 17011->17012 17012->16997 17015 20c23e 17013->17015 17014 20c283 17014->16997 17015->17014 17016 20c2bc 17015->17016 17017 20c295 17015->17017 17018 20bf37 RtlAllocateHeap 17016->17018 17019 20c120 RtlAllocateHeap 17017->17019 17018->17014 17019->17014 17021 20c0b9 17020->17021 17022 20c101 17021->17022 17023 20c120 RtlAllocateHeap 17021->17023 17022->16997 17023->17022 17025 20bebd 17024->17025 17026 20bf37 RtlAllocateHeap 17025->17026 17027 20bf12 17025->17027 17026->17027 17027->16997 17029 1fea84 17028->17029 17030 1fe790 RtlAllocateHeap 17029->17030 17031 1feaa6 ___std_exception_copy 17029->17031 17030->17031 17031->16981 17033 201425 ___std_exception_copy 17032->17033 17034 201418 17032->17034 17033->16496 17034->17033 17037 201363 17034->17037 17036 20147f 17036->16496 17038 20136f std::locale::_Setgloballocale 17037->17038 17041 2013be 17038->17041 17040 20138a 17040->17036 17048 20c8aa 17041->17048 17043 2013d6 17052 201481 17043->17052 17045 2013f4 17057 20c955 17045->17057 17049 20c8bb 17048->17049 17050 20b094 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 17049->17050 17051 20c914 ___std_exception_copy 17049->17051 17050->17051 17051->17043 17053 2014a1 ___std_exception_copy 17052->17053 17056 201493 std::locale::_Locimp::_Locimp 17052->17056 17053->17045 17056->17053 17061 1f9a91 17056->17061 17065 209678 17056->17065 17058 20c960 17057->17058 17059 201400 17057->17059 17058->17059 17060 1f9a91 3 API calls 17058->17060 17059->17040 17060->17059 17062 1f9aaa 17061->17062 17064 1f9ad1 17061->17064 17063 209678 3 API calls 17062->17063 17062->17064 17063->17064 17064->17056 17066 209684 std::locale::_Setgloballocale 17065->17066 17068 20968c ___std_exception_copy 17066->17068 17069 209789 17066->17069 17068->17056 17070 2097b1 17069->17070 17079 2097b5 ___std_exception_copy 17069->17079 17071 20982e 17070->17071 17070->17079 17084 20263d 17070->17084 17080 2092ce 17071->17080 17075 209846 17075->17079 17087 208e9f 17075->17087 17076 20988d 17077 2098f6 WriteFile 17076->17077 17076->17079 17077->17079 17079->17068 17082 2092e0 17080->17082 17081 20930e 17081->17075 17081->17076 17082->17081 17083 1fe1d0 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 17082->17083 17083->17081 17093 20251c 17084->17093 17086 202656 17086->17071 17088 208f07 17087->17088 17089 1fe1d0 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 17088->17089 17092 208f18 std::_Locinfo::_Locinfo_ctor std::locale::_Locimp::_Locimp 17088->17092 17089->17092 17090 20c724 RtlAllocateHeap 17090->17092 17091 2091ce _ValidateLocalCookies 17091->17079 17091->17091 17092->17090 17092->17091 17094 20252e 17093->17094 17095 20254a SetFilePointerEx 17094->17095 17096 202536 17094->17096 17095->17096 17096->17086 17098 1fcf8f std::locale::_Setgloballocale 17097->17098 17100 1fcf99 ___std_exception_copy 17098->17100 17101 1fd01a 17098->17101 17100->16500 17102 1fd04a 17101->17102 17104 1fd027 ___std_exception_copy 17101->17104 17103 1f9a91 3 API calls 17102->17103 17102->17104 17105 1fd062 17103->17105 17104->17100 17107 208d2c 17105->17107 17108 208d3d ___std_exception_copy 17107->17108 17109 208d55 17107->17109 17108->17104 17109->17108 17111 208c9b 17109->17111 17112 208ca7 std::locale::_Setgloballocale 17111->17112 17114 208ce6 17112->17114 17115 208dff 17112->17115 17114->17108 17118 208e0f 17115->17118 17116 208e15 17116->17114 17117 208e53 CloseHandle 17117->17116 17118->17116 17118->17117 17120 1d7f1d 17119->17120 17121 1d8034 17119->17121 17122 1d7f7c 17120->17122 17123 1d7fcb 17120->17123 17124 1d7f2b 17120->17124 17125 1d7f24 17120->17125 17126 1d7f83 17120->17126 17130 1c2cf0 std::_Throw_Cpp_error RtlAllocateHeap 17121->17130 17132 1d7f29 17121->17132 17179 1dcf80 17122->17179 17123->16503 17129 1f3672 std::_Facet_Register RtlAllocateHeap 17124->17129 17174 1dc3a0 17125->17174 17127 1f3672 std::_Facet_Register RtlAllocateHeap 17126->17127 17127->17132 17129->17132 17133 1d804f 17130->17133 17132->16503 17184 1c7f90 17133->17184 17135 1d8062 std::_Throw_Cpp_error 17137 1e215f 17136->17137 17231 1dfd70 17137->17231 17139 1db4f0 17140 1ddb10 17139->17140 17141 1dde3d 17140->17141 17142 1ddb56 17140->17142 17144 1dfd70 RtlAllocateHeap 17141->17144 17272 1debb0 17142->17272 17146 1dde87 17144->17146 17145 1ddba4 17147 1dfd70 RtlAllocateHeap 17145->17147 17148 1deda0 2 API calls 17146->17148 17171 1ddf1f std::ios_base::_Ios_base_dtor 17146->17171 17150 1ddbc1 17147->17150 17149 1ddee2 17148->17149 17152 1c75c0 RtlAllocateHeap 17149->17152 17173 1ddcc3 std::ios_base::_Ios_base_dtor 17150->17173 17278 1deda0 17150->17278 17151 1d7ef0 RtlAllocateHeap 17153 1ddfc7 std::_Throw_Cpp_error 17151->17153 17154 1ddf06 17152->17154 17169 1ddd01 std::ios_base::_Ios_base_dtor 17153->17169 17343 1d90b0 17153->17343 17158 1df440 2 API calls 17154->17158 17156 1ddcec 17160 1d7ef0 RtlAllocateHeap 17156->17160 17157 1ddd82 17162 1d7ef0 RtlAllocateHeap 17157->17162 17157->17169 17158->17171 17159 1ddc1c 17313 1c75c0 17159->17313 17160->17169 17162->17169 17164 1ddc40 17337 1df440 17164->17337 17165 1de07d std::_Throw_Cpp_error 17167 1d90b0 RtlAllocateHeap 17165->17167 17170 1de0a1 std::_Throw_Cpp_error 17167->17170 17168 1ddc56 17168->17153 17172 1ddc6b 17168->17172 17169->16507 17171->17151 17171->17153 17171->17165 17171->17170 17172->17165 17172->17173 17173->17156 17173->17157 17175 1f3672 std::_Facet_Register RtlAllocateHeap 17174->17175 17176 1dc3c3 17175->17176 17177 1f3672 std::_Facet_Register RtlAllocateHeap 17176->17177 17178 1dc3ec 17177->17178 17178->17132 17180 1f3672 std::_Facet_Register RtlAllocateHeap 17179->17180 17181 1dcfb7 17180->17181 17182 1c3040 std::_Throw_Cpp_error RtlAllocateHeap 17181->17182 17183 1dcfee 17182->17183 17183->17132 17192 1c7350 17184->17192 17186 1c8029 17203 1dad80 17186->17203 17189 1c80aa 17189->17135 17190 1c803d std::ios_base::_Ios_base_dtor 17191 1c80df std::_Throw_Cpp_error 17190->17191 17207 1c72b0 17190->17207 17191->17135 17210 1c4d70 17192->17210 17201 1d8f00 std::_Throw_Cpp_error RtlAllocateHeap 17202 1c73e6 std::ios_base::_Ios_base_dtor std::_Throw_Cpp_error ___std_exception_destroy 17201->17202 17202->17186 17204 1dadb4 17203->17204 17205 1d8f00 std::_Throw_Cpp_error RtlAllocateHeap 17204->17205 17206 1dadbf 17205->17206 17206->17190 17208 1f4b15 ___std_exception_copy RtlAllocateHeap 17207->17208 17209 1c731a 17208->17209 17209->17189 17211 1c4da6 17210->17211 17212 1c4dd8 17211->17212 17213 1c3040 std::_Throw_Cpp_error RtlAllocateHeap 17211->17213 17214 1dac50 17212->17214 17213->17212 17216 1dac81 17214->17216 17215 1dacd3 17216->17215 17217 1de8a0 RtlAllocateHeap 17216->17217 17218 1c73af 17217->17218 17219 1dabb0 17218->17219 17220 1dabe1 17219->17220 17220->17220 17221 1d8f00 std::_Throw_Cpp_error RtlAllocateHeap 17220->17221 17222 1c73c2 17221->17222 17223 1dae20 17222->17223 17226 1de710 17223->17226 17225 1c73d1 17225->17201 17227 1de753 17226->17227 17228 1de758 std::locale::_Locimp::_Locimp 17227->17228 17229 1c32d0 std::_Throw_Cpp_error RtlAllocateHeap 17227->17229 17228->17225 17230 1de843 std::locale::_Locimp::_Locimp 17229->17230 17230->17225 17234 1dfde4 17231->17234 17235 1dfd84 17231->17235 17233 1dff6c 17233->17139 17240 1dfe74 17234->17240 17261 1e01e0 17234->17261 17238 1dfdc2 17235->17238 17245 1e9e20 17235->17245 17238->17234 17239 1e9e20 RtlAllocateHeap 17238->17239 17242 1dfe58 17238->17242 17239->17242 17240->17139 17241 1dfecc 17241->17233 17244 1e9e20 RtlAllocateHeap 17241->17244 17265 1e08f0 17241->17265 17242->17240 17257 1e1430 17242->17257 17244->17241 17246 1e9f76 17245->17246 17247 1e9e62 17245->17247 17248 1c3330 RtlAllocateHeap 17246->17248 17250 1e9eca 17247->17250 17251 1e9eba 17247->17251 17254 1e9e7c 17247->17254 17249 1e9f7b 17248->17249 17252 1c2b50 Concurrency::cancel_current_task RtlAllocateHeap 17249->17252 17255 1f3672 std::_Facet_Register RtlAllocateHeap 17250->17255 17256 1e9e8f std::_Throw_Cpp_error std::locale::_Locimp::_Locimp 17250->17256 17251->17249 17251->17254 17252->17256 17253 1f3672 std::_Facet_Register RtlAllocateHeap 17253->17256 17254->17253 17255->17256 17256->17238 17259 1e1443 17257->17259 17258 1e1471 17258->17234 17259->17258 17260 1e9e20 RtlAllocateHeap 17259->17260 17260->17258 17262 1e01f0 17261->17262 17263 1e9e20 RtlAllocateHeap 17262->17263 17264 1e0260 17262->17264 17263->17262 17264->17241 17266 1e1430 RtlAllocateHeap 17265->17266 17268 1e08fc 17266->17268 17267 1e090a 17267->17241 17268->17267 17269 1e9e20 RtlAllocateHeap 17268->17269 17270 1e0995 17268->17270 17269->17268 17270->17267 17271 1e9e20 RtlAllocateHeap 17270->17271 17271->17270 17273 1dec6d 17272->17273 17274 1d7ef0 RtlAllocateHeap 17273->17274 17275 1dec8d 17274->17275 17346 1e16c0 17275->17346 17277 1decdf 17277->17145 17279 1dee46 17278->17279 17298 1deee3 std::ios_base::_Ios_base_dtor 17278->17298 17282 1de8a0 RtlAllocateHeap 17279->17282 17312 1df375 std::ios_base::_Ios_base_dtor std::_Throw_Cpp_error 17279->17312 17280 1d8f00 std::_Throw_Cpp_error RtlAllocateHeap 17281 1def5b 17280->17281 17283 1def6a 17281->17283 17289 1df191 17281->17289 17284 1dee79 17282->17284 17285 1df440 2 API calls 17283->17285 17286 1d8f00 std::_Throw_Cpp_error RtlAllocateHeap 17284->17286 17287 1def79 17285->17287 17288 1dee93 17286->17288 17291 1c3040 std::_Throw_Cpp_error RtlAllocateHeap 17287->17291 17290 1d8f00 std::_Throw_Cpp_error RtlAllocateHeap 17288->17290 17289->17289 17292 1c3040 std::_Throw_Cpp_error RtlAllocateHeap 17289->17292 17290->17298 17293 1defba 17291->17293 17294 1df1c9 17292->17294 17295 1d8f00 std::_Throw_Cpp_error RtlAllocateHeap 17293->17295 17296 1dfbf0 RtlAllocateHeap 17294->17296 17297 1defcd 17295->17297 17299 1df1e0 17296->17299 17300 1de710 RtlAllocateHeap 17297->17300 17298->17280 17298->17312 17301 1d8f00 std::_Throw_Cpp_error RtlAllocateHeap 17299->17301 17302 1df019 17300->17302 17310 1df081 std::ios_base::_Ios_base_dtor 17301->17310 17303 1d8f00 std::_Throw_Cpp_error RtlAllocateHeap 17302->17303 17304 1df032 17303->17304 17305 1d8f00 std::_Throw_Cpp_error RtlAllocateHeap 17304->17305 17305->17310 17306 1c3040 std::_Throw_Cpp_error RtlAllocateHeap 17307 1df30c 17306->17307 17308 1dfbf0 RtlAllocateHeap 17307->17308 17309 1df323 17308->17309 17311 1d8f00 std::_Throw_Cpp_error RtlAllocateHeap 17309->17311 17310->17306 17310->17312 17311->17312 17312->17159 17405 1c4e30 17313->17405 17316 1c4e30 RtlAllocateHeap 17317 1c762b 17316->17317 17318 1dace0 RtlAllocateHeap 17317->17318 17319 1c7640 17318->17319 17320 1dabb0 RtlAllocateHeap 17319->17320 17321 1c7656 17320->17321 17322 1de710 RtlAllocateHeap 17321->17322 17323 1c766d std::ios_base::_Ios_base_dtor 17322->17323 17324 1c7a09 std::_Throw_Cpp_error 17323->17324 17325 1c7350 RtlAllocateHeap 17323->17325 17326 1c77a4 17325->17326 17327 1d8f00 std::_Throw_Cpp_error RtlAllocateHeap 17326->17327 17328 1c77b9 17327->17328 17329 1de710 RtlAllocateHeap 17328->17329 17330 1c780c 17329->17330 17331 1d8f00 std::_Throw_Cpp_error RtlAllocateHeap 17330->17331 17332 1c7828 17331->17332 17333 1dad80 RtlAllocateHeap 17332->17333 17334 1c7879 std::ios_base::_Ios_base_dtor 17333->17334 17334->17324 17335 1c72b0 RtlAllocateHeap 17334->17335 17336 1c79ca 17335->17336 17336->17164 17341 1df4c9 std::ios_base::_Ios_base_dtor std::locale::_Locimp::_Locimp 17337->17341 17342 1df630 std::_Throw_Cpp_error 17337->17342 17339 1c32d0 std::_Throw_Cpp_error RtlAllocateHeap 17339->17341 17340 1d8f00 std::_Throw_Cpp_error RtlAllocateHeap 17340->17341 17341->17339 17341->17340 17341->17342 17409 1c34a0 17341->17409 17342->17168 17416 1d6590 17343->17416 17349 1e17d0 17346->17349 17348 1e16da std::locale::_Setgloballocale 17348->17277 17350 1e1809 17349->17350 17356 1e1838 17349->17356 17351 1e1923 17350->17351 17354 1e181b 17350->17354 17363 1e1990 17351->17363 17354->17356 17357 1e9f90 17354->17357 17356->17348 17358 1e9fc2 17357->17358 17359 1ea0a3 17357->17359 17373 1ed190 17358->17373 17360 1c3330 RtlAllocateHeap 17359->17360 17362 1ea000 std::ios_base::_Ios_base_dtor std::_Throw_Cpp_error std::locale::_Locimp::_Locimp 17360->17362 17362->17356 17364 1f1cea RtlAllocateHeap 17363->17364 17366 1e199a 17364->17366 17365 1e1928 17366->17365 17367 1c2cf0 std::_Throw_Cpp_error RtlAllocateHeap 17366->17367 17368 1e1a03 17367->17368 17369 1dace0 RtlAllocateHeap 17368->17369 17370 1e1a18 17369->17370 17381 1c7cf0 17370->17381 17372 1e1a2d std::_Throw_Cpp_error 17374 1ed1d9 17373->17374 17375 1ed199 17373->17375 17374->17374 17375->17374 17376 1ed1b0 17375->17376 17379 1f3672 std::_Facet_Register RtlAllocateHeap 17375->17379 17377 1ed1b9 17376->17377 17378 1f3672 std::_Facet_Register RtlAllocateHeap 17376->17378 17377->17362 17380 1ed1d2 17378->17380 17379->17376 17380->17362 17382 1c7350 RtlAllocateHeap 17381->17382 17383 1c7d80 17382->17383 17384 1dad80 RtlAllocateHeap 17383->17384 17385 1c7d94 17384->17385 17386 1c7dcd std::ios_base::_Ios_base_dtor 17385->17386 17388 1c7e33 std::_Throw_Cpp_error 17385->17388 17387 1c72b0 RtlAllocateHeap 17386->17387 17389 1c7dfd 17387->17389 17390 1c7350 RtlAllocateHeap 17388->17390 17389->17372 17391 1c7ece 17390->17391 17392 1dad80 RtlAllocateHeap 17391->17392 17393 1c7ee2 17392->17393 17394 1c7f1b std::ios_base::_Ios_base_dtor 17393->17394 17397 1c7f81 std::_Throw_Cpp_error 17393->17397 17395 1c72b0 RtlAllocateHeap 17394->17395 17396 1c7f4b 17395->17396 17396->17372 17398 1c7350 RtlAllocateHeap 17397->17398 17399 1c8029 17398->17399 17400 1dad80 RtlAllocateHeap 17399->17400 17403 1c803d std::ios_base::_Ios_base_dtor 17400->17403 17401 1c72b0 RtlAllocateHeap 17402 1c80aa 17401->17402 17402->17372 17403->17401 17404 1c80df std::_Throw_Cpp_error 17403->17404 17404->17372 17406 1c4e66 17405->17406 17406->17406 17407 1c4ea8 17406->17407 17408 1c3040 std::_Throw_Cpp_error RtlAllocateHeap 17406->17408 17407->17316 17408->17407 17412 1c3380 17409->17412 17413 1c3399 17412->17413 17414 200dd7 RtlAllocateHeap 17413->17414 17415 1c33a7 17414->17415 17415->17341 17417 1f4b15 ___std_exception_copy RtlAllocateHeap 17416->17417 17418 1d65ce 17417->17418 17419 1f4b15 ___std_exception_copy RtlAllocateHeap 17418->17419 17420 1d6601 17419->17420 17420->17165 17422 218e17 17421->17422 17423 218c08 17421->17423 17422->16510 17425 218d38 std::locale::_Setgloballocale 17423->17425 17428 1f87b0 17423->17428 17433 1c3130 17423->17433 17425->17422 17426 1c3130 RtlAllocateHeap 17425->17426 17426->17425 17429 1f87e3 __Getctype 17428->17429 17430 1f87c7 17428->17430 17429->17430 17431 209a39 RtlAllocateHeap 17429->17431 17430->17423 17432 1f882a 17431->17432 17432->17423 17434 1c316f 17433->17434 17435 1c32b3 17433->17435 17437 1c3189 17434->17437 17439 1c31d7 17434->17439 17440 1c31c7 17434->17440 17436 1c3330 RtlAllocateHeap 17435->17436 17438 1c32b8 17436->17438 17442 1f3672 std::_Facet_Register RtlAllocateHeap 17437->17442 17441 1c2b50 Concurrency::cancel_current_task RtlAllocateHeap 17438->17441 17443 1f3672 std::_Facet_Register RtlAllocateHeap 17439->17443 17444 1c319c std::ios_base::_Ios_base_dtor std::_Throw_Cpp_error std::locale::_Locimp::_Locimp 17439->17444 17440->17437 17440->17438 17441->17444 17442->17444 17443->17444 17444->17423 17446 1f364d GetSystemTimePreciseAsFileTime 17445->17446 17447 1f3077 17445->17447 17446->17447 17447->16322 17854 2131ca 17855 2131ea std::_Locinfo::_Locinfo_ctor __Getctype 17854->17855 17856 20f8d3 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 17855->17856 17857 213228 _ValidateLocalCookies 17855->17857 17858 21323c 17856->17858 17858->17857 17859 20f8d3 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 17858->17859 17859->17857 17449 1d6130 17450 1d6174 17449->17450 17453 1d6143 std::locale::_Locimp::_Locimp 17449->17453 17451 1d6200 17450->17451 17452 1d6180 17450->17452 17455 1d8f00 std::_Throw_Cpp_error RtlAllocateHeap 17451->17455 17454 1c32d0 std::_Throw_Cpp_error RtlAllocateHeap 17452->17454 17457 1d61bf std::_Throw_Cpp_error std::locale::_Locimp::_Locimp 17454->17457 17456 1d6232 17455->17456 17487 1d9e70 17488 1d9ed5 std::ios_base::_Ios_base_dtor 17487->17488 17489 1d9e93 std::_Throw_Cpp_error 17487->17489 17489->17488 17490 1da060 std::_Throw_Cpp_error 2 API calls 17489->17490 17491 1d9f6b 17490->17491 17492 1e0270 17493 1e0284 17492->17493 17495 1e0300 17492->17495 17494 1e9e20 RtlAllocateHeap 17493->17494 17493->17495 17494->17493 17690 1e47b0 17691 1e48ed 17690->17691 17692 1e47ed 17690->17692 17693 1c3330 RtlAllocateHeap 17691->17693 17697 1e4a30 RtlAllocateHeap 17692->17697 17694 1e48f2 17693->17694 17695 1e493d 17694->17695 17696 1e4a23 17694->17696 17700 1e4a30 RtlAllocateHeap 17695->17700 17698 1c3330 RtlAllocateHeap 17696->17698 17703 1e4827 17697->17703 17699 1e4a28 17698->17699 17701 1e4977 17700->17701 17705 1d3d50 17701->17705 17704 1e499f 17706 1d3d8f 17705->17706 17733 1d3df7 std::_Throw_Cpp_error std::locale::_Locimp::_Locimp 17705->17733 17707 1d3f7d 17706->17707 17708 1d3f1e 17706->17708 17709 1d3e69 17706->17709 17710 1d3d96 17706->17710 17706->17733 17711 1f3672 std::_Facet_Register RtlAllocateHeap 17707->17711 17771 1d7e80 17708->17771 17713 1f3672 std::_Facet_Register RtlAllocateHeap 17709->17713 17714 1f3672 std::_Facet_Register RtlAllocateHeap 17710->17714 17716 1d3f8a 17711->17716 17717 1d3e73 17713->17717 17715 1d3da0 17714->17715 17718 1f3672 std::_Facet_Register RtlAllocateHeap 17715->17718 17721 1d408e 17716->17721 17722 1d3fd3 17716->17722 17716->17733 17717->17733 17735 1ebf30 17717->17735 17720 1d3dd2 17718->17720 17759 1ef460 17720->17759 17724 1c3330 RtlAllocateHeap 17721->17724 17725 1d3fdb 17722->17725 17726 1d4004 17722->17726 17727 1d4093 17724->17727 17725->17727 17728 1d3fe6 17725->17728 17729 1f3672 std::_Facet_Register RtlAllocateHeap 17726->17729 17730 1c2b50 Concurrency::cancel_current_task RtlAllocateHeap 17727->17730 17731 1f3672 std::_Facet_Register RtlAllocateHeap 17728->17731 17729->17733 17730->17733 17731->17733 17732 1d3d50 5 API calls 17734 1d3eb1 17732->17734 17733->17704 17734->17732 17734->17733 17736 1ebfab 17735->17736 17737 1ebf42 17735->17737 17738 1c3330 RtlAllocateHeap 17736->17738 17739 1ebf7c 17737->17739 17740 1ebf4d 17737->17740 17742 1ebfb0 17738->17742 17743 1ebf99 17739->17743 17745 1f3672 std::_Facet_Register RtlAllocateHeap 17739->17745 17741 1ebf54 17740->17741 17740->17742 17744 1f3672 std::_Facet_Register RtlAllocateHeap 17741->17744 17746 1c2b50 Concurrency::cancel_current_task RtlAllocateHeap 17742->17746 17743->17734 17748 1ebf5a std::_Throw_Cpp_error 17744->17748 17747 1ebf86 17745->17747 17746->17748 17747->17734 17749 1ec00c 17748->17749 17750 1ec077 17748->17750 17753 1ebf63 std::locale::_Locimp::_Locimp 17748->17753 17776 1dfab0 17749->17776 17752 1c3330 RtlAllocateHeap 17750->17752 17754 1ec07c 17752->17754 17753->17734 17755 1f3672 std::_Facet_Register RtlAllocateHeap 17754->17755 17756 1ec0ae 17755->17756 17757 1c3040 std::_Throw_Cpp_error RtlAllocateHeap 17756->17757 17758 1ec0f2 17757->17758 17758->17734 17760 1ef498 17759->17760 17770 1ef53f 17759->17770 17761 1f3672 std::_Facet_Register RtlAllocateHeap 17760->17761 17762 1ef4ba 17761->17762 17763 1d63b0 std::_Throw_Cpp_error RtlAllocateHeap 17762->17763 17764 1ef4d0 17763->17764 17765 1d3d50 5 API calls 17764->17765 17766 1ef4e0 17765->17766 17767 1ef460 5 API calls 17766->17767 17768 1ef531 17767->17768 17769 1ef460 5 API calls 17768->17769 17769->17770 17770->17733 17772 1f3672 std::_Facet_Register RtlAllocateHeap 17771->17772 17773 1d7ea6 17772->17773 17774 1d63b0 std::_Throw_Cpp_error RtlAllocateHeap 17773->17774 17775 1d7ec5 17774->17775 17775->17733 17777 1dfb2b 17776->17777 17778 1dfac2 17776->17778 17779 1c2b50 Concurrency::cancel_current_task RtlAllocateHeap 17777->17779 17780 1dfacd 17778->17780 17783 1dfafc 17778->17783 17787 1dfada std::_Throw_Cpp_error 17779->17787 17780->17777 17781 1dfad4 17780->17781 17785 1f3672 std::_Facet_Register RtlAllocateHeap 17781->17785 17782 1dfb19 17782->17753 17783->17782 17784 1f3672 std::_Facet_Register RtlAllocateHeap 17783->17784 17786 1dfb06 17784->17786 17785->17787 17786->17753 17789 1dfae3 std::locale::_Setgloballocale 17787->17789 17791 1e9c70 17787->17791 17789->17753 17790 1dfb7f 17790->17753 17792 1e9dc4 17791->17792 17796 1e9ca2 17791->17796 17793 1c3330 RtlAllocateHeap 17792->17793 17804 1e9d04 std::_Throw_Cpp_error std::locale::_Locimp::_Locimp 17793->17804 17794 1e9dbf 17795 1c2b50 Concurrency::cancel_current_task RtlAllocateHeap 17794->17795 17795->17792 17796->17794 17797 1e9d1d 17796->17797 17798 1e9cf3 17796->17798 17801 1f3672 std::_Facet_Register RtlAllocateHeap 17797->17801 17797->17804 17798->17794 17800 1e9cfe 17798->17800 17803 1f3672 std::_Facet_Register RtlAllocateHeap 17800->17803 17801->17804 17802 1e9dd9 std::_Throw_Cpp_error 17803->17804 17805 1e9d8f std::ios_base::_Ios_base_dtor 17804->17805 17806 1d9950 17804->17806 17805->17790 17807 1d9968 std::_Throw_Cpp_error 17806->17807 17808 1d9978 std::ios_base::_Ios_base_dtor 17806->17808 17807->17808 17813 1f2b74 17807->17813 17808->17802 17810 1d99cc 17810->17808 17819 1dc430 17810->17819 17812 1d9a04 17812->17802 17814 1f2af7 17813->17814 17815 1f2b4c 17814->17815 17829 1fd5f6 17814->17829 17815->17810 17817 1f2b5e 17817->17815 17818 1fd0a8 4 API calls 17817->17818 17818->17815 17821 1dc45f std::_Throw_Cpp_error std::_Lockit::~_Lockit std::_Lockit::_Lockit 17819->17821 17820 1dc4f8 std::_Lockit::~_Lockit 17820->17812 17821->17820 17822 1f3672 std::_Facet_Register RtlAllocateHeap 17821->17822 17823 1dc506 17822->17823 17824 1c4040 std::_Throw_Cpp_error 2 API calls 17823->17824 17825 1dc536 17824->17825 17826 1c4100 std::_Throw_Cpp_error RtlAllocateHeap 17825->17826 17827 1dc592 17826->17827 17828 1f26f7 std::_Facet_Register RtlAllocateHeap 17827->17828 17828->17820 17830 1fd609 ___std_exception_copy 17829->17830 17833 1fd34d 17830->17833 17832 1fd61e ___std_exception_copy 17832->17817 17835 1fd359 std::locale::_Setgloballocale 17833->17835 17834 1fd35f ___std_exception_copy 17834->17832 17835->17834 17837 1fd4d0 17835->17837 17838 1fd4f6 17837->17838 17839 1fd4e3 17837->17839 17846 1fd3f7 17838->17846 17839->17834 17841 1fd519 17842 1f9a91 3 API calls 17841->17842 17845 1fd5a7 17841->17845 17843 1fd547 17842->17843 17844 20263d SetFilePointerEx 17843->17844 17844->17845 17845->17834 17847 1fd408 17846->17847 17849 1fd460 17846->17849 17848 2025fd SetFilePointerEx 17847->17848 17847->17849 17848->17849 17849->17841 17462 212610 17463 21262f std::_Locinfo::_Locinfo_ctor __Getctype 17462->17463 17471 212658 std::_Locinfo::_Locinfo_ctor _ValidateLocalCookies __Getctype 17463->17471 17472 20f8d3 17463->17472 17465 212671 std::_Locinfo::_Locinfo_ctor 17466 20f8d3 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 17465->17466 17468 2126bf std::_Locinfo::_Locinfo_ctor 17465->17468 17465->17471 17466->17468 17467 20f8d3 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 17469 2127b6 std::_Locinfo::_Locinfo_ctor __Getctype 17467->17469 17468->17467 17468->17468 17468->17469 17468->17471 17470 20f8d3 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 17469->17470 17469->17471 17470->17471 17473 20f8e1 17472->17473 17475 20f8e7 ___std_exception_copy 17473->17475 17477 20f91c 17473->17477 17475->17465 17476 20f917 17476->17465 17478 20f946 17477->17478 17481 20f92c std::_Locinfo::_Locinfo_ctor ___std_exception_copy 17477->17481 17479 1f95ae std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 17478->17479 17478->17481 17482 20f970 17479->17482 17480 20f894 RtlAllocateHeap std::_Locinfo::_Locinfo_ctor 17480->17482 17481->17476 17482->17480 17482->17481 17546 1f1cad 17547 1f1cbb Concurrency::cancel_current_task std::_Throw_Cpp_error 17546->17547 17550 1f1a65 17547->17550 17549 1f1cdb std::_Throw_Cpp_error 17551 1c34e0 std::invalid_argument::invalid_argument RtlAllocateHeap 17550->17551 17552 1f1a77 17551->17552 17552->17549 17500 1c7260 17501 1f1cea RtlAllocateHeap 17500->17501 17502 1c726a 17501->17502 17503 1ea460 17504 1ea488 17503->17504 17505 1ea500 17503->17505 17506 1ea51d 17505->17506 17509 1ef180 17505->17509 17508 1ea570 17510 1ef2bd 17509->17510 17511 1ef1bd 17509->17511 17512 1c3330 RtlAllocateHeap 17510->17512 17530 1e4a30 17511->17530 17513 1ef2c2 17512->17513 17514 1ef3ff 17513->17514 17515 1ef30d 17513->17515 17517 1c3330 RtlAllocateHeap 17514->17517 17518 1e4a30 RtlAllocateHeap 17515->17518 17524 1ef404 17517->17524 17520 1ef347 17518->17520 17519 1ef459 17519->17519 17523 1d7ef0 RtlAllocateHeap 17520->17523 17521 1ef430 17522 1ef439 17521->17522 17526 1f3672 std::_Facet_Register RtlAllocateHeap 17521->17526 17522->17508 17529 1ef36f 17523->17529 17524->17519 17524->17521 17527 1f3672 std::_Facet_Register RtlAllocateHeap 17524->17527 17525 1ef1f7 17525->17508 17528 1ef452 17526->17528 17527->17521 17528->17508 17529->17508 17531 1e4a79 17530->17531 17532 1e4a39 17530->17532 17531->17531 17532->17531 17533 1e4a50 17532->17533 17535 1f3672 std::_Facet_Register RtlAllocateHeap 17532->17535 17534 1f3672 std::_Facet_Register RtlAllocateHeap 17533->17534 17537 1e4a59 17533->17537 17536 1e4a72 17534->17536 17535->17533 17536->17525 17537->17525 17576 1e0320 17577 1e14a0 RtlAllocateHeap 17576->17577 17578 1e0330 17577->17578 17579 1e0373 17578->17579 17584 1e0359 17578->17584 17593 1e037b 17578->17593 17621 1c2e70 17578->17621 17581 1c2e70 RtlAllocateHeap 17579->17581 17583 1e040b 17581->17583 17582 1e03ab 17582->17579 17585 1e03c8 17582->17585 17582->17593 17587 1e1430 RtlAllocateHeap 17583->17587 17584->17582 17588 1e9e20 RtlAllocateHeap 17584->17588 17586 1c2e70 RtlAllocateHeap 17586->17593 17589 1e0412 17587->17589 17588->17582 17590 1e04c0 17589->17590 17598 1e041b 17589->17598 17591 1c2e70 RtlAllocateHeap 17590->17591 17592 1e04cf 17591->17592 17594 1e1430 RtlAllocateHeap 17592->17594 17593->17586 17593->17590 17595 1e9e20 RtlAllocateHeap 17593->17595 17593->17598 17599 1e06bd ___std_exception_copy 17593->17599 17597 1e04db 17594->17597 17595->17593 17596 1c2e70 RtlAllocateHeap 17601 1e05a2 17596->17601 17598->17596 17598->17599 17603 1e073d 17599->17603 17604 1e0777 17599->17604 17600 1e05e4 17602 1e0601 17600->17602 17607 1e0634 17600->17607 17608 1e0675 17600->17608 17601->17600 17605 1e9e20 RtlAllocateHeap 17601->17605 17627 1fe2bd 17603->17627 17610 1e0754 ___std_exception_copy 17604->17610 17631 1fe271 17604->17631 17605->17600 17613 1c2e70 RtlAllocateHeap 17607->17613 17611 1c2e70 RtlAllocateHeap 17608->17611 17617 1e0765 17610->17617 17635 1fcf6c 17610->17635 17619 1e0683 17611->17619 17615 1e063d 17613->17615 17616 1e1430 RtlAllocateHeap 17615->17616 17618 1e0644 17616->17618 17619->17599 17620 1e9e20 RtlAllocateHeap 17619->17620 17620->17599 17622 1c2e88 17621->17622 17623 1c2ea9 17621->17623 17622->17584 17624 1c2f60 17623->17624 17625 1c32d0 std::_Throw_Cpp_error RtlAllocateHeap 17623->17625 17624->17584 17626 1c2eee std::_Throw_Cpp_error std::locale::_Locimp::_Locimp 17625->17626 17626->17584 17628 1fe2d1 ___std_exception_copy 17627->17628 17638 1fdefa 17628->17638 17630 1fe2f2 ___std_exception_copy 17630->17610 17632 1fe285 ___std_exception_copy 17631->17632 17633 1fdefa RtlAllocateHeap 17632->17633 17634 1fe2a6 ___std_exception_copy 17633->17634 17634->17610 17646 1f9c4e 17635->17646 17637 1e07cb 17640 1fdf0d std::_Locinfo::_Locinfo_ctor 17638->17640 17639 1fdf7a 17642 1fce94 RtlAllocateHeap 17639->17642 17640->17639 17641 1fe1d0 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 17640->17641 17645 1fdf22 __aulldiv ___std_exception_copy 17640->17645 17641->17639 17644 1fdf8f 17642->17644 17643 1fce94 RtlAllocateHeap 17643->17644 17644->17643 17644->17645 17645->17630 17647 1f9c62 17646->17647 17648 1f95ae std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 17647->17648 17651 1f9c68 ___std_exception_copy 17647->17651 17649 1f9c87 17648->17649 17652 1f9d34 17649->17652 17651->17637 17653 1f9d54 17652->17653 17655 1f9d58 _ValidateLocalCookies ___std_exception_copy 17652->17655 17653->17655 17656 1f9db4 17653->17656 17655->17651 17657 1f9dc9 std::_Locinfo::_Locinfo_ctor 17656->17657 17658 1fce94 RtlAllocateHeap 17657->17658 17659 1f9e0c 17657->17659 17658->17657 17659->17655

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 80 4da0785-4da078c 81 4da078e-4da078f 80->81 82 4da0751-4da0780 80->82 83 4da074f-4da0750 81->83 84 4da0791-4da0793 81->84 86 4da0794-4da0795 82->86 83->82 84->86 87 4da0796 86->87 87->87
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3462642775.0000000004DA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04DA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4da0000_dcmaM16D71.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Z
                                  • API String ID: 0-3693650021
                                  • Opcode ID: 95b740b3fafa7f2301e3c79fee26d75dbfd371f4a0ab47fd04264f7983021ce1
                                  • Instruction ID: abc350ec2234a9dbce1082d8c23e00e90fa69b7a9d339741e0fc5d7e9fe1ebec
                                  • Opcode Fuzzy Hash: 95b740b3fafa7f2301e3c79fee26d75dbfd371f4a0ab47fd04264f7983021ce1
                                  • Instruction Fuzzy Hash: 5281ADEB34D121BDB10399812B54EFB676DE6C6730731882BF483D6502F394AE6E6072

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 88 1c9280-1c92dd call 1d63b0 91 1c9413-1c9521 call 1c2df0 call 2aa420 88->91 92 1c92e3-1c92e9 88->92 108 1c9537-1c953f call 1d8dc0 91->108 109 1c9523-1c9535 91->109 94 1c92f0-1c9313 92->94 96 1c9324-1c9331 94->96 97 1c9315-1c931f 94->97 100 1c9342-1c934f 96->100 101 1c9333-1c933d 96->101 99 1c9403-1c9406 97->99 105 1c9409-1c940d 99->105 102 1c9360-1c936d 100->102 103 1c9351-1c935b 100->103 101->99 106 1c937e-1c938b 102->106 107 1c936f-1c9379 102->107 103->99 105->91 105->94 110 1c938d-1c9397 106->110 111 1c9399-1c93a6 106->111 107->99 112 1c9544-1c9597 call 2aa420 * 2 108->112 109->112 110->99 114 1c93a8-1c93b2 111->114 115 1c93b4-1c93c1 111->115 125 1c9599-1c95c8 call 2aa420 call 1f5270 112->125 126 1c95cb-1c95e1 call 2aa420 112->126 114->99 117 1c93cf-1c93dc 115->117 118 1c93c3-1c93cd 115->118 120 1c93de-1c93e8 117->120 121 1c93ea-1c93f4 117->121 118->99 120->99 121->105 124 1c93f6-1c93ff 121->124 124->99 125->126 131 1c95e7-1c95ed 126->131 132 1c96e2 126->132 135 1c95f0-1c96ce WSASend 131->135 136 1c96e6-1c96f0 132->136 154 1c975f-1c9763 135->154 155 1c96d4-1c96dc 135->155 137 1c971e-1c973d 136->137 138 1c96f2-1c96fe 136->138 139 1c976f-1c9796 137->139 140 1c973f-1c974b 137->140 142 1c9714-1c971b call 1f38f3 138->142 143 1c9700-1c970e 138->143 145 1c974d-1c975b 140->145 146 1c9765-1c976c call 1f38f3 140->146 142->137 143->142 147 1c9797-1c97fe call 1f8c70 call 1c2df0 * 2 143->147 145->147 149 1c975d 145->149 146->139 149->146 154->136 155->132 155->135
                                  APIs
                                  • WSASend.WS2_32(?,?,00000001,00000000,00000000,00000000,00000000,?,?,?,?,0030D15C,00000000,74D723A0,-00349880), ref: 001C96C9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3452995684.00000000001C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                  • Associated: 00000000.00000002.3452807575.00000000001C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3452995684.0000000000345000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454102449.000000000034A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000034D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000004D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005F6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005FD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000060C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455566999.000000000060D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455820853.00000000007AA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455850718.00000000007AB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455888488.00000000007AC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455930351.00000000007AD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1c0000_dcmaM16D71.jbxd
                                  Similarity
                                  • API ID: Send
                                  • String ID: Ws2_32.dll
                                  • API String ID: 121738739-3093949381
                                  • Opcode ID: 5611a04a6341aa0ed432ea55869e2299843f004a38060fa6d9be7fddf038daea
                                  • Instruction ID: a1b1968ce830ba5cecc066fa1b88f825dec0d9aed0af114b82983334f81f8749
                                  • Opcode Fuzzy Hash: 5611a04a6341aa0ed432ea55869e2299843f004a38060fa6d9be7fddf038daea
                                  • Instruction Fuzzy Hash: 3002DC70D04298DFDF25CFA4C894BACBBB1EF69300F24428DE4856B686D7745986CB92

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 416 4da09cc-4da09ce 417 4da09da-4da09dd 416->417 418 4da09d0 416->418 421 4da09df-4da0a18 call 4da0a23 417->421 419 4da096a-4da09c7 418->419 420 4da09d2-4da09d6 418->420 419->421 420->417 427 4da0a1d-4da0a37 GetCurrentHwProfileW 421->427 428 4da0a42-4da0b0a call 4da0b0b 427->428 437 4da0b5c-4da0c8a call 4da0c99 428->437 438 4da0b0c-4da0b5b 428->438 456 4da0c8f 437->456 438->437 456->456
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04DA0A2D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3462642775.0000000004DA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04DA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4da0000_dcmaM16D71.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID: Z
                                  • API String ID: 2104809126-3693650021
                                  • Opcode ID: d1ef0ed8b093013d5e4950afac060fb1d6071af6e16abdbb37d048c3f93951e6
                                  • Instruction ID: 3173c873b79e6ff0fcd0ec8b47f70ba8e2f70d6a71ce58a471b962370b0d8d87
                                  • Opcode Fuzzy Hash: d1ef0ed8b093013d5e4950afac060fb1d6071af6e16abdbb37d048c3f93951e6
                                  • Instruction Fuzzy Hash: AE518CEB34D124BDB113D9812B24EFB676DE5C6770330886BF843D2542F784AA5E6072

                                  Control-flow Graph

                                  APIs
                                  • setsockopt.WS2_32(00000438,0000FFFF,00001006,?,00000008), ref: 00287BA7
                                  • recv.WS2_32(?,00000004,00000002), ref: 00287BC1
                                  • recv.WS2_32(00000000,0000000C,00000002,00000000), ref: 00287C43
                                  • recv.WS2_32(00000000,0000000C,00000008), ref: 00287C64
                                    • Part of subcall function 00288590: WSAStartup.WS2_32 ref: 002885BA
                                    • Part of subcall function 00288590: socket.WS2_32(?,?,?,?,?,?,00349328,?,?), ref: 0028865E
                                    • Part of subcall function 00288590: connect.WS2_32(00000000,00319BFC,?,?,?,?,00349328,?,?), ref: 00288672
                                    • Part of subcall function 00288590: closesocket.WS2_32(00000000), ref: 0028867D
                                  • recv.WS2_32(00000000,?,00000008), ref: 00287D1B
                                  • recv.WS2_32(?,00000004,00000008), ref: 00287E23
                                  • __Xtime_get_ticks.LIBCPMT ref: 00287E2A
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00287E38
                                  • Sleep.KERNELBASE(00000001,00000000,?,00002710,00000000), ref: 00287EB1
                                  • Sleep.KERNELBASE(00000064,?,00002710,00000000), ref: 00287EB9
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3452995684.00000000001C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                  • Associated: 00000000.00000002.3452807575.00000000001C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3452995684.0000000000345000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454102449.000000000034A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000034D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000004D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005F6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005FD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000060C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455566999.000000000060D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455820853.00000000007AA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455850718.00000000007AB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455888488.00000000007AC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455930351.00000000007AD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1c0000_dcmaM16D71.jbxd
                                  Similarity
                                  • API ID: recv$Sleep$StartupUnothrow_t@std@@@Xtime_get_ticks__ehfuncinfo$??2@closesocketconnectsetsockoptsocket
                                  • String ID:
                                  • API String ID: 56803616-0
                                  • Opcode ID: d853e5a55d398af6fc16b7cc9a9a00aff19d076bee7700b626dbfbc2a11b827e
                                  • Instruction ID: 95c084bd213c7845d19ff68e2dee200dae203140f683ae426dab95f22cb81120
                                  • Opcode Fuzzy Hash: d853e5a55d398af6fc16b7cc9a9a00aff19d076bee7700b626dbfbc2a11b827e
                                  • Instruction Fuzzy Hash: 46B1BB74D143089BEB11EFA8CC89BADBBB5EB55300F204259E454AF2D2D7B0AD94CB91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 58 288590-2885c2 WSAStartup 59 2885c8-2885f2 call 2aa420 * 2 58->59 60 288696-28869f 58->60 65 2885fe-288644 59->65 66 2885f4-2885f8 59->66 68 288690-288695 65->68 69 288646-28864c 65->69 66->60 66->65 68->60 70 28864e 69->70 71 2886a4-2886ae 69->71 73 288654-288668 socket 70->73 71->68 76 2886b0-2886b8 71->76 73->68 75 28866a-28867a connect 73->75 77 28867c-288684 closesocket 75->77 78 2886a0 75->78 77->73 79 288686-28868a 77->79 78->71 79->68
                                  APIs
                                  • WSAStartup.WS2_32 ref: 002885BA
                                  • socket.WS2_32(?,?,?,?,?,?,00349328,?,?), ref: 0028865E
                                  • connect.WS2_32(00000000,00319BFC,?,?,?,?,00349328,?,?), ref: 00288672
                                  • closesocket.WS2_32(00000000), ref: 0028867D
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3452995684.00000000001C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                  • Associated: 00000000.00000002.3452807575.00000000001C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3452995684.0000000000345000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454102449.000000000034A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000034D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000004D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005F6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005FD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000060C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455566999.000000000060D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455820853.00000000007AA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455850718.00000000007AB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455888488.00000000007AC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455930351.00000000007AD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1c0000_dcmaM16D71.jbxd
                                  Similarity
                                  • API ID: Startupclosesocketconnectsocket
                                  • String ID:
                                  • API String ID: 3098855095-0
                                  • Opcode ID: 5f2e32187835baec903bd828876a40bea2015b9558ac19890794d8de38304112
                                  • Instruction ID: 04cda77b61e652f2340f41f742281e7b86aebdaff5e3c9ea3100a580c47da04b
                                  • Opcode Fuzzy Hash: 5f2e32187835baec903bd828876a40bea2015b9558ac19890794d8de38304112
                                  • Instruction Fuzzy Hash: 463107725163115BD7209F248C4472BB7E9FFCA774F404F1AFAA8A21D0E770992487A3

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 161 4da088b-4da0891 162 4da089d-4da08a3 161->162 163 4da0893 161->163 167 4da08a5-4da0a18 call 4da0a23 162->167 164 4da0832-4da084e 163->164 165 4da0895 163->165 168 4da0854-4da0895 164->168 169 4da084f call 4da0862 164->169 170 4da089b 165->170 186 4da0a1d-4da0a37 GetCurrentHwProfileW 167->186 168->170 169->168 170->167 187 4da0a42-4da0b0a call 4da0b0b 186->187 196 4da0b5c-4da0c8a call 4da0c99 187->196 197 4da0b0c-4da0b5b 187->197 215 4da0c8f 196->215 197->196 215->215
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3462642775.0000000004DA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04DA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4da0000_dcmaM16D71.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Z
                                  • API String ID: 0-3693650021
                                  • Opcode ID: cf7df19aac18ef3b154ff7c431035ac9e65a5e14ceb96bdf38bc9a25cc62a92a
                                  • Instruction ID: b63d089d760845cfa7a4ae7dbbbb4676cea7d09141ea8ca50d7cd0394f23ed9d
                                  • Opcode Fuzzy Hash: cf7df19aac18ef3b154ff7c431035ac9e65a5e14ceb96bdf38bc9a25cc62a92a
                                  • Instruction Fuzzy Hash: 97519DEB34D121BDB10399812B64EFAA76DE6C6730731846BF843D2506F788AE5D2072

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 216 4da0856-4da0a18 call 4da0a23 235 4da0a1d-4da0a37 GetCurrentHwProfileW 216->235 236 4da0a42-4da0b0a call 4da0b0b 235->236 245 4da0b5c-4da0c8a call 4da0c99 236->245 246 4da0b0c-4da0b5b 236->246 264 4da0c8f 245->264 246->245 264->264
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04DA0A2D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3462642775.0000000004DA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04DA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4da0000_dcmaM16D71.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID: Z
                                  • API String ID: 2104809126-3693650021
                                  • Opcode ID: 40187780668e0348784a95d1d6acda39b02be29eb5f56e00c9916cb49271d896
                                  • Instruction ID: caf34448e9fffcf2b9469bdb50efca29275a3f44606f57af62fe7d98816dde8a
                                  • Opcode Fuzzy Hash: 40187780668e0348784a95d1d6acda39b02be29eb5f56e00c9916cb49271d896
                                  • Instruction Fuzzy Hash: 30515CEB34C125BDB10399812B64EFBA76DE6C6730731846BF943D2506F7C8AA5D2072

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 265 4da08af-4da08b1 266 4da084c 265->266 267 4da08b3-4da08be 265->267 268 4da084e 266->268 269 4da089d-4da08a3 266->269 270 4da08c1-4da0a18 call 4da0a23 267->270 272 4da0854-4da089b 268->272 273 4da084f call 4da0862 268->273 276 4da08a5-4da08aa 269->276 290 4da0a1d-4da0a37 GetCurrentHwProfileW 270->290 272->276 273->272 276->270 291 4da0a42-4da0b0a call 4da0b0b 290->291 300 4da0b5c-4da0c8a call 4da0c99 291->300 301 4da0b0c-4da0b5b 291->301 319 4da0c8f 300->319 301->300 319->319
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04DA0A2D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3462642775.0000000004DA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04DA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4da0000_dcmaM16D71.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID: Z
                                  • API String ID: 2104809126-3693650021
                                  • Opcode ID: 721bf6de452e1fa646139f7a326ed6b6b01ba0c53ceefe0d2e4522c141324118
                                  • Instruction ID: 48e0e7c888d2b34eb07ff4bc977cfb59286df973df0562fa7a3136f6ba286887
                                  • Opcode Fuzzy Hash: 721bf6de452e1fa646139f7a326ed6b6b01ba0c53ceefe0d2e4522c141324118
                                  • Instruction Fuzzy Hash: 99517CEB34D125BDB10399812B64EFB676DE6C6B30731846BF443D1502F388AA5D2072

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 320 4da08de-4da08df 321 4da089f-4da08d8 320->321 322 4da08e1-4da08e3 320->322 324 4da08e4-4da0a18 call 4da0a23 321->324 322->324 337 4da0a1d-4da0a37 GetCurrentHwProfileW 324->337 338 4da0a42-4da0b0a call 4da0b0b 337->338 347 4da0b5c-4da0c8a call 4da0c99 338->347 348 4da0b0c-4da0b5b 338->348 366 4da0c8f 347->366 348->347 366->366
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3462642775.0000000004DA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04DA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4da0000_dcmaM16D71.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Z
                                  • API String ID: 0-3693650021
                                  • Opcode ID: de7cfee608a89809c65a727f77ae42fefd04a9329f139477ee2abae23cc8ca34
                                  • Instruction ID: 738d48c402838feee50634f3710c9585f6ffe74a752023623d47a037d90a9fa6
                                  • Opcode Fuzzy Hash: de7cfee608a89809c65a727f77ae42fefd04a9329f139477ee2abae23cc8ca34
                                  • Instruction Fuzzy Hash: 48515AEB34D125BCB10399812B64EFB676DE6C6B30731846BF843D1506F788AE5D2072

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 367 4da0874-4da0a18 call 4da0a23 386 4da0a1d-4da0a37 GetCurrentHwProfileW 367->386 387 4da0a42-4da0b0a call 4da0b0b 386->387 396 4da0b5c-4da0c8a call 4da0c99 387->396 397 4da0b0c-4da0b5b 387->397 415 4da0c8f 396->415 397->396 415->415
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04DA0A2D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3462642775.0000000004DA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04DA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4da0000_dcmaM16D71.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID: Z
                                  • API String ID: 2104809126-3693650021
                                  • Opcode ID: 5f3009d80da316050204de3e7c9e34c03854cdb1e4852b24d40949f9d3927218
                                  • Instruction ID: 52b57e9b96e194e98e84541fcf13242a2670827fad556b8b4cb3de3b96f890ed
                                  • Opcode Fuzzy Hash: 5f3009d80da316050204de3e7c9e34c03854cdb1e4852b24d40949f9d3927218
                                  • Instruction Fuzzy Hash: 4F515AEB34C125BDB10399812B64EFB676DE6C6B30730846BF983D1506F788AA5D2032

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 457 4da0943-4da0a18 call 4da0a23 465 4da0a1d-4da0a37 GetCurrentHwProfileW 457->465 466 4da0a42-4da0b0a call 4da0b0b 465->466 475 4da0b5c-4da0c8a call 4da0c99 466->475 476 4da0b0c-4da0b5b 466->476 494 4da0c8f 475->494 476->475 494->494
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04DA0A2D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3462642775.0000000004DA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04DA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4da0000_dcmaM16D71.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID: Z
                                  • API String ID: 2104809126-3693650021
                                  • Opcode ID: 338dee58f233ead10b9b62e26a8eeea8aa56d2e9a8fb22f32f5d6e142426931f
                                  • Instruction ID: 81da26d810d2df349d60a1c8bde90f042f192beae7b2f7b62833baa488967dbc
                                  • Opcode Fuzzy Hash: 338dee58f233ead10b9b62e26a8eeea8aa56d2e9a8fb22f32f5d6e142426931f
                                  • Instruction Fuzzy Hash: 5D4148EB34D125BCB11399812B64EFB676DE5D6B70331886BF843D2506F784AA5D2032

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 495 4da096a-4da0a18 call 4da0a23 501 4da0a1d-4da0a37 GetCurrentHwProfileW 495->501 502 4da0a42-4da0b0a call 4da0b0b 501->502 511 4da0b5c-4da0c8a call 4da0c99 502->511 512 4da0b0c-4da0b5b 502->512 530 4da0c8f 511->530 512->511 530->530
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04DA0A2D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3462642775.0000000004DA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04DA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4da0000_dcmaM16D71.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID: Z
                                  • API String ID: 2104809126-3693650021
                                  • Opcode ID: c103aa684cadea3f3c6b6ae6ae466649d49ea4817430fbade3bd81e663674236
                                  • Instruction ID: 9ee7e7418f71892df83a64debfa97347fccbf9a95965ce2a0246d606cf8dc66c
                                  • Opcode Fuzzy Hash: c103aa684cadea3f3c6b6ae6ae466649d49ea4817430fbade3bd81e663674236
                                  • Instruction Fuzzy Hash: DD415AEB34D125BDB11399812B64EFB676DE5C6B70330886BF843D2546F784AA5E2032

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 531 4da095d-4da0a18 call 4da0a23 539 4da0a1d-4da0a37 GetCurrentHwProfileW 531->539 540 4da0a42-4da0b0a call 4da0b0b 539->540 549 4da0b5c-4da0c8a call 4da0c99 540->549 550 4da0b0c-4da0b5b 540->550 568 4da0c8f 549->568 550->549 568->568
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04DA0A2D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3462642775.0000000004DA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04DA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4da0000_dcmaM16D71.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID: Z
                                  • API String ID: 2104809126-3693650021
                                  • Opcode ID: dc92c51d2c828c95fd8f2c00c4fd69e72f00bfb829e748f86efdb19076a85c61
                                  • Instruction ID: 2a66883a03017220ff0a5acde4bcf449a3ee02a31c4dc83387a1986b348d653f
                                  • Opcode Fuzzy Hash: dc92c51d2c828c95fd8f2c00c4fd69e72f00bfb829e748f86efdb19076a85c61
                                  • Instruction Fuzzy Hash: 5E4158EB34D125BCB113C9812B64EFBA76DE5C6B30330886BF843D2506F784AA5D2032

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 569 4da0991-4da0a18 call 4da0a23 575 4da0a1d-4da0a37 GetCurrentHwProfileW 569->575 576 4da0a42-4da0b0a call 4da0b0b 575->576 585 4da0b5c-4da0c8a call 4da0c99 576->585 586 4da0b0c-4da0b5b 576->586 604 4da0c8f 585->604 586->585 604->604
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04DA0A2D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3462642775.0000000004DA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04DA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4da0000_dcmaM16D71.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID: Z
                                  • API String ID: 2104809126-3693650021
                                  • Opcode ID: 8dc20b4d9fecb5cd439a8d9f4f5e9d3f3647dc73675a86ac0a41d9049e971646
                                  • Instruction ID: e4663b3a6527350795260bb83f8638c43a2db77cef47185b90146fdfbf715653
                                  • Opcode Fuzzy Hash: 8dc20b4d9fecb5cd439a8d9f4f5e9d3f3647dc73675a86ac0a41d9049e971646
                                  • Instruction Fuzzy Hash: A5417CEB34D124BDB21389852F24EFB676DE5C6B30330846BF843D2546F784AA5D6032

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 605 4da0a09-4da0a11 606 4da0a13-4da0a37 call 4da0a23 GetCurrentHwProfileW 605->606 607 4da09d6-4da0a04 605->607 612 4da0a42-4da0b0a call 4da0b0b 606->612 607->606 621 4da0b5c-4da0c8a call 4da0c99 612->621 622 4da0b0c-4da0b5b 612->622 640 4da0c8f 621->640 622->621 640->640
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04DA0A2D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3462642775.0000000004DA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04DA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4da0000_dcmaM16D71.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID: Z
                                  • API String ID: 2104809126-3693650021
                                  • Opcode ID: e815fc6a15506637cb1b0ef1b309904f629cdf2c2f1e04cbb1e3a25d0da3c251
                                  • Instruction ID: f4743fd26c2ad6a63d9bb8eadb765000569bcaf508a2a7e56e2065dd717eda06
                                  • Opcode Fuzzy Hash: e815fc6a15506637cb1b0ef1b309904f629cdf2c2f1e04cbb1e3a25d0da3c251
                                  • Instruction Fuzzy Hash: 5C4149EB34D1247CB21399812B64EFB676DE5C6B70331886BF847D2506F784AA5D2072
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04DA0A2D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3462642775.0000000004DA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04DA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4da0000_dcmaM16D71.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID: Z
                                  • API String ID: 2104809126-3693650021
                                  • Opcode ID: a89f29a52b166cf5321ae5a1b88cb806dd8f6bcba3eaa01e6d1035e8b689b27c
                                  • Instruction ID: abdbe5a3aa5f250d43f057218e452282d4305c5e2225aee2f05b0ba684b47c53
                                  • Opcode Fuzzy Hash: a89f29a52b166cf5321ae5a1b88cb806dd8f6bcba3eaa01e6d1035e8b689b27c
                                  • Instruction Fuzzy Hash: EA4137EB34D124BDB21389812F24EFB676DE5C6B30331886BF847D2546F784AA5D2032
                                  APIs
                                  • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0020990E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3452995684.00000000001C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                  • Associated: 00000000.00000002.3452807575.00000000001C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3452995684.0000000000345000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454102449.000000000034A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000034D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000004D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005F6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005FD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000060C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455566999.000000000060D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455820853.00000000007AA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455850718.00000000007AB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455888488.00000000007AC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455930351.00000000007AD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1c0000_dcmaM16D71.jbxd
                                  Similarity
                                  • API ID: FileWrite
                                  • String ID:
                                  • API String ID: 3934441357-0
                                  • Opcode ID: 3905c7796dc9d8c797ce17f508952e74a1a07578c851cf0761614d90870e5e6f
                                  • Instruction ID: 4322bbb46d8ba6b8e4430df8386048b22bac5b563be3f681427ee04069c4c8ec
                                  • Opcode Fuzzy Hash: 3905c7796dc9d8c797ce17f508952e74a1a07578c851cf0761614d90870e5e6f
                                  • Instruction Fuzzy Hash: BA61C8B1C2421AAFDF11DFA8C880AEEBBB9AF45304F144149E901A7297D771DDA1CB60
                                  APIs
                                  • SetFilePointerEx.KERNELBASE(00000000,?,?,?,?,?,00000000,?,?,?,00202626,?,?,?,?,?), ref: 00202558
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3452995684.00000000001C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                  • Associated: 00000000.00000002.3452807575.00000000001C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3452995684.0000000000345000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454102449.000000000034A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000034D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000004D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005F6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005FD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000060C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455566999.000000000060D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455820853.00000000007AA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455850718.00000000007AB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455888488.00000000007AC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455930351.00000000007AD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1c0000_dcmaM16D71.jbxd
                                  Similarity
                                  • API ID: FilePointer
                                  • String ID:
                                  • API String ID: 973152223-0
                                  • Opcode ID: e3fdc1aa2d8759e2acbb4cc78bd01ba277dd4aa88edd2ee927b5a955a00ac05c
                                  • Instruction ID: 8398c9330f6e8e47c593afd0b961caf0964f376002e69eaae656ceb35601e63a
                                  • Opcode Fuzzy Hash: e3fdc1aa2d8759e2acbb4cc78bd01ba277dd4aa88edd2ee927b5a955a00ac05c
                                  • Instruction Fuzzy Hash: 0B012632620215AFDF09CF19DC15D9E7F59DF85334B240209F800AB2E2EA71ED618BA4
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 001C331F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3452995684.00000000001C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                  • Associated: 00000000.00000002.3452807575.00000000001C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3452995684.0000000000345000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454102449.000000000034A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000034D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000004D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005F6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005FD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000060C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455566999.000000000060D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455820853.00000000007AA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455850718.00000000007AB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455888488.00000000007AC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455930351.00000000007AD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1c0000_dcmaM16D71.jbxd
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID:
                                  • API String ID: 118556049-0
                                  • Opcode ID: 0fd589d96c9d07b1efa01aec19e4ff46bb0766daf2056f60d33bc81ca57302d3
                                  • Instruction ID: 8d86d23f7220c27258312bc264bb2139b00c432f7a8ea2c6f32083bedd8d8330
                                  • Opcode Fuzzy Hash: 0fd589d96c9d07b1efa01aec19e4ff46bb0766daf2056f60d33bc81ca57302d3
                                  • Instruction Fuzzy Hash: 8DF0B4721001049BDB146FA4D815AF9B3F8EF34361750497EE9ADC7212EF36DA40C790
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000000,00000001,?,?,001F4B3F,?,?,74D723A0,?,?,001C3522,?,?), ref: 0020B0C7
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3452995684.00000000001C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                  • Associated: 00000000.00000002.3452807575.00000000001C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3452995684.0000000000345000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454102449.000000000034A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000034D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000004D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005F6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005FD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000060C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455566999.000000000060D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455820853.00000000007AA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455850718.00000000007AB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455888488.00000000007AC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455930351.00000000007AD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1c0000_dcmaM16D71.jbxd
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 0b11b0c7c58e59f2d4e32dac05a2fe073af2cbfa8f0e58776eaa5afaf6cd2436
                                  • Instruction ID: 272320e3e08a78749cbc4969c8057ffe1a79a12ccf3f90b330f69a307678336e
                                  • Opcode Fuzzy Hash: 0b11b0c7c58e59f2d4e32dac05a2fe073af2cbfa8f0e58776eaa5afaf6cd2436
                                  • Instruction Fuzzy Hash: BDE092312317226AEB333A659C11B6B765F9F423A1F190221EC25A65C3EF61DC3086E5
                                  APIs
                                  • CloseHandle.KERNELBASE(00000000,00000000,?,?,00208CE6,00000000,?,0033A178,0000000C,00208DA2,?,?,?), ref: 00208E55
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3452995684.00000000001C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                  • Associated: 00000000.00000002.3452807575.00000000001C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3452995684.0000000000345000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454102449.000000000034A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000034D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000004D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005F6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005FD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000060C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455566999.000000000060D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455820853.00000000007AA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455850718.00000000007AB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455888488.00000000007AC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455930351.00000000007AD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1c0000_dcmaM16D71.jbxd
                                  Similarity
                                  • API ID: CloseHandle
                                  • String ID:
                                  • API String ID: 2962429428-0
                                  • Opcode ID: a30b638cdb076b23374e9092ba3438a5810bb2993a85d7aec7edb81f2a8355d0
                                  • Instruction ID: 4f2f2d70f0d242ec17fac4ef9abb31a7332a2d9f74c465f32864fbfdaf1ea989
                                  • Opcode Fuzzy Hash: a30b638cdb076b23374e9092ba3438a5810bb2993a85d7aec7edb81f2a8355d0
                                  • Instruction Fuzzy Hash: EA11483263132416DB252635EC41B7F67494F82738F2A0A1DFA588B1C3DEA19CB14551
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3462852494.0000000004DB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4db0000_dcmaM16D71.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c1434d70773b401a1a8ef132695cdcb9adf3fee42dd6545003b7e2cb55372811
                                  • Instruction ID: 4310c314289559706f17dab62d92c3558899d18cb53da8b4014857de59c760d5
                                  • Opcode Fuzzy Hash: c1434d70773b401a1a8ef132695cdcb9adf3fee42dd6545003b7e2cb55372811
                                  • Instruction Fuzzy Hash: 3711C0F760C000FFAA079D51AA605FB3FEDE5863B4731C856F4C3CA21AE151E54696E1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3462852494.0000000004DB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04DB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_4db0000_dcmaM16D71.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2705e165b4d9480578f9ff511bb8ad7467085b03ee651eedcf21ad70276dc979
                                  • Instruction ID: b383e093d24d3088f00fbdac636c66e7d0280246f3526af475df51706e8ae26b
                                  • Opcode Fuzzy Hash: 2705e165b4d9480578f9ff511bb8ad7467085b03ee651eedcf21ad70276dc979
                                  • Instruction Fuzzy Hash: E4017BDB148011ACB407AD666B949FB2BEDE1C66B0331DC26F4C3C5B06E1859A8A50F0
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3452995684.00000000001C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                  • Associated: 00000000.00000002.3452807575.00000000001C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3452995684.0000000000345000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454102449.000000000034A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000034D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000004D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005F6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005FD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000060C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455566999.000000000060D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455820853.00000000007AA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455850718.00000000007AB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455888488.00000000007AC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455930351.00000000007AD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1c0000_dcmaM16D71.jbxd
                                  Similarity
                                  • API ID: __floor_pentium4
                                  • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                  • API String ID: 4168288129-2761157908
                                  • Opcode ID: f636c04007eed239672dc9efb12cc429004d330957d63e601ec96bb92acf2355
                                  • Instruction ID: 0dc594150f7dd3368c93fde7ac005a7deb42dc1cfc01fed116f76eac0e6c4ebb
                                  • Opcode Fuzzy Hash: f636c04007eed239672dc9efb12cc429004d330957d63e601ec96bb92acf2355
                                  • Instruction Fuzzy Hash: 04D22671E286298FDB65CE28DD407EAB7F5EB94305F1441EAD40DA7240E778AED18F80
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3452995684.00000000001C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                  • Associated: 00000000.00000002.3452807575.00000000001C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3452995684.0000000000345000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454102449.000000000034A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000034D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000004D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005F6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005FD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000060C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455566999.000000000060D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455820853.00000000007AA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455850718.00000000007AB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455888488.00000000007AC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455930351.00000000007AD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1c0000_dcmaM16D71.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 333d4b6d5425d6f9d03797ee82114c3711da98524c03317fffdb5ec62fb2b380
                                  • Instruction ID: a7946ebb8717f9a5a2f0a2080181d7cfdc7d890014761bd308e3a4c31923d96f
                                  • Opcode Fuzzy Hash: 333d4b6d5425d6f9d03797ee82114c3711da98524c03317fffdb5ec62fb2b380
                                  • Instruction Fuzzy Hash: FE023B71E0021D9BDF14CFA9C9806AEBBB1FF48314F258269EA19E7380D731A941DB90
                                  APIs
                                  • GetSystemTimePreciseAsFileTime.KERNEL32(?,001F3077,?,?,?,?,00287E2F), ref: 001F3655
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3452995684.00000000001C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                  • Associated: 00000000.00000002.3452807575.00000000001C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3452995684.0000000000345000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454102449.000000000034A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000034D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000004D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005F6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005FD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000060C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455566999.000000000060D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455820853.00000000007AA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455850718.00000000007AB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455888488.00000000007AC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455930351.00000000007AD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1c0000_dcmaM16D71.jbxd
                                  Similarity
                                  • API ID: Time$FilePreciseSystem
                                  • String ID:
                                  • API String ID: 1802150274-0
                                  • Opcode ID: 309dcbb2f751d7b7342e6688b15809ee752ee6b5bb5aa5ab3c07dd6a360bc4f6
                                  • Instruction ID: 7cbed5600dfa755b303be86deefb885c5bf46036b3fa7a0297d0e8763b24a4e1
                                  • Opcode Fuzzy Hash: 309dcbb2f751d7b7342e6688b15809ee752ee6b5bb5aa5ab3c07dd6a360bc4f6
                                  • Instruction Fuzzy Hash: C2F06C36944554EFC7069F54DC00F9D77ACF749B24F004626D921D7790DF746A008E90
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3452995684.00000000001C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                  • Associated: 00000000.00000002.3452807575.00000000001C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3452995684.0000000000345000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454102449.000000000034A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000034D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000004D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005F6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005FD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000060C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455566999.000000000060D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455820853.00000000007AA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455850718.00000000007AB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455888488.00000000007AC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455930351.00000000007AD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1c0000_dcmaM16D71.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: `.
                                  • API String ID: 0-1808708230
                                  • Opcode ID: 977beedbef35d94dcd22bed567e329dc830c8b7263959b0ea7cbde72c9a0b28d
                                  • Instruction ID: e942cb25d2e0fad1f15ca5b00b7a0101464bd74a726e5aa160ad20c709669656
                                  • Opcode Fuzzy Hash: 977beedbef35d94dcd22bed567e329dc830c8b7263959b0ea7cbde72c9a0b28d
                                  • Instruction Fuzzy Hash: 2481F2B4E1024A9FDB158F68D8C17FFBBF5EB2A300F44016AD9549B382CB349959C7A0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3452995684.00000000001C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                  • Associated: 00000000.00000002.3452807575.00000000001C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3452995684.0000000000345000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454102449.000000000034A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000034D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000004D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005F6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005FD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000060C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455566999.000000000060D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455820853.00000000007AA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455850718.00000000007AB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455888488.00000000007AC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455930351.00000000007AD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1c0000_dcmaM16D71.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 278fe9adefdf42a5ec8edac92cf0a87358dcef4640420414ef397005a92dab30
                                  • Instruction ID: 4a32d057145f335069137371b71cd6a92f51eacc28f3a08c297d1025160526eb
                                  • Opcode Fuzzy Hash: 278fe9adefdf42a5ec8edac92cf0a87358dcef4640420414ef397005a92dab30
                                  • Instruction Fuzzy Hash: 12625CB0E202169FDB14CF99C5846ADBBF5AF48348F2881ADD814AB342C775DA56CF90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3452995684.00000000001C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                  • Associated: 00000000.00000002.3452807575.00000000001C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3452995684.0000000000345000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454102449.000000000034A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000034D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000004D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005F6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005FD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000060C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455566999.000000000060D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455820853.00000000007AA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455850718.00000000007AB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455888488.00000000007AC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455930351.00000000007AD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1c0000_dcmaM16D71.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 80b9970b4e61b3a89387c81d03852b8640c12f30169ca405eadcc1892538b820
                                  • Instruction ID: ed968c98337797a68b82d16a3d1972157e6785e05773b6b2c6e4a6c15b3b1918
                                  • Opcode Fuzzy Hash: 80b9970b4e61b3a89387c81d03852b8640c12f30169ca405eadcc1892538b820
                                  • Instruction Fuzzy Hash: CCE11376E1062A9FCB05CFA9D4816ADFBF1BF88324F1942A9E854B7340D730AD45CB90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3452995684.00000000001C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                  • Associated: 00000000.00000002.3452807575.00000000001C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3452995684.0000000000345000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454102449.000000000034A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000034D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000004D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005F6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005FD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000060C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455566999.000000000060D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455820853.00000000007AA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455850718.00000000007AB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455888488.00000000007AC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455930351.00000000007AD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1c0000_dcmaM16D71.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 60e8584a4d6b5d3747f8068c620ccbdbb7811d06a98abb5351065b7086c59d11
                                  • Instruction ID: fdc5c3007f2ac8383ed83a26970daf65a4cdd85cb1b85a3feb8fb17bb89928f6
                                  • Opcode Fuzzy Hash: 60e8584a4d6b5d3747f8068c620ccbdbb7811d06a98abb5351065b7086c59d11
                                  • Instruction Fuzzy Hash: 58C1D97092074B8FEB28CF68C8C4BBABBA5BF45300F144619DA96976D3C331AD65CB15
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3452995684.00000000001C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                  • Associated: 00000000.00000002.3452807575.00000000001C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3452995684.0000000000345000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454102449.000000000034A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000034D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000004D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005F6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005FD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000060C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455566999.000000000060D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455820853.00000000007AA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455850718.00000000007AB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455888488.00000000007AC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455930351.00000000007AD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1c0000_dcmaM16D71.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 619408f5f7bb3310f35da1683e0af9d353d709d9cad6c64c72c35efb21ea85da
                                  • Instruction ID: e089d90df27a3e39a6692d6192221d52df45b69eb00c2d368a333525a77a947f
                                  • Opcode Fuzzy Hash: 619408f5f7bb3310f35da1683e0af9d353d709d9cad6c64c72c35efb21ea85da
                                  • Instruction Fuzzy Hash: 49B1E535520746DBDB389F24CC92AF7B3E8EF64308F14442DF942C6681EA75A9E9CB10
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3452995684.00000000001C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                  • Associated: 00000000.00000002.3452807575.00000000001C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3452995684.0000000000345000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454102449.000000000034A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000034D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000004D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005F6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005FD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000060C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455566999.000000000060D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455820853.00000000007AA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455850718.00000000007AB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455888488.00000000007AC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455930351.00000000007AD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1c0000_dcmaM16D71.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f7fdd390772aeee6c87d715db5e25320fd28655c2f1c13395591b84385dd0f1c
                                  • Instruction ID: 6654fa6c09b49e26859d83c89e3c7b823b07a2d02edb2b45a9ba71d943f096d6
                                  • Opcode Fuzzy Hash: f7fdd390772aeee6c87d715db5e25320fd28655c2f1c13395591b84385dd0f1c
                                  • Instruction Fuzzy Hash: 1FB18E362217098FD715CF68C48AB657BE0FF45364F258658E899CF2E2C375E9A1CB40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3452995684.00000000001C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                  • Associated: 00000000.00000002.3452807575.00000000001C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3452995684.0000000000345000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454102449.000000000034A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000034D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000004D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005F6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005FD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000060C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455566999.000000000060D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455820853.00000000007AA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455850718.00000000007AB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455888488.00000000007AC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455930351.00000000007AD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1c0000_dcmaM16D71.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d6316bc3201bd39b7f6ce1a8a9b1729b27e69c99713c7f39ab6b6e37d4737025
                                  • Instruction ID: 8eecd7e9a785f4efd49be84b1fac25f9992ca3fb7f89fa840424c9c4ae109758
                                  • Opcode Fuzzy Hash: d6316bc3201bd39b7f6ce1a8a9b1729b27e69c99713c7f39ab6b6e37d4737025
                                  • Instruction Fuzzy Hash: B26197316245658FE729CF5EECC04763B66F38A301785462EEA81CB395C535EA27C7E0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3452995684.00000000001C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                  • Associated: 00000000.00000002.3452807575.00000000001C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3452995684.0000000000345000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454102449.000000000034A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000034D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000004D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005F6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005FD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000060C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455566999.000000000060D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455820853.00000000007AA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455850718.00000000007AB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455888488.00000000007AC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455930351.00000000007AD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1c0000_dcmaM16D71.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 46680d0314554fd398ed7fd020ff60bee8df1d437ae882661bd78aeb1168d151
                                  • Instruction ID: cea14e89ae032d5ab97d61f56a3683a3cb1f78ba1aef792c2b2e4e42ec56a203
                                  • Opcode Fuzzy Hash: 46680d0314554fd398ed7fd020ff60bee8df1d437ae882661bd78aeb1168d151
                                  • Instruction Fuzzy Hash: A9518272D00219EFDF04CF98C940AFEBBB6FF88304F598469E555AB241D7789A50CB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3452995684.00000000001C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                  • Associated: 00000000.00000002.3452807575.00000000001C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3452995684.0000000000345000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454102449.000000000034A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000034D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000004D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005F6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005FD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000060C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455566999.000000000060D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455820853.00000000007AA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455850718.00000000007AB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455888488.00000000007AC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455930351.00000000007AD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1c0000_dcmaM16D71.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                  • Instruction ID: db22b93f56604048edf0f734ff8631959753a207c314a0288beed1776416b111
                                  • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                  • Instruction Fuzzy Hash: 88113D7720D08A43E7648A3DD8B46F7A795FBD532072D437AE3824BBD8D322E9499500
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3452995684.00000000001C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                  • Associated: 00000000.00000002.3452807575.00000000001C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3452995684.0000000000345000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454102449.000000000034A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000034D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000004D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005F6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005FD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000060C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455566999.000000000060D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455820853.00000000007AA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455850718.00000000007AB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455888488.00000000007AC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455930351.00000000007AD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1c0000_dcmaM16D71.jbxd
                                  Similarity
                                  • API ID: _strrchr
                                  • String ID:
                                  • API String ID: 3213747228-0
                                  • Opcode ID: 785c90e8ff89e0f1a3d98e37725974d6f6ea20f06d45e48120c47f1ca5a82ffe
                                  • Instruction ID: 4cc487ff1439af0a7ace3a53eb4d02a582b09c8f82cfa0ba8a355574d3b245e5
                                  • Opcode Fuzzy Hash: 785c90e8ff89e0f1a3d98e37725974d6f6ea20f06d45e48120c47f1ca5a82ffe
                                  • Instruction Fuzzy Hash: 64B137729203569FEB338F24CC82BEEBBA5EF55310F144156E904AB2C3D7749961CBA1
                                  APIs
                                  • _ValidateLocalCookies.LIBCMT ref: 001F7307
                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 001F730F
                                  • _ValidateLocalCookies.LIBCMT ref: 001F7398
                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 001F73C3
                                  • _ValidateLocalCookies.LIBCMT ref: 001F7418
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3452995684.00000000001C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                  • Associated: 00000000.00000002.3452807575.00000000001C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3452995684.0000000000345000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454102449.000000000034A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000034D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000004D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005F6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005FD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000060C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455566999.000000000060D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455820853.00000000007AA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455850718.00000000007AB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455888488.00000000007AC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455930351.00000000007AD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1c0000_dcmaM16D71.jbxd
                                  Similarity
                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                  • String ID: csm
                                  • API String ID: 1170836740-1018135373
                                  • Opcode ID: 4364b4f5467b940377a02d82a4276d8b55fabda3dcb28f2e91a3208e6fbba785
                                  • Instruction ID: 4dd225781fe67d3b7034759c7059b032e7c4bd572986fcad638bf7ddda7dbe82
                                  • Opcode Fuzzy Hash: 4364b4f5467b940377a02d82a4276d8b55fabda3dcb28f2e91a3208e6fbba785
                                  • Instruction Fuzzy Hash: 8A41CF34A0420DAFCF10DF68C885AAEBBF5BF04314F148165EE199B392DB31EA11DB91
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 001DA09D
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 001DA0BF
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 001DA0E7
                                  • __Getctype.LIBCPMT ref: 001DA1C5
                                  • std::_Facet_Register.LIBCPMT ref: 001DA1F9
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 001DA223
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3452995684.00000000001C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                  • Associated: 00000000.00000002.3452807575.00000000001C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3452995684.0000000000345000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454102449.000000000034A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000034D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000004D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005F6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005FD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000060C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455566999.000000000060D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455820853.00000000007AA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455850718.00000000007AB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455888488.00000000007AC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455930351.00000000007AD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1c0000_dcmaM16D71.jbxd
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetctypeRegister
                                  • String ID:
                                  • API String ID: 1102183713-0
                                  • Opcode ID: af797b7e2fb43ce29f9a7bc58cd677b2e2de40d72e6fca44968b7a09e63a3e57
                                  • Instruction ID: 33dc549775adbaeb30254c15ed63fcc83532d53f89417e42ae18ac4a022fe722
                                  • Opcode Fuzzy Hash: af797b7e2fb43ce29f9a7bc58cd677b2e2de40d72e6fca44968b7a09e63a3e57
                                  • Instruction Fuzzy Hash: 7E51BAB4D00249CFCB12CF98C941BAEBBF4BF15710F14825AD855AB391DB74AE44CB92
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 001DC45A
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 001DC47C
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 001DC4A4
                                  • std::_Facet_Register.LIBCPMT ref: 001DC59A
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 001DC5C4
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3452995684.00000000001C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                  • Associated: 00000000.00000002.3452807575.00000000001C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3452995684.0000000000345000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454102449.000000000034A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000034D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000004D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005F6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005FD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000060C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455566999.000000000060D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455820853.00000000007AA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455850718.00000000007AB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455888488.00000000007AC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455930351.00000000007AD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1c0000_dcmaM16D71.jbxd
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                  • String ID:
                                  • API String ID: 459529453-0
                                  • Opcode ID: bba004ad7bf2d9ac3b5566742ffba7246262b782a86b81f3d403752e0e8f08f8
                                  • Instruction ID: a336f403e88ccac1bf2450389a9ebf8a19f742ea9a26765ac473ae458df5610e
                                  • Opcode Fuzzy Hash: bba004ad7bf2d9ac3b5566742ffba7246262b782a86b81f3d403752e0e8f08f8
                                  • Instruction Fuzzy Hash: 0A51EC74A0025ADFDB12CF58D850BAEBBF4FF11314F24855AE845AB380DBB5AA01CBD0
                                  APIs
                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 001C499F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3452995684.00000000001C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                  • Associated: 00000000.00000002.3452807575.00000000001C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3452995684.0000000000345000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454102449.000000000034A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000034D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000004D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005F6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005FD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000060C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455566999.000000000060D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455820853.00000000007AA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455850718.00000000007AB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455888488.00000000007AC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455930351.00000000007AD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1c0000_dcmaM16D71.jbxd
                                  Similarity
                                  • API ID: Ios_base_dtorstd::ios_base::_
                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                  • API String ID: 323602529-1866435925
                                  • Opcode ID: 2b54d4fedba340e7cdff0c233aae21be55b075dcc0cb34345c47897a0fd124d3
                                  • Instruction ID: cc73b777b8642338424be1c72b06872c9f70479b4aad96efe1bc206cc304908a
                                  • Opcode Fuzzy Hash: 2b54d4fedba340e7cdff0c233aae21be55b075dcc0cb34345c47897a0fd124d3
                                  • Instruction Fuzzy Hash: 48112C729086586BC711DE589C13FAA7398D729714F04462DFA54872C1EB75E901C792
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 001F2730
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 001F273B
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 001F27A9
                                    • Part of subcall function 001F288C: std::locale::_Locimp::_Locimp.LIBCPMT ref: 001F28A4
                                  • std::locale::_Setgloballocale.LIBCPMT ref: 001F2756
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3452995684.00000000001C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                  • Associated: 00000000.00000002.3452807575.00000000001C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3452995684.0000000000345000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454102449.000000000034A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000034D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000004D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005F6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005FD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000060C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455566999.000000000060D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455820853.00000000007AA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455850718.00000000007AB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455888488.00000000007AC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455930351.00000000007AD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1c0000_dcmaM16D71.jbxd
                                  Similarity
                                  • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                                  • String ID:
                                  • API String ID: 677527491-0
                                  • Opcode ID: d8ff1136c0dfffdc131c7aeb351f556a3929cb2bf4283443f28bbc94ccad1aa8
                                  • Instruction ID: c50139fba705bb7c418919e0919f2e5086b5c4ef6ec9a40687c661a59f549222
                                  • Opcode Fuzzy Hash: d8ff1136c0dfffdc131c7aeb351f556a3929cb2bf4283443f28bbc94ccad1aa8
                                  • Instruction Fuzzy Hash: AA01BC7DA006289BC70BEF20D8415BD7BA5FFA9B50B144009EA2157395CF74AE42CB82
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 001C750C
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 001C7522
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3452995684.00000000001C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                  • Associated: 00000000.00000002.3452807575.00000000001C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3452995684.0000000000345000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454102449.000000000034A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000034D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000004D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005F6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005FD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000060C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455566999.000000000060D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455820853.00000000007AA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455850718.00000000007AB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455888488.00000000007AC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455930351.00000000007AD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1c0000_dcmaM16D71.jbxd
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: [json.exception.
                                  • API String ID: 4194217158-791563284
                                  • Opcode ID: 32afdd00e13889ef628507a755f6c45c3f8467bfe3c6f48e17a9d4e43fe08e0c
                                  • Instruction ID: 66071e4e48d57192b22fc967a5bde6fd1cd1c1b34a9e248cea5054862921da1b
                                  • Opcode Fuzzy Hash: 32afdd00e13889ef628507a755f6c45c3f8467bfe3c6f48e17a9d4e43fe08e0c
                                  • Instruction Fuzzy Hash: 4F51C1B1C046489FDB01DFA8C905BAEBBB4EF25314F14425DE851AB3C2D7B49A44CBE1
                                  APIs
                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 001C499F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3452995684.00000000001C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                  • Associated: 00000000.00000002.3452807575.00000000001C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3452995684.0000000000345000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454102449.000000000034A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000034D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000004D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005F6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005FD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000060C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455566999.000000000060D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455820853.00000000007AA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455850718.00000000007AB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455888488.00000000007AC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455930351.00000000007AD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1c0000_dcmaM16D71.jbxd
                                  Similarity
                                  • API ID: Ios_base_dtorstd::ios_base::_
                                  • String ID: ios_base::badbit set$ios_base::failbit set
                                  • API String ID: 323602529-1240500531
                                  • Opcode ID: b4e6fb0c6136c3f9aa1a04523a0e829cb18529cda164e583a3a5a871c89fe19c
                                  • Instruction ID: 8e4379e5727aee972724f8dcb55789553e70311662382761b2e2d48fe724816e
                                  • Opcode Fuzzy Hash: b4e6fb0c6136c3f9aa1a04523a0e829cb18529cda164e583a3a5a871c89fe19c
                                  • Instruction Fuzzy Hash: C54126B1C04248ABCB04DF58CC56BEEBBB8EF19710F14825DF554AB381D775AA00CBA1
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 001C4061
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 001C40C4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3452995684.00000000001C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 001C0000, based on PE: true
                                  • Associated: 00000000.00000002.3452807575.00000000001C0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3452995684.0000000000345000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454102449.000000000034A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000034D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000004D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005BA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005F6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.00000000005FD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3454237327.000000000060C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455566999.000000000060D000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455820853.00000000007AA000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455850718.00000000007AB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455888488.00000000007AC000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3455930351.00000000007AD000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1c0000_dcmaM16D71.jbxd
                                  Similarity
                                  • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                  • String ID: bad locale name
                                  • API String ID: 3988782225-1405518554
                                  • Opcode ID: 81cb878d5f7f671cd75a05b3014f746c7baddea68c4421e23e500d5f83e6a452
                                  • Instruction ID: cdcfe3f5f1b7ee6ff7be2c9d42dd2923c5f863eaac068d487986836195f4832e
                                  • Opcode Fuzzy Hash: 81cb878d5f7f671cd75a05b3014f746c7baddea68c4421e23e500d5f83e6a452
                                  • Instruction Fuzzy Hash: 0F11E670805B84EFD721CFA8C50478BBFF4AF26714F14868DE09597B81D3B59A04C791

                                  Execution Graph

                                  Execution Coverage:3.5%
                                  Dynamic/Decrypted Code Coverage:2%
                                  Signature Coverage:0%
                                  Total number of Nodes:1828
                                  Total number of Limit Nodes:25
                                  execution_graph 19294 5120991 19295 5120996 19294->19295 19302 51209b6 19295->19302 19303 51209db 19302->19303 19304 5120b06 2 API calls 19303->19304 19305 5120afd GetCurrentHwProfileW 19304->19305 19307 5120c7f 19305->19307 19264 5120b59 19265 5120af7 19264->19265 19266 5120afd GetCurrentHwProfileW 19264->19266 19265->19266 19270 5120b06 19265->19270 19269 5120c7f 19266->19269 19275 5120b20 19270->19275 19272 5120b0e GetCurrentHwProfileW 19274 5120c7f 19272->19274 19276 5120b2d GetCurrentHwProfileW 19275->19276 19278 5120c7f 19276->19278 19319 5120987 19320 5120996 19319->19320 19321 51209b6 3 API calls 19320->19321 19322 51209b2 19321->19322 19323 5120b06 2 API calls 19322->19323 19324 5120afd GetCurrentHwProfileW 19323->19324 19326 5120c7f 19324->19326 19693 2947b0 19694 2948ed 19693->19694 19695 2947ed 19693->19695 19696 273330 2 API calls 19694->19696 19700 294a30 2 API calls 19695->19700 19697 2948f2 19696->19697 19698 29493d 19697->19698 19699 294a23 19697->19699 19703 294a30 2 API calls 19698->19703 19701 273330 2 API calls 19699->19701 19706 294827 19700->19706 19702 294a28 19701->19702 19704 294977 19703->19704 19712 283d50 19704->19712 19707 28e1e0 RtlAllocateHeap 19706->19707 19708 2948b4 19707->19708 19709 29499f 19710 28e1e0 RtlAllocateHeap 19709->19710 19711 2949ea 19710->19711 19713 283d8f 19712->19713 19737 283df7 std::locale::_Locimp::_Locimp 19712->19737 19714 283e69 19713->19714 19715 283f7d 19713->19715 19716 283f1e 19713->19716 19717 283d96 19713->19717 19713->19737 19719 2a3672 std::_Facet_Register 2 API calls 19714->19719 19721 2a3672 std::_Facet_Register 2 API calls 19715->19721 19784 287e80 19716->19784 19720 2a3672 std::_Facet_Register 2 API calls 19717->19720 19722 283e73 19719->19722 19723 283da0 19720->19723 19724 283f8a 19721->19724 19722->19737 19745 29bf30 19722->19745 19725 2a3672 std::_Facet_Register 2 API calls 19723->19725 19728 28408e 19724->19728 19729 283fd3 19724->19729 19724->19737 19727 283dd2 19725->19727 19772 29f460 19727->19772 19731 273330 2 API calls 19728->19731 19732 283fdb 19729->19732 19733 284004 19729->19733 19735 284093 19731->19735 19732->19735 19736 283fe6 19732->19736 19734 2a3672 std::_Facet_Register 2 API calls 19733->19734 19734->19737 19738 272b50 Concurrency::cancel_current_task 2 API calls 19735->19738 19739 2a3672 std::_Facet_Register 2 API calls 19736->19739 19737->19709 19741 283fec 19738->19741 19739->19741 19740 283d50 6 API calls 19742 283eb1 19740->19742 19741->19737 19743 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 19741->19743 19742->19737 19742->19740 19744 28409d 19743->19744 19746 29bfab 19745->19746 19747 29bf42 19745->19747 19748 273330 2 API calls 19746->19748 19749 29bf4d 19747->19749 19750 29bf7c 19747->19750 19751 29bfb0 19748->19751 19749->19751 19752 29bf54 19749->19752 19753 29bf99 19750->19753 19756 2a3672 std::_Facet_Register 2 API calls 19750->19756 19754 272b50 Concurrency::cancel_current_task 2 API calls 19751->19754 19755 2a3672 std::_Facet_Register 2 API calls 19752->19755 19753->19742 19757 29bf5a 19754->19757 19755->19757 19758 29bf86 19756->19758 19759 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 19757->19759 19760 29bf63 19757->19760 19758->19742 19761 29bfba 19759->19761 19760->19742 19762 29c00c 19761->19762 19763 29c077 19761->19763 19769 29c013 std::locale::_Locimp::_Locimp 19761->19769 19789 28fab0 19762->19789 19765 273330 2 API calls 19763->19765 19766 29c07c 19765->19766 19767 2a3672 std::_Facet_Register 2 API calls 19766->19767 19768 29c0ae 19767->19768 19770 273040 std::_Throw_Cpp_error 2 API calls 19768->19770 19769->19742 19771 29c0f2 19770->19771 19771->19742 19773 29f498 19772->19773 19783 29f53f 19772->19783 19774 2a3672 std::_Facet_Register 2 API calls 19773->19774 19775 29f4ba 19774->19775 19776 2863b0 std::_Throw_Cpp_error 2 API calls 19775->19776 19777 29f4d0 19776->19777 19778 283d50 6 API calls 19777->19778 19779 29f4e0 19778->19779 19780 29f460 6 API calls 19779->19780 19781 29f531 19780->19781 19782 29f460 6 API calls 19781->19782 19782->19783 19783->19737 19785 2a3672 std::_Facet_Register 2 API calls 19784->19785 19786 287ea6 19785->19786 19787 2863b0 std::_Throw_Cpp_error 2 API calls 19786->19787 19788 287ec5 19787->19788 19788->19737 19790 28fb2b 19789->19790 19791 28fac2 19789->19791 19792 272b50 Concurrency::cancel_current_task 2 API calls 19790->19792 19793 28fafc 19791->19793 19794 28facd 19791->19794 19801 28fada 19792->19801 19796 28fb19 19793->19796 19799 2a3672 std::_Facet_Register 2 API calls 19793->19799 19794->19790 19795 28fad4 19794->19795 19798 2a3672 std::_Facet_Register 2 API calls 19795->19798 19796->19769 19797 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 19803 28fb35 19797->19803 19798->19801 19800 28fb06 19799->19800 19800->19769 19801->19797 19802 28fae3 19801->19802 19802->19769 19805 28fb5b std::locale::_Setgloballocale 19803->19805 19807 299c70 19803->19807 19805->19769 19806 28fb7f 19806->19769 19808 299dc4 19807->19808 19813 299ca2 19807->19813 19809 273330 2 API calls 19808->19809 19822 299d04 std::locale::_Locimp::_Locimp 19809->19822 19810 299dbf 19811 272b50 Concurrency::cancel_current_task 2 API calls 19810->19811 19811->19808 19812 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 19814 299dce 19812->19814 19813->19810 19815 299d1d 19813->19815 19816 299cf3 19813->19816 19824 289950 19814->19824 19821 2a3672 std::_Facet_Register 2 API calls 19815->19821 19815->19822 19816->19810 19818 299cfe 19816->19818 19820 2a3672 std::_Facet_Register 2 API calls 19818->19820 19819 299dd9 std::_Throw_Cpp_error 19820->19822 19821->19822 19822->19812 19823 299d8f std::ios_base::_Ios_base_dtor 19822->19823 19823->19806 19825 289968 19824->19825 19826 289978 std::ios_base::_Ios_base_dtor 19824->19826 19825->19826 19827 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 19825->19827 19826->19819 19828 28998d 19827->19828 19829 289a4f 19828->19829 19836 2a2b74 19828->19836 19829->19819 19835 289a04 19835->19819 19837 2a2af7 19836->19837 19838 2899cc 19837->19838 19858 2a9815 19837->19858 19838->19829 19844 2883b0 19838->19844 19840 2a2b43 19840->19838 19872 2ad5f6 19840->19872 19843 2ad0a8 5 API calls 19843->19838 19845 28843c 19844->19845 19847 288463 19844->19847 19898 2b120a 19845->19898 19848 28c430 19847->19848 19850 28c45f std::_Throw_Cpp_error std::_Lockit::~_Lockit std::_Lockit::_Lockit 19848->19850 19849 28c4f8 std::_Lockit::~_Lockit 19849->19835 19850->19849 19851 2a3672 std::_Facet_Register 2 API calls 19850->19851 19852 28c506 19851->19852 19853 274040 std::_Throw_Cpp_error 3 API calls 19852->19853 19854 28c536 19853->19854 19855 274100 std::_Throw_Cpp_error 2 API calls 19854->19855 19856 28c592 19855->19856 19857 2a26f7 std::_Facet_Register 2 API calls 19856->19857 19857->19849 19860 2a975e std::_Locinfo::_Locinfo_dtor 19858->19860 19859 2a9771 19861 2b16ff __floor_pentium4 RtlAllocateHeap 19859->19861 19860->19859 19863 2a9791 19860->19863 19862 2a9776 19861->19862 19864 2a8c60 ___std_exception_copy RtlAllocateHeap 19862->19864 19865 2a97a3 19863->19865 19866 2a9796 19863->19866 19871 2a9781 19864->19871 19868 2ba8ef RtlAllocateHeap 19865->19868 19867 2b16ff __floor_pentium4 RtlAllocateHeap 19866->19867 19867->19871 19869 2a97ac 19868->19869 19870 2b16ff __floor_pentium4 RtlAllocateHeap 19869->19870 19869->19871 19870->19871 19871->19840 19873 2ad609 ___std_exception_copy 19872->19873 19878 2ad34d 19873->19878 19875 2ad61e 19876 2a899c ___std_exception_copy RtlAllocateHeap 19875->19876 19877 2a2b5e 19876->19877 19877->19838 19877->19843 19880 2ad359 std::_Locinfo::_Locinfo_dtor 19878->19880 19879 2ad35f 19881 2a8be3 ___std_exception_copy RtlAllocateHeap 19879->19881 19880->19879 19882 2ad3a2 19880->19882 19884 2ad37a 19881->19884 19885 2ad4d0 19882->19885 19884->19875 19886 2ad4e3 19885->19886 19887 2ad4f6 19885->19887 19886->19884 19894 2ad3f7 19887->19894 19889 2ad5a7 19889->19884 19890 2ad519 19890->19889 19891 2a9a91 4 API calls 19890->19891 19892 2ad547 19891->19892 19893 2b263d 2 API calls 19892->19893 19893->19889 19895 2ad408 19894->19895 19897 2ad460 19894->19897 19896 2b25fd SetFilePointerEx RtlAllocateHeap 19895->19896 19895->19897 19896->19897 19897->19890 19899 2b122b 19898->19899 19900 2b1216 19898->19900 19899->19847 19901 2b16ff __floor_pentium4 RtlAllocateHeap 19900->19901 19902 2b121b 19901->19902 19903 2a8c60 ___std_exception_copy RtlAllocateHeap 19902->19903 19904 2b1226 19903->19904 19904->19847 17252 5120cb0 17253 5120c50 17252->17253 17254 5120c6a GetCurrentHwProfileW 17253->17254 17255 5120c7f 17253->17255 17254->17255 19916 5120ae3 19917 5120b2d GetCurrentHwProfileW 19916->19917 19919 5120c7f 19917->19919 17256 337b00 17257 337ecc 17256->17257 17267 337b3e std::ios_base::_Ios_base_dtor __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 17256->17267 17258 337b87 setsockopt recv 17258->17267 17260 337eb7 Sleep 17260->17257 17260->17267 17261 337e15 recv 17263 337eaf Sleep 17261->17263 17263->17260 17265 337c2d recv 17266 337c4e recv 17265->17266 17265->17267 17266->17267 17267->17257 17267->17258 17267->17260 17267->17261 17267->17263 17269 337ee1 17267->17269 17271 337cb3 17267->17271 17277 338590 WSAStartup 17267->17277 17283 288dc0 17267->17283 17292 2863b0 17267->17292 17297 337ef0 17267->17297 17353 2a3069 17267->17353 17356 279280 17267->17356 17366 2a8c70 17269->17366 17272 288dc0 2 API calls 17271->17272 17275 337d06 recv 17271->17275 17272->17271 17275->17267 17278 3385c8 17277->17278 17281 338686 17277->17281 17279 338654 socket 17278->17279 17278->17281 17280 33866a connect 17279->17280 17279->17281 17280->17281 17282 33867c closesocket 17280->17282 17281->17267 17282->17279 17282->17281 17285 288e11 17283->17285 17286 288de2 std::locale::_Setgloballocale 17283->17286 17284 288ef8 17285->17284 17369 2732d0 17285->17369 17286->17265 17288 288e66 std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 17289 288ecb std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 17288->17289 17383 272fe0 17288->17383 17289->17265 17291 288eb8 17291->17265 17293 2863d8 17292->17293 17294 2863e7 17293->17294 17295 2732d0 std::_Throw_Cpp_error 2 API calls 17293->17295 17294->17267 17296 28642a std::locale::_Locimp::_Locimp 17295->17296 17296->17267 17298 337f3e 17297->17298 17299 337f6c 17297->17299 17302 272cf0 std::_Throw_Cpp_error 2 API calls 17298->17302 17300 337f74 17299->17300 17301 337f8e 17299->17301 17581 286290 17300->17581 17304 337fb0 17301->17304 17305 337f96 17301->17305 17306 337f50 17302->17306 17308 337fd5 17304->17308 17309 337fb8 17304->17309 17307 286290 2 API calls 17305->17307 17310 279280 3 API calls 17306->17310 17351 337f64 17307->17351 17311 337ffb 17308->17311 17312 337fdd 17308->17312 17313 286290 2 API calls 17309->17313 17309->17351 17310->17351 17315 3382c0 17311->17315 17316 33801b 17311->17316 17311->17351 17585 2b12b7 17312->17585 17313->17351 17318 33831b 17315->17318 17319 3382c8 17315->17319 17538 275400 17316->17538 17320 338323 17318->17320 17321 338376 17318->17321 17608 28b430 17319->17608 17323 28b430 3 API calls 17320->17323 17324 3383d1 17321->17324 17325 33837e 17321->17325 17323->17351 17327 3383d9 17324->17327 17328 33842c 17324->17328 17326 28b430 3 API calls 17325->17326 17326->17351 17332 28b430 3 API calls 17327->17332 17329 338484 17328->17329 17330 338434 17328->17330 17329->17351 17615 2c8b00 17329->17615 17333 28b430 3 API calls 17330->17333 17332->17351 17333->17351 17336 338040 17337 33810b 17336->17337 17336->17351 17548 272cf0 17336->17548 17552 28ace0 17336->17552 17555 272d30 17337->17555 17341 338140 17342 3381b2 17341->17342 17344 3381e5 17341->17344 17343 2863b0 std::_Throw_Cpp_error 2 API calls 17342->17343 17345 3381ce 17343->17345 17572 2a9820 17344->17572 17591 33f280 17345->17591 17351->17267 19128 2a361d 17353->19128 17357 2863b0 std::_Throw_Cpp_error 2 API calls 17356->17357 17358 2792d4 17357->17358 17359 288dc0 2 API calls 17358->17359 17360 279523 std::locale::_Locimp::_Locimp 17358->17360 17359->17360 17361 2796e2 std::ios_base::_Ios_base_dtor 17360->17361 17362 2796b6 WSASend 17360->17362 17363 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 17361->17363 17364 27975d std::ios_base::_Ios_base_dtor 17361->17364 17362->17360 17362->17361 17365 27979c 17363->17365 17364->17267 17365->17267 17367 2a8bac ___std_exception_copy RtlAllocateHeap 17366->17367 17368 2a8c7f __Getctype 17367->17368 17370 2732e2 17369->17370 17373 273306 17369->17373 17371 27331f 17370->17371 17372 2732e9 17370->17372 17396 272b50 17371->17396 17388 2a3672 17372->17388 17374 273318 17373->17374 17375 2a3672 std::_Facet_Register 2 API calls 17373->17375 17374->17288 17378 273310 17375->17378 17378->17288 17379 2732ef 17380 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 17379->17380 17381 2732f8 17379->17381 17382 273329 17380->17382 17381->17288 17384 273007 17383->17384 17385 273017 std::ios_base::_Ios_base_dtor 17383->17385 17384->17385 17386 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 17384->17386 17385->17291 17387 273036 17386->17387 17391 2a3677 std::_Facet_Register 17388->17391 17390 2a3691 17390->17379 17391->17390 17393 272b50 Concurrency::cancel_current_task std::_Throw_Cpp_error 17391->17393 17400 2b23ec 17391->17400 17392 2a369d 17392->17392 17393->17392 17406 2a4b15 17393->17406 17397 272b5e Concurrency::cancel_current_task std::_Throw_Cpp_error 17396->17397 17398 2a4b15 ___std_exception_copy 2 API calls 17397->17398 17399 272bac 17398->17399 17399->17379 17405 2bb094 __Getctype std::_Facet_Register 17400->17405 17401 2bb0d2 17414 2b16ff 17401->17414 17403 2bb0bd RtlAllocateHeap 17404 2bb0d0 17403->17404 17403->17405 17404->17391 17405->17401 17405->17403 17407 2a4b22 17406->17407 17413 272bac 17406->17413 17408 2b23ec ___std_exception_copy 2 API calls 17407->17408 17407->17413 17409 2a4b3f 17408->17409 17410 2a4b4f 17409->17410 17476 2b99a5 17409->17476 17485 2b1c96 17410->17485 17413->17379 17417 2b9f93 17414->17417 17418 2b9f9c __Getctype 17417->17418 17425 2b1704 17418->17425 17428 2ba65a 17418->17428 17420 2b9fe0 __Getctype 17421 2b9fe8 __Getctype 17420->17421 17422 2ba020 17420->17422 17432 2bb01a 17421->17432 17436 2b9c70 17422->17436 17425->17404 17427 2bb01a ___std_exception_destroy RtlAllocateHeap 17427->17425 17429 2ba667 __Getctype std::_Facet_Register 17428->17429 17430 2ba692 RtlAllocateHeap 17429->17430 17431 2ba6a5 __floor_pentium4 17429->17431 17430->17429 17430->17431 17431->17420 17433 2bb025 ___std_exception_destroy 17432->17433 17435 2bb04f 17432->17435 17434 2b16ff __floor_pentium4 RtlAllocateHeap 17433->17434 17433->17435 17434->17435 17435->17425 17437 2b9cde __Getctype 17436->17437 17440 2b9c16 17437->17440 17439 2b9d07 17439->17427 17441 2b9c22 std::_Lockit::_Lockit std::_Locinfo::_Locinfo_dtor 17440->17441 17444 2b9df7 17441->17444 17443 2b9c44 __Getctype 17443->17439 17445 2b9e2d __Getctype 17444->17445 17446 2b9e06 __Getctype 17444->17446 17445->17443 17446->17445 17448 2c2146 17446->17448 17450 2c21c6 17448->17450 17451 2c215c 17448->17451 17449 2c22b7 __Getctype RtlAllocateHeap 17473 2c2222 17449->17473 17452 2bb01a ___std_exception_destroy RtlAllocateHeap 17450->17452 17474 2c2214 17450->17474 17451->17450 17456 2c218f 17451->17456 17458 2bb01a ___std_exception_destroy RtlAllocateHeap 17451->17458 17453 2c21e8 17452->17453 17454 2bb01a ___std_exception_destroy RtlAllocateHeap 17453->17454 17455 2c21fb 17454->17455 17459 2bb01a ___std_exception_destroy RtlAllocateHeap 17455->17459 17460 2bb01a ___std_exception_destroy RtlAllocateHeap 17456->17460 17475 2c21b1 17456->17475 17457 2bb01a ___std_exception_destroy RtlAllocateHeap 17461 2c21bb 17457->17461 17463 2c2184 17458->17463 17464 2c2209 17459->17464 17465 2c21a6 17460->17465 17466 2bb01a ___std_exception_destroy RtlAllocateHeap 17461->17466 17462 2c2282 17467 2bb01a ___std_exception_destroy RtlAllocateHeap 17462->17467 17468 2c144a __Getctype RtlAllocateHeap 17463->17468 17470 2bb01a ___std_exception_destroy RtlAllocateHeap 17464->17470 17471 2c18a9 __Getctype RtlAllocateHeap 17465->17471 17466->17450 17472 2c2288 17467->17472 17468->17456 17469 2bb01a RtlAllocateHeap ___std_exception_destroy 17469->17473 17470->17474 17471->17475 17472->17445 17473->17462 17473->17469 17474->17449 17475->17457 17477 2b99b3 17476->17477 17479 2b99c1 17476->17479 17477->17479 17483 2b99d9 17477->17483 17478 2b16ff __floor_pentium4 RtlAllocateHeap 17480 2b99c9 17478->17480 17479->17478 17488 2a8c60 17480->17488 17482 2b99d3 17482->17410 17483->17482 17484 2b16ff __floor_pentium4 RtlAllocateHeap 17483->17484 17484->17480 17486 2bb01a ___std_exception_destroy RtlAllocateHeap 17485->17486 17487 2b1cae 17486->17487 17487->17413 17491 2a8bac 17488->17491 17492 2a8bbe ___std_exception_copy 17491->17492 17497 2a8be3 17492->17497 17494 2a8bd6 17504 2a899c 17494->17504 17498 2a8bf3 17497->17498 17501 2a8bfa ___std_exception_copy __Getctype 17497->17501 17510 2a8a01 17498->17510 17500 2a8c08 17500->17494 17501->17500 17502 2a8bac ___std_exception_copy RtlAllocateHeap 17501->17502 17503 2a8c6c 17502->17503 17503->17494 17506 2a89a8 17504->17506 17505 2a89bf 17508 2a89d2 17505->17508 17509 2a8a47 ___std_exception_copy RtlAllocateHeap 17505->17509 17506->17505 17525 2a8a47 17506->17525 17508->17482 17509->17508 17511 2a8a10 17510->17511 17514 2ba044 17511->17514 17515 2ba057 __Getctype 17514->17515 17516 2ba65a __Getctype RtlAllocateHeap 17515->17516 17524 2a8a32 17515->17524 17517 2ba087 __Getctype 17516->17517 17518 2ba0c3 17517->17518 17519 2ba08f __Getctype 17517->17519 17521 2b9c70 __Getctype RtlAllocateHeap 17518->17521 17520 2bb01a ___std_exception_destroy RtlAllocateHeap 17519->17520 17520->17524 17522 2ba0ce 17521->17522 17523 2bb01a ___std_exception_destroy RtlAllocateHeap 17522->17523 17523->17524 17524->17501 17526 2a8a5a 17525->17526 17527 2a8a51 17525->17527 17526->17505 17528 2a8a01 ___std_exception_copy RtlAllocateHeap 17527->17528 17529 2a8a56 17528->17529 17529->17526 17532 2b41c6 17529->17532 17531 2a8a63 17533 2b41cb std::locale::_Setgloballocale 17532->17533 17534 2bf665 std::locale::_Setgloballocale RtlAllocateHeap 17533->17534 17536 2b41d6 std::locale::_Setgloballocale 17533->17536 17534->17536 17535 2b36e2 std::locale::_Setgloballocale RtlAllocateHeap 17537 2b4209 __Getctype std::locale::_Setgloballocale 17535->17537 17536->17535 17537->17531 17620 2a2b99 17538->17620 17541 275410 17542 275419 17541->17542 17544 2a2534 std::_Throw_Cpp_error 3 API calls 17541->17544 17542->17336 17545 275430 17544->17545 17629 2a953c 17545->17629 17549 272d13 17548->17549 17549->17549 17550 273040 std::_Throw_Cpp_error 2 API calls 17549->17550 17551 272d25 17550->17551 17551->17336 17553 28ad10 17552->17553 17553->17553 17946 28fbf0 17553->17946 17556 273040 std::_Throw_Cpp_error 2 API calls 17555->17556 17557 272d55 17556->17557 17558 3462c0 17557->17558 17559 346358 17558->17559 17563 346361 std::locale::_Setgloballocale 17558->17563 17955 28e4b0 17559->17955 17564 346553 17563->17564 17571 34654f 17563->17571 17978 364760 17563->17978 17989 294160 17563->17989 17566 346580 std::ios_base::_Ios_base_dtor 17564->17566 17567 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 17564->17567 17566->17341 17568 3465ce 17567->17568 17569 2a3069 __Xtime_get_ticks GetSystemTimePreciseAsFileTime 17568->17569 17570 3465d6 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 17569->17570 17570->17341 17571->17564 18057 286130 17571->18057 18144 2a975e 17572->18144 17574 2a9832 17574->17351 17575 2b1628 17574->17575 17576 2b163b ___std_exception_copy 17575->17576 18168 2b140a 17576->18168 17578 2b1650 17579 2a899c ___std_exception_copy RtlAllocateHeap 17578->17579 17580 2b165d 17579->17580 17602 2ad0a8 17580->17602 17582 2862b1 17581->17582 17583 28629d 17581->17583 17582->17351 17584 286130 2 API calls 17583->17584 17584->17582 17586 2b12ca ___std_exception_copy 17585->17586 18282 2ad6a5 17586->18282 17588 2b12e4 17589 2a899c ___std_exception_copy RtlAllocateHeap 17588->17589 17590 2b12f1 17589->17590 17590->17351 17592 33f2f6 std::locale::_Setgloballocale 17591->17592 18397 28ab20 17592->18397 17595 288f00 std::_Throw_Cpp_error 2 API calls 17596 33f47f 17595->17596 18402 273440 17596->18402 17598 33f58b std::ios_base::_Ios_base_dtor 17598->17351 17600 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 17601 33f5ce 17600->17601 17601->17351 17603 2ad0bb ___std_exception_copy 17602->17603 18643 2acf83 17603->18643 17605 2ad0c7 17606 2a899c ___std_exception_copy RtlAllocateHeap 17605->17606 17607 2ad0d3 17606->17607 17607->17351 18713 287ef0 17608->18713 17610 28b48d 18730 292100 17610->18730 17614 28b503 17614->17351 19097 2c8bb0 17615->19097 17617 2c8b31 std::locale::_Locimp::_Locimp 17618 273040 std::_Throw_Cpp_error 2 API calls 17617->17618 17619 2c8b7c 17618->17619 17619->17351 17635 2a2bc8 17620->17635 17622 275409 17622->17541 17623 2a2534 17622->17623 17624 2a254a std::_Throw_Cpp_error 17623->17624 17642 2a24e7 17624->17642 17626 2a255a __EH_prolog3 std::_Throw_Cpp_error 17648 289cb0 17626->17648 17628 2a25c7 std::_Throw_Cpp_error 17628->17541 17630 2a954f ___std_exception_copy 17629->17630 17930 2a93db 17630->17930 17632 2a955e 17633 2a899c ___std_exception_copy RtlAllocateHeap 17632->17633 17634 275450 17633->17634 17634->17336 17638 2a2be2 17635->17638 17636 2a2bf2 _ValidateLocalCookies 17636->17622 17638->17636 17639 2a302b 17638->17639 17640 2a3069 __Xtime_get_ticks GetSystemTimePreciseAsFileTime 17639->17640 17641 2a3036 __aulldiv __aullrem 17640->17641 17641->17638 17643 2a24f3 __EH_prolog3_GS 17642->17643 17644 272cf0 std::_Throw_Cpp_error 2 API calls 17643->17644 17645 2a2507 17644->17645 17659 2736e0 17645->17659 17647 2a251c std::_Throw_Cpp_error 17647->17626 17686 274900 17648->17686 17650 289d26 17651 2a3672 std::_Facet_Register 2 API calls 17650->17651 17652 289d2d 17651->17652 17691 2a2729 17652->17691 17654 289d39 17699 28a060 17654->17699 17656 289d76 17657 289dc7 std::_Throw_Cpp_error 17656->17657 17658 274900 std::_Throw_Cpp_error 2 API calls 17656->17658 17657->17628 17658->17657 17660 2863b0 std::_Throw_Cpp_error 2 API calls 17659->17660 17661 273731 17660->17661 17662 27375a 17661->17662 17673 288f00 17661->17673 17664 288f00 std::_Throw_Cpp_error 2 API calls 17662->17664 17665 27378a 17664->17665 17666 2a4b15 ___std_exception_copy 2 API calls 17665->17666 17668 27381e 17666->17668 17667 27385f std::ios_base::_Ios_base_dtor 17667->17647 17668->17667 17669 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 17668->17669 17670 2738b0 17669->17670 17682 2a4b78 17670->17682 17672 2738f5 std::ios_base::_Ios_base_dtor 17672->17647 17674 288f4f 17673->17674 17675 288f22 std::locale::_Locimp::_Locimp 17673->17675 17676 2732d0 std::_Throw_Cpp_error 2 API calls 17674->17676 17677 28902f std::ios_base::_Ios_base_dtor 17674->17677 17675->17662 17678 288fa4 std::locale::_Locimp::_Locimp 17676->17678 17677->17662 17679 289002 std::locale::_Locimp::_Locimp 17678->17679 17680 272fe0 std::_Throw_Cpp_error RtlAllocateHeap 17678->17680 17679->17662 17681 288fef 17680->17681 17681->17662 17683 2a4b8c 17682->17683 17684 2a4b85 17682->17684 17683->17672 17685 2b1c96 ___std_exception_destroy RtlAllocateHeap 17684->17685 17685->17683 17687 274922 17686->17687 17688 27491a std::_Throw_Cpp_error 17686->17688 17687->17650 17711 2747f0 17688->17711 17690 274968 std::ios_base::_Ios_base_dtor std::_Throw_Cpp_error 17690->17650 17692 2a2735 __EH_prolog3 std::_Lockit::_Lockit 17691->17692 17695 2a2771 std::_Throw_Cpp_error std::_Lockit::~_Lockit 17692->17695 17729 2a288c 17692->17729 17694 2a2753 17735 2a28af 17694->17735 17695->17654 17700 28a0a2 std::_Throw_Cpp_error std::_Lockit::~_Lockit std::_Lockit::_Lockit 17699->17700 17701 2a3672 std::_Facet_Register 2 API calls 17700->17701 17710 28a144 std::_Lockit::~_Lockit 17700->17710 17702 28a152 17701->17702 17800 274040 17702->17800 17708 28a1f1 17835 2a26f7 17708->17835 17710->17656 17712 274851 17711->17712 17712->17712 17723 273040 17712->17723 17714 274865 17715 2736e0 std::_Throw_Cpp_error 2 API calls 17714->17715 17716 27487b 17715->17716 17717 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 17716->17717 17718 2748a5 std::ios_base::_Ios_base_dtor 17716->17718 17720 2748f7 std::_Throw_Cpp_error 17717->17720 17718->17690 17719 274922 17719->17690 17720->17719 17721 2747f0 std::_Throw_Cpp_error 2 API calls 17720->17721 17722 274968 std::ios_base::_Ios_base_dtor std::_Throw_Cpp_error 17721->17722 17722->17690 17724 273052 17723->17724 17725 2730c8 17723->17725 17726 273057 std::locale::_Locimp::_Locimp 17724->17726 17727 2732d0 std::_Throw_Cpp_error 2 API calls 17724->17727 17725->17714 17726->17714 17728 2730a3 std::locale::_Locimp::_Locimp 17727->17728 17728->17714 17730 2a3672 std::_Facet_Register 2 API calls 17729->17730 17731 2a2897 17730->17731 17732 2a28ab 17731->17732 17745 2a2611 17731->17745 17732->17694 17736 2a28bb 17735->17736 17737 2a275b 17735->17737 17748 2a333a 17736->17748 17739 285a60 17737->17739 17740 285a86 17739->17740 17741 285ab3 std::locale::_Locimp::_Locimp 17739->17741 17742 285a90 17740->17742 17743 2b1c96 ___std_exception_destroy RtlAllocateHeap 17740->17743 17741->17695 17742->17741 17744 2b23ec ___std_exception_copy 2 API calls 17742->17744 17743->17742 17744->17741 17746 285a60 std::locale::_Locimp::_Locimp 2 API calls 17745->17746 17747 2a264b 17746->17747 17747->17694 17749 2a334a std::locale::_Setgloballocale 17748->17749 17749->17737 17752 2b41d6 std::locale::_Setgloballocale 17749->17752 17754 2bf665 17749->17754 17775 2b36e2 17752->17775 17753 2b4209 __Getctype std::locale::_Setgloballocale 17753->17737 17759 2bf671 std::_Locinfo::_Locinfo_dtor 17754->17759 17755 2b9f93 std::locale::_Setgloballocale RtlAllocateHeap 17761 2bf6a2 std::locale::_Setgloballocale 17755->17761 17756 2bf6c1 17758 2b16ff __floor_pentium4 RtlAllocateHeap 17756->17758 17757 2bf6ab 17757->17752 17760 2bf6c6 17758->17760 17759->17755 17759->17756 17759->17761 17763 2bf6d3 std::_Lockit::_Lockit std::locale::_Setgloballocale 17759->17763 17762 2a8c60 ___std_exception_copy RtlAllocateHeap 17760->17762 17761->17756 17761->17757 17761->17763 17762->17757 17764 2bf843 std::_Lockit::~_Lockit 17763->17764 17765 2bf746 17763->17765 17770 2bf774 std::locale::_Setgloballocale 17763->17770 17766 2b36e2 std::locale::_Setgloballocale RtlAllocateHeap 17764->17766 17765->17770 17778 2b9e42 17765->17778 17768 2bf856 17766->17768 17769 2bf7c9 17769->17757 17774 2b9e42 __Getctype RtlAllocateHeap 17769->17774 17770->17757 17770->17769 17771 2b9e42 __Getctype RtlAllocateHeap 17770->17771 17771->17769 17773 2b9e42 __Getctype RtlAllocateHeap 17773->17770 17774->17757 17792 2b3552 17775->17792 17777 2b36f3 17777->17753 17779 2b9e4b __Getctype 17778->17779 17780 2ba65a __Getctype RtlAllocateHeap 17779->17780 17782 2b9e62 17779->17782 17783 2b9e8f __Getctype 17780->17783 17781 2b9ef2 17781->17773 17782->17781 17784 2b41c6 __Getctype RtlAllocateHeap 17782->17784 17785 2b9e97 __Getctype 17783->17785 17786 2b9ecf 17783->17786 17787 2b9efc 17784->17787 17788 2bb01a ___std_exception_destroy RtlAllocateHeap 17785->17788 17789 2b9c70 __Getctype RtlAllocateHeap 17786->17789 17788->17782 17790 2b9eda 17789->17790 17791 2bb01a ___std_exception_destroy RtlAllocateHeap 17790->17791 17791->17782 17794 2b357f std::locale::_Setgloballocale 17792->17794 17796 2b33e3 17794->17796 17795 2b35c8 std::locale::_Setgloballocale 17795->17777 17797 2b33ef std::_Lockit::_Lockit std::_Locinfo::_Locinfo_dtor 17796->17797 17798 2b346a std::locale::_Setgloballocale RtlAllocateHeap 17797->17798 17799 2b3406 std::locale::_Setgloballocale 17798->17799 17799->17795 17801 274066 std::_Lockit::_Lockit 17800->17801 17802 2740e6 17801->17802 17803 2740c2 17801->17803 17847 2a1d4a 17802->17847 17838 2a2827 17803->17838 17807 2740f0 17808 2a2cf4 17879 2b3cf8 17808->17879 17810 2a2cfd __Getctype 17811 2a2d17 17810->17811 17812 2a2d35 17810->17812 17884 2b454e 17811->17884 17814 2b454e __Getctype RtlAllocateHeap 17812->17814 17815 2a2d1e 17814->17815 17889 2b3d42 17815->17889 17818 28a1ca 17820 274100 17818->17820 17926 2a2872 17820->17926 17823 274140 17825 27415b 17823->17825 17827 2b1c96 ___std_exception_destroy RtlAllocateHeap 17823->17827 17824 2b1c96 ___std_exception_destroy RtlAllocateHeap 17824->17823 17826 274176 17825->17826 17828 2b1c96 ___std_exception_destroy RtlAllocateHeap 17825->17828 17829 274191 17826->17829 17830 2b1c96 ___std_exception_destroy RtlAllocateHeap 17826->17830 17827->17825 17828->17826 17831 2741ac 17829->17831 17832 2b1c96 ___std_exception_destroy RtlAllocateHeap 17829->17832 17830->17829 17833 2741c7 std::_Lockit::~_Lockit 17831->17833 17834 2b1c96 ___std_exception_destroy RtlAllocateHeap 17831->17834 17832->17831 17833->17708 17834->17833 17836 2a3672 std::_Facet_Register 2 API calls 17835->17836 17837 2a2702 17836->17837 17837->17710 17850 2b4516 17838->17850 17841 285a60 std::locale::_Locimp::_Locimp 2 API calls 17842 2a284b 17841->17842 17843 2b4516 std::_Locinfo::_Locinfo_dtor 2 API calls 17842->17843 17844 2a285b 17842->17844 17843->17844 17845 285a60 std::locale::_Locimp::_Locimp 2 API calls 17844->17845 17846 2740c9 17845->17846 17846->17808 17876 273540 17847->17876 17849 2a1d5b std::_Throw_Cpp_error 17849->17807 17851 2b4523 std::_Locinfo::_Locinfo_dtor 17850->17851 17854 2b42c1 17851->17854 17853 2a2833 17853->17841 17855 2b42cd std::_Lockit::_Lockit std::_Locinfo::_Locinfo_dtor 17854->17855 17858 2b431c 17855->17858 17857 2b42e8 std::_Locinfo::_Locinfo_dtor 17857->17853 17859 2b447b std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 17858->17859 17860 2b4337 17859->17860 17861 2b9e42 __Getctype RtlAllocateHeap 17860->17861 17866 2b4370 __Getctype 17860->17866 17862 2b4344 17861->17862 17863 2b3379 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 17862->17863 17864 2b4369 17863->17864 17865 2bb094 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 17864->17865 17864->17866 17867 2b4395 17865->17867 17866->17857 17867->17866 17868 2b3379 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 17867->17868 17869 2b43b1 17868->17869 17870 2b43b8 17869->17870 17871 2b43d3 17869->17871 17870->17866 17872 2bb01a ___std_exception_destroy RtlAllocateHeap 17870->17872 17873 2bb01a ___std_exception_destroy RtlAllocateHeap 17871->17873 17874 2b43fe 17871->17874 17872->17866 17873->17874 17874->17866 17875 2bb01a ___std_exception_destroy RtlAllocateHeap 17874->17875 17875->17866 17877 2a4b15 ___std_exception_copy 2 API calls 17876->17877 17878 273585 17877->17878 17878->17849 17880 2b9e42 __Getctype RtlAllocateHeap 17879->17880 17881 2b3d03 17880->17881 17900 2ba12d 17881->17900 17885 2b9e42 __Getctype RtlAllocateHeap 17884->17885 17886 2b4559 17885->17886 17887 2ba12d __Getctype RtlAllocateHeap 17886->17887 17888 2b4569 17887->17888 17888->17815 17890 2b9e42 __Getctype RtlAllocateHeap 17889->17890 17891 2b3d4d 17890->17891 17892 2ba12d __Getctype RtlAllocateHeap 17891->17892 17893 2a2d46 17892->17893 17893->17818 17894 2b4572 17893->17894 17895 2b457f 17894->17895 17899 2b45b3 __Getctype 17894->17899 17896 2b23ec ___std_exception_copy 2 API calls 17895->17896 17897 2b45a2 17896->17897 17897->17899 17917 2be2f4 17897->17917 17899->17818 17901 2ba140 17900->17901 17903 2b3d13 17900->17903 17901->17903 17904 2c2392 17901->17904 17903->17810 17905 2c239e std::_Locinfo::_Locinfo_dtor 17904->17905 17906 2b9e42 __Getctype RtlAllocateHeap 17905->17906 17908 2c23a7 std::_Lockit::_Lockit 17906->17908 17907 2c23ed 17907->17903 17908->17907 17913 2c2413 17908->17913 17910 2c23d6 __Getctype 17910->17907 17911 2b41c6 __Getctype RtlAllocateHeap 17910->17911 17912 2c2412 17911->17912 17914 2c2421 __Getctype 17913->17914 17916 2c242e 17913->17916 17915 2c2146 __Getctype RtlAllocateHeap 17914->17915 17914->17916 17915->17916 17916->17910 17918 2be302 17917->17918 17919 2be310 17917->17919 17918->17919 17924 2be32a 17918->17924 17920 2b16ff __floor_pentium4 RtlAllocateHeap 17919->17920 17921 2be31a 17920->17921 17922 2a8c60 ___std_exception_copy RtlAllocateHeap 17921->17922 17923 2be324 17922->17923 17923->17899 17924->17923 17925 2b16ff __floor_pentium4 RtlAllocateHeap 17924->17925 17925->17921 17927 2a287e 17926->17927 17929 27412c 17926->17929 17928 2b4516 std::_Locinfo::_Locinfo_dtor 2 API calls 17927->17928 17928->17929 17929->17823 17929->17824 17931 2a93e7 std::_Locinfo::_Locinfo_dtor 17930->17931 17932 2a93f0 17931->17932 17934 2a9414 17931->17934 17933 2a8be3 ___std_exception_copy RtlAllocateHeap 17932->17933 17938 2a9409 17933->17938 17936 2a9432 17934->17936 17939 2ba1e9 17934->17939 17937 2a8be3 ___std_exception_copy RtlAllocateHeap 17936->17937 17936->17938 17937->17938 17938->17632 17940 2ba20a 17939->17940 17941 2ba1f5 17939->17941 17940->17936 17942 2b16ff __floor_pentium4 RtlAllocateHeap 17941->17942 17943 2ba1fa 17942->17943 17944 2a8c60 ___std_exception_copy RtlAllocateHeap 17943->17944 17945 2ba205 17944->17945 17945->17936 17948 28fc8d 17946->17948 17950 28fc12 std::locale::_Locimp::_Locimp 17946->17950 17947 28fd5e 17948->17947 17949 2732d0 std::_Throw_Cpp_error 2 API calls 17948->17949 17951 28fce1 std::locale::_Locimp::_Locimp 17949->17951 17952 28fd3a std::locale::_Locimp::_Locimp 17951->17952 17953 272fe0 std::_Throw_Cpp_error RtlAllocateHeap 17951->17953 17954 28fd27 17953->17954 17956 28e528 17955->17956 17957 28e4c2 17955->17957 18068 273330 17956->18068 17958 28e4f9 17957->17958 17959 28e4ca 17957->17959 17963 28e516 17958->17963 17965 2a3672 std::_Facet_Register 2 API calls 17958->17965 17961 28e52d 17959->17961 17962 28e4d1 17959->17962 17966 272b50 Concurrency::cancel_current_task 2 API calls 17961->17966 17964 2a3672 std::_Facet_Register 2 API calls 17962->17964 17963->17563 17967 28e4d7 17964->17967 17968 28e503 17965->17968 17966->17967 17969 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 17967->17969 17970 28e4e0 17967->17970 17968->17563 17971 28e537 17969->17971 17970->17563 18071 286ad0 17971->18071 17973 28e574 17974 274900 std::_Throw_Cpp_error 2 API calls 17973->17974 17975 28e5fb 17974->17975 17976 28e613 17975->17976 18075 289b60 17975->18075 17976->17563 17979 364767 17978->17979 17980 36476c 17978->17980 17979->17563 17981 2b23ec ___std_exception_copy 2 API calls 17980->17981 17983 3647af 17980->17983 17981->17983 17982 3647c2 17982->17563 17983->17982 17984 364821 17983->17984 17988 2b1c96 ___std_exception_destroy RtlAllocateHeap 17983->17988 17985 2b1c96 ___std_exception_destroy RtlAllocateHeap 17984->17985 17987 364877 17984->17987 17986 364867 17985->17986 17986->17563 17987->17563 17988->17984 17990 294288 17989->17990 17991 294195 17989->17991 17992 273330 2 API calls 17990->17992 17993 2941b1 17991->17993 17994 294202 17991->17994 17995 2941f2 17991->17995 17996 29428d 17992->17996 17997 2a3672 std::_Facet_Register 2 API calls 17993->17997 18001 2a3672 std::_Facet_Register 2 API calls 17994->18001 18006 2941cf std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 17994->18006 17995->17993 17995->17996 17998 272b50 Concurrency::cancel_current_task 2 API calls 17996->17998 17999 2941c4 17997->17999 18000 294292 17998->18000 17999->18000 17999->18006 18002 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 18000->18002 18001->18006 18003 294297 18002->18003 18004 2943e9 18003->18004 18005 2942fa 18003->18005 18007 273330 2 API calls 18004->18007 18115 296ff0 18005->18115 18110 2977d0 18006->18110 18008 2943ee 18007->18008 18011 294549 18008->18011 18012 29445a 18008->18012 18013 273330 2 API calls 18011->18013 18016 296ff0 2 API calls 18012->18016 18022 29454e 18013->18022 18014 29425e 18014->17563 18015 294336 18123 297830 18015->18123 18018 294496 18016->18018 18017 29470b 18020 273330 2 API calls 18017->18020 18021 2863b0 std::_Throw_Cpp_error 2 API calls 18018->18021 18019 294706 18023 272b50 Concurrency::cancel_current_task 2 API calls 18019->18023 18044 2946af 18020->18044 18035 2944c4 18021->18035 18022->18017 18022->18019 18024 2945ee 18022->18024 18025 294615 18022->18025 18023->18017 18024->18019 18027 2945f9 18024->18027 18032 2a3672 std::_Facet_Register 2 API calls 18025->18032 18041 2945ff 18025->18041 18026 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 18028 294715 18026->18028 18029 2a3672 std::_Facet_Register 2 API calls 18027->18029 18135 28d010 18028->18135 18029->18041 18032->18041 18033 2943b0 18033->17563 18037 297830 RtlAllocateHeap 18035->18037 18038 294510 18037->18038 18038->17563 18039 294798 18045 272b50 Concurrency::cancel_current_task 2 API calls 18039->18045 18040 29472f std::_Throw_Cpp_error 18040->18039 18042 29475b 18040->18042 18043 29477f 18040->18043 18041->18044 18048 2946d1 std::ios_base::_Ios_base_dtor 18041->18048 18128 2a1f9c 18041->18128 18042->18039 18046 294762 18042->18046 18047 294791 18043->18047 18051 2a3672 std::_Facet_Register 2 API calls 18043->18051 18044->18026 18044->18048 18049 294768 18045->18049 18050 2a3672 std::_Facet_Register 2 API calls 18046->18050 18047->17563 18048->17563 18053 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 18049->18053 18056 294771 18049->18056 18050->18049 18055 294789 18051->18055 18054 2947a2 18053->18054 18055->17563 18056->17563 18058 286143 std::locale::_Locimp::_Locimp 18057->18058 18059 286174 18057->18059 18058->17564 18060 286180 18059->18060 18061 286200 18059->18061 18062 2732d0 std::_Throw_Cpp_error 2 API calls 18060->18062 18063 288f00 std::_Throw_Cpp_error 2 API calls 18061->18063 18066 2861bf std::locale::_Locimp::_Locimp 18062->18066 18064 286232 18063->18064 18064->17564 18065 2861ed 18065->17564 18066->18065 18067 272fe0 std::_Throw_Cpp_error RtlAllocateHeap 18066->18067 18067->18065 18079 2a1cea 18068->18079 18073 286b02 18071->18073 18072 286b1d 18072->17973 18073->18072 18099 2850e0 18073->18099 18076 289bbb 18075->18076 18077 289b96 18075->18077 18076->17976 18077->18076 18107 2888a0 18077->18107 18086 2a1a9f 18079->18086 18081 2a1cfb std::_Throw_Cpp_error 18089 2a1af4 18081->18089 18083 2a1d1b std::_Throw_Cpp_error 18092 2a1b37 18083->18092 18085 2a1d3b std::_Throw_Cpp_error 18096 2734e0 18086->18096 18090 2734e0 std::invalid_argument::invalid_argument 2 API calls 18089->18090 18091 2a1b06 18090->18091 18091->18083 18093 2a1b4b std::regex_error::regex_error 18092->18093 18094 2734e0 std::invalid_argument::invalid_argument 2 API calls 18093->18094 18095 2a1b54 18094->18095 18095->18085 18097 2a4b15 ___std_exception_copy 2 API calls 18096->18097 18098 273522 18097->18098 18098->18081 18100 285117 18099->18100 18104 2851b5 18099->18104 18101 286ad0 2 API calls 18100->18101 18103 285120 18101->18103 18102 28519d 18102->18104 18106 289b60 2 API calls 18102->18106 18103->18102 18105 274900 std::_Throw_Cpp_error 2 API calls 18103->18105 18104->18072 18105->18102 18106->18104 18108 274900 std::_Throw_Cpp_error 2 API calls 18107->18108 18109 2888bf 18108->18109 18109->18076 18111 2977dc 18110->18111 18112 2977f9 std::ios_base::_Ios_base_dtor 18110->18112 18111->18112 18113 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 18111->18113 18112->18014 18114 297824 18113->18114 18116 29703c 18115->18116 18118 296ff9 18115->18118 18116->18116 18117 297013 18119 29701c 18117->18119 18120 2a3672 std::_Facet_Register 2 API calls 18117->18120 18118->18116 18118->18117 18121 2a3672 std::_Facet_Register 2 API calls 18118->18121 18119->18015 18122 297035 18120->18122 18121->18117 18122->18015 18124 297882 std::ios_base::_Ios_base_dtor 18123->18124 18125 29783d 18123->18125 18124->18033 18125->18124 18126 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 18125->18126 18127 2978b6 18126->18127 18129 2a1fb2 18128->18129 18130 2a1fa5 18128->18130 18129->18041 18130->18129 18131 2b41c6 __Getctype RtlAllocateHeap 18130->18131 18132 2a1fbb 18131->18132 18133 2a1f9c RtlAllocateHeap 18132->18133 18134 2a1fca 18133->18134 18134->18041 18136 28d01a 18135->18136 18137 28d02e 18135->18137 18136->18137 18138 2a1f9c RtlAllocateHeap 18136->18138 18139 289910 18137->18139 18138->18136 18140 289928 18139->18140 18141 289938 std::ios_base::_Ios_base_dtor 18139->18141 18140->18141 18142 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 18140->18142 18141->18040 18143 28994d 18142->18143 18147 2a976a std::_Locinfo::_Locinfo_dtor 18144->18147 18145 2a9771 18146 2b16ff __floor_pentium4 RtlAllocateHeap 18145->18146 18148 2a9776 18146->18148 18147->18145 18149 2a9791 18147->18149 18150 2a8c60 ___std_exception_copy RtlAllocateHeap 18148->18150 18151 2a97a3 18149->18151 18152 2a9796 18149->18152 18157 2a9781 18150->18157 18158 2ba8ef 18151->18158 18153 2b16ff __floor_pentium4 RtlAllocateHeap 18152->18153 18153->18157 18155 2a97ac 18156 2b16ff __floor_pentium4 RtlAllocateHeap 18155->18156 18155->18157 18156->18157 18157->17574 18159 2ba8fb std::_Lockit::_Lockit std::_Locinfo::_Locinfo_dtor 18158->18159 18162 2ba993 18159->18162 18161 2ba916 18161->18155 18164 2ba9b6 18162->18164 18163 2ba65a __Getctype RtlAllocateHeap 18165 2baa17 18163->18165 18164->18163 18167 2ba9fc std::locale::_Setgloballocale 18164->18167 18166 2bb01a ___std_exception_destroy RtlAllocateHeap 18165->18166 18166->18167 18167->18161 18169 2b1418 18168->18169 18174 2b1440 18168->18174 18170 2b1447 18169->18170 18171 2b1425 18169->18171 18169->18174 18176 2b1363 18170->18176 18173 2a8be3 ___std_exception_copy RtlAllocateHeap 18171->18173 18173->18174 18174->17578 18175 2b147f 18175->17578 18177 2b136f std::_Locinfo::_Locinfo_dtor 18176->18177 18180 2b13be 18177->18180 18179 2b138a 18179->18175 18187 2bc8aa 18180->18187 18207 2bc86c 18187->18207 18189 2bc8bb 18193 2b13d6 18189->18193 18214 2bb094 18189->18214 18192 2bb01a ___std_exception_destroy RtlAllocateHeap 18192->18193 18194 2b1481 18193->18194 18197 2b1493 18194->18197 18198 2b13f4 18194->18198 18195 2b14a1 18196 2a8be3 ___std_exception_copy RtlAllocateHeap 18195->18196 18196->18198 18197->18195 18197->18198 18201 2b14d7 std::locale::_Locimp::_Locimp 18197->18201 18203 2bc955 18198->18203 18200 2ba1e9 RtlAllocateHeap 18200->18201 18201->18198 18201->18200 18229 2a9a91 18201->18229 18235 2b9678 18201->18235 18204 2b1400 18203->18204 18205 2bc960 18203->18205 18204->18179 18205->18204 18206 2a9a91 4 API calls 18205->18206 18206->18204 18208 2bc878 18207->18208 18209 2bc8a2 18208->18209 18210 2ba1e9 RtlAllocateHeap 18208->18210 18209->18189 18211 2bc893 18210->18211 18220 2c3be3 18211->18220 18213 2bc899 18213->18189 18215 2bb0d2 18214->18215 18216 2bb0a2 __Getctype std::_Facet_Register 18214->18216 18217 2b16ff __floor_pentium4 RtlAllocateHeap 18215->18217 18216->18215 18218 2bb0bd RtlAllocateHeap 18216->18218 18219 2bb0d0 18217->18219 18218->18216 18218->18219 18219->18192 18221 2c3bf0 18220->18221 18223 2c3bfd 18220->18223 18222 2b16ff __floor_pentium4 RtlAllocateHeap 18221->18222 18224 2c3bf5 18222->18224 18225 2c3c09 18223->18225 18226 2b16ff __floor_pentium4 RtlAllocateHeap 18223->18226 18224->18213 18225->18213 18227 2c3c2a 18226->18227 18228 2a8c60 ___std_exception_copy RtlAllocateHeap 18227->18228 18228->18224 18230 2a9aaa 18229->18230 18234 2a9ad1 18229->18234 18231 2ba1e9 RtlAllocateHeap 18230->18231 18230->18234 18232 2a9ac6 18231->18232 18233 2b9678 4 API calls 18232->18233 18233->18234 18234->18201 18236 2b9684 std::_Locinfo::_Locinfo_dtor 18235->18236 18237 2b96c5 18236->18237 18239 2b968c 18236->18239 18240 2b970b 18236->18240 18238 2a8be3 ___std_exception_copy RtlAllocateHeap 18237->18238 18238->18239 18239->18201 18240->18239 18242 2b9789 18240->18242 18243 2b97b1 18242->18243 18246 2b97d4 18242->18246 18244 2b97b5 18243->18244 18247 2b9810 18243->18247 18245 2a8be3 ___std_exception_copy RtlAllocateHeap 18244->18245 18245->18246 18246->18239 18248 2b982e 18247->18248 18261 2b263d 18247->18261 18256 2b92ce 18248->18256 18252 2b988d 18252->18246 18254 2b98f6 WriteFile 18252->18254 18253 2b9846 18253->18246 18264 2b8e9f 18253->18264 18254->18246 18257 2c3be3 RtlAllocateHeap 18256->18257 18259 2b92e0 18257->18259 18258 2b930e 18258->18252 18258->18253 18259->18258 18270 2ae1d0 18259->18270 18277 2b251c 18261->18277 18263 2b2656 18263->18248 18265 2b8f07 18264->18265 18266 2ae1d0 std::_Locinfo::_Locinfo_dtor 2 API calls 18265->18266 18269 2b8f18 std::_Locinfo::_Locinfo_dtor std::locale::_Locimp::_Locimp 18265->18269 18266->18269 18267 2bc724 RtlAllocateHeap RtlAllocateHeap 18267->18269 18268 2b91ce _ValidateLocalCookies 18268->18246 18268->18268 18269->18267 18269->18268 18271 2a8a47 ___std_exception_copy RtlAllocateHeap 18270->18271 18272 2ae1e0 18271->18272 18273 2ba15a std::_Locinfo::_Locinfo_dtor RtlAllocateHeap 18272->18273 18274 2ae1fd 18273->18274 18275 2ba1b8 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 18274->18275 18276 2ae20a 18275->18276 18276->18258 18278 2be940 RtlAllocateHeap 18277->18278 18279 2b252e 18278->18279 18280 2b254a SetFilePointerEx 18279->18280 18281 2b2536 18279->18281 18280->18281 18281->18263 18296 2ace79 18282->18296 18284 2ad6ff 18288 2ae1d0 std::_Locinfo::_Locinfo_dtor 2 API calls 18284->18288 18290 2ad723 18284->18290 18285 2ad6cc 18287 2a8be3 ___std_exception_copy RtlAllocateHeap 18285->18287 18286 2ad6b7 18286->18284 18286->18285 18295 2ad6e7 std::_Locinfo::_Locinfo_dtor 18286->18295 18287->18295 18288->18290 18291 2ad747 18290->18291 18303 2ace94 18290->18303 18292 2ad7cf 18291->18292 18310 2ace22 18291->18310 18293 2ace22 RtlAllocateHeap 18292->18293 18293->18295 18295->17588 18297 2ace7e 18296->18297 18298 2ace91 18296->18298 18299 2b16ff __floor_pentium4 RtlAllocateHeap 18297->18299 18298->18286 18300 2ace83 18299->18300 18301 2a8c60 ___std_exception_copy RtlAllocateHeap 18300->18301 18302 2ace8e 18301->18302 18302->18286 18304 2acea0 18303->18304 18306 2aceb6 18303->18306 18305 2b454e __Getctype RtlAllocateHeap 18304->18305 18308 2aceab std::_Locinfo::_Locinfo_dtor 18305->18308 18307 2acec6 18306->18307 18316 2b9a39 18306->18316 18307->18290 18308->18290 18311 2ace33 18310->18311 18312 2ace47 18310->18312 18311->18312 18313 2b16ff __floor_pentium4 RtlAllocateHeap 18311->18313 18312->18292 18314 2ace3c 18313->18314 18315 2a8c60 ___std_exception_copy RtlAllocateHeap 18314->18315 18315->18312 18321 2a95ae 18316->18321 18320 2b9a66 _ValidateLocalCookies 18320->18307 18322 2a95cc 18321->18322 18328 2a95c5 18321->18328 18323 2b9e42 __Getctype RtlAllocateHeap 18322->18323 18322->18328 18324 2a95ed 18323->18324 18325 2ba12d __Getctype RtlAllocateHeap 18324->18325 18326 2a9603 18325->18326 18336 2ba18b 18326->18336 18328->18320 18329 2bf44d 18328->18329 18330 2a95ae std::_Locinfo::_Locinfo_dtor 2 API calls 18329->18330 18331 2bf46d std::_Locinfo::_Locinfo_dtor 18330->18331 18332 2bf529 _ValidateLocalCookies 18331->18332 18334 2bb094 std::_Locinfo::_Locinfo_dtor 2 API calls 18331->18334 18335 2bf4bf std::_Locinfo::_Locinfo_dtor std::locale::_Setgloballocale 18331->18335 18332->18320 18334->18335 18393 2a3275 18335->18393 18337 2ba19e 18336->18337 18339 2ba1b3 18336->18339 18337->18339 18340 2c06bd 18337->18340 18339->18328 18341 2b9e42 __Getctype RtlAllocateHeap 18340->18341 18342 2c06c2 18341->18342 18345 2c05d5 18342->18345 18344 2c06cd 18344->18339 18346 2c05e1 std::_Lockit::_Lockit std::_Locinfo::_Locinfo_dtor 18345->18346 18348 2c05fb std::_Locinfo::_Locinfo_dtor 18346->18348 18352 2bb01a ___std_exception_destroy RtlAllocateHeap 18346->18352 18347 2c0602 18347->18344 18348->18347 18349 2b41c6 __Getctype RtlAllocateHeap 18348->18349 18350 2c0674 18349->18350 18351 2c06b0 18350->18351 18356 2b9efd 18350->18356 18351->18344 18352->18348 18357 2b9f08 __Getctype 18356->18357 18358 2b9f14 18357->18358 18361 2ba65a __Getctype RtlAllocateHeap 18357->18361 18359 2b41c6 __Getctype RtlAllocateHeap 18358->18359 18360 2b9f19 18358->18360 18362 2b9f92 18359->18362 18370 2c0480 18360->18370 18363 2b9f38 __Getctype 18361->18363 18364 2b9f40 __Getctype 18363->18364 18365 2b9f74 18363->18365 18366 2bb01a ___std_exception_destroy RtlAllocateHeap 18364->18366 18367 2b9c70 __Getctype RtlAllocateHeap 18365->18367 18366->18358 18368 2b9f7f 18367->18368 18369 2bb01a ___std_exception_destroy RtlAllocateHeap 18368->18369 18369->18360 18371 2c05d5 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 18370->18371 18372 2c04aa 18371->18372 18373 2c0207 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 18372->18373 18374 2c04b2 18373->18374 18375 2bb094 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 18374->18375 18381 2c04c3 18374->18381 18376 2c04d4 18375->18376 18377 2c04dc 18376->18377 18378 2c04ea 18376->18378 18379 2bb01a ___std_exception_destroy RtlAllocateHeap 18377->18379 18380 2c06d0 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 18378->18380 18379->18381 18382 2c0517 18380->18382 18381->18351 18383 2c0522 18382->18383 18387 2c053d std::_Locinfo::_Locinfo_dtor 18382->18387 18384 2b16ff __floor_pentium4 RtlAllocateHeap 18383->18384 18386 2c0527 18384->18386 18385 2c0569 18388 2c05b2 18385->18388 18391 2c00f9 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap 18385->18391 18389 2bb01a ___std_exception_destroy RtlAllocateHeap 18386->18389 18387->18385 18390 2bb01a ___std_exception_destroy RtlAllocateHeap 18387->18390 18392 2bb01a ___std_exception_destroy RtlAllocateHeap 18388->18392 18389->18381 18390->18385 18391->18388 18392->18381 18394 2a327f 18393->18394 18396 2a3290 18393->18396 18395 2b1c96 ___std_exception_destroy RtlAllocateHeap 18394->18395 18394->18396 18395->18396 18396->18332 18398 28ab55 18397->18398 18398->18398 18399 28aba3 18398->18399 18406 28e8a0 18398->18406 18401 28ab83 18401->17595 18403 273459 18402->18403 18410 2b0dd7 18403->18410 18407 28e8ce 18406->18407 18409 28e8f8 std::locale::_Locimp::_Locimp 18406->18409 18408 2732d0 std::_Throw_Cpp_error 2 API calls 18407->18408 18408->18409 18409->18401 18411 2b0deb ___std_exception_copy 18410->18411 18416 2ae565 18411->18416 18413 2b0e06 18414 2a899c ___std_exception_copy RtlAllocateHeap 18413->18414 18415 273467 18414->18415 18415->17598 18415->17600 18417 2ae591 18416->18417 18418 2ae5b4 18416->18418 18419 2a8be3 ___std_exception_copy RtlAllocateHeap 18417->18419 18418->18417 18420 2ae5bc 18418->18420 18421 2ae5a9 _ValidateLocalCookies 18419->18421 18425 2afaa7 18420->18425 18421->18413 18443 2b0b0d 18425->18443 18428 2afacc 18429 2a8be3 ___std_exception_copy RtlAllocateHeap 18428->18429 18430 2ae63d 18429->18430 18440 2af28d 18430->18440 18433 2ae1d0 std::_Locinfo::_Locinfo_dtor 2 API calls 18435 2afaf4 std::_Locinfo::_Locinfo_dtor 18433->18435 18435->18430 18435->18433 18436 2afbd0 18435->18436 18447 2af49b 18435->18447 18450 2afed4 18435->18450 18482 2b036f 18435->18482 18437 2a8be3 ___std_exception_copy RtlAllocateHeap 18436->18437 18438 2afbea 18437->18438 18439 2a8be3 ___std_exception_copy RtlAllocateHeap 18438->18439 18439->18430 18441 2bb01a ___std_exception_destroy RtlAllocateHeap 18440->18441 18442 2af29d 18441->18442 18442->18421 18444 2afac1 18443->18444 18445 2b0b18 18443->18445 18444->18428 18444->18430 18444->18435 18446 2a8be3 ___std_exception_copy RtlAllocateHeap 18445->18446 18446->18444 18509 2ae842 18447->18509 18449 2af4d6 18449->18435 18451 2afedb 18450->18451 18452 2afef2 18450->18452 18454 2b03f4 18451->18454 18455 2b0394 18451->18455 18465 2aff31 18451->18465 18453 2a8be3 ___std_exception_copy RtlAllocateHeap 18452->18453 18452->18465 18456 2aff26 18453->18456 18457 2b03f9 18454->18457 18458 2b042d 18454->18458 18459 2b041a 18455->18459 18460 2b039a 18455->18460 18456->18435 18461 2b03fb 18457->18461 18462 2b0426 18457->18462 18463 2b044a 18458->18463 18464 2b0432 18458->18464 18544 2aebfc 18459->18544 18471 2b039f 18460->18471 18472 2b03eb 18460->18472 18469 2b03ae 18461->18469 18475 2b040a 18461->18475 18551 2b0a30 18462->18551 18555 2b0a4d 18463->18555 18464->18459 18464->18472 18480 2b03c5 18464->18480 18465->18435 18478 2b0453 _ValidateLocalCookies 18469->18478 18519 2b0785 18469->18519 18471->18469 18473 2b03d8 18471->18473 18471->18480 18472->18478 18533 2aed89 18472->18533 18473->18478 18529 2b0916 18473->18529 18475->18459 18477 2b040e 18475->18477 18477->18478 18540 2b09ab 18477->18540 18478->18435 18480->18478 18558 2bc5ba 18480->18558 18483 2b03f4 18482->18483 18484 2b0394 18482->18484 18485 2b03f9 18483->18485 18486 2b042d 18483->18486 18487 2b041a 18484->18487 18488 2b039a 18484->18488 18489 2b03fb 18485->18489 18490 2b0426 18485->18490 18491 2b044a 18486->18491 18492 2b0432 18486->18492 18494 2aebfc 2 API calls 18487->18494 18497 2b039f 18488->18497 18498 2b03eb 18488->18498 18501 2b040a 18489->18501 18504 2b03ae 18489->18504 18495 2b0a30 2 API calls 18490->18495 18493 2b0a4d 2 API calls 18491->18493 18492->18487 18492->18498 18508 2b03c5 18492->18508 18493->18508 18494->18508 18495->18508 18496 2b0785 2 API calls 18496->18508 18499 2b03d8 18497->18499 18497->18504 18497->18508 18500 2aed89 2 API calls 18498->18500 18507 2b0453 _ValidateLocalCookies 18498->18507 18503 2b0916 2 API calls 18499->18503 18499->18507 18500->18508 18501->18487 18502 2b040e 18501->18502 18505 2b09ab RtlAllocateHeap 18502->18505 18502->18507 18503->18508 18504->18496 18504->18507 18505->18508 18506 2bc5ba 2 API calls 18506->18508 18507->18435 18508->18506 18508->18507 18510 2ace79 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap 18509->18510 18512 2ae854 18510->18512 18511 2ae869 18513 2a8be3 ___std_exception_copy RtlAllocateHeap 18511->18513 18512->18511 18514 2ae89c 18512->18514 18518 2ae884 std::_Locinfo::_Locinfo_dtor 18512->18518 18513->18518 18515 2ae933 18514->18515 18517 2ace22 RtlAllocateHeap 18514->18517 18516 2ace22 RtlAllocateHeap 18515->18516 18516->18518 18517->18515 18518->18449 18520 2b079f 18519->18520 18564 2ae790 18520->18564 18522 2b07de 18575 2bc439 18522->18575 18525 2ae1d0 std::_Locinfo::_Locinfo_dtor 2 API calls 18526 2b0895 18525->18526 18527 2ae1d0 std::_Locinfo::_Locinfo_dtor 2 API calls 18526->18527 18528 2b08c8 18526->18528 18527->18528 18528->18480 18528->18528 18530 2b0931 18529->18530 18531 2b0967 18530->18531 18532 2bc5ba 2 API calls 18530->18532 18531->18480 18532->18531 18534 2aed9e 18533->18534 18535 2aedc0 18534->18535 18537 2aede7 18534->18537 18536 2a8be3 ___std_exception_copy RtlAllocateHeap 18535->18536 18539 2aeddd 18536->18539 18538 2ae790 2 API calls 18537->18538 18537->18539 18538->18539 18539->18480 18543 2b09c1 18540->18543 18541 2a8be3 ___std_exception_copy RtlAllocateHeap 18542 2b09e2 18541->18542 18542->18480 18543->18541 18543->18542 18545 2aec11 18544->18545 18546 2aec33 18545->18546 18549 2aec5a 18545->18549 18547 2a8be3 ___std_exception_copy RtlAllocateHeap 18546->18547 18548 2aec50 18547->18548 18548->18480 18549->18548 18550 2ae790 2 API calls 18549->18550 18550->18548 18552 2b0a3c 18551->18552 18636 2aea6f 18552->18636 18554 2b0a4c 18554->18480 18556 2aed89 2 API calls 18555->18556 18557 2b0a62 18556->18557 18557->18480 18559 2bc5cf 18558->18559 18561 2ae1d0 std::_Locinfo::_Locinfo_dtor 2 API calls 18559->18561 18562 2bc5d3 std::_Locinfo::_Locinfo_dtor std::locale::_Setgloballocale 18559->18562 18563 2bc5fc std::_Locinfo::_Locinfo_dtor std::locale::_Setgloballocale 18559->18563 18560 2a8be3 ___std_exception_copy RtlAllocateHeap 18560->18562 18561->18563 18562->18480 18563->18560 18563->18562 18565 2ae7b7 18564->18565 18572 2ae7a5 18564->18572 18566 2bb094 std::_Locinfo::_Locinfo_dtor 2 API calls 18565->18566 18565->18572 18567 2ae7db 18566->18567 18568 2ae7ee 18567->18568 18569 2ae7e3 18567->18569 18594 2af2a7 18568->18594 18570 2bb01a ___std_exception_destroy RtlAllocateHeap 18569->18570 18570->18572 18572->18522 18574 2bb01a ___std_exception_destroy RtlAllocateHeap 18574->18572 18576 2bc46e 18575->18576 18578 2bc44a 18575->18578 18576->18578 18579 2bc4a1 18576->18579 18577 2a8be3 ___std_exception_copy RtlAllocateHeap 18589 2b0871 18577->18589 18578->18577 18580 2bc4da 18579->18580 18582 2bc509 18579->18582 18597 2bc2dd 18580->18597 18581 2bc532 18586 2bc599 18581->18586 18587 2bc55f 18581->18587 18582->18581 18583 2bc537 18582->18583 18602 2bbb66 18583->18602 18629 2bbe93 18586->18629 18590 2bc57f 18587->18590 18591 2bc564 18587->18591 18589->18525 18589->18526 18622 2bc08a 18590->18622 18612 2bc20e 18591->18612 18595 2bb01a ___std_exception_destroy RtlAllocateHeap 18594->18595 18596 2ae7f9 18595->18596 18596->18574 18598 2bc2f3 18597->18598 18599 2bc2fe 18597->18599 18598->18589 18600 2b99a5 ___std_exception_copy RtlAllocateHeap 18599->18600 18601 2bc359 __Getctype 18600->18601 18601->18589 18603 2bbb79 18602->18603 18604 2bbbaa 18603->18604 18605 2bbb88 18603->18605 18606 2bbbbf 18604->18606 18609 2bbc12 18604->18609 18607 2a8be3 ___std_exception_copy RtlAllocateHeap 18605->18607 18608 2bbe93 RtlAllocateHeap RtlAllocateHeap 18606->18608 18611 2bbba0 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z std::locale::_Setgloballocale __allrem _strrchr 18607->18611 18608->18611 18610 2ae1d0 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 18609->18610 18609->18611 18610->18611 18611->18589 18613 2c47bf RtlAllocateHeap 18612->18613 18614 2bc23e 18613->18614 18615 2c46c5 RtlAllocateHeap 18614->18615 18616 2bc27c 18615->18616 18617 2bc283 18616->18617 18618 2bc2bc 18616->18618 18619 2bc295 18616->18619 18617->18589 18620 2bbf37 RtlAllocateHeap RtlAllocateHeap 18618->18620 18621 2bc120 RtlAllocateHeap RtlAllocateHeap 18619->18621 18620->18617 18621->18617 18623 2c47bf RtlAllocateHeap 18622->18623 18624 2bc0b9 18623->18624 18625 2c46c5 RtlAllocateHeap 18624->18625 18626 2bc0fa 18625->18626 18627 2bc101 18626->18627 18628 2bc120 RtlAllocateHeap RtlAllocateHeap 18626->18628 18627->18589 18628->18627 18630 2c47bf RtlAllocateHeap 18629->18630 18631 2bbebd 18630->18631 18632 2c46c5 RtlAllocateHeap 18631->18632 18633 2bbf0b 18632->18633 18634 2bbf12 18633->18634 18635 2bbf37 RtlAllocateHeap RtlAllocateHeap 18633->18635 18634->18589 18635->18634 18637 2aea84 18636->18637 18638 2aeacd 18637->18638 18639 2aeaa6 18637->18639 18641 2aeac3 18638->18641 18642 2ae790 2 API calls 18638->18642 18640 2a8be3 ___std_exception_copy RtlAllocateHeap 18639->18640 18640->18641 18641->18554 18642->18641 18644 2acf8f std::_Locinfo::_Locinfo_dtor 18643->18644 18645 2acf99 18644->18645 18647 2acfbc 18644->18647 18646 2a8be3 ___std_exception_copy RtlAllocateHeap 18645->18646 18648 2acfb4 18646->18648 18647->18648 18650 2ad01a 18647->18650 18648->17605 18651 2ad04a 18650->18651 18652 2ad027 18650->18652 18654 2ad042 18651->18654 18655 2a9a91 4 API calls 18651->18655 18653 2a8be3 ___std_exception_copy RtlAllocateHeap 18652->18653 18653->18654 18654->18648 18656 2ad062 18655->18656 18664 2bb054 18656->18664 18659 2ba1e9 RtlAllocateHeap 18660 2ad076 18659->18660 18668 2b8d2c 18660->18668 18663 2bb01a ___std_exception_destroy RtlAllocateHeap 18663->18654 18665 2bb06b 18664->18665 18666 2ad06a 18664->18666 18665->18666 18667 2bb01a ___std_exception_destroy RtlAllocateHeap 18665->18667 18666->18659 18667->18666 18669 2b8d55 18668->18669 18674 2ad07d 18668->18674 18670 2b8da4 18669->18670 18672 2b8d7c 18669->18672 18671 2a8be3 ___std_exception_copy RtlAllocateHeap 18670->18671 18671->18674 18675 2b8c9b 18672->18675 18674->18654 18674->18663 18676 2b8ca7 std::_Locinfo::_Locinfo_dtor 18675->18676 18678 2b8ce6 18676->18678 18679 2b8dff 18676->18679 18678->18674 18691 2be940 18679->18691 18681 2b8e15 18704 2be8af 18681->18704 18683 2b8e0f 18683->18681 18684 2b8e47 18683->18684 18685 2be940 RtlAllocateHeap 18683->18685 18684->18681 18686 2be940 RtlAllocateHeap 18684->18686 18687 2b8e3e 18685->18687 18688 2b8e53 CloseHandle 18686->18688 18689 2be940 RtlAllocateHeap 18687->18689 18688->18681 18689->18684 18690 2b8e6d 18690->18678 18692 2be94d 18691->18692 18694 2be962 18691->18694 18710 2b16ec 18692->18710 18695 2b16ec RtlAllocateHeap 18694->18695 18697 2be987 18694->18697 18698 2be992 18695->18698 18697->18683 18701 2b16ff __floor_pentium4 RtlAllocateHeap 18698->18701 18699 2b16ff __floor_pentium4 RtlAllocateHeap 18700 2be95a 18699->18700 18700->18683 18702 2be99a 18701->18702 18703 2a8c60 ___std_exception_copy RtlAllocateHeap 18702->18703 18703->18700 18706 2be8be 18704->18706 18705 2b16ff __floor_pentium4 RtlAllocateHeap 18707 2be92a 18705->18707 18706->18705 18709 2be8e8 18706->18709 18708 2b16ec RtlAllocateHeap 18707->18708 18708->18709 18709->18690 18711 2b9f93 std::locale::_Setgloballocale RtlAllocateHeap 18710->18711 18712 2b16f1 18711->18712 18712->18699 18714 287f1d 18713->18714 18715 288034 18713->18715 18716 287fcb 18714->18716 18717 287f2b 18714->18717 18718 287f7c 18714->18718 18719 287f83 18714->18719 18720 287f24 18714->18720 18721 287f29 18715->18721 18726 272cf0 std::_Throw_Cpp_error 2 API calls 18715->18726 18716->17610 18725 2a3672 std::_Facet_Register 2 API calls 18717->18725 18793 28cf80 18718->18793 18723 2a3672 std::_Facet_Register 2 API calls 18719->18723 18788 28c3a0 18720->18788 18721->17610 18723->18721 18725->18721 18727 28804f 18726->18727 18798 277f90 18727->18798 18729 288062 std::_Throw_Cpp_error 18732 29215f 18730->18732 18855 2b133b 18732->18855 18735 28b4f0 18736 28db10 18735->18736 18737 28de3d 18736->18737 18738 28db56 18736->18738 18740 28fd70 2 API calls 18737->18740 18907 28ebb0 18738->18907 18742 28de87 18740->18742 18741 28dba4 18744 28fd70 2 API calls 18741->18744 18743 28eda0 3 API calls 18742->18743 18777 28df4f std::ios_base::_Ios_base_dtor 18742->18777 18748 28dee2 18743->18748 18745 28dbc1 18744->18745 18786 28dcc3 std::ios_base::_Ios_base_dtor 18745->18786 18913 28eda0 18745->18913 18746 287ef0 2 API calls 18753 28dfc7 18746->18753 18747 28de38 std::ios_base::_Ios_base_dtor 18747->17614 18749 2775c0 2 API calls 18748->18749 18754 28df06 18749->18754 18751 28dcec 18757 287ef0 2 API calls 18751->18757 18752 28dd82 18761 287ef0 2 API calls 18752->18761 18768 28dd9f 18752->18768 18753->18747 18758 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 18753->18758 18755 28f440 3 API calls 18754->18755 18769 28df1f 18755->18769 18756 28dc1c 18960 2775c0 18756->18960 18784 28dd01 18757->18784 18759 28e06f 18758->18759 19009 2890b0 18759->19009 18761->18768 18763 28e093 18767 2890b0 2 API calls 18763->18767 18764 28dc40 18990 28f440 18764->18990 18765 28e07d std::_Throw_Cpp_error 18776 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 18765->18776 18771 28e0a1 std::_Throw_Cpp_error 18767->18771 18772 2835b0 RtlAllocateHeap 18768->18772 18769->18763 18774 277a20 RtlAllocateHeap 18769->18774 18770 28dc56 18770->18759 18775 28dc6b 18770->18775 18780 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 18771->18780 18773 28dd6c 18772->18773 18779 2835b0 RtlAllocateHeap 18773->18779 18774->18777 18999 277a20 18775->18999 18776->18763 18777->18746 18777->18753 18777->18771 18781 28de26 18779->18781 18783 28e0b7 18780->18783 18785 2835b0 RtlAllocateHeap 18781->18785 19004 2835b0 18784->19004 18785->18747 18786->18751 18786->18752 18787 28dc86 18787->18765 18787->18786 18789 2a3672 std::_Facet_Register 2 API calls 18788->18789 18790 28c3c3 18789->18790 18791 2a3672 std::_Facet_Register 2 API calls 18790->18791 18792 28c3ec 18791->18792 18792->18721 18794 2a3672 std::_Facet_Register 2 API calls 18793->18794 18795 28cfb7 18794->18795 18796 273040 std::_Throw_Cpp_error 2 API calls 18795->18796 18797 28cfee 18796->18797 18797->18721 18809 277350 18798->18809 18800 278029 18827 28ad80 18800->18827 18802 27803d 18803 278076 std::ios_base::_Ios_base_dtor 18802->18803 18805 2780df 18802->18805 18831 2772b0 18803->18831 18807 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 18805->18807 18806 2780aa 18806->18729 18808 2780e4 18807->18808 18808->18729 18834 274d70 18809->18834 18818 288f00 std::_Throw_Cpp_error 2 API calls 18819 2773e6 18818->18819 18820 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 18819->18820 18821 277476 std::ios_base::_Ios_base_dtor 18819->18821 18822 2774c4 18820->18822 18821->18800 18823 2a4b78 ___std_exception_destroy RtlAllocateHeap 18822->18823 18824 277511 18823->18824 18825 2a4b78 ___std_exception_destroy RtlAllocateHeap 18824->18825 18826 277527 std::ios_base::_Ios_base_dtor 18825->18826 18826->18800 18828 28adb4 18827->18828 18829 288f00 std::_Throw_Cpp_error 2 API calls 18828->18829 18830 28adbf 18829->18830 18830->18802 18832 2a4b15 ___std_exception_copy 2 API calls 18831->18832 18833 27731a 18832->18833 18833->18806 18835 274da6 18834->18835 18836 274dd8 18835->18836 18837 273040 std::_Throw_Cpp_error 2 API calls 18835->18837 18838 28ac50 18836->18838 18837->18836 18839 28ac81 18838->18839 18840 28acd3 18839->18840 18841 28e8a0 2 API calls 18839->18841 18842 2773af 18841->18842 18843 28abb0 18842->18843 18844 28abe1 18843->18844 18844->18844 18845 288f00 std::_Throw_Cpp_error 2 API calls 18844->18845 18846 2773c2 18845->18846 18847 28ae20 18846->18847 18850 28e710 18847->18850 18849 2773d1 18849->18818 18851 28e753 18850->18851 18852 2732d0 std::_Throw_Cpp_error 2 API calls 18851->18852 18853 28e758 std::locale::_Locimp::_Locimp 18851->18853 18854 28e843 std::locale::_Locimp::_Locimp 18852->18854 18853->18849 18854->18849 18856 2b9e42 __Getctype RtlAllocateHeap 18855->18856 18857 2b1346 18856->18857 18858 2ba12d __Getctype RtlAllocateHeap 18857->18858 18859 29225f 18858->18859 18860 28fd70 18859->18860 18861 28fd84 18860->18861 18872 28fde4 18860->18872 18866 28fdc2 18861->18866 18874 299e20 18861->18874 18863 28ff6c 18863->18735 18867 299e20 2 API calls 18866->18867 18870 28fe58 18866->18870 18866->18872 18867->18870 18868 28fe74 18868->18735 18869 28fecc 18869->18863 18873 299e20 2 API calls 18869->18873 18900 2908f0 18869->18900 18870->18868 18892 291430 18870->18892 18872->18868 18896 2901e0 18872->18896 18873->18869 18875 299e62 18874->18875 18876 299f76 18874->18876 18878 299e7c 18875->18878 18879 299eca 18875->18879 18880 299eba 18875->18880 18877 273330 2 API calls 18876->18877 18881 299f7b 18877->18881 18883 2a3672 std::_Facet_Register 2 API calls 18878->18883 18884 2a3672 std::_Facet_Register 2 API calls 18879->18884 18889 299e9a std::locale::_Locimp::_Locimp 18879->18889 18880->18878 18880->18881 18882 272b50 Concurrency::cancel_current_task 2 API calls 18881->18882 18885 299f80 18882->18885 18886 299e8f 18883->18886 18884->18889 18887 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 18885->18887 18886->18885 18886->18889 18888 299f85 18887->18888 18890 2977d0 RtlAllocateHeap 18889->18890 18891 299f47 18890->18891 18891->18866 18893 291443 18892->18893 18894 291471 18893->18894 18895 299e20 2 API calls 18893->18895 18894->18872 18895->18894 18897 2901f0 18896->18897 18898 299e20 2 API calls 18897->18898 18899 290260 18897->18899 18898->18897 18899->18869 18901 291430 2 API calls 18900->18901 18903 2908fc 18901->18903 18902 29090a 18902->18869 18903->18902 18904 299e20 2 API calls 18903->18904 18905 290995 18903->18905 18904->18903 18905->18902 18906 299e20 RtlAllocateHeap RtlAllocateHeap 18905->18906 18906->18905 18908 28ec6d 18907->18908 18909 287ef0 2 API calls 18908->18909 18910 28ec8d 18909->18910 19012 2916c0 18910->19012 18912 28ecdf 18912->18741 18914 28ee46 18913->18914 18939 28ef1f std::ios_base::_Ios_base_dtor 18913->18939 18915 28f425 18914->18915 18918 28e8a0 2 API calls 18914->18918 18922 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 18915->18922 18916 288f00 std::_Throw_Cpp_error 2 API calls 18917 28ef5b 18916->18917 18919 28ef6a 18917->18919 18928 28f191 18917->18928 18920 28ee79 18918->18920 18921 28f440 3 API calls 18919->18921 18924 288f00 std::_Throw_Cpp_error 2 API calls 18920->18924 18925 28ef79 18921->18925 18923 28f42f 18922->18923 18926 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 18923->18926 18927 28ee93 18924->18927 18934 273040 std::_Throw_Cpp_error 2 API calls 18925->18934 18929 28f434 18926->18929 18930 288f00 std::_Throw_Cpp_error 2 API calls 18927->18930 18928->18928 18931 273040 std::_Throw_Cpp_error 2 API calls 18928->18931 18932 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 18929->18932 18933 28eee3 18930->18933 18935 28f1c9 18931->18935 18958 28f375 std::ios_base::_Ios_base_dtor 18932->18958 18933->18915 18933->18939 18936 28efba 18934->18936 18937 28fbf0 2 API calls 18935->18937 18940 288f00 std::_Throw_Cpp_error 2 API calls 18936->18940 18941 28f1e0 18937->18941 18938 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 18942 28f43e 18938->18942 18939->18916 18943 28efcd 18940->18943 18945 288f00 std::_Throw_Cpp_error 2 API calls 18941->18945 18944 28e710 2 API calls 18943->18944 18946 28f019 18944->18946 18950 28f22f std::ios_base::_Ios_base_dtor 18945->18950 18947 288f00 std::_Throw_Cpp_error 2 API calls 18946->18947 18948 28f032 18947->18948 18949 288f00 std::_Throw_Cpp_error 2 API calls 18948->18949 18952 28f081 std::ios_base::_Ios_base_dtor 18949->18952 18950->18929 18953 28f161 std::ios_base::_Ios_base_dtor 18950->18953 18951 273040 std::_Throw_Cpp_error 2 API calls 18954 28f30c 18951->18954 18952->18923 18952->18953 18953->18951 18959 28f3f2 std::ios_base::_Ios_base_dtor 18953->18959 18955 28fbf0 2 API calls 18954->18955 18956 28f323 18955->18956 18957 288f00 std::_Throw_Cpp_error 2 API calls 18956->18957 18957->18958 18958->18938 18958->18959 18959->18756 19081 274e30 18960->19081 18963 274e30 2 API calls 18964 27762b 18963->18964 18965 28ace0 2 API calls 18964->18965 18966 277640 18965->18966 18967 28abb0 2 API calls 18966->18967 18968 277656 18967->18968 18969 28e710 2 API calls 18968->18969 18971 27766d std::ios_base::_Ios_base_dtor 18969->18971 18970 277a09 18972 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 18970->18972 18971->18970 18974 27770a std::ios_base::_Ios_base_dtor 18971->18974 18973 277a0e 18972->18973 18975 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 18973->18975 18977 277350 2 API calls 18974->18977 18976 277a13 18975->18976 18978 2777a4 18977->18978 18979 288f00 std::_Throw_Cpp_error 2 API calls 18978->18979 18980 2777b9 18979->18980 18981 28e710 2 API calls 18980->18981 18982 27780c 18981->18982 18983 288f00 std::_Throw_Cpp_error 2 API calls 18982->18983 18984 277828 18983->18984 18985 28ad80 2 API calls 18984->18985 18986 277879 std::ios_base::_Ios_base_dtor 18985->18986 18986->18973 18987 277975 std::ios_base::_Ios_base_dtor 18986->18987 18988 2772b0 2 API calls 18987->18988 18989 2779ca 18988->18989 18989->18764 18991 28f630 18990->18991 18997 28f4c9 std::ios_base::_Ios_base_dtor std::locale::_Locimp::_Locimp 18990->18997 18991->18770 18993 28f647 18995 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 18993->18995 18994 2732d0 std::_Throw_Cpp_error 2 API calls 18994->18997 18998 28f651 18995->18998 18996 288f00 std::_Throw_Cpp_error 2 API calls 18996->18997 18997->18991 18997->18993 18997->18994 18997->18996 19085 2734a0 18997->19085 18998->18770 19000 2a4b78 ___std_exception_destroy RtlAllocateHeap 18999->19000 19001 277a61 19000->19001 19002 2a4b78 ___std_exception_destroy RtlAllocateHeap 19001->19002 19003 277a77 19002->19003 19003->18787 19005 2835d1 19004->19005 19006 2835f1 std::ios_base::_Ios_base_dtor 19004->19006 19005->19006 19007 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 19005->19007 19006->18773 19008 283625 19007->19008 19008->18773 19092 286590 19009->19092 19015 2917d0 19012->19015 19014 2916da std::locale::_Setgloballocale 19014->18912 19016 291809 19015->19016 19022 291838 19015->19022 19017 291923 19016->19017 19020 29181b 19016->19020 19032 291990 19017->19032 19020->19022 19023 299f90 19020->19023 19022->19014 19024 29a0a3 19023->19024 19025 299fc2 19023->19025 19026 273330 2 API calls 19024->19026 19042 29d190 19025->19042 19030 29a000 std::locale::_Locimp::_Locimp 19026->19030 19028 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 19029 29a0ad 19028->19029 19030->19028 19031 29a05f std::ios_base::_Ios_base_dtor 19030->19031 19031->19022 19033 2a1cea 2 API calls 19032->19033 19035 29199a 19033->19035 19034 291928 19035->19034 19036 272cf0 std::_Throw_Cpp_error 2 API calls 19035->19036 19037 291a03 19036->19037 19038 28ace0 2 API calls 19037->19038 19039 291a18 19038->19039 19050 277cf0 19039->19050 19041 291a2d std::_Throw_Cpp_error 19043 29d1d9 19042->19043 19044 29d199 19042->19044 19043->19043 19044->19043 19045 29d1b0 19044->19045 19046 2a3672 std::_Facet_Register 2 API calls 19044->19046 19047 2a3672 std::_Facet_Register 2 API calls 19045->19047 19049 29d1b9 19045->19049 19046->19045 19048 29d1d2 19047->19048 19048->19030 19049->19030 19051 277350 2 API calls 19050->19051 19052 277d80 19051->19052 19053 28ad80 2 API calls 19052->19053 19054 277d94 19053->19054 19055 277dcd std::ios_base::_Ios_base_dtor 19054->19055 19057 277e33 19054->19057 19056 2772b0 2 API calls 19055->19056 19058 277dfd 19056->19058 19059 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 19057->19059 19058->19041 19060 277e38 19059->19060 19061 277350 2 API calls 19060->19061 19062 277ece 19061->19062 19063 28ad80 2 API calls 19062->19063 19064 277ee2 19063->19064 19065 277f1b std::ios_base::_Ios_base_dtor 19064->19065 19067 277f81 19064->19067 19066 2772b0 2 API calls 19065->19066 19068 277f4b 19066->19068 19069 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 19067->19069 19068->19041 19070 277f86 19069->19070 19071 277350 2 API calls 19070->19071 19072 278029 19071->19072 19073 28ad80 2 API calls 19072->19073 19074 27803d 19073->19074 19075 278076 std::ios_base::_Ios_base_dtor 19074->19075 19077 2780df 19074->19077 19076 2772b0 2 API calls 19075->19076 19078 2780aa 19076->19078 19079 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 19077->19079 19078->19041 19080 2780e4 19079->19080 19080->19041 19082 274e66 19081->19082 19082->19082 19083 274ea8 19082->19083 19084 273040 std::_Throw_Cpp_error 2 API calls 19082->19084 19083->18963 19084->19083 19088 273380 19085->19088 19089 273399 19088->19089 19090 2b0dd7 2 API calls 19089->19090 19091 2733a7 19090->19091 19091->18997 19093 2a4b15 ___std_exception_copy 2 API calls 19092->19093 19094 2865ce 19093->19094 19095 2a4b15 ___std_exception_copy 2 API calls 19094->19095 19096 286601 19095->19096 19096->18765 19098 2c8e17 19097->19098 19102 2c8c08 19097->19102 19098->17617 19100 2c8d38 std::locale::_Setgloballocale 19100->19098 19101 273130 2 API calls 19100->19101 19101->19100 19102->19100 19104 2a87b0 19102->19104 19113 273130 19102->19113 19105 2a87e3 19104->19105 19109 2a87c7 19104->19109 19106 2b9e42 __Getctype RtlAllocateHeap 19105->19106 19107 2a87e8 19106->19107 19108 2ba12d __Getctype RtlAllocateHeap 19107->19108 19110 2a87f8 19108->19110 19109->19102 19110->19109 19111 2b9a39 2 API calls 19110->19111 19112 2a882a 19111->19112 19112->19102 19114 2732b3 19113->19114 19115 27316f 19113->19115 19116 273330 2 API calls 19114->19116 19117 273189 19115->19117 19119 2731d7 19115->19119 19120 2731c7 19115->19120 19118 2732b8 19116->19118 19122 2a3672 std::_Facet_Register 2 API calls 19117->19122 19121 272b50 Concurrency::cancel_current_task 2 API calls 19118->19121 19123 2a3672 std::_Facet_Register 2 API calls 19119->19123 19126 27319c std::locale::_Locimp::_Locimp 19119->19126 19120->19117 19120->19118 19121->19126 19122->19126 19123->19126 19124 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 19125 2732c2 19124->19125 19126->19124 19127 27326b std::ios_base::_Ios_base_dtor 19126->19127 19127->19102 19129 2a3077 19128->19129 19130 2a364d GetSystemTimePreciseAsFileTime 19128->19130 19129->17267 19130->19129 19327 51209a4 19328 51209db 19327->19328 19329 5120b06 2 API calls 19328->19329 19330 5120afd GetCurrentHwProfileW 19329->19330 19332 5120c7f 19330->19332

                                  Control-flow Graph

                                  APIs
                                  • setsockopt.WS2_32(000003F0,0000FFFF,00001006,?,00000008), ref: 00337BA7
                                  • recv.WS2_32(?,00000004,00000002), ref: 00337BC1
                                  • recv.WS2_32(00000000,0000000C,00000002,00000000), ref: 00337C43
                                  • recv.WS2_32(00000000,0000000C,00000008), ref: 00337C64
                                    • Part of subcall function 00338590: WSAStartup.WS2_32 ref: 003385BB
                                    • Part of subcall function 00338590: socket.WS2_32(?,?,?,?,?,?,003F9328,?,?), ref: 0033865E
                                    • Part of subcall function 00338590: connect.WS2_32(00000000,003C9BFC,?,?,?,?,003F9328,?,?), ref: 00338671
                                    • Part of subcall function 00338590: closesocket.WS2_32(00000000), ref: 0033867D
                                  • recv.WS2_32(00000000,?,00000008), ref: 00337D1B
                                  • recv.WS2_32(?,00000004,00000008), ref: 00337E23
                                  • __Xtime_get_ticks.LIBCPMT ref: 00337E2A
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00337E38
                                  • Sleep.KERNELBASE(00000001,00000000,?,00002710,00000000), ref: 00337EB1
                                  • Sleep.KERNELBASE(00000064,?,00002710,00000000), ref: 00337EB9
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3452978591.0000000000271000.00000040.00000001.01000000.00000005.sdmp, Offset: 00270000, based on PE: true
                                  • Associated: 00000005.00000002.3452809333.0000000000270000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3452978591.00000000003F5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454063388.00000000003FA000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000003FD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.000000000066A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006A6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006AD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006BC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455564770.00000000006BD000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455818468.000000000085A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455864962.000000000085B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455913213.000000000085C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455961682.000000000085D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_270000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: recv$Sleep$StartupUnothrow_t@std@@@Xtime_get_ticks__ehfuncinfo$??2@closesocketconnectsetsockoptsocket
                                  • String ID:
                                  • API String ID: 56803616-0
                                  • Opcode ID: 14f113aa81b4e7c886033d4d6ca81b59a8173493ab5170a4592fda14dab2fb7b
                                  • Instruction ID: 79d5830eb69932ce1b7bddb492c0f900a9758d58ec73ff338faaef2ec9fbbe9e
                                  • Opcode Fuzzy Hash: 14f113aa81b4e7c886033d4d6ca81b59a8173493ab5170a4592fda14dab2fb7b
                                  • Instruction Fuzzy Hash: 9BB1ABB0D04348DFEB22DBA8CD89BADBBB5BF45300F204259E554AB2D2D7B45D84CB91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 58 338590-3385c2 WSAStartup 59 338696-33869f 58->59 60 3385c8-3385f2 call 35a420 * 2 58->60 65 3385f4-3385f8 60->65 66 3385fe-338644 60->66 65->59 65->66 68 338690 66->68 69 338646-33864c 66->69 68->59 70 3386a4-3386ae 69->70 71 33864e 69->71 70->68 77 3386b0-3386b8 70->77 72 338654-338668 socket 71->72 72->68 73 33866a-33867a connect 72->73 75 3386a0 73->75 76 33867c-338684 closesocket 73->76 75->70 76->72 78 338686-33868a 76->78 78->68
                                  APIs
                                  • WSAStartup.WS2_32 ref: 003385BB
                                  • socket.WS2_32(?,?,?,?,?,?,003F9328,?,?), ref: 0033865E
                                  • connect.WS2_32(00000000,003C9BFC,?,?,?,?,003F9328,?,?), ref: 00338671
                                  • closesocket.WS2_32(00000000), ref: 0033867D
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3452978591.0000000000271000.00000040.00000001.01000000.00000005.sdmp, Offset: 00270000, based on PE: true
                                  • Associated: 00000005.00000002.3452809333.0000000000270000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3452978591.00000000003F5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454063388.00000000003FA000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000003FD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.000000000066A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006A6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006AD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006BC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455564770.00000000006BD000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455818468.000000000085A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455864962.000000000085B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455913213.000000000085C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455961682.000000000085D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_270000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: Startupclosesocketconnectsocket
                                  • String ID:
                                  • API String ID: 3098855095-0
                                  • Opcode ID: 32a973d9115589d8f794e4965f7acdc38b932b3f7d10cb142f753f0f56468da0
                                  • Instruction ID: a70202a66f05c70aa626a12c30ac4a8c4570a3aeb78805a11bd364363075c3ad
                                  • Opcode Fuzzy Hash: 32a973d9115589d8f794e4965f7acdc38b932b3f7d10cb142f753f0f56468da0
                                  • Instruction Fuzzy Hash: A331F5726057005BD7218F248C85B6BB7E5EFCA734F114F1AFAA8A22D0D774990486A3

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 79 279280-2792dd call 2863b0 82 279413-279521 call 272df0 call 35a420 79->82 83 2792e3-2792e9 79->83 99 279537-27953f call 288dc0 82->99 100 279523-279535 82->100 84 2792f0-279313 83->84 86 279315-27931f 84->86 87 279324-279331 84->87 89 279403-279406 86->89 90 279333-27933d 87->90 91 279342-27934f 87->91 93 279409-27940d 89->93 90->89 94 279351-27935b 91->94 95 279360-27936d 91->95 93->82 93->84 94->89 97 27936f-279379 95->97 98 27937e-27938b 95->98 97->89 102 27938d-279397 98->102 103 279399-2793a6 98->103 104 279544-279597 call 35a420 * 2 99->104 100->104 102->89 105 2793b4-2793c1 103->105 106 2793a8-2793b2 103->106 116 2795cb-2795e1 call 35a420 104->116 117 279599-2795c8 call 35a420 call 2a5270 104->117 108 2793c3-2793cd 105->108 109 2793cf-2793dc 105->109 106->89 108->89 111 2793de-2793e8 109->111 112 2793ea-2793f4 109->112 111->89 112->93 115 2793f6-2793ff 112->115 115->89 123 2795e7-2795ed 116->123 124 2796e2 116->124 117->116 127 2795f0-2796ce WSASend 123->127 125 2796e6-2796f0 124->125 128 2796f2-2796fe 125->128 129 27971e-27973d 125->129 145 2796d4-2796dc 127->145 146 27975f-279763 127->146 131 279714-27971b call 2a38f3 128->131 132 279700-27970e 128->132 133 27976f-279796 129->133 134 27973f-27974b 129->134 131->129 132->131 135 279797-2797fe call 2a8c70 call 272df0 * 2 132->135 137 279765-27976c call 2a38f3 134->137 138 27974d-27975b 134->138 137->133 138->135 143 27975d 138->143 143->137 145->124 145->127 146->125
                                  APIs
                                  • WSASend.WS2_32(?,?,00000001,00000000,00000000,00000000,00000000,?,?,?,?,003BD15C,00000000,74D723A0,-003F9880), ref: 002796C9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3452978591.0000000000271000.00000040.00000001.01000000.00000005.sdmp, Offset: 00270000, based on PE: true
                                  • Associated: 00000005.00000002.3452809333.0000000000270000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3452978591.00000000003F5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454063388.00000000003FA000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000003FD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.000000000066A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006A6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006AD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006BC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455564770.00000000006BD000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455818468.000000000085A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455864962.000000000085B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455913213.000000000085C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455961682.000000000085D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_270000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: Send
                                  • String ID: Ws2_32.dll
                                  • API String ID: 121738739-3093949381
                                  • Opcode ID: 7cbbce373a54b8f581c6d27f73a0cd94aef6f16dee24c1a6f386610572d3f3cb
                                  • Instruction ID: d947ec1e1ae461ec64a80fce01356de9ff068c374343f5e4c19a03cb55a6e028
                                  • Opcode Fuzzy Hash: 7cbbce373a54b8f581c6d27f73a0cd94aef6f16dee24c1a6f386610572d3f3cb
                                  • Instruction Fuzzy Hash: 7902E1B0D14398DFDF25CF98C8907ADBBB0EF55314F248289E4496B286D7701986CF92

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 152 5120b59-5120b5b 153 5120b67-5120b6a 152->153 154 5120b5d 152->154 155 5120b6c-5120c00 153->155 156 5120af7-5120b54 call 5120b06 154->156 157 5120b5f-5120b63 154->157 169 5120c18-5120c1a 155->169 156->155 157->153 170 5120bf3-5120c00 169->170 171 5120c1c-5120c46 169->171 170->169 174 5120c51-5120c71 GetCurrentHwProfileW 171->174 176 5120c7f-5120f13 call 5120d83 174->176
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 05120C6A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3462685148.0000000005120000.00000040.00001000.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5120000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID: `
                                  • API String ID: 2104809126-2679148245
                                  • Opcode ID: afcbd00c150307c315d38a3774bce0544d21aa1097ff953a785d6d2907d76780
                                  • Instruction ID: 7369367a14009c7bd50e6e48bc79ed53a78a4ecbcb8e29ece80385635642f68d
                                  • Opcode Fuzzy Hash: afcbd00c150307c315d38a3774bce0544d21aa1097ff953a785d6d2907d76780
                                  • Instruction Fuzzy Hash: 0E614AFF50C234AEA22AC1555B58AF76B6FDACB730331867BF407C6602E3950EA95131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 207 5120bc6-5120bde 208 5120be0-5120be9 207->208 209 5120bc9-5120bdf 207->209 211 5120bea-5120c00 208->211 209->211 213 5120c18-5120c1a 211->213 214 5120bf3-5120c00 213->214 215 5120c1c-5120c46 213->215 214->213 218 5120c51-5120c71 GetCurrentHwProfileW 215->218 220 5120c7f-5120f13 call 5120d83 218->220
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 05120C6A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3462685148.0000000005120000.00000040.00001000.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5120000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID: `
                                  • API String ID: 2104809126-2679148245
                                  • Opcode ID: 99471bc266c498a5cd55cf998ba26f086b04bb8f9970b20d8fac063174352479
                                  • Instruction ID: e93814bfaaa3ae6c3ec97637be4f0c68374fbb672af37281382c01fd95c1b294
                                  • Opcode Fuzzy Hash: 99471bc266c498a5cd55cf998ba26f086b04bb8f9970b20d8fac063174352479
                                  • Instruction Fuzzy Hash: F741E5FF20C234AEB22AC1452B58AF7676FD6CA7303328676F407D6606E3850EE91131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 251 5120987-51209b5 call 51209b6 256 5120a07-5120a0f 251->256 257 51209b7-51209fb 251->257 259 5120a11-5120a15 256->259 260 5120a16-5120a1e 256->260 257->259 261 5120a20-5120c00 call 5120b06 259->261 260->261 284 5120c18-5120c1a 261->284 285 5120bf3-5120c00 284->285 286 5120c1c-5120c46 284->286 285->284 289 5120c51-5120c71 GetCurrentHwProfileW 286->289 291 5120c7f-5120f13 call 5120d83 289->291
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3462685148.0000000005120000.00000040.00001000.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5120000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5c660454424f389c403eaa24826d4240eb034ce3c2c9c7674b4cdac228f31564
                                  • Instruction ID: ed6b0b07ab18d9bc167f3e3bbe756ddcf611f3ce52a91d9264731eba2ac9d050
                                  • Opcode Fuzzy Hash: 5c660454424f389c403eaa24826d4240eb034ce3c2c9c7674b4cdac228f31564
                                  • Instruction Fuzzy Hash: 2981EBFB10D134BEB22AC1456B58AF7676FD6CE730732866BF407D6602E3940EA95132

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 322 5120991-51209b5 call 51209b6 327 5120a07-5120a0f 322->327 328 51209b7-51209fb 322->328 330 5120a11-5120a15 327->330 331 5120a16-5120a1e 327->331 328->330 332 5120a20-5120c00 call 5120b06 330->332 331->332 355 5120c18-5120c1a 332->355 356 5120bf3-5120c00 355->356 357 5120c1c-5120c46 355->357 356->355 360 5120c51-5120c71 GetCurrentHwProfileW 357->360 362 5120c7f-5120f13 call 5120d83 360->362
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3462685148.0000000005120000.00000040.00001000.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5120000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d1adcea4cc2ba1d2575c468a8115a1fad894433624707c73022e26db8e043fd3
                                  • Instruction ID: 10232dc1ff873dcfa57506a09b9b49069dd7b8b45cc27103eb3ab65fd5fc2479
                                  • Opcode Fuzzy Hash: d1adcea4cc2ba1d2575c468a8115a1fad894433624707c73022e26db8e043fd3
                                  • Instruction Fuzzy Hash: F271E8FB10D134BDB22AC1456B58AF7676FD6CE7307328667F407D6602E3940EA95131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 393 51209a4-5120c00 call 5120b06 419 5120c18-5120c1a 393->419 420 5120bf3-5120c00 419->420 421 5120c1c-5120c46 419->421 420->419 424 5120c51-5120c71 GetCurrentHwProfileW 421->424 426 5120c7f-5120f13 call 5120d83 424->426
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3462685148.0000000005120000.00000040.00001000.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5120000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: ea83ffd3b51e30d8ece721e91fe2921bf33e2f73bbc22343f6d09b46b55400c2
                                  • Instruction ID: 9aa67baef5bc6f5cb531f6c976bcfaa086756387a59fdf22595f27f34d9b69af
                                  • Opcode Fuzzy Hash: ea83ffd3b51e30d8ece721e91fe2921bf33e2f73bbc22343f6d09b46b55400c2
                                  • Instruction Fuzzy Hash: 6871D8EF10D134BEB22AC1456B58AFB676FD6CE7307328667F407D6502E3940EA95131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 457 51209b6-5120c00 call 5120b06 483 5120c18-5120c1a 457->483 484 5120bf3-5120c00 483->484 485 5120c1c-5120c46 483->485 484->483 488 5120c51-5120c71 GetCurrentHwProfileW 485->488 490 5120c7f-5120f13 call 5120d83 488->490
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3462685148.0000000005120000.00000040.00001000.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5120000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 0ad1193482162a73c87a3165f543d2853a01a87c50706101220241ed0fc210d6
                                  • Instruction ID: dd35ef712c3d51cc458f87d136afc5381029035bc78dd1f64bd13124a1ed6073
                                  • Opcode Fuzzy Hash: 0ad1193482162a73c87a3165f543d2853a01a87c50706101220241ed0fc210d6
                                  • Instruction Fuzzy Hash: 2371C6EF10D134BDB22AC1456B58AF7676FD6CE7307328667F407D6602E3940EA91131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 521 51209c7-5120c00 call 5120b06 546 5120c18-5120c1a 521->546 547 5120bf3-5120c00 546->547 548 5120c1c-5120c46 546->548 547->546 551 5120c51-5120c71 GetCurrentHwProfileW 548->551 553 5120c7f-5120f13 call 5120d83 551->553
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3462685148.0000000005120000.00000040.00001000.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5120000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: dc913795c2686aeca4c95f53616664958c73769b9bae882e5040306023a70ba8
                                  • Instruction ID: c665f637166eecf403dc5e18c44a3d93b64d6238e5eb273ee830738d1ffa968e
                                  • Opcode Fuzzy Hash: dc913795c2686aeca4c95f53616664958c73769b9bae882e5040306023a70ba8
                                  • Instruction Fuzzy Hash: 3171D6FF10D134BEB22AC1456B58AFB676FD6CE7307328666F407D6602E3940EA95131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 584 51209e4-5120c00 call 5120b06 609 5120c18-5120c1a 584->609 610 5120bf3-5120c00 609->610 611 5120c1c-5120c46 609->611 610->609 614 5120c51-5120c71 GetCurrentHwProfileW 611->614 616 5120c7f-5120f13 call 5120d83 614->616
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3462685148.0000000005120000.00000040.00001000.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5120000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: a7ed9558f91e59e1679df90c2f40c8f45fea682a5ee3b71eea52827a49f6e5d1
                                  • Instruction ID: 83860948f4c0bf5bdd5c7d96b5ce461b7e563db467bfae39e677f2dcddc17a53
                                  • Opcode Fuzzy Hash: a7ed9558f91e59e1679df90c2f40c8f45fea682a5ee3b71eea52827a49f6e5d1
                                  • Instruction Fuzzy Hash: B471D6FB10D134BEB22AC1456B58AFB676FD6CE7307328666F407D6602E3940EA91131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 647 5120a00-5120a05 648 5120a07-5120a0f 647->648 649 5120a7e-5120c00 call 5120b06 647->649 651 5120a11-5120a15 648->651 652 5120a16-5120a1e 648->652 673 5120c18-5120c1a 649->673 653 5120a20-5120a7c 651->653 652->653 653->649 674 5120bf3-5120c00 673->674 675 5120c1c-5120c46 673->675 674->673 678 5120c51-5120c71 GetCurrentHwProfileW 675->678 680 5120c7f-5120f13 call 5120d83 678->680
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3462685148.0000000005120000.00000040.00001000.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5120000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 37ab7202d3358aeeee40e3d110efc462f5ffb1b2a75a44eb7e19c98db555c947
                                  • Instruction ID: 57f926bdb52a2fd0e75ae3a5695f9ac189bd630ccb983d6c1aefcdbfda3e8f69
                                  • Opcode Fuzzy Hash: 37ab7202d3358aeeee40e3d110efc462f5ffb1b2a75a44eb7e19c98db555c947
                                  • Instruction Fuzzy Hash: 6071F6FB20D134BEB22AC1456B58AFB676FD6CE7307328667F407D6602E3940EA95131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 711 5120a2e-5120c00 call 5120b06 733 5120c18-5120c1a 711->733 734 5120bf3-5120c00 733->734 735 5120c1c-5120c46 733->735 734->733 738 5120c51-5120c71 GetCurrentHwProfileW 735->738 740 5120c7f-5120f13 call 5120d83 738->740
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3462685148.0000000005120000.00000040.00001000.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5120000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 6c6187d2533b2c7316192b49b58811b18cd784abac7f09519cbf37433903f28d
                                  • Instruction ID: 5815efdd37dc2c4f243616ba4695cf260ed1307869bb180f139f3eb6be0b7688
                                  • Opcode Fuzzy Hash: 6c6187d2533b2c7316192b49b58811b18cd784abac7f09519cbf37433903f28d
                                  • Instruction Fuzzy Hash: 8561E8FF50C134BEB22AC1456B58AF76B6FD6CE7307328A66F407D6602E3944EA91131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 771 5120a1a-5120c00 call 5120b06 794 5120c18-5120c1a 771->794 795 5120bf3-5120c00 794->795 796 5120c1c-5120c46 794->796 795->794 799 5120c51-5120c71 GetCurrentHwProfileW 796->799 801 5120c7f-5120f13 call 5120d83 799->801
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3462685148.0000000005120000.00000040.00001000.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5120000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 8a96e218cae7c5d78138dfa576109762fd4c92a388ca15072d604ee9d3b523ab
                                  • Instruction ID: dd11eb704315c894b902bfaabd49060162dd17930163c80d4808e97b87dca0eb
                                  • Opcode Fuzzy Hash: 8a96e218cae7c5d78138dfa576109762fd4c92a388ca15072d604ee9d3b523ab
                                  • Instruction Fuzzy Hash: 2961D6FF20C134BEB22AC1456B58AFB676FD6CE7307328666F407D6602E3944EA95131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 832 5120a76-5120a77 833 5120a37-5120a6e 832->833 834 5120a79-5120a7b 832->834 836 5120a7c-5120c00 call 5120b06 833->836 834->836 855 5120c18-5120c1a 836->855 856 5120bf3-5120c00 855->856 857 5120c1c-5120c46 855->857 856->855 860 5120c51-5120c71 GetCurrentHwProfileW 857->860 862 5120c7f-5120f13 call 5120d83 860->862
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3462685148.0000000005120000.00000040.00001000.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5120000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a87021c8081d31026481d4178d29bad1ccd1eba689011ef52c7b68df888abc46
                                  • Instruction ID: a64dbe0820e2da176797b6c770239dc524dc767629fe2a97977a55b61f742376
                                  • Opcode Fuzzy Hash: a87021c8081d31026481d4178d29bad1ccd1eba689011ef52c7b68df888abc46
                                  • Instruction Fuzzy Hash: DF7109FB10C234AEB22AC1456B58AF76B6FDACA7307328577F407C6602E3940EA95131
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3462685148.0000000005120000.00000040.00001000.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5120000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 235e976d7ac00c8d6009aeefa420970c08095a56912f2c02f9237f80b41d8ccc
                                  • Instruction ID: 56752758a872e9d99d10b3fa92dd2a46efb6b55a371f51b42c8419f46b1e4f72
                                  • Opcode Fuzzy Hash: 235e976d7ac00c8d6009aeefa420970c08095a56912f2c02f9237f80b41d8ccc
                                  • Instruction Fuzzy Hash: F36109FF10C234BEB22AC1456B58AF7676FD6CE7307328666F407D6602E3940EA91131
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3462685148.0000000005120000.00000040.00001000.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5120000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f969ab653bf0b362b3f767c7622ff7fc75eba00d365a177da24b2f0a0a447b09
                                  • Instruction ID: 6c34b00d8f6e850877992eed32b0afffcdf37840ed2bd7a34d29bdc73ff09a4b
                                  • Opcode Fuzzy Hash: f969ab653bf0b362b3f767c7622ff7fc75eba00d365a177da24b2f0a0a447b09
                                  • Instruction Fuzzy Hash: C6611AFB50C134AEB22AC1456B58AF76B6FDACA330731857AF407D6602D3944EA95131
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3462685148.0000000005120000.00000040.00001000.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5120000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 12ce7e660f62905dbc5a1e76a2e44e6e120db6a7898d999dfdc87529c4982e8e
                                  • Instruction ID: df40bce63bb37aef84b3fc32f7e13ae1cce5204ac50a75a67cd5be33c3cd5126
                                  • Opcode Fuzzy Hash: 12ce7e660f62905dbc5a1e76a2e44e6e120db6a7898d999dfdc87529c4982e8e
                                  • Instruction Fuzzy Hash: C05107EF50C234BEB22AC1456B58AF76B6FE6CE7307318666F407D6602E3940EA95131
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3462685148.0000000005120000.00000040.00001000.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5120000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 1bdb092ac4a0ea8b23e771ab77dfa9efc1a2ca28c1754caa5ea974db7a4d5a53
                                  • Instruction ID: e9c7f6fcbae77cd9e51b056ec224e8933aef04d010d383cc355d8a02cda71763
                                  • Opcode Fuzzy Hash: 1bdb092ac4a0ea8b23e771ab77dfa9efc1a2ca28c1754caa5ea974db7a4d5a53
                                  • Instruction Fuzzy Hash: 5B51E7EF20C134BEB22AC1856B58AF7676FD7CE7307328666F407D6602E7950EA91131
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 05120C6A
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3462685148.0000000005120000.00000040.00001000.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5120000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 643f8efe1e48572533770b6c706a05f076de8452f0566bbd9fab65e37547c353
                                  • Instruction ID: fd69a68dd8d670df0e24fed339d18dd0f879f92da1f456c02bc4757d2563b5d5
                                  • Opcode Fuzzy Hash: 643f8efe1e48572533770b6c706a05f076de8452f0566bbd9fab65e37547c353
                                  • Instruction Fuzzy Hash: 6551F9EF50C134BEB22AC1852B58AF7676FE6CE7307328667F407D6602E3950EA91131
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 05120C6A
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3462685148.0000000005120000.00000040.00001000.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5120000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 15758137bd28468b8062c8236f45e99bb33a2f263ecb94736b743d4eee0cc1f4
                                  • Instruction ID: 5b042a861eb40fdf78f53268c6e7f69da38901130ec48fba3e61cbe90fc0dd82
                                  • Opcode Fuzzy Hash: 15758137bd28468b8062c8236f45e99bb33a2f263ecb94736b743d4eee0cc1f4
                                  • Instruction Fuzzy Hash: 0951E3FF64C134BEB26AC1856B58AF7676FE6CE7303328666F407D6601E3940EA91131
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 05120C6A
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3462685148.0000000005120000.00000040.00001000.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5120000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 471dac8245715c237e5bb775f0fb77f1e27908bee5c9369a5099ae81b6de3e08
                                  • Instruction ID: b6b3f894a6759333e36d0fe4150e5c0677d0644c51ec080eda7a04da9244e6ef
                                  • Opcode Fuzzy Hash: 471dac8245715c237e5bb775f0fb77f1e27908bee5c9369a5099ae81b6de3e08
                                  • Instruction Fuzzy Hash: B651E4EF60C134BDB26AC0852B58AF7666FE7CA7307328676F40BD6601E7940EE91031
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 05120C6A
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3462685148.0000000005120000.00000040.00001000.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5120000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 9ad3a04cfe81df24a8a616bdbf357ba4562ee07d71350f22e5a3969f720922af
                                  • Instruction ID: f099e9efe20fb07a9fde16fb44b1333a1b75ad49f7801577e1b045627b0d138f
                                  • Opcode Fuzzy Hash: 9ad3a04cfe81df24a8a616bdbf357ba4562ee07d71350f22e5a3969f720922af
                                  • Instruction Fuzzy Hash: D05107EF50C134BD722AC1856B58AF76A5FE6CE7303328A67F40BD6601E3944EE91031
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 05120C6A
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3462685148.0000000005120000.00000040.00001000.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5120000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: f5839461aaf96e772fd8346df685ac26ddfdc5f17ac2e95f960279cedf1a1b31
                                  • Instruction ID: b3e503ec97a035c01b17b3e006486c349432f9629b9006d72b2ef268ae03a9a2
                                  • Opcode Fuzzy Hash: f5839461aaf96e772fd8346df685ac26ddfdc5f17ac2e95f960279cedf1a1b31
                                  • Instruction Fuzzy Hash: 7151D4EF50C134BD726AC0852B58AF7666FE6CE7307328667F407D6601E3940EA91031
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 05120C6A
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3462685148.0000000005120000.00000040.00001000.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5120000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: c1279ca06d3c7a2ff40e13f690e8c9d4813adaf8da27b53d375bed7b6932b2ed
                                  • Instruction ID: 6015406d3b8671df2efe2ef1acdf00bd1a028bb0e479fdadeeaa4357ee35608a
                                  • Opcode Fuzzy Hash: c1279ca06d3c7a2ff40e13f690e8c9d4813adaf8da27b53d375bed7b6932b2ed
                                  • Instruction Fuzzy Hash: 8741E9EF14D134BEB22AC1452B58AF76B6FD6CA7303328666F40BD6502D7840EE91131
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 05120C6A
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3462685148.0000000005120000.00000040.00001000.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5120000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 1f39ac5b85660d8dc1c0765f2717ab880ca5967ac335296ed959dee466f6d7c5
                                  • Instruction ID: f3b3590d6e265e58b0be0b9546c9e9d81ad495d710e006e4acfb804d2376ebf6
                                  • Opcode Fuzzy Hash: 1f39ac5b85660d8dc1c0765f2717ab880ca5967ac335296ed959dee466f6d7c5
                                  • Instruction Fuzzy Hash: F941E5EF10D134BEB22AC1452B58AF76B6FD6DA7303328A77F407D6606E7840EA91131
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 05120C6A
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3462685148.0000000005120000.00000040.00001000.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5120000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: b55bb3a004cf601447a9c1937b469cbce691a6379bc969f7ee2b3850465b79e5
                                  • Instruction ID: c4b5b36f779bb00bb4c2bd6d4a10a8b0fcdb2eb63c85d9a9244a004fdd64dbf7
                                  • Opcode Fuzzy Hash: b55bb3a004cf601447a9c1937b469cbce691a6379bc969f7ee2b3850465b79e5
                                  • Instruction Fuzzy Hash: EE41D5EF10D134AEB22AC1856B58AF76B6FD6CA7307328677F407D6606E7840EE91131
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 05120C6A
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3462685148.0000000005120000.00000040.00001000.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5120000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: b001a4483de140166dcc8834cc3d8d81ffd032af1b1abef336e991efafd4bf4b
                                  • Instruction ID: 6173dd140f0007ec0f22a5def8ac5fe3b53c2a0a8e0412e6d4c8018b993c9eb8
                                  • Opcode Fuzzy Hash: b001a4483de140166dcc8834cc3d8d81ffd032af1b1abef336e991efafd4bf4b
                                  • Instruction Fuzzy Hash: DB41B4EF10C134ADB22AC1852B58AF76B6FE6CA7307328666F40BD6506E7840EE91531
                                  APIs
                                  • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,?,?,?,?,?,?,?,00000000,?), ref: 002B990E
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3452978591.0000000000271000.00000040.00000001.01000000.00000005.sdmp, Offset: 00270000, based on PE: true
                                  • Associated: 00000005.00000002.3452809333.0000000000270000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3452978591.00000000003F5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454063388.00000000003FA000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000003FD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.000000000066A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006A6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006AD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006BC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455564770.00000000006BD000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455818468.000000000085A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455864962.000000000085B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455913213.000000000085C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455961682.000000000085D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_270000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: FileWrite
                                  • String ID:
                                  • API String ID: 3934441357-0
                                  • Opcode ID: 99070719ef2d93a0d84073d5d62ca4072f01224507306a20e9e34ce853210a82
                                  • Instruction ID: b2718675f68f62c82e11c92f690de0b762bf814f5fdb073358f3190e787a55d3
                                  • Opcode Fuzzy Hash: 99070719ef2d93a0d84073d5d62ca4072f01224507306a20e9e34ce853210a82
                                  • Instruction Fuzzy Hash: B861C8B1D2411ABFDF11CFA8C884EEEBFB9AF09344F140149EA00A7256D771D9A1CB60
                                  APIs
                                  • SetFilePointerEx.KERNELBASE(00000000,?,?,?,?,?,00000000,?,?,?,002B2626,?,?,?,?,?), ref: 002B2558
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3452978591.0000000000271000.00000040.00000001.01000000.00000005.sdmp, Offset: 00270000, based on PE: true
                                  • Associated: 00000005.00000002.3452809333.0000000000270000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3452978591.00000000003F5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454063388.00000000003FA000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000003FD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.000000000066A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006A6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006AD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006BC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455564770.00000000006BD000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455818468.000000000085A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455864962.000000000085B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455913213.000000000085C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455961682.000000000085D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_270000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: FilePointer
                                  • String ID:
                                  • API String ID: 973152223-0
                                  • Opcode ID: 56d213dbd91de9293ad3575466b4c9ec5c5aacf4fad093dafcfd666e5dc94b7e
                                  • Instruction ID: 28cc41648bdef4c2737e92d7cd6a63b5d2f2f93b2d847f29fc2976d8b4316546
                                  • Opcode Fuzzy Hash: 56d213dbd91de9293ad3575466b4c9ec5c5aacf4fad093dafcfd666e5dc94b7e
                                  • Instruction Fuzzy Hash: 6101DB32620615AFCF1D8F55DC258DE7B59DF85370F390104FC11AB1A1E671ED618B90
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0027331F
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3452978591.0000000000271000.00000040.00000001.01000000.00000005.sdmp, Offset: 00270000, based on PE: true
                                  • Associated: 00000005.00000002.3452809333.0000000000270000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3452978591.00000000003F5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454063388.00000000003FA000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000003FD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.000000000066A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006A6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006AD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006BC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455564770.00000000006BD000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455818468.000000000085A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455864962.000000000085B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455913213.000000000085C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455961682.000000000085D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_270000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID:
                                  • API String ID: 118556049-0
                                  • Opcode ID: 0fd589d96c9d07b1efa01aec19e4ff46bb0766daf2056f60d33bc81ca57302d3
                                  • Instruction ID: 0ac005857ee6407b8a2d41b35a0a975707a6a027ac5cba7ce810bafe7a2ed3a8
                                  • Opcode Fuzzy Hash: 0fd589d96c9d07b1efa01aec19e4ff46bb0766daf2056f60d33bc81ca57302d3
                                  • Instruction Fuzzy Hash: 0AF024325201019BDB28AF60E4055EAB3ECEF2436175048BBF88CC7612EF36DA609BC0
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000008,?,00000001,?,002B9FE0,00000001,00000364,00000001,00000006,000000FF,?,002A4B3F,?,?,74D723A0,?), ref: 002BA69B
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3452978591.0000000000271000.00000040.00000001.01000000.00000005.sdmp, Offset: 00270000, based on PE: true
                                  • Associated: 00000005.00000002.3452809333.0000000000270000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3452978591.00000000003F5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454063388.00000000003FA000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000003FD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.000000000066A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006A6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006AD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006BC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455564770.00000000006BD000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455818468.000000000085A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455864962.000000000085B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455913213.000000000085C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455961682.000000000085D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_270000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: fa80724fb86a737f60587e4f842d720a8a6cf01521e617fa1fd9710ae7941711
                                  • Instruction ID: d56e73f6becb651b15f7534a9c68faafa63a33a798b5cf801eab872cb1e006fd
                                  • Opcode Fuzzy Hash: fa80724fb86a737f60587e4f842d720a8a6cf01521e617fa1fd9710ae7941711
                                  • Instruction Fuzzy Hash: C3F0E9721315226A9F256E65DC01BEA374DAF417E0F1D8111EC14EB080CE30DC3089E6
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000000,00000001,?,?,002A4B3F,?,?,74D723A0,?,?,00273522,?,?), ref: 002BB0C6
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3452978591.0000000000271000.00000040.00000001.01000000.00000005.sdmp, Offset: 00270000, based on PE: true
                                  • Associated: 00000005.00000002.3452809333.0000000000270000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3452978591.00000000003F5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454063388.00000000003FA000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000003FD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.000000000066A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006A6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006AD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006BC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455564770.00000000006BD000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455818468.000000000085A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455864962.000000000085B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455913213.000000000085C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455961682.000000000085D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_270000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 63758fccaa53b7d7c601e5ac656ee40500893e6bfb15f8b6807af92025f41f0a
                                  • Instruction ID: 0b27abcd5bd83b549b13e4cd8bc30d64bf550bea58b72dd2972eb15100b5db86
                                  • Opcode Fuzzy Hash: 63758fccaa53b7d7c601e5ac656ee40500893e6bfb15f8b6807af92025f41f0a
                                  • Instruction Fuzzy Hash: F0E0653117162266DA333A659C11BFB764D9F413E0F550A11AC24A61D1DBE1DC3085A5
                                  APIs
                                  • CloseHandle.KERNELBASE(00000000,00000000,?,?,002B8CE6,00000000,?,003EA178,0000000C,002B8DA2,?,?,?), ref: 002B8E55
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3452978591.0000000000271000.00000040.00000001.01000000.00000005.sdmp, Offset: 00270000, based on PE: true
                                  • Associated: 00000005.00000002.3452809333.0000000000270000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3452978591.00000000003F5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454063388.00000000003FA000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000003FD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.000000000066A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006A6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006AD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006BC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455564770.00000000006BD000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455818468.000000000085A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455864962.000000000085B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455913213.000000000085C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455961682.000000000085D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_270000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CloseHandle
                                  • String ID:
                                  • API String ID: 2962429428-0
                                  • Opcode ID: bcd7e3ab3165c9db126017a0f9ceb983477c1614edbcf34d4c3153ad4c96f86f
                                  • Instruction ID: 63d03883b37eef07a3cb8f328999506f3057a08fbcade95fb7e014098ccfb278
                                  • Opcode Fuzzy Hash: bcd7e3ab3165c9db126017a0f9ceb983477c1614edbcf34d4c3153ad4c96f86f
                                  • Instruction Fuzzy Hash: 1E116B3363551016EA2936346845BFE679D4F827F4F2E0619F91C9B0D2DE70CCB1C151
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3462923073.0000000005130000.00000040.00001000.00020000.00000000.sdmp, Offset: 05130000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5130000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e5f4dd2ab8217461c42d2ae5d7289c9be39ab3483e6936d34e211358c6073517
                                  • Instruction ID: f2fadfbef8d1b30cc385629b82ba95c90075d146955f3b9e8e5e349bae1d6170
                                  • Opcode Fuzzy Hash: e5f4dd2ab8217461c42d2ae5d7289c9be39ab3483e6936d34e211358c6073517
                                  • Instruction Fuzzy Hash: 711133BB50C210BEF355C5856B69AFB67AED7DA730B32C867F842C6102E3954E095131
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3462923073.0000000005130000.00000040.00001000.00020000.00000000.sdmp, Offset: 05130000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5130000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a857232d736f85a66a1832c02a23902db1cb51d6d9d9c3b58379b5e9feeac741
                                  • Instruction ID: 0684471c9c76c62b901bf7c1e90bab090c7fa90db7002a762714d857c2f13c57
                                  • Opcode Fuzzy Hash: a857232d736f85a66a1832c02a23902db1cb51d6d9d9c3b58379b5e9feeac741
                                  • Instruction Fuzzy Hash: A9010CFB10C210BEB256C5866B29AFB67AED6CA730732C877F443C6102E3994E496135
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3462923073.0000000005130000.00000040.00001000.00020000.00000000.sdmp, Offset: 05130000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5130000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c6edd114cc425a1f6cd834a3131461c0090c1572afb12f7d71ccf6eb05c3004a
                                  • Instruction ID: 78ab25f82ed3c71838a89f1ee2e6b0d3107579d2221f981ceb747e1da21770dd
                                  • Opcode Fuzzy Hash: c6edd114cc425a1f6cd834a3131461c0090c1572afb12f7d71ccf6eb05c3004a
                                  • Instruction Fuzzy Hash: 31016DEB10C110BEF259C5817B69AFA67EED7CA730732886BF442C6002E3994A4E6135
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3462923073.0000000005130000.00000040.00001000.00020000.00000000.sdmp, Offset: 05130000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5130000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9f6534f6952a8fb0bb4fb196a1629708afeb8a1db10d7793e9f3deb6de2a6bec
                                  • Instruction ID: 706b839cf8c9f0b6ef6824250eb031b047eb158a1dbd59406cf49c1c96f70d85
                                  • Opcode Fuzzy Hash: 9f6534f6952a8fb0bb4fb196a1629708afeb8a1db10d7793e9f3deb6de2a6bec
                                  • Instruction Fuzzy Hash: 96011EBB50C210FDF255C5817B69AFA67AEE6CA730732C877F442C6102E3994A4E6131
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3462923073.0000000005130000.00000040.00001000.00020000.00000000.sdmp, Offset: 05130000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5130000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 960063879059c46c03703430b1ec710f7521893bf1a163f4eb7166ff2cb05a4c
                                  • Instruction ID: aaa72efec5d5c40e6d3d51f56207cddbde05e847c5413bfccd623bdfc4fcc95b
                                  • Opcode Fuzzy Hash: 960063879059c46c03703430b1ec710f7521893bf1a163f4eb7166ff2cb05a4c
                                  • Instruction Fuzzy Hash: 5AF074FB61C060BDB255C1923F69AFB57AEE5D5A31332C82BF802C5406E38A4B4E6131
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3462923073.0000000005130000.00000040.00001000.00020000.00000000.sdmp, Offset: 05130000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5130000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ef81aa83b8a1d2a9460415ad40216adff102e56114c4149225e6bc01649486c8
                                  • Instruction ID: 2c55ef5b712a426a082b9458cb4be83b3a77f220504a51fbe5819f070795432e
                                  • Opcode Fuzzy Hash: ef81aa83b8a1d2a9460415ad40216adff102e56114c4149225e6bc01649486c8
                                  • Instruction Fuzzy Hash: 8AE052BB20C120ADB115C0427F2AEFB67AED1D4A31332C827F402C5406E78A4A4E2032
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3462923073.0000000005130000.00000040.00001000.00020000.00000000.sdmp, Offset: 05130000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5130000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e54297b136d36747cc8e45f8e49578d3d209536e4268452955553f8afdcb2002
                                  • Instruction ID: dd044284457a96c647e57bd06cf6455877fd7ba2a66f11de631f3919cc8b0b7e
                                  • Opcode Fuzzy Hash: e54297b136d36747cc8e45f8e49578d3d209536e4268452955553f8afdcb2002
                                  • Instruction Fuzzy Hash: C1E01AB760C210DEF264C5923B3EAFA37ADF6D5730332C827F002C1405D749560A5135
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3452978591.0000000000271000.00000040.00000001.01000000.00000005.sdmp, Offset: 00270000, based on PE: true
                                  • Associated: 00000005.00000002.3452809333.0000000000270000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3452978591.00000000003F5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454063388.00000000003FA000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000003FD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.000000000066A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006A6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006AD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006BC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455564770.00000000006BD000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455818468.000000000085A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455864962.000000000085B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455913213.000000000085C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455961682.000000000085D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_270000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 333d4b6d5425d6f9d03797ee82114c3711da98524c03317fffdb5ec62fb2b380
                                  • Instruction ID: 80b3fa339f82122b0e9e544e827fcabe06d761cf03f4fdff635df8208b6c9988
                                  • Opcode Fuzzy Hash: 333d4b6d5425d6f9d03797ee82114c3711da98524c03317fffdb5ec62fb2b380
                                  • Instruction Fuzzy Hash: FE023C71E1121A9BDF14CFA9C9807AEFBB1FF49314F24826AD919E7340DB31A951CB90
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0028A09D
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0028A0BF
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0028A0E7
                                  • __Getctype.LIBCPMT ref: 0028A1C5
                                  • std::_Facet_Register.LIBCPMT ref: 0028A1F9
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0028A223
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3452978591.0000000000271000.00000040.00000001.01000000.00000005.sdmp, Offset: 00270000, based on PE: true
                                  • Associated: 00000005.00000002.3452809333.0000000000270000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3452978591.00000000003F5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454063388.00000000003FA000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000003FD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.000000000066A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006A6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006AD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006BC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455564770.00000000006BD000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455818468.000000000085A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455864962.000000000085B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455913213.000000000085C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455961682.000000000085D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_270000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetctypeRegister
                                  • String ID: PD'$PG'$E'
                                  • API String ID: 1102183713-296772504
                                  • Opcode ID: 60d84625269c321870243de85b1db2f6c70b5fe39c8d606c73e0e90eee090758
                                  • Instruction ID: eff3a569e27ae02317733a737fe9287f19c6946f03623e1f42262a434fcfa0a8
                                  • Opcode Fuzzy Hash: 60d84625269c321870243de85b1db2f6c70b5fe39c8d606c73e0e90eee090758
                                  • Instruction Fuzzy Hash: 3B51CAB4D11205CFDB12DF58C845BAEBBB4BB01710F14815AE845AB391DB74AE14CB92
                                  APIs
                                  • _ValidateLocalCookies.LIBCMT ref: 002A7307
                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 002A730F
                                  • _ValidateLocalCookies.LIBCMT ref: 002A7398
                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 002A73C3
                                  • _ValidateLocalCookies.LIBCMT ref: 002A7418
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3452978591.0000000000271000.00000040.00000001.01000000.00000005.sdmp, Offset: 00270000, based on PE: true
                                  • Associated: 00000005.00000002.3452809333.0000000000270000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3452978591.00000000003F5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454063388.00000000003FA000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000003FD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.000000000066A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006A6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006AD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006BC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455564770.00000000006BD000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455818468.000000000085A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455864962.000000000085B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455913213.000000000085C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455961682.000000000085D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_270000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                  • String ID: `-'$csm
                                  • API String ID: 1170836740-83844572
                                  • Opcode ID: eb5129a1509aeb7940f5fdea42eabb246665db7eed828f8fb3404deb1bd0632f
                                  • Instruction ID: e7130925ce2521ba356c3b8b9291d5350d115f62cea08ebb7c7193a0d9533b34
                                  • Opcode Fuzzy Hash: eb5129a1509aeb7940f5fdea42eabb246665db7eed828f8fb3404deb1bd0632f
                                  • Instruction Fuzzy Hash: 7041B334A2420A9FCF10DF68CC81AAE7FB5AF46314F148195ED149B391DF31A921CF95
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0028C45A
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0028C47C
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0028C4A4
                                  • std::_Facet_Register.LIBCPMT ref: 0028C59A
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0028C5C4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3452978591.0000000000271000.00000040.00000001.01000000.00000005.sdmp, Offset: 00270000, based on PE: true
                                  • Associated: 00000005.00000002.3452809333.0000000000270000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3452978591.00000000003F5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454063388.00000000003FA000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000003FD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.000000000066A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006A6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006AD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006BC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455564770.00000000006BD000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455818468.000000000085A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455864962.000000000085B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455913213.000000000085C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455961682.000000000085D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_270000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                  • String ID: E'$PD'
                                  • API String ID: 459529453-207005594
                                  • Opcode ID: 099c9abab4cb4a0b3a7949531a80820e266761042ad5f7d9ebeece61937255ba
                                  • Instruction ID: 04638ea25e28e67670dd8d25aa7a6da063081b823bc7dd7e8df3b0e003af22aa
                                  • Opcode Fuzzy Hash: 099c9abab4cb4a0b3a7949531a80820e266761042ad5f7d9ebeece61937255ba
                                  • Instruction Fuzzy Hash: 2E51EDB4911245DFDB12EF58C840BAEBBF4FB01314F24815DE845AB381DBB5AE04CBA0
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3452978591.0000000000271000.00000040.00000001.01000000.00000005.sdmp, Offset: 00270000, based on PE: true
                                  • Associated: 00000005.00000002.3452809333.0000000000270000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3452978591.00000000003F5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454063388.00000000003FA000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000003FD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.000000000066A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006A6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006AD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006BC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455564770.00000000006BD000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455818468.000000000085A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455864962.000000000085B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455913213.000000000085C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455961682.000000000085D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_270000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: _strrchr
                                  • String ID:
                                  • API String ID: 3213747228-0
                                  • Opcode ID: 785c90e8ff89e0f1a3d98e37725974d6f6ea20f06d45e48120c47f1ca5a82ffe
                                  • Instruction ID: cdc596237ba662f3ce77e08062660e67d6033201eb08cb3056a373a9ec18004e
                                  • Opcode Fuzzy Hash: 785c90e8ff89e0f1a3d98e37725974d6f6ea20f06d45e48120c47f1ca5a82ffe
                                  • Instruction Fuzzy Hash: 8FB148729202569FDB13CF24CC81BEEBBA5EF55390F144156E944AF282D7F4E921CBA0
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 002A2730
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 002A273B
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 002A27A9
                                    • Part of subcall function 002A288C: std::locale::_Locimp::_Locimp.LIBCPMT ref: 002A28A4
                                  • std::locale::_Setgloballocale.LIBCPMT ref: 002A2756
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3452978591.0000000000271000.00000040.00000001.01000000.00000005.sdmp, Offset: 00270000, based on PE: true
                                  • Associated: 00000005.00000002.3452809333.0000000000270000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3452978591.00000000003F5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454063388.00000000003FA000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000003FD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.000000000066A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006A6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006AD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006BC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455564770.00000000006BD000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455818468.000000000085A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455864962.000000000085B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455913213.000000000085C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455961682.000000000085D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_270000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                                  • String ID: `-'
                                  • API String ID: 677527491-850853302
                                  • Opcode ID: 9c1c91dffb11d4b22cd92066b52ef04e143a079d96b08b275b38dbe2b69bfb77
                                  • Instruction ID: d3a84ff1dd501f7cea3147f817d6d549f2981559e4c0be2a6c39d19b810baa03
                                  • Opcode Fuzzy Hash: 9c1c91dffb11d4b22cd92066b52ef04e143a079d96b08b275b38dbe2b69bfb77
                                  • Instruction Fuzzy Hash: D401B179A20111CFC70AEF24D84197D7BB5BF86750B14000AF81157391CF34AE16CF91
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 0027750C
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00277522
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3452978591.0000000000271000.00000040.00000001.01000000.00000005.sdmp, Offset: 00270000, based on PE: true
                                  • Associated: 00000005.00000002.3452809333.0000000000270000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3452978591.00000000003F5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454063388.00000000003FA000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000003FD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.000000000066A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006A6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006AD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006BC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455564770.00000000006BD000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455818468.000000000085A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455864962.000000000085B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455913213.000000000085C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455961682.000000000085D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_270000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: )'$[json.exception.
                                  • API String ID: 4194217158-3484975215
                                  • Opcode ID: 253e77879df66892f0db02ee0fff639805cb4dc6d71a2beeb379d08c5deda496
                                  • Instruction ID: c52d74661e54674c008a959a49d2695ae2ce487d2c0002feb8a137af747c28cd
                                  • Opcode Fuzzy Hash: 253e77879df66892f0db02ee0fff639805cb4dc6d71a2beeb379d08c5deda496
                                  • Instruction Fuzzy Hash: D351F1B1C15748DFDB11DFA8C905B9EBBB4EF11314F108269E854A7382DBB85A44CBE1
                                  APIs
                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 0027499F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3452978591.0000000000271000.00000040.00000001.01000000.00000005.sdmp, Offset: 00270000, based on PE: true
                                  • Associated: 00000005.00000002.3452809333.0000000000270000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3452978591.00000000003F5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454063388.00000000003FA000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000003FD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.000000000066A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006A6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006AD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006BC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455564770.00000000006BD000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455818468.000000000085A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455864962.000000000085B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455913213.000000000085C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455961682.000000000085D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_270000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: Ios_base_dtorstd::ios_base::_
                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                  • API String ID: 323602529-1866435925
                                  • Opcode ID: 604716ef037de747dfa135c380a61004ca7c0cb3d6f9715772cdc66060f54691
                                  • Instruction ID: eadcf8f316b9aaabeb78b9665c21b7e47094956d9c1fe35f325af4cfee47fe99
                                  • Opcode Fuzzy Hash: 604716ef037de747dfa135c380a61004ca7c0cb3d6f9715772cdc66060f54691
                                  • Instruction Fuzzy Hash: D9112C73924644EBC711EE5CDC42BA77398D706710F04862AFE5C872C1EB75A9258B92
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00273819
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 002738F0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3452978591.0000000000271000.00000040.00000001.01000000.00000005.sdmp, Offset: 00270000, based on PE: true
                                  • Associated: 00000005.00000002.3452809333.0000000000270000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3452978591.00000000003F5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454063388.00000000003FA000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000003FD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.000000000066A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006A6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006AD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006BC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455564770.00000000006BD000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455818468.000000000085A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455864962.000000000085B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455913213.000000000085C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455961682.000000000085D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_270000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: ___std_exception_copy___std_exception_destroy
                                  • String ID: )'
                                  • API String ID: 2970364248-641774962
                                  • Opcode ID: 8996ea3b7b77475126a7e0c08eccd432abd4ee941a668fa86889af7834bf8f05
                                  • Instruction ID: 58a5256877885751e01093c811ef01a7015b09f847f7305146640162b8b519d6
                                  • Opcode Fuzzy Hash: 8996ea3b7b77475126a7e0c08eccd432abd4ee941a668fa86889af7834bf8f05
                                  • Instruction Fuzzy Hash: 1A61ABB1C01248DFDB11DF98C845BDDFBB4FF19324F14825AE818AB282D7B55A54CBA1
                                  APIs
                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 0027499F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3452978591.0000000000271000.00000040.00000001.01000000.00000005.sdmp, Offset: 00270000, based on PE: true
                                  • Associated: 00000005.00000002.3452809333.0000000000270000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3452978591.00000000003F5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454063388.00000000003FA000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000003FD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.000000000066A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006A6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006AD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006BC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455564770.00000000006BD000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455818468.000000000085A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455864962.000000000085B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455913213.000000000085C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455961682.000000000085D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_270000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: Ios_base_dtorstd::ios_base::_
                                  • String ID: ios_base::badbit set$ios_base::failbit set
                                  • API String ID: 323602529-1240500531
                                  • Opcode ID: 1752f2705687943523609b8749fc7f0d92bff2e29829d02c3c42ea6421dcbdd0
                                  • Instruction ID: 15d42b873b51aa764f1ed3b13278ebe1b71469e63501a1f1ac471d2e9c3a28b2
                                  • Opcode Fuzzy Hash: 1752f2705687943523609b8749fc7f0d92bff2e29829d02c3c42ea6421dcbdd0
                                  • Instruction Fuzzy Hash: 7F4106B1D10248EFCB04EF58CC45BAEB7B8EB05710F14825EF558A7381DB755A10CBA1
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00274061
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 002740C4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3452978591.0000000000271000.00000040.00000001.01000000.00000005.sdmp, Offset: 00270000, based on PE: true
                                  • Associated: 00000005.00000002.3452809333.0000000000270000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3452978591.00000000003F5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454063388.00000000003FA000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000003FD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.000000000066A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006A6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006AD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006BC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455564770.00000000006BD000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455818468.000000000085A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455864962.000000000085B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455913213.000000000085C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455961682.000000000085D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_270000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                  • String ID: bad locale name
                                  • API String ID: 3988782225-1405518554
                                  • Opcode ID: a9cc83db2e2213766dee099c76c83250dcceeaeb1161b38aa4111445d6b51c45
                                  • Instruction ID: 7faac44741581b92729de6deaa50b25d08920131feda2a594f5cbbb5b62b3fdc
                                  • Opcode Fuzzy Hash: a9cc83db2e2213766dee099c76c83250dcceeaeb1161b38aa4111445d6b51c45
                                  • Instruction Fuzzy Hash: 9411D370805B84EFD721CF68C50474BBFF4AF16714F14868DE0959BB81D3B95A04CBA1
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 002865C9
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 002865FC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3452978591.0000000000271000.00000040.00000001.01000000.00000005.sdmp, Offset: 00270000, based on PE: true
                                  • Associated: 00000005.00000002.3452809333.0000000000270000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3452978591.00000000003F5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454063388.00000000003FA000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000003FD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.000000000066A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006A6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006AD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006BC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455564770.00000000006BD000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455818468.000000000085A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455864962.000000000085B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455913213.000000000085C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455961682.000000000085D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_270000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: )'
                                  • API String ID: 2659868963-641774962
                                  • Opcode ID: 123be6cf39f18f8d199e1f8907df87c2684ebc01a62f92d8328519941ec621ad
                                  • Instruction ID: e2f976665c31f7f803b90caa95c2baf1acf2e14e2a92afb9d0b02c9e7bcc2375
                                  • Opcode Fuzzy Hash: 123be6cf39f18f8d199e1f8907df87c2684ebc01a62f92d8328519941ec621ad
                                  • Instruction Fuzzy Hash: DC1133B6910748EBC711DF59C980B85F7F8FF0A724F10876AF91497641E774A9448BA0
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00277A5C
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00277A72
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.3452978591.0000000000271000.00000040.00000001.01000000.00000005.sdmp, Offset: 00270000, based on PE: true
                                  • Associated: 00000005.00000002.3452809333.0000000000270000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3452978591.00000000003F5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454063388.00000000003FA000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000003FD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.000000000066A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006A6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006AD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3454226179.00000000006BC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455564770.00000000006BD000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455818468.000000000085A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455864962.000000000085B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455913213.000000000085C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.3455961682.000000000085D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_270000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: )'
                                  • API String ID: 4194217158-641774962
                                  • Opcode ID: a42d6aa48fbe70f0ad7044525cff6f328afa84e1345691169a26e7f23dbabe79
                                  • Instruction ID: 8aaf9455f6e72a9519bef7e15fdd8e30fe2b849b97671001748982469209d337
                                  • Opcode Fuzzy Hash: a42d6aa48fbe70f0ad7044525cff6f328afa84e1345691169a26e7f23dbabe79
                                  • Instruction Fuzzy Hash: 0EF04FB1845648DFC711DF98C901B89BBF8EB06728F50066EE414A3680D7B59A048BA1

                                  Execution Graph

                                  Execution Coverage:3.8%
                                  Dynamic/Decrypted Code Coverage:0.9%
                                  Signature Coverage:0%
                                  Total number of Nodes:1809
                                  Total number of Limit Nodes:26
                                  execution_graph 18606 4cc0000 18607 4cc0025 18606->18607 18608 4cc0089 GetCurrentHwProfileW 18607->18608 18609 4cc0092 GetCurrentHwProfileW 18607->18609 18608->18607 18611 4cc02a1 18609->18611 18936 2947b0 18937 2948ed 18936->18937 18938 2947ed 18936->18938 18939 273330 2 API calls 18937->18939 18943 294a30 2 API calls 18938->18943 18940 2948f2 18939->18940 18941 29493d 18940->18941 18942 294a23 18940->18942 18946 294a30 2 API calls 18941->18946 18944 273330 2 API calls 18942->18944 18947 294827 18943->18947 18945 294a28 18944->18945 18948 294977 18946->18948 18950 28e1e0 RtlAllocateHeap 18947->18950 18955 283d50 18948->18955 18951 2948b4 18950->18951 18952 29499f 18953 28e1e0 RtlAllocateHeap 18952->18953 18954 2949ea 18953->18954 18956 283df7 std::locale::_Locimp::_Locimp 18955->18956 18957 283d8f 18955->18957 18956->18952 18957->18956 18958 283e69 18957->18958 18959 283f7d 18957->18959 18960 283f1e 18957->18960 18961 283d96 18957->18961 18963 2a3672 std::_Facet_Register 2 API calls 18958->18963 18965 2a3672 std::_Facet_Register 2 API calls 18959->18965 19027 287e80 18960->19027 18964 2a3672 std::_Facet_Register 2 API calls 18961->18964 18966 283e73 18963->18966 18967 283da0 18964->18967 18968 283f8a 18965->18968 18966->18956 18988 29bf30 18966->18988 18969 2a3672 std::_Facet_Register 2 API calls 18967->18969 18968->18956 18972 28408e 18968->18972 18973 283fd3 18968->18973 18971 283dd2 18969->18971 19015 29f460 18971->19015 18976 273330 2 API calls 18972->18976 18977 283fdb 18973->18977 18978 284004 18973->18978 18974 283eb1 18974->18956 18985 283d50 6 API calls 18974->18985 18979 284093 18976->18979 18977->18979 18980 283fe6 18977->18980 18981 2a3672 std::_Facet_Register 2 API calls 18978->18981 18982 272b50 Concurrency::cancel_current_task 2 API calls 18979->18982 18983 2a3672 std::_Facet_Register 2 API calls 18980->18983 18981->18956 18984 283fec 18982->18984 18983->18984 18984->18956 18986 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 18984->18986 18985->18974 18987 28409d 18986->18987 18989 29bfab 18988->18989 18990 29bf42 18988->18990 18993 273330 2 API calls 18989->18993 18991 29bf4d 18990->18991 18992 29bf7c 18990->18992 18994 29bfb0 18991->18994 18995 29bf54 18991->18995 18996 29bf99 18992->18996 18999 2a3672 std::_Facet_Register 2 API calls 18992->18999 18993->18994 18997 272b50 Concurrency::cancel_current_task 2 API calls 18994->18997 18998 2a3672 std::_Facet_Register 2 API calls 18995->18998 18996->18974 19000 29bf5a 18997->19000 18998->19000 19001 29bf86 18999->19001 19002 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 19000->19002 19003 29bf63 19000->19003 19001->18974 19005 29bfba 19002->19005 19003->18974 19004 29c013 std::locale::_Locimp::_Locimp 19004->18974 19005->19004 19006 29c00c 19005->19006 19007 29c077 19005->19007 19032 28fab0 19006->19032 19009 273330 2 API calls 19007->19009 19010 29c07c 19009->19010 19011 2a3672 std::_Facet_Register 2 API calls 19010->19011 19012 29c0ae 19011->19012 19013 273040 std::_Throw_Cpp_error 2 API calls 19012->19013 19014 29c0f2 19013->19014 19014->18974 19016 29f498 19015->19016 19017 29f53f 19015->19017 19018 2a3672 std::_Facet_Register 2 API calls 19016->19018 19017->18956 19019 29f4ba 19018->19019 19020 2863b0 std::_Throw_Cpp_error 2 API calls 19019->19020 19021 29f4d0 19020->19021 19022 283d50 6 API calls 19021->19022 19023 29f4e0 19022->19023 19024 29f460 6 API calls 19023->19024 19025 29f531 19024->19025 19026 29f460 6 API calls 19025->19026 19026->19017 19028 2a3672 std::_Facet_Register 2 API calls 19027->19028 19029 287ea6 19028->19029 19030 2863b0 std::_Throw_Cpp_error 2 API calls 19029->19030 19031 287ec5 19030->19031 19031->18956 19033 28fb2b 19032->19033 19034 28fac2 19032->19034 19035 272b50 Concurrency::cancel_current_task 2 API calls 19033->19035 19036 28facd 19034->19036 19039 28fafc 19034->19039 19040 28fada 19035->19040 19036->19033 19037 28fad4 19036->19037 19041 2a3672 std::_Facet_Register 2 API calls 19037->19041 19038 28fb19 19038->19004 19039->19038 19042 2a3672 std::_Facet_Register 2 API calls 19039->19042 19043 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 19040->19043 19045 28fae3 19040->19045 19041->19040 19044 28fb06 19042->19044 19046 28fb35 19043->19046 19044->19004 19045->19004 19048 28fb5b std::locale::_Setgloballocale 19046->19048 19050 299c70 19046->19050 19048->19004 19049 28fb7f 19049->19004 19051 299dc4 19050->19051 19056 299ca2 19050->19056 19052 273330 2 API calls 19051->19052 19065 299d04 std::locale::_Locimp::_Locimp 19052->19065 19053 299dbf 19054 272b50 Concurrency::cancel_current_task 2 API calls 19053->19054 19054->19051 19055 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 19057 299dce 19055->19057 19056->19053 19058 299d1d 19056->19058 19059 299cf3 19056->19059 19067 289950 19057->19067 19062 2a3672 std::_Facet_Register 2 API calls 19058->19062 19058->19065 19059->19053 19061 299cfe 19059->19061 19064 2a3672 std::_Facet_Register 2 API calls 19061->19064 19062->19065 19063 299dd9 Concurrency::cancel_current_task 19064->19065 19065->19055 19066 299d8f std::ios_base::_Ios_base_dtor 19065->19066 19066->19049 19068 289978 std::ios_base::_Ios_base_dtor 19067->19068 19069 289968 19067->19069 19068->19063 19069->19068 19070 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 19069->19070 19071 28998d 19070->19071 19072 289a4f 19071->19072 19079 2a2b74 19071->19079 19072->19063 19078 289a04 19078->19063 19080 2a2af7 19079->19080 19081 2899cc 19080->19081 19101 2a9815 19080->19101 19081->19072 19087 2883b0 19081->19087 19083 2a2b43 19083->19081 19115 2ad5f6 19083->19115 19086 2ad0a8 5 API calls 19086->19081 19088 28843c 19087->19088 19089 288463 19087->19089 19141 2b120a 19088->19141 19091 28c430 19089->19091 19093 28c45f std::_Throw_Cpp_error std::_Lockit::~_Lockit std::_Lockit::_Lockit 19091->19093 19092 28c4f8 std::_Lockit::~_Lockit 19092->19078 19093->19092 19094 2a3672 std::_Facet_Register 2 API calls 19093->19094 19095 28c506 19094->19095 19096 274040 std::_Throw_Cpp_error 3 API calls 19095->19096 19097 28c536 19096->19097 19098 274100 std::_Throw_Cpp_error 2 API calls 19097->19098 19099 28c592 19098->19099 19100 2a26f7 std::_Facet_Register 2 API calls 19099->19100 19100->19092 19103 2a975e std::locale::_Setgloballocale 19101->19103 19102 2a9771 19104 2b16ff ___std_exception_copy RtlAllocateHeap 19102->19104 19103->19102 19105 2a9791 19103->19105 19106 2a9776 19104->19106 19107 2a97a3 19105->19107 19108 2a9796 19105->19108 19109 2a8c60 ___std_exception_copy RtlAllocateHeap 19106->19109 19111 2ba8ef RtlAllocateHeap 19107->19111 19110 2b16ff ___std_exception_copy RtlAllocateHeap 19108->19110 19114 2a9781 19109->19114 19110->19114 19112 2a97ac 19111->19112 19113 2b16ff ___std_exception_copy RtlAllocateHeap 19112->19113 19112->19114 19113->19114 19114->19083 19116 2ad609 ___std_exception_copy 19115->19116 19121 2ad34d 19116->19121 19118 2ad61e 19119 2a899c ___std_exception_copy RtlAllocateHeap 19118->19119 19120 2a2b5e 19119->19120 19120->19081 19120->19086 19123 2ad359 std::locale::_Setgloballocale 19121->19123 19122 2ad35f 19124 2a8be3 ___std_exception_copy RtlAllocateHeap 19122->19124 19123->19122 19125 2ad3a2 19123->19125 19126 2ad37a 19124->19126 19128 2ad4d0 19125->19128 19126->19118 19129 2ad4e3 19128->19129 19130 2ad4f6 19128->19130 19129->19126 19137 2ad3f7 19130->19137 19132 2a9a91 4 API calls 19134 2ad547 19132->19134 19133 2ad519 19133->19132 19136 2ad5a7 19133->19136 19135 2b263d 2 API calls 19134->19135 19135->19136 19136->19126 19138 2ad408 19137->19138 19140 2ad460 19137->19140 19139 2b25fd SetFilePointerEx RtlAllocateHeap 19138->19139 19138->19140 19139->19140 19140->19133 19142 2b122b 19141->19142 19143 2b1216 19141->19143 19142->19089 19144 2b16ff ___std_exception_copy RtlAllocateHeap 19143->19144 19145 2b121b 19144->19145 19146 2a8c60 ___std_exception_copy RtlAllocateHeap 19145->19146 19147 2b1226 19146->19147 19147->19089 18571 4cc00a6 18573 4cc002a 18571->18573 18574 4cc0092 GetCurrentHwProfileW 18571->18574 18573->18574 18577 4cc0089 18573->18577 18576 4cc02a1 18574->18576 18578 4cc009f GetCurrentHwProfileW 18577->18578 18580 4cc02a1 18578->18580 16546 337b00 16547 337ecc 16546->16547 16552 337b3e std::ios_base::_Ios_base_dtor __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 16546->16552 16548 337b87 setsockopt recv 16548->16552 16550 337eb7 Sleep 16550->16547 16550->16552 16551 337e15 recv 16554 337eaf Sleep 16551->16554 16552->16547 16552->16548 16552->16550 16552->16551 16552->16554 16559 337ee1 16552->16559 16561 337cb3 16552->16561 16567 338590 WSAStartup 16552->16567 16573 288dc0 16552->16573 16582 2863b0 16552->16582 16587 337ef0 16552->16587 16643 2a3069 16552->16643 16646 279280 16552->16646 16554->16550 16556 337c2d recv 16556->16552 16557 337c4e recv 16556->16557 16557->16552 16656 2a8c70 16559->16656 16563 288dc0 2 API calls 16561->16563 16565 337d05 recv 16561->16565 16563->16561 16565->16552 16568 3385c8 16567->16568 16571 338686 16567->16571 16569 338654 socket 16568->16569 16568->16571 16570 33866a connect 16569->16570 16569->16571 16570->16571 16572 33867c closesocket 16570->16572 16571->16552 16572->16569 16572->16571 16575 288de2 std::locale::_Setgloballocale 16573->16575 16576 288e11 16573->16576 16574 288ef8 16575->16556 16576->16574 16659 2732d0 16576->16659 16578 288e66 std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 16579 288ecb std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 16578->16579 16673 272fe0 16578->16673 16579->16556 16581 288eb8 16581->16556 16584 2863d8 16582->16584 16583 2863e7 16583->16552 16584->16583 16585 2732d0 std::_Throw_Cpp_error 2 API calls 16584->16585 16586 28642a std::locale::_Locimp::_Locimp 16585->16586 16586->16552 16588 337f3e 16587->16588 16589 337f6c 16587->16589 16592 272cf0 std::_Throw_Cpp_error 2 API calls 16588->16592 16590 337f74 16589->16590 16591 337f8e 16589->16591 16871 286290 16590->16871 16594 337fb0 16591->16594 16595 337f96 16591->16595 16596 337f50 16592->16596 16598 337fd5 16594->16598 16599 337fb8 16594->16599 16597 286290 2 API calls 16595->16597 16600 279280 3 API calls 16596->16600 16625 337f64 16597->16625 16601 337ffb 16598->16601 16602 337fdd 16598->16602 16604 286290 2 API calls 16599->16604 16599->16625 16600->16625 16605 3382c0 16601->16605 16606 33801b 16601->16606 16601->16625 16875 2b12b7 16602->16875 16604->16625 16608 33831b 16605->16608 16609 3382c8 16605->16609 16828 275400 16606->16828 16610 338323 16608->16610 16611 338376 16608->16611 16898 28b430 16609->16898 16613 28b430 3 API calls 16610->16613 16614 3383d1 16611->16614 16615 33837e 16611->16615 16613->16625 16617 3383d9 16614->16617 16618 33842c 16614->16618 16616 28b430 3 API calls 16615->16616 16616->16625 16619 28b430 3 API calls 16617->16619 16620 338484 16618->16620 16621 338434 16618->16621 16619->16625 16620->16625 16905 2c8b00 16620->16905 16623 28b430 3 API calls 16621->16623 16623->16625 16625->16552 16627 338040 16627->16625 16628 33810b 16627->16628 16838 272cf0 16627->16838 16842 28ace0 16627->16842 16845 272d30 16628->16845 16632 338140 16633 3381b2 16632->16633 16634 3381e5 16632->16634 16635 2863b0 std::_Throw_Cpp_error 2 API calls 16633->16635 16862 2a9820 16634->16862 16636 3381ce 16635->16636 16881 33f280 16636->16881 18418 2a361d 16643->18418 16647 2863b0 std::_Throw_Cpp_error 2 API calls 16646->16647 16648 2792d4 16647->16648 16649 288dc0 2 API calls 16648->16649 16650 279523 std::locale::_Locimp::_Locimp 16648->16650 16649->16650 16651 2796e2 std::ios_base::_Ios_base_dtor 16650->16651 16653 2796b6 WSASend 16650->16653 16652 27975d std::ios_base::_Ios_base_dtor 16651->16652 16654 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 16651->16654 16652->16552 16653->16650 16653->16651 16655 27979c 16654->16655 16655->16552 16657 2a8bac ___std_exception_copy RtlAllocateHeap 16656->16657 16658 2a8c7f __Getctype 16657->16658 16660 2732e2 16659->16660 16663 273306 16659->16663 16661 27331f 16660->16661 16662 2732e9 16660->16662 16686 272b50 16661->16686 16678 2a3672 16662->16678 16664 273318 16663->16664 16667 2a3672 std::_Facet_Register 2 API calls 16663->16667 16664->16578 16668 273310 16667->16668 16668->16578 16669 2732ef 16670 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 16669->16670 16671 2732f8 16669->16671 16672 273329 16670->16672 16671->16578 16674 273007 16673->16674 16675 273017 std::ios_base::_Ios_base_dtor 16673->16675 16674->16675 16676 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 16674->16676 16675->16581 16677 273036 16676->16677 16681 2a3677 std::_Facet_Register 16678->16681 16680 2a3691 16680->16669 16681->16680 16683 272b50 Concurrency::cancel_current_task 16681->16683 16690 2b23ec 16681->16690 16682 2a369d 16682->16682 16683->16682 16696 2a4b15 16683->16696 16687 272b5e Concurrency::cancel_current_task 16686->16687 16688 2a4b15 ___std_exception_copy 2 API calls 16687->16688 16689 272bac 16688->16689 16689->16669 16695 2bb094 __Getctype std::_Facet_Register 16690->16695 16691 2bb0d2 16704 2b16ff 16691->16704 16692 2bb0bd RtlAllocateHeap 16694 2bb0d0 16692->16694 16692->16695 16694->16681 16695->16691 16695->16692 16697 2a4b22 16696->16697 16698 272bac 16696->16698 16697->16698 16699 2b23ec ___std_exception_copy 2 API calls 16697->16699 16698->16669 16700 2a4b3f 16699->16700 16701 2a4b4f 16700->16701 16766 2b99a5 16700->16766 16775 2b1c96 16701->16775 16707 2b9f93 16704->16707 16708 2b9f9c __Getctype 16707->16708 16715 2b1704 16708->16715 16718 2ba65a 16708->16718 16710 2b9fe0 __Getctype 16711 2b9fe8 __Getctype 16710->16711 16712 2ba020 16710->16712 16722 2bb01a 16711->16722 16726 2b9c70 16712->16726 16715->16694 16717 2bb01a ___std_exception_copy RtlAllocateHeap 16717->16715 16721 2ba667 __Getctype std::_Facet_Register 16718->16721 16719 2ba692 RtlAllocateHeap 16720 2ba6a5 ___std_exception_copy 16719->16720 16719->16721 16720->16710 16721->16719 16721->16720 16723 2bb025 ___std_exception_copy 16722->16723 16725 2bb04f 16722->16725 16724 2b16ff ___std_exception_copy RtlAllocateHeap 16723->16724 16723->16725 16724->16725 16725->16715 16727 2b9cde __Getctype 16726->16727 16730 2b9c16 16727->16730 16729 2b9d07 16729->16717 16731 2b9c22 std::_Lockit::_Lockit std::locale::_Setgloballocale 16730->16731 16734 2b9df7 16731->16734 16733 2b9c44 __Getctype 16733->16729 16735 2b9e2d __Getctype 16734->16735 16736 2b9e06 __Getctype 16734->16736 16735->16733 16736->16735 16738 2c2146 16736->16738 16739 2c21c6 16738->16739 16742 2c215c 16738->16742 16741 2bb01a ___std_exception_copy RtlAllocateHeap 16739->16741 16764 2c2214 16739->16764 16740 2c22b7 __Getctype RtlAllocateHeap 16750 2c2222 16740->16750 16743 2c21e8 16741->16743 16742->16739 16745 2bb01a ___std_exception_copy RtlAllocateHeap 16742->16745 16747 2c218f 16742->16747 16744 2bb01a ___std_exception_copy RtlAllocateHeap 16743->16744 16746 2c21fb 16744->16746 16751 2c2184 16745->16751 16752 2bb01a ___std_exception_copy RtlAllocateHeap 16746->16752 16753 2bb01a ___std_exception_copy RtlAllocateHeap 16747->16753 16765 2c21b1 16747->16765 16748 2bb01a ___std_exception_copy RtlAllocateHeap 16754 2c21bb 16748->16754 16749 2c2282 16755 2bb01a ___std_exception_copy RtlAllocateHeap 16749->16755 16750->16749 16763 2bb01a RtlAllocateHeap ___std_exception_copy 16750->16763 16756 2c144a __Getctype RtlAllocateHeap 16751->16756 16757 2c2209 16752->16757 16758 2c21a6 16753->16758 16759 2bb01a ___std_exception_copy RtlAllocateHeap 16754->16759 16760 2c2288 16755->16760 16756->16747 16761 2bb01a ___std_exception_copy RtlAllocateHeap 16757->16761 16762 2c18a9 __Getctype RtlAllocateHeap 16758->16762 16759->16739 16760->16735 16761->16764 16762->16765 16763->16750 16764->16740 16765->16748 16767 2b99b3 16766->16767 16768 2b99c1 16766->16768 16767->16768 16773 2b99d9 16767->16773 16769 2b16ff ___std_exception_copy RtlAllocateHeap 16768->16769 16770 2b99c9 16769->16770 16778 2a8c60 16770->16778 16771 2b99d3 16771->16701 16773->16771 16774 2b16ff ___std_exception_copy RtlAllocateHeap 16773->16774 16774->16770 16776 2bb01a ___std_exception_copy RtlAllocateHeap 16775->16776 16777 2b1cae 16776->16777 16777->16698 16781 2a8bac 16778->16781 16782 2a8bbe ___std_exception_copy 16781->16782 16787 2a8be3 16782->16787 16784 2a8bd6 16794 2a899c 16784->16794 16788 2a8bf3 16787->16788 16791 2a8bfa ___std_exception_copy __Getctype 16787->16791 16800 2a8a01 16788->16800 16790 2a8c08 16790->16784 16791->16790 16792 2a8bac ___std_exception_copy RtlAllocateHeap 16791->16792 16793 2a8c6c 16792->16793 16793->16784 16795 2a89a8 16794->16795 16796 2a89bf 16795->16796 16815 2a8a47 16795->16815 16797 2a89d2 16796->16797 16799 2a8a47 ___std_exception_copy RtlAllocateHeap 16796->16799 16797->16771 16799->16797 16801 2a8a10 16800->16801 16804 2ba044 16801->16804 16805 2ba057 __Getctype 16804->16805 16806 2ba65a __Getctype RtlAllocateHeap 16805->16806 16814 2a8a32 16805->16814 16807 2ba087 __Getctype 16806->16807 16808 2ba0c3 16807->16808 16809 2ba08f __Getctype 16807->16809 16810 2b9c70 __Getctype RtlAllocateHeap 16808->16810 16811 2bb01a ___std_exception_copy RtlAllocateHeap 16809->16811 16812 2ba0ce 16810->16812 16811->16814 16813 2bb01a ___std_exception_copy RtlAllocateHeap 16812->16813 16813->16814 16814->16791 16816 2a8a5a 16815->16816 16817 2a8a51 16815->16817 16816->16796 16818 2a8a01 ___std_exception_copy RtlAllocateHeap 16817->16818 16819 2a8a56 16818->16819 16819->16816 16822 2b41c6 16819->16822 16821 2a8a63 16823 2b41cb std::locale::_Setgloballocale 16822->16823 16824 2bf665 std::locale::_Setgloballocale RtlAllocateHeap 16823->16824 16826 2b41d6 std::locale::_Setgloballocale 16823->16826 16824->16826 16825 2b36e2 std::locale::_Setgloballocale RtlAllocateHeap 16827 2b4209 __Getctype std::locale::_Setgloballocale 16825->16827 16826->16825 16827->16821 16910 2a2b99 16828->16910 16831 275410 16832 275419 16831->16832 16834 2a2534 std::_Throw_Cpp_error 3 API calls 16831->16834 16832->16627 16835 275430 16834->16835 16919 2a953c 16835->16919 16839 272d13 16838->16839 16840 273040 std::_Throw_Cpp_error 2 API calls 16839->16840 16841 272d25 16840->16841 16841->16627 16843 28ad10 16842->16843 16843->16843 17236 28fbf0 16843->17236 16846 273040 std::_Throw_Cpp_error 2 API calls 16845->16846 16847 272d55 16846->16847 16848 3462c0 16847->16848 16849 346358 16848->16849 16852 346361 std::locale::_Setgloballocale 16848->16852 17245 28e4b0 16849->17245 16854 346553 16852->16854 16860 34654f 16852->16860 17268 364760 16852->17268 17279 294160 16852->17279 16856 346580 std::ios_base::_Ios_base_dtor 16854->16856 16857 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 16854->16857 16856->16632 16858 3465ce 16857->16858 16859 2a3069 __Xtime_get_ticks GetSystemTimePreciseAsFileTime 16858->16859 16861 3465d6 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 16859->16861 16860->16854 17347 286130 16860->17347 16861->16632 17434 2a975e 16862->17434 16864 2a9832 16864->16625 16865 2b1628 16864->16865 16866 2b163b ___std_exception_copy 16865->16866 17458 2b140a 16866->17458 16868 2b1650 16869 2a899c ___std_exception_copy RtlAllocateHeap 16868->16869 16870 2b165d 16869->16870 16892 2ad0a8 16870->16892 16872 28629d 16871->16872 16873 2862b1 16871->16873 16874 286130 2 API calls 16872->16874 16873->16625 16874->16873 16876 2b12ca ___std_exception_copy 16875->16876 17572 2ad6a5 16876->17572 16878 2b12e4 16879 2a899c ___std_exception_copy RtlAllocateHeap 16878->16879 16880 2b12f1 16879->16880 16880->16625 16882 33f2f6 std::locale::_Setgloballocale 16881->16882 17687 28ab20 16882->17687 16885 288f00 std::_Throw_Cpp_error 2 API calls 16886 33f47f 16885->16886 17692 273440 16886->17692 16888 33f58b std::ios_base::_Ios_base_dtor 16888->16625 16890 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 16891 33f5ce 16890->16891 16891->16625 16893 2ad0bb ___std_exception_copy 16892->16893 17933 2acf83 16893->17933 16895 2ad0c7 16896 2a899c ___std_exception_copy RtlAllocateHeap 16895->16896 16897 2ad0d3 16896->16897 16897->16625 18003 287ef0 16898->18003 16900 28b48d 18020 292100 16900->18020 16904 28b503 16904->16625 18387 2c8bb0 16905->18387 16907 2c8b31 std::locale::_Locimp::_Locimp 16908 273040 std::_Throw_Cpp_error 2 API calls 16907->16908 16909 2c8b7c 16908->16909 16909->16625 16925 2a2bc8 16910->16925 16912 275409 16912->16831 16913 2a2534 16912->16913 16914 2a254a std::_Throw_Cpp_error 16913->16914 16932 2a24e7 16914->16932 16916 2a255a __EH_prolog3 std::_Throw_Cpp_error Concurrency::cancel_current_task 16938 289cb0 16916->16938 16918 2a25c7 std::_Throw_Cpp_error 16918->16831 16920 2a954f ___std_exception_copy 16919->16920 17220 2a93db 16920->17220 16922 2a955e 16923 2a899c ___std_exception_copy RtlAllocateHeap 16922->16923 16924 275450 16923->16924 16924->16627 16928 2a2be2 16925->16928 16926 2a2bf2 _ValidateLocalCookies 16926->16912 16928->16926 16929 2a302b 16928->16929 16930 2a3069 __Xtime_get_ticks GetSystemTimePreciseAsFileTime 16929->16930 16931 2a3036 __aulldiv __aullrem 16930->16931 16931->16928 16933 2a24f3 __EH_prolog3_GS 16932->16933 16934 272cf0 std::_Throw_Cpp_error 2 API calls 16933->16934 16935 2a2507 16934->16935 16949 2736e0 16935->16949 16937 2a251c std::_Throw_Cpp_error 16937->16916 16976 274900 16938->16976 16940 289d26 16941 2a3672 std::_Facet_Register 2 API calls 16940->16941 16942 289d2d 16941->16942 16981 2a2729 16942->16981 16944 289d39 16989 28a060 16944->16989 16946 289d76 16947 289dc7 std::_Throw_Cpp_error 16946->16947 16948 274900 std::_Throw_Cpp_error 2 API calls 16946->16948 16947->16918 16948->16947 16950 2863b0 std::_Throw_Cpp_error 2 API calls 16949->16950 16951 273731 16950->16951 16952 27375a 16951->16952 16963 288f00 16951->16963 16954 288f00 std::_Throw_Cpp_error 2 API calls 16952->16954 16955 27378a 16954->16955 16956 2a4b15 ___std_exception_copy 2 API calls 16955->16956 16958 27381e 16956->16958 16957 27385f std::ios_base::_Ios_base_dtor 16957->16937 16958->16957 16959 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 16958->16959 16960 2738b0 16959->16960 16972 2a4b78 16960->16972 16962 2738f5 std::ios_base::_Ios_base_dtor 16962->16937 16964 288f22 std::locale::_Locimp::_Locimp 16963->16964 16965 288f4f 16963->16965 16964->16952 16966 28902f std::ios_base::_Ios_base_dtor 16965->16966 16967 2732d0 std::_Throw_Cpp_error 2 API calls 16965->16967 16966->16952 16968 288fa4 std::locale::_Locimp::_Locimp 16967->16968 16969 289002 std::locale::_Locimp::_Locimp 16968->16969 16970 272fe0 std::_Throw_Cpp_error RtlAllocateHeap 16968->16970 16969->16952 16971 288fef 16970->16971 16971->16952 16973 2a4b8c 16972->16973 16974 2a4b85 16972->16974 16973->16962 16975 2b1c96 ___std_exception_copy RtlAllocateHeap 16974->16975 16975->16973 16977 274922 16976->16977 16978 27491a std::_Throw_Cpp_error Concurrency::cancel_current_task 16976->16978 16977->16940 17001 2747f0 16978->17001 16980 274968 std::ios_base::_Ios_base_dtor Concurrency::cancel_current_task 16980->16940 16982 2a2735 __EH_prolog3 std::_Lockit::_Lockit 16981->16982 16987 2a2771 std::_Throw_Cpp_error std::_Lockit::~_Lockit 16982->16987 17019 2a288c 16982->17019 16984 2a2753 17025 2a28af 16984->17025 16987->16944 16990 28a0a2 std::_Throw_Cpp_error std::_Lockit::~_Lockit std::_Lockit::_Lockit 16989->16990 16991 2a3672 std::_Facet_Register 2 API calls 16990->16991 17000 28a144 std::_Lockit::~_Lockit 16990->17000 16992 28a152 16991->16992 17090 274040 16992->17090 16998 28a1f1 17125 2a26f7 16998->17125 17000->16946 17002 274851 17001->17002 17002->17002 17013 273040 17002->17013 17004 274865 17005 2736e0 std::_Throw_Cpp_error 2 API calls 17004->17005 17007 27487b 17005->17007 17006 2748a5 std::ios_base::_Ios_base_dtor 17006->16980 17007->17006 17008 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 17007->17008 17010 2748f7 std::_Throw_Cpp_error Concurrency::cancel_current_task 17008->17010 17009 274922 17009->16980 17010->17009 17011 2747f0 std::_Throw_Cpp_error 2 API calls 17010->17011 17012 274968 std::ios_base::_Ios_base_dtor Concurrency::cancel_current_task 17011->17012 17012->16980 17015 273052 17013->17015 17016 2730c8 17013->17016 17014 273057 std::locale::_Locimp::_Locimp 17014->17004 17015->17014 17017 2732d0 std::_Throw_Cpp_error 2 API calls 17015->17017 17016->17004 17018 2730a3 std::locale::_Locimp::_Locimp 17017->17018 17018->17004 17020 2a3672 std::_Facet_Register 2 API calls 17019->17020 17021 2a2897 17020->17021 17022 2a28ab 17021->17022 17035 2a2611 17021->17035 17022->16984 17026 2a28bb 17025->17026 17027 2a275b 17025->17027 17038 2a333a 17026->17038 17029 285a60 17027->17029 17030 285a86 17029->17030 17031 285ab3 std::locale::_Locimp::_Locimp 17029->17031 17032 285a90 17030->17032 17033 2b1c96 ___std_exception_copy RtlAllocateHeap 17030->17033 17031->16987 17032->17031 17034 2b23ec ___std_exception_copy 2 API calls 17032->17034 17033->17032 17034->17031 17036 285a60 std::locale::_Locimp::_Locimp 2 API calls 17035->17036 17037 2a264b 17036->17037 17037->16984 17039 2a334a std::locale::_Setgloballocale 17038->17039 17039->17027 17042 2b41d6 std::locale::_Setgloballocale 17039->17042 17044 2bf665 17039->17044 17065 2b36e2 17042->17065 17043 2b4209 __Getctype std::locale::_Setgloballocale 17043->17027 17047 2bf671 std::locale::_Setgloballocale 17044->17047 17045 2b9f93 std::locale::_Setgloballocale RtlAllocateHeap 17052 2bf6a2 std::locale::_Setgloballocale 17045->17052 17046 2bf6c1 17049 2b16ff ___std_exception_copy RtlAllocateHeap 17046->17049 17047->17045 17047->17046 17047->17052 17053 2bf6d3 std::_Lockit::_Lockit std::locale::_Setgloballocale 17047->17053 17048 2bf6ab 17048->17042 17050 2bf6c6 17049->17050 17051 2a8c60 ___std_exception_copy RtlAllocateHeap 17050->17051 17051->17048 17052->17046 17052->17048 17052->17053 17054 2bf843 std::_Lockit::~_Lockit 17053->17054 17055 2bf746 17053->17055 17056 2bf774 std::locale::_Setgloballocale 17053->17056 17057 2b36e2 std::locale::_Setgloballocale RtlAllocateHeap 17054->17057 17055->17056 17068 2b9e42 17055->17068 17056->17048 17060 2b9e42 __Getctype RtlAllocateHeap 17056->17060 17062 2bf7c9 17056->17062 17059 2bf856 17057->17059 17060->17062 17062->17048 17064 2b9e42 __Getctype RtlAllocateHeap 17062->17064 17063 2b9e42 __Getctype RtlAllocateHeap 17063->17056 17064->17048 17082 2b3552 17065->17082 17067 2b36f3 17067->17043 17069 2b9e4b __Getctype 17068->17069 17070 2ba65a __Getctype RtlAllocateHeap 17069->17070 17073 2b9e62 17069->17073 17071 2b9e8f __Getctype 17070->17071 17075 2b9e97 __Getctype 17071->17075 17076 2b9ecf 17071->17076 17072 2b9ef2 17072->17063 17073->17072 17074 2b41c6 __Getctype RtlAllocateHeap 17073->17074 17077 2b9efc 17074->17077 17078 2bb01a ___std_exception_copy RtlAllocateHeap 17075->17078 17079 2b9c70 __Getctype RtlAllocateHeap 17076->17079 17078->17073 17080 2b9eda 17079->17080 17081 2bb01a ___std_exception_copy RtlAllocateHeap 17080->17081 17081->17073 17083 2b357f std::locale::_Setgloballocale 17082->17083 17086 2b33e3 17083->17086 17085 2b35c8 std::locale::_Setgloballocale 17085->17067 17087 2b33ef std::_Lockit::_Lockit std::locale::_Setgloballocale 17086->17087 17088 2b346a std::locale::_Setgloballocale RtlAllocateHeap 17087->17088 17089 2b3406 std::locale::_Setgloballocale 17088->17089 17089->17085 17091 274066 std::_Lockit::_Lockit 17090->17091 17092 2740e6 17091->17092 17093 2740c2 17091->17093 17137 2a1d4a 17092->17137 17128 2a2827 17093->17128 17097 2740f0 17098 2a2cf4 17169 2b3cf8 17098->17169 17100 2a2cfd __Getctype 17101 2a2d17 17100->17101 17102 2a2d35 17100->17102 17174 2b454e 17101->17174 17104 2b454e __Getctype RtlAllocateHeap 17102->17104 17105 2a2d1e 17104->17105 17179 2b3d42 17105->17179 17109 28a1ca 17110 274100 17109->17110 17216 2a2872 17110->17216 17113 274140 17115 27415b 17113->17115 17116 2b1c96 ___std_exception_copy RtlAllocateHeap 17113->17116 17114 2b1c96 ___std_exception_copy RtlAllocateHeap 17114->17113 17117 274176 17115->17117 17118 2b1c96 ___std_exception_copy RtlAllocateHeap 17115->17118 17116->17115 17119 274191 17117->17119 17120 2b1c96 ___std_exception_copy RtlAllocateHeap 17117->17120 17118->17117 17121 2741ac 17119->17121 17122 2b1c96 ___std_exception_copy RtlAllocateHeap 17119->17122 17120->17119 17123 2b1c96 ___std_exception_copy RtlAllocateHeap 17121->17123 17124 2741c7 std::_Lockit::~_Lockit 17121->17124 17122->17121 17123->17124 17124->16998 17126 2a3672 std::_Facet_Register 2 API calls 17125->17126 17127 2a2702 17126->17127 17127->17000 17140 2b4516 17128->17140 17131 285a60 std::locale::_Locimp::_Locimp 2 API calls 17132 2a284b 17131->17132 17133 2a285b 17132->17133 17134 2b4516 std::_Locinfo::_Locinfo_dtor 2 API calls 17132->17134 17135 285a60 std::locale::_Locimp::_Locimp 2 API calls 17133->17135 17134->17133 17136 2740c9 17135->17136 17136->17098 17166 273540 17137->17166 17139 2a1d5b Concurrency::cancel_current_task 17139->17097 17141 2b4523 std::_Locinfo::_Locinfo_dtor 17140->17141 17144 2b42c1 17141->17144 17143 2a2833 17143->17131 17145 2b42cd std::_Lockit::_Lockit std::locale::_Setgloballocale 17144->17145 17148 2b431c 17145->17148 17147 2b42e8 std::_Locinfo::_Locinfo_dtor 17147->17143 17149 2b447b std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 17148->17149 17150 2b4337 17149->17150 17151 2b9e42 __Getctype RtlAllocateHeap 17150->17151 17161 2b4370 __Getctype 17150->17161 17152 2b4344 17151->17152 17153 2b3379 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 17152->17153 17154 2b4369 17153->17154 17155 2bb094 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 17154->17155 17154->17161 17156 2b4395 17155->17156 17157 2b3379 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 17156->17157 17156->17161 17158 2b43b1 17157->17158 17159 2b43b8 17158->17159 17160 2b43d3 17158->17160 17159->17161 17163 2bb01a ___std_exception_copy RtlAllocateHeap 17159->17163 17162 2bb01a ___std_exception_copy RtlAllocateHeap 17160->17162 17164 2b43fe 17160->17164 17161->17147 17162->17164 17163->17161 17164->17161 17165 2bb01a ___std_exception_copy RtlAllocateHeap 17164->17165 17165->17161 17167 2a4b15 ___std_exception_copy 2 API calls 17166->17167 17168 273585 17167->17168 17168->17139 17170 2b9e42 __Getctype RtlAllocateHeap 17169->17170 17171 2b3d03 17170->17171 17190 2ba12d 17171->17190 17175 2b9e42 __Getctype RtlAllocateHeap 17174->17175 17176 2b4559 17175->17176 17177 2ba12d __Getctype RtlAllocateHeap 17176->17177 17178 2b4569 17177->17178 17178->17105 17180 2b9e42 __Getctype RtlAllocateHeap 17179->17180 17181 2b3d4d 17180->17181 17182 2ba12d __Getctype RtlAllocateHeap 17181->17182 17183 2a2d46 17182->17183 17183->17109 17184 2b4572 17183->17184 17185 2b457f 17184->17185 17189 2b45b3 __Getctype 17184->17189 17186 2b23ec ___std_exception_copy 2 API calls 17185->17186 17187 2b45a2 17186->17187 17187->17189 17207 2be2f4 17187->17207 17189->17109 17191 2ba140 17190->17191 17193 2b3d13 17190->17193 17191->17193 17194 2c2392 17191->17194 17193->17100 17195 2c239e std::locale::_Setgloballocale 17194->17195 17196 2b9e42 __Getctype RtlAllocateHeap 17195->17196 17198 2c23a7 std::_Lockit::_Lockit 17196->17198 17197 2c23ed 17197->17193 17198->17197 17203 2c2413 17198->17203 17200 2c23d6 __Getctype 17200->17197 17201 2b41c6 __Getctype RtlAllocateHeap 17200->17201 17202 2c2412 17201->17202 17204 2c242e 17203->17204 17205 2c2421 __Getctype 17203->17205 17204->17200 17205->17204 17206 2c2146 __Getctype RtlAllocateHeap 17205->17206 17206->17204 17208 2be302 17207->17208 17209 2be310 17207->17209 17208->17209 17212 2be32a 17208->17212 17210 2b16ff ___std_exception_copy RtlAllocateHeap 17209->17210 17215 2be31a 17210->17215 17211 2a8c60 ___std_exception_copy RtlAllocateHeap 17213 2be324 17211->17213 17212->17213 17214 2b16ff ___std_exception_copy RtlAllocateHeap 17212->17214 17213->17189 17214->17215 17215->17211 17217 27412c 17216->17217 17218 2a287e 17216->17218 17217->17113 17217->17114 17219 2b4516 std::_Locinfo::_Locinfo_dtor 2 API calls 17218->17219 17219->17217 17221 2a93e7 std::locale::_Setgloballocale 17220->17221 17222 2a93f0 17221->17222 17224 2a9414 17221->17224 17223 2a8be3 ___std_exception_copy RtlAllocateHeap 17222->17223 17228 2a9409 17223->17228 17225 2a9432 17224->17225 17229 2ba1e9 17224->17229 17227 2a8be3 ___std_exception_copy RtlAllocateHeap 17225->17227 17225->17228 17227->17228 17228->16922 17230 2ba20a 17229->17230 17231 2ba1f5 17229->17231 17230->17225 17232 2b16ff ___std_exception_copy RtlAllocateHeap 17231->17232 17233 2ba1fa 17232->17233 17234 2a8c60 ___std_exception_copy RtlAllocateHeap 17233->17234 17235 2ba205 17234->17235 17235->17225 17237 28fc8d 17236->17237 17240 28fc12 std::locale::_Locimp::_Locimp 17236->17240 17238 28fd5e 17237->17238 17239 2732d0 std::_Throw_Cpp_error 2 API calls 17237->17239 17241 28fce1 std::locale::_Locimp::_Locimp 17239->17241 17242 28fd3a std::locale::_Locimp::_Locimp 17241->17242 17243 272fe0 std::_Throw_Cpp_error RtlAllocateHeap 17241->17243 17244 28fd27 17243->17244 17246 28e528 17245->17246 17247 28e4c2 17245->17247 17358 273330 17246->17358 17249 28e4f9 17247->17249 17250 28e4ca 17247->17250 17251 28e516 17249->17251 17254 2a3672 std::_Facet_Register 2 API calls 17249->17254 17252 28e52d 17250->17252 17253 28e4d1 17250->17253 17251->16852 17255 272b50 Concurrency::cancel_current_task 2 API calls 17252->17255 17256 2a3672 std::_Facet_Register 2 API calls 17253->17256 17257 28e503 17254->17257 17258 28e4d7 17255->17258 17256->17258 17257->16852 17259 28e4e0 17258->17259 17260 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 17258->17260 17259->16852 17261 28e537 17260->17261 17361 286ad0 17261->17361 17263 28e574 17264 274900 std::_Throw_Cpp_error 2 API calls 17263->17264 17265 28e5fb 17264->17265 17267 28e613 17265->17267 17365 289b60 17265->17365 17267->16852 17269 364767 17268->17269 17270 36476c 17268->17270 17269->16852 17271 2b23ec ___std_exception_copy 2 API calls 17270->17271 17277 3647af 17270->17277 17271->17277 17272 3647c2 17272->16852 17273 364877 17273->16852 17274 2b1c96 ___std_exception_copy RtlAllocateHeap 17275 364867 17274->17275 17275->16852 17276 364821 17276->17273 17276->17274 17277->17272 17277->17276 17278 2b1c96 ___std_exception_copy RtlAllocateHeap 17277->17278 17278->17276 17280 294288 17279->17280 17281 294195 17279->17281 17283 273330 2 API calls 17280->17283 17282 2941b1 17281->17282 17284 294202 17281->17284 17285 2941f2 17281->17285 17287 2a3672 std::_Facet_Register 2 API calls 17282->17287 17286 29428d 17283->17286 17291 2a3672 std::_Facet_Register 2 API calls 17284->17291 17292 2941cf std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 17284->17292 17285->17282 17285->17286 17288 272b50 Concurrency::cancel_current_task 2 API calls 17286->17288 17289 2941c4 17287->17289 17290 294292 17288->17290 17289->17290 17289->17292 17293 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 17290->17293 17291->17292 17400 2977d0 17292->17400 17294 294297 17293->17294 17295 2943e9 17294->17295 17297 2942fa 17294->17297 17296 273330 2 API calls 17295->17296 17298 2943ee 17296->17298 17405 296ff0 17297->17405 17300 294549 17298->17300 17301 29445a 17298->17301 17303 273330 2 API calls 17300->17303 17305 296ff0 2 API calls 17301->17305 17312 29454e 17303->17312 17304 29425e 17304->16852 17307 294496 17305->17307 17306 29470b 17309 273330 2 API calls 17306->17309 17311 2863b0 std::_Throw_Cpp_error 2 API calls 17307->17311 17308 294706 17313 272b50 Concurrency::cancel_current_task 2 API calls 17308->17313 17314 2946af 17309->17314 17310 294336 17413 297830 17310->17413 17326 2944c4 17311->17326 17312->17306 17312->17308 17316 2945ee 17312->17316 17317 294615 17312->17317 17313->17306 17315 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 17314->17315 17336 2946d1 std::ios_base::_Ios_base_dtor 17314->17336 17318 294715 17315->17318 17316->17308 17319 2945f9 17316->17319 17322 2a3672 std::_Facet_Register 2 API calls 17317->17322 17329 2945ff 17317->17329 17425 28d010 17318->17425 17323 2a3672 std::_Facet_Register 2 API calls 17319->17323 17322->17329 17323->17329 17324 2943b0 17324->16852 17328 297830 RtlAllocateHeap 17326->17328 17330 294510 17328->17330 17329->17314 17329->17336 17418 2a1f9c 17329->17418 17330->16852 17331 294798 17333 272b50 Concurrency::cancel_current_task 2 API calls 17331->17333 17332 29472f Concurrency::cancel_current_task 17332->17331 17334 29475b 17332->17334 17335 29477f 17332->17335 17337 294768 17333->17337 17334->17331 17338 294762 17334->17338 17339 294791 17335->17339 17340 2a3672 std::_Facet_Register 2 API calls 17335->17340 17336->16852 17342 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 17337->17342 17346 294771 17337->17346 17343 2a3672 std::_Facet_Register 2 API calls 17338->17343 17339->16852 17344 294789 17340->17344 17345 2947a2 17342->17345 17343->17337 17344->16852 17346->16852 17348 286174 17347->17348 17350 286143 std::locale::_Locimp::_Locimp 17347->17350 17349 286180 17348->17349 17351 286200 17348->17351 17352 2732d0 std::_Throw_Cpp_error 2 API calls 17349->17352 17350->16854 17351->17351 17353 288f00 std::_Throw_Cpp_error 2 API calls 17351->17353 17356 2861bf std::locale::_Locimp::_Locimp 17352->17356 17354 286232 17353->17354 17354->16854 17355 2861ed 17355->16854 17356->17355 17357 272fe0 std::_Throw_Cpp_error RtlAllocateHeap 17356->17357 17357->17355 17369 2a1cea 17358->17369 17363 286b02 17361->17363 17362 286b1d 17362->17263 17363->17362 17389 2850e0 17363->17389 17366 289bbb 17365->17366 17367 289b96 17365->17367 17366->17267 17367->17366 17397 2888a0 17367->17397 17376 2a1a9f 17369->17376 17371 2a1cfb Concurrency::cancel_current_task 17379 2a1af4 17371->17379 17373 2a1d1b Concurrency::cancel_current_task 17382 2a1b37 17373->17382 17375 2a1d3b Concurrency::cancel_current_task 17386 2734e0 17376->17386 17380 2734e0 std::invalid_argument::invalid_argument 2 API calls 17379->17380 17381 2a1b06 17380->17381 17381->17373 17383 2a1b4b std::regex_error::regex_error 17382->17383 17384 2734e0 std::invalid_argument::invalid_argument 2 API calls 17383->17384 17385 2a1b54 17384->17385 17385->17375 17387 2a4b15 ___std_exception_copy 2 API calls 17386->17387 17388 273522 17387->17388 17388->17371 17390 285117 17389->17390 17394 2851b5 17389->17394 17391 286ad0 2 API calls 17390->17391 17392 285120 17391->17392 17393 28519d 17392->17393 17395 274900 std::_Throw_Cpp_error 2 API calls 17392->17395 17393->17394 17396 289b60 2 API calls 17393->17396 17394->17362 17395->17393 17396->17394 17398 274900 std::_Throw_Cpp_error 2 API calls 17397->17398 17399 2888bf 17398->17399 17399->17366 17401 2977dc 17400->17401 17402 2977f9 std::ios_base::_Ios_base_dtor 17400->17402 17401->17402 17403 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 17401->17403 17402->17304 17404 297824 17403->17404 17406 296ff9 17405->17406 17407 29703c 17405->17407 17406->17407 17408 297013 17406->17408 17410 2a3672 std::_Facet_Register 2 API calls 17406->17410 17407->17407 17409 2a3672 std::_Facet_Register 2 API calls 17408->17409 17412 29701c 17408->17412 17411 297035 17409->17411 17410->17408 17411->17310 17412->17310 17414 29783d 17413->17414 17415 297882 std::ios_base::_Ios_base_dtor 17413->17415 17414->17415 17416 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 17414->17416 17415->17324 17417 2978b6 17416->17417 17419 2a1fb2 17418->17419 17420 2a1fa5 17418->17420 17419->17329 17420->17419 17421 2b41c6 __Getctype RtlAllocateHeap 17420->17421 17422 2a1fbb 17421->17422 17423 2a1f9c RtlAllocateHeap 17422->17423 17424 2a1fca 17423->17424 17424->17329 17426 28d01a 17425->17426 17427 28d02e 17425->17427 17426->17427 17428 2a1f9c RtlAllocateHeap 17426->17428 17429 289910 17427->17429 17428->17426 17430 289928 17429->17430 17431 289938 std::ios_base::_Ios_base_dtor 17429->17431 17430->17431 17432 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 17430->17432 17431->17332 17433 28994d 17432->17433 17437 2a976a std::locale::_Setgloballocale 17434->17437 17435 2a9771 17436 2b16ff ___std_exception_copy RtlAllocateHeap 17435->17436 17439 2a9776 17436->17439 17437->17435 17438 2a9791 17437->17438 17440 2a97a3 17438->17440 17441 2a9796 17438->17441 17442 2a8c60 ___std_exception_copy RtlAllocateHeap 17439->17442 17448 2ba8ef 17440->17448 17443 2b16ff ___std_exception_copy RtlAllocateHeap 17441->17443 17445 2a9781 17442->17445 17443->17445 17445->16864 17446 2a97ac 17446->17445 17447 2b16ff ___std_exception_copy RtlAllocateHeap 17446->17447 17447->17445 17449 2ba8fb std::_Lockit::_Lockit std::locale::_Setgloballocale 17448->17449 17452 2ba993 17449->17452 17451 2ba916 17451->17446 17456 2ba9b6 17452->17456 17453 2ba65a __Getctype RtlAllocateHeap 17454 2baa17 17453->17454 17455 2bb01a ___std_exception_copy RtlAllocateHeap 17454->17455 17457 2ba9fc std::locale::_Setgloballocale 17455->17457 17456->17453 17456->17456 17456->17457 17457->17451 17459 2b1418 17458->17459 17460 2b1440 17458->17460 17459->17460 17461 2b1447 17459->17461 17462 2b1425 17459->17462 17460->16868 17466 2b1363 17461->17466 17463 2a8be3 ___std_exception_copy RtlAllocateHeap 17462->17463 17463->17460 17465 2b147f 17465->16868 17467 2b136f std::locale::_Setgloballocale 17466->17467 17470 2b13be 17467->17470 17469 2b138a 17469->17465 17477 2bc8aa 17470->17477 17497 2bc86c 17477->17497 17479 2bc8bb 17480 2b13d6 17479->17480 17504 2bb094 17479->17504 17484 2b1481 17480->17484 17483 2bb01a ___std_exception_copy RtlAllocateHeap 17483->17480 17485 2b13f4 17484->17485 17488 2b1493 17484->17488 17493 2bc955 17485->17493 17486 2b14a1 17487 2a8be3 ___std_exception_copy RtlAllocateHeap 17486->17487 17487->17485 17488->17485 17488->17486 17490 2b14d7 std::locale::_Locimp::_Locimp 17488->17490 17490->17485 17491 2ba1e9 RtlAllocateHeap 17490->17491 17519 2a9a91 17490->17519 17525 2b9678 17490->17525 17491->17490 17494 2b1400 17493->17494 17495 2bc960 17493->17495 17494->17469 17495->17494 17496 2a9a91 4 API calls 17495->17496 17496->17494 17498 2bc878 17497->17498 17499 2bc8a2 17498->17499 17500 2ba1e9 RtlAllocateHeap 17498->17500 17499->17479 17501 2bc893 17500->17501 17510 2c3be3 17501->17510 17503 2bc899 17503->17479 17505 2bb0d2 17504->17505 17509 2bb0a2 __Getctype std::_Facet_Register 17504->17509 17507 2b16ff ___std_exception_copy RtlAllocateHeap 17505->17507 17506 2bb0bd RtlAllocateHeap 17508 2bb0d0 17506->17508 17506->17509 17507->17508 17508->17483 17509->17505 17509->17506 17511 2c3bfd 17510->17511 17512 2c3bf0 17510->17512 17515 2c3c09 17511->17515 17516 2b16ff ___std_exception_copy RtlAllocateHeap 17511->17516 17513 2b16ff ___std_exception_copy RtlAllocateHeap 17512->17513 17514 2c3bf5 17513->17514 17514->17503 17515->17503 17517 2c3c2a 17516->17517 17518 2a8c60 ___std_exception_copy RtlAllocateHeap 17517->17518 17518->17514 17520 2a9aaa 17519->17520 17524 2a9ad1 17519->17524 17521 2ba1e9 RtlAllocateHeap 17520->17521 17520->17524 17522 2a9ac6 17521->17522 17523 2b9678 4 API calls 17522->17523 17523->17524 17524->17490 17527 2b9684 std::locale::_Setgloballocale 17525->17527 17526 2b968c 17526->17490 17527->17526 17528 2b96c5 17527->17528 17530 2b970b 17527->17530 17529 2a8be3 ___std_exception_copy RtlAllocateHeap 17528->17529 17529->17526 17530->17526 17532 2b9789 17530->17532 17533 2b97b1 17532->17533 17545 2b97d4 17532->17545 17534 2b97b5 17533->17534 17536 2b9810 17533->17536 17535 2a8be3 ___std_exception_copy RtlAllocateHeap 17534->17535 17535->17545 17537 2b982e 17536->17537 17551 2b263d 17536->17551 17546 2b92ce 17537->17546 17541 2b988d 17543 2b98f6 WriteFile 17541->17543 17541->17545 17542 2b9846 17542->17545 17554 2b8e9f 17542->17554 17543->17545 17545->17526 17547 2c3be3 RtlAllocateHeap 17546->17547 17548 2b92e0 17547->17548 17550 2b930e 17548->17550 17560 2ae1d0 17548->17560 17550->17541 17550->17542 17567 2b251c 17551->17567 17553 2b2656 17553->17537 17555 2b8f07 17554->17555 17556 2ae1d0 std::_Locinfo::_Locinfo_dtor 2 API calls 17555->17556 17558 2b8f18 std::_Locinfo::_Locinfo_dtor std::locale::_Locimp::_Locimp 17555->17558 17556->17558 17557 2b91ce _ValidateLocalCookies 17557->17545 17558->17557 17559 2bc724 RtlAllocateHeap RtlAllocateHeap 17558->17559 17559->17558 17561 2a8a47 ___std_exception_copy RtlAllocateHeap 17560->17561 17562 2ae1e0 17561->17562 17563 2ba15a std::_Locinfo::_Locinfo_dtor RtlAllocateHeap 17562->17563 17564 2ae1fd 17563->17564 17565 2ba1b8 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 17564->17565 17566 2ae20a 17565->17566 17566->17550 17568 2be940 RtlAllocateHeap 17567->17568 17569 2b252e 17568->17569 17570 2b254a SetFilePointerEx 17569->17570 17571 2b2536 17569->17571 17570->17571 17571->17553 17586 2ace79 17572->17586 17574 2ad6b7 17575 2ad6cc 17574->17575 17576 2ad6ff 17574->17576 17585 2ad6e7 std::_Locinfo::_Locinfo_dtor 17574->17585 17577 2a8be3 ___std_exception_copy RtlAllocateHeap 17575->17577 17578 2ae1d0 std::_Locinfo::_Locinfo_dtor 2 API calls 17576->17578 17580 2ad723 17576->17580 17577->17585 17578->17580 17582 2ad747 17580->17582 17593 2ace94 17580->17593 17581 2ad7cf 17583 2ace22 RtlAllocateHeap 17581->17583 17582->17581 17600 2ace22 17582->17600 17583->17585 17585->16878 17587 2ace7e 17586->17587 17588 2ace91 17586->17588 17589 2b16ff ___std_exception_copy RtlAllocateHeap 17587->17589 17588->17574 17590 2ace83 17589->17590 17591 2a8c60 ___std_exception_copy RtlAllocateHeap 17590->17591 17592 2ace8e 17591->17592 17592->17574 17594 2acea0 17593->17594 17595 2aceb6 17593->17595 17596 2b454e __Getctype RtlAllocateHeap 17594->17596 17597 2acec6 17595->17597 17606 2b9a39 17595->17606 17598 2aceab std::_Locinfo::_Locinfo_dtor 17596->17598 17597->17580 17598->17580 17601 2ace33 17600->17601 17602 2ace47 17600->17602 17601->17602 17603 2b16ff ___std_exception_copy RtlAllocateHeap 17601->17603 17602->17581 17604 2ace3c 17603->17604 17605 2a8c60 ___std_exception_copy RtlAllocateHeap 17604->17605 17605->17602 17611 2a95ae 17606->17611 17610 2b9a66 _ValidateLocalCookies 17610->17597 17612 2a95cc 17611->17612 17613 2a95c5 17611->17613 17612->17613 17614 2b9e42 __Getctype RtlAllocateHeap 17612->17614 17613->17610 17619 2bf44d 17613->17619 17615 2a95ed 17614->17615 17616 2ba12d __Getctype RtlAllocateHeap 17615->17616 17617 2a9603 17616->17617 17626 2ba18b 17617->17626 17620 2a95ae std::_Locinfo::_Locinfo_dtor 2 API calls 17619->17620 17621 2bf46d std::_Locinfo::_Locinfo_dtor 17620->17621 17623 2bb094 std::_Locinfo::_Locinfo_dtor 2 API calls 17621->17623 17624 2bf529 _ValidateLocalCookies 17621->17624 17625 2bf4bf std::_Locinfo::_Locinfo_dtor std::locale::_Setgloballocale 17621->17625 17623->17625 17624->17610 17683 2a3275 17625->17683 17627 2ba19e 17626->17627 17628 2ba1b3 17626->17628 17627->17628 17630 2c06bd 17627->17630 17628->17613 17631 2b9e42 __Getctype RtlAllocateHeap 17630->17631 17632 2c06c2 17631->17632 17635 2c05d5 17632->17635 17634 2c06cd 17634->17628 17636 2c05e1 std::_Lockit::_Lockit std::locale::_Setgloballocale 17635->17636 17637 2c05fb std::_Locinfo::_Locinfo_dtor 17636->17637 17643 2bb01a ___std_exception_copy RtlAllocateHeap 17636->17643 17638 2c0602 17637->17638 17639 2b41c6 __Getctype RtlAllocateHeap 17637->17639 17638->17634 17640 2c0674 17639->17640 17641 2c06b0 17640->17641 17646 2b9efd 17640->17646 17641->17634 17643->17637 17647 2b9f08 __Getctype 17646->17647 17649 2ba65a __Getctype RtlAllocateHeap 17647->17649 17656 2b9f14 17647->17656 17648 2b41c6 __Getctype RtlAllocateHeap 17650 2b9f92 17648->17650 17651 2b9f38 __Getctype 17649->17651 17652 2b9f40 __Getctype 17651->17652 17653 2b9f74 17651->17653 17654 2bb01a ___std_exception_copy RtlAllocateHeap 17652->17654 17655 2b9c70 __Getctype RtlAllocateHeap 17653->17655 17654->17656 17657 2b9f7f 17655->17657 17656->17648 17659 2b9f19 17656->17659 17658 2bb01a ___std_exception_copy RtlAllocateHeap 17657->17658 17658->17659 17660 2c0480 17659->17660 17661 2c05d5 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 17660->17661 17662 2c04aa 17661->17662 17663 2c0207 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 17662->17663 17664 2c04b2 17663->17664 17665 2bb094 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 17664->17665 17671 2c04c3 17664->17671 17666 2c04d4 17665->17666 17667 2c04dc 17666->17667 17668 2c04ea 17666->17668 17669 2bb01a ___std_exception_copy RtlAllocateHeap 17667->17669 17670 2c06d0 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 17668->17670 17669->17671 17672 2c0517 17670->17672 17671->17641 17673 2c0522 17672->17673 17679 2c053d std::_Locinfo::_Locinfo_dtor 17672->17679 17674 2b16ff ___std_exception_copy RtlAllocateHeap 17673->17674 17675 2c0527 17674->17675 17678 2bb01a ___std_exception_copy RtlAllocateHeap 17675->17678 17676 2c0569 17677 2c05b2 17676->17677 17681 2c00f9 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap 17676->17681 17682 2bb01a ___std_exception_copy RtlAllocateHeap 17677->17682 17678->17671 17679->17676 17680 2bb01a ___std_exception_copy RtlAllocateHeap 17679->17680 17680->17676 17681->17677 17682->17671 17684 2a327f 17683->17684 17685 2a3290 17683->17685 17684->17685 17686 2b1c96 ___std_exception_copy RtlAllocateHeap 17684->17686 17685->17624 17686->17685 17688 28ab55 17687->17688 17689 28aba3 17688->17689 17696 28e8a0 17688->17696 17691 28ab83 17691->16885 17693 273459 17692->17693 17700 2b0dd7 17693->17700 17697 28e8ce 17696->17697 17699 28e8f8 std::locale::_Locimp::_Locimp 17696->17699 17698 2732d0 std::_Throw_Cpp_error 2 API calls 17697->17698 17698->17699 17699->17691 17701 2b0deb ___std_exception_copy 17700->17701 17706 2ae565 17701->17706 17703 2b0e06 17704 2a899c ___std_exception_copy RtlAllocateHeap 17703->17704 17705 273467 17704->17705 17705->16888 17705->16890 17707 2ae591 17706->17707 17708 2ae5b4 17706->17708 17709 2a8be3 ___std_exception_copy RtlAllocateHeap 17707->17709 17708->17707 17710 2ae5bc 17708->17710 17711 2ae5a9 _ValidateLocalCookies 17709->17711 17715 2afaa7 17710->17715 17711->17703 17733 2b0b0d 17715->17733 17718 2afacc 17719 2a8be3 ___std_exception_copy RtlAllocateHeap 17718->17719 17720 2ae63d 17719->17720 17730 2af28d 17720->17730 17721 2afaf4 std::_Locinfo::_Locinfo_dtor 17721->17720 17724 2ae1d0 std::_Locinfo::_Locinfo_dtor 2 API calls 17721->17724 17726 2afbd0 17721->17726 17737 2af49b 17721->17737 17740 2afed4 17721->17740 17772 2b036f 17721->17772 17724->17721 17727 2a8be3 ___std_exception_copy RtlAllocateHeap 17726->17727 17728 2afbea 17727->17728 17729 2a8be3 ___std_exception_copy RtlAllocateHeap 17728->17729 17729->17720 17731 2bb01a ___std_exception_copy RtlAllocateHeap 17730->17731 17732 2af29d 17731->17732 17732->17711 17734 2afac1 17733->17734 17735 2b0b18 17733->17735 17734->17718 17734->17720 17734->17721 17736 2a8be3 ___std_exception_copy RtlAllocateHeap 17735->17736 17736->17734 17799 2ae842 17737->17799 17739 2af4d6 17739->17721 17741 2afedb 17740->17741 17742 2afef2 17740->17742 17743 2aff31 17741->17743 17744 2b03f4 17741->17744 17745 2b0394 17741->17745 17742->17743 17746 2a8be3 ___std_exception_copy RtlAllocateHeap 17742->17746 17743->17721 17750 2b03f9 17744->17750 17751 2b042d 17744->17751 17747 2b041a 17745->17747 17748 2b039a 17745->17748 17749 2aff26 17746->17749 17834 2aebfc 17747->17834 17760 2b039f 17748->17760 17762 2b03eb 17748->17762 17749->17721 17752 2b03fb 17750->17752 17753 2b0426 17750->17753 17754 2b044a 17751->17754 17755 2b0432 17751->17755 17764 2b040a 17752->17764 17766 2b03ae 17752->17766 17841 2b0a30 17753->17841 17845 2b0a4d 17754->17845 17755->17747 17755->17762 17771 2b03c5 17755->17771 17761 2b03d8 17760->17761 17760->17766 17760->17771 17770 2b0453 _ValidateLocalCookies 17761->17770 17819 2b0916 17761->17819 17762->17770 17823 2aed89 17762->17823 17764->17747 17765 2b040e 17764->17765 17765->17770 17830 2b09ab 17765->17830 17766->17770 17809 2b0785 17766->17809 17770->17721 17771->17770 17848 2bc5ba 17771->17848 17773 2b03f4 17772->17773 17774 2b0394 17772->17774 17776 2b03f9 17773->17776 17777 2b042d 17773->17777 17775 2b039a 17774->17775 17778 2b041a 17774->17778 17788 2b039f 17775->17788 17789 2b03eb 17775->17789 17779 2b03fb 17776->17779 17780 2b0426 17776->17780 17781 2b044a 17777->17781 17782 2b0432 17777->17782 17784 2aebfc 2 API calls 17778->17784 17786 2b03ae 17779->17786 17792 2b040a 17779->17792 17785 2b0a30 2 API calls 17780->17785 17783 2b0a4d 2 API calls 17781->17783 17782->17778 17782->17789 17798 2b03c5 17782->17798 17783->17798 17784->17798 17785->17798 17787 2b0785 2 API calls 17786->17787 17797 2b0453 _ValidateLocalCookies 17786->17797 17787->17798 17788->17786 17790 2b03d8 17788->17790 17788->17798 17791 2aed89 2 API calls 17789->17791 17789->17797 17794 2b0916 2 API calls 17790->17794 17790->17797 17791->17798 17792->17778 17793 2b040e 17792->17793 17795 2b09ab RtlAllocateHeap 17793->17795 17793->17797 17794->17798 17795->17798 17796 2bc5ba 2 API calls 17796->17798 17797->17721 17798->17796 17798->17797 17800 2ace79 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap 17799->17800 17802 2ae854 17800->17802 17801 2ae869 17803 2a8be3 ___std_exception_copy RtlAllocateHeap 17801->17803 17802->17801 17804 2ae89c 17802->17804 17808 2ae884 std::_Locinfo::_Locinfo_dtor 17802->17808 17803->17808 17805 2ae933 17804->17805 17807 2ace22 RtlAllocateHeap 17804->17807 17806 2ace22 RtlAllocateHeap 17805->17806 17806->17808 17807->17805 17808->17739 17810 2b079f 17809->17810 17854 2ae790 17810->17854 17812 2b07de 17865 2bc439 17812->17865 17815 2ae1d0 std::_Locinfo::_Locinfo_dtor 2 API calls 17816 2b0895 17815->17816 17817 2ae1d0 std::_Locinfo::_Locinfo_dtor 2 API calls 17816->17817 17818 2b08c8 17816->17818 17817->17818 17818->17771 17818->17818 17821 2b0931 17819->17821 17820 2b0967 17820->17771 17821->17820 17822 2bc5ba 2 API calls 17821->17822 17822->17820 17824 2aed9e 17823->17824 17825 2aedc0 17824->17825 17827 2aede7 17824->17827 17826 2a8be3 ___std_exception_copy RtlAllocateHeap 17825->17826 17829 2aeddd 17826->17829 17828 2ae790 2 API calls 17827->17828 17827->17829 17828->17829 17829->17771 17833 2b09c1 17830->17833 17831 2a8be3 ___std_exception_copy RtlAllocateHeap 17832 2b09e2 17831->17832 17832->17771 17833->17831 17833->17832 17835 2aec11 17834->17835 17836 2aec33 17835->17836 17838 2aec5a 17835->17838 17837 2a8be3 ___std_exception_copy RtlAllocateHeap 17836->17837 17840 2aec50 17837->17840 17839 2ae790 2 API calls 17838->17839 17838->17840 17839->17840 17840->17771 17842 2b0a3c 17841->17842 17926 2aea6f 17842->17926 17844 2b0a4c 17844->17771 17846 2aed89 2 API calls 17845->17846 17847 2b0a62 17846->17847 17847->17771 17849 2bc5cf 17848->17849 17850 2ae1d0 std::_Locinfo::_Locinfo_dtor 2 API calls 17849->17850 17852 2bc5fc std::_Locinfo::_Locinfo_dtor std::locale::_Setgloballocale 17849->17852 17853 2bc5d3 std::_Locinfo::_Locinfo_dtor std::locale::_Setgloballocale 17849->17853 17850->17852 17851 2a8be3 ___std_exception_copy RtlAllocateHeap 17851->17853 17852->17851 17852->17853 17853->17771 17855 2ae7b7 17854->17855 17864 2ae7a5 17854->17864 17856 2bb094 std::_Locinfo::_Locinfo_dtor 2 API calls 17855->17856 17855->17864 17857 2ae7db 17856->17857 17858 2ae7ee 17857->17858 17859 2ae7e3 17857->17859 17884 2af2a7 17858->17884 17861 2bb01a ___std_exception_copy RtlAllocateHeap 17859->17861 17861->17864 17863 2bb01a ___std_exception_copy RtlAllocateHeap 17863->17864 17864->17812 17866 2bc46e 17865->17866 17868 2bc44a 17865->17868 17867 2bc4a1 17866->17867 17866->17868 17870 2bc4da 17867->17870 17871 2bc509 17867->17871 17869 2a8be3 ___std_exception_copy RtlAllocateHeap 17868->17869 17878 2b0871 17869->17878 17887 2bc2dd 17870->17887 17872 2bc532 17871->17872 17873 2bc537 17871->17873 17875 2bc599 17872->17875 17876 2bc55f 17872->17876 17892 2bbb66 17873->17892 17919 2bbe93 17875->17919 17879 2bc57f 17876->17879 17880 2bc564 17876->17880 17878->17815 17878->17816 17912 2bc08a 17879->17912 17902 2bc20e 17880->17902 17885 2bb01a ___std_exception_copy RtlAllocateHeap 17884->17885 17886 2ae7f9 17885->17886 17886->17863 17888 2bc2fe 17887->17888 17889 2bc2f3 17887->17889 17890 2b99a5 ___std_exception_copy RtlAllocateHeap 17888->17890 17889->17878 17891 2bc359 __Getctype 17890->17891 17891->17878 17893 2bbb79 17892->17893 17894 2bbbaa 17893->17894 17895 2bbb88 17893->17895 17897 2bbbbf 17894->17897 17899 2bbc12 17894->17899 17896 2a8be3 ___std_exception_copy RtlAllocateHeap 17895->17896 17901 2bbba0 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z std::locale::_Setgloballocale __allrem _strrchr 17896->17901 17898 2bbe93 RtlAllocateHeap RtlAllocateHeap 17897->17898 17898->17901 17900 2ae1d0 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 17899->17900 17899->17901 17900->17901 17901->17878 17903 2c47bf RtlAllocateHeap 17902->17903 17904 2bc23e 17903->17904 17905 2c46c5 RtlAllocateHeap 17904->17905 17906 2bc27c 17905->17906 17907 2bc283 17906->17907 17908 2bc2bc 17906->17908 17909 2bc295 17906->17909 17907->17878 17910 2bbf37 RtlAllocateHeap RtlAllocateHeap 17908->17910 17911 2bc120 RtlAllocateHeap RtlAllocateHeap 17909->17911 17910->17907 17911->17907 17913 2c47bf RtlAllocateHeap 17912->17913 17914 2bc0b9 17913->17914 17915 2c46c5 RtlAllocateHeap 17914->17915 17916 2bc0fa 17915->17916 17917 2bc101 17916->17917 17918 2bc120 RtlAllocateHeap RtlAllocateHeap 17916->17918 17917->17878 17918->17917 17920 2c47bf RtlAllocateHeap 17919->17920 17921 2bbebd 17920->17921 17922 2c46c5 RtlAllocateHeap 17921->17922 17923 2bbf0b 17922->17923 17924 2bbf12 17923->17924 17925 2bbf37 RtlAllocateHeap RtlAllocateHeap 17923->17925 17924->17878 17925->17924 17927 2aea84 17926->17927 17928 2aeaa6 17927->17928 17930 2aeacd 17927->17930 17929 2a8be3 ___std_exception_copy RtlAllocateHeap 17928->17929 17932 2aeac3 17929->17932 17931 2ae790 2 API calls 17930->17931 17930->17932 17931->17932 17932->17844 17934 2acf8f std::locale::_Setgloballocale 17933->17934 17935 2acf99 17934->17935 17938 2acfbc 17934->17938 17936 2a8be3 ___std_exception_copy RtlAllocateHeap 17935->17936 17937 2acfb4 17936->17937 17937->16895 17938->17937 17940 2ad01a 17938->17940 17941 2ad027 17940->17941 17943 2ad04a 17940->17943 17942 2a8be3 ___std_exception_copy RtlAllocateHeap 17941->17942 17944 2ad042 17942->17944 17943->17944 17945 2a9a91 4 API calls 17943->17945 17944->17937 17946 2ad062 17945->17946 17954 2bb054 17946->17954 17949 2ba1e9 RtlAllocateHeap 17950 2ad076 17949->17950 17958 2b8d2c 17950->17958 17953 2bb01a ___std_exception_copy RtlAllocateHeap 17953->17944 17955 2bb06b 17954->17955 17956 2ad06a 17954->17956 17955->17956 17957 2bb01a ___std_exception_copy RtlAllocateHeap 17955->17957 17956->17949 17957->17956 17959 2b8d55 17958->17959 17961 2ad07d 17958->17961 17960 2b8da4 17959->17960 17963 2b8d7c 17959->17963 17962 2a8be3 ___std_exception_copy RtlAllocateHeap 17960->17962 17961->17944 17961->17953 17962->17961 17965 2b8c9b 17963->17965 17966 2b8ca7 std::locale::_Setgloballocale 17965->17966 17968 2b8ce6 17966->17968 17969 2b8dff 17966->17969 17968->17961 17981 2be940 17969->17981 17971 2b8e15 17994 2be8af 17971->17994 17973 2b8e0f 17973->17971 17974 2b8e47 17973->17974 17975 2be940 RtlAllocateHeap 17973->17975 17974->17971 17976 2be940 RtlAllocateHeap 17974->17976 17977 2b8e3e 17975->17977 17978 2b8e53 CloseHandle 17976->17978 17979 2be940 RtlAllocateHeap 17977->17979 17978->17971 17979->17974 17980 2b8e6d 17980->17968 17982 2be94d 17981->17982 17983 2be962 17981->17983 18000 2b16ec 17982->18000 17986 2b16ec RtlAllocateHeap 17983->17986 17988 2be987 17983->17988 17989 2be992 17986->17989 17987 2b16ff ___std_exception_copy RtlAllocateHeap 17990 2be95a 17987->17990 17988->17973 17991 2b16ff ___std_exception_copy RtlAllocateHeap 17989->17991 17990->17973 17992 2be99a 17991->17992 17993 2a8c60 ___std_exception_copy RtlAllocateHeap 17992->17993 17993->17990 17995 2be8be 17994->17995 17996 2b16ff ___std_exception_copy RtlAllocateHeap 17995->17996 17999 2be8e8 17995->17999 17997 2be92a 17996->17997 17998 2b16ec RtlAllocateHeap 17997->17998 17998->17999 17999->17980 18001 2b9f93 std::locale::_Setgloballocale RtlAllocateHeap 18000->18001 18002 2b16f1 18001->18002 18002->17987 18004 287f1d 18003->18004 18005 288034 18003->18005 18006 287fcb 18004->18006 18007 287f2b 18004->18007 18008 287f7c 18004->18008 18009 287f83 18004->18009 18010 287f24 18004->18010 18015 272cf0 std::_Throw_Cpp_error 2 API calls 18005->18015 18016 287f29 18005->18016 18006->16900 18014 2a3672 std::_Facet_Register 2 API calls 18007->18014 18083 28cf80 18008->18083 18012 2a3672 std::_Facet_Register 2 API calls 18009->18012 18078 28c3a0 18010->18078 18012->18016 18014->18016 18017 28804f 18015->18017 18016->16900 18088 277f90 18017->18088 18019 288062 Concurrency::cancel_current_task 18022 29215f 18020->18022 18145 2b133b 18022->18145 18025 28b4f0 18026 28db10 18025->18026 18027 28de3d 18026->18027 18028 28db56 18026->18028 18030 28fd70 2 API calls 18027->18030 18197 28ebb0 18028->18197 18032 28de87 18030->18032 18031 28dba4 18034 28fd70 2 API calls 18031->18034 18033 28eda0 3 API calls 18032->18033 18035 28df4f std::ios_base::_Ios_base_dtor 18032->18035 18036 28dee2 18033->18036 18037 28dbc1 18034->18037 18038 287ef0 2 API calls 18035->18038 18055 28dfc7 18035->18055 18060 28e0a1 Concurrency::cancel_current_task 18035->18060 18039 2775c0 2 API calls 18036->18039 18077 28dcc3 std::ios_base::_Ios_base_dtor 18037->18077 18203 28eda0 18037->18203 18038->18055 18040 28df06 18039->18040 18046 28f440 3 API calls 18040->18046 18042 28dcec 18048 287ef0 2 API calls 18042->18048 18043 28dd82 18051 287ef0 2 API calls 18043->18051 18056 28dd9f 18043->18056 18044 28de38 std::ios_base::_Ios_base_dtor 18044->16904 18045 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 18049 28e06f 18045->18049 18062 28df1f 18046->18062 18047 28dc1c 18250 2775c0 18047->18250 18073 28dd01 18048->18073 18299 2890b0 18049->18299 18051->18056 18053 28e093 18059 2890b0 2 API calls 18053->18059 18054 28dc40 18280 28f440 18054->18280 18055->18044 18055->18045 18061 2835b0 RtlAllocateHeap 18056->18061 18057 28e07d Concurrency::cancel_current_task 18067 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 18057->18067 18059->18060 18068 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 18060->18068 18065 28dd6c 18061->18065 18062->18053 18066 277a20 RtlAllocateHeap 18062->18066 18063 28dc56 18063->18049 18064 28dc6b 18063->18064 18289 277a20 18064->18289 18070 2835b0 RtlAllocateHeap 18065->18070 18066->18035 18067->18053 18072 28e0b7 18068->18072 18074 28de26 18070->18074 18294 2835b0 18073->18294 18075 2835b0 RtlAllocateHeap 18074->18075 18075->18044 18076 28dc86 18076->18057 18076->18077 18077->18042 18077->18043 18079 2a3672 std::_Facet_Register 2 API calls 18078->18079 18080 28c3c3 18079->18080 18081 2a3672 std::_Facet_Register 2 API calls 18080->18081 18082 28c3ec 18081->18082 18082->18016 18084 2a3672 std::_Facet_Register 2 API calls 18083->18084 18085 28cfb7 18084->18085 18086 273040 std::_Throw_Cpp_error 2 API calls 18085->18086 18087 28cfee 18086->18087 18087->18016 18099 277350 18088->18099 18090 278029 18117 28ad80 18090->18117 18092 27803d 18093 278076 std::ios_base::_Ios_base_dtor 18092->18093 18095 2780df 18092->18095 18121 2772b0 18093->18121 18097 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 18095->18097 18096 2780aa 18096->18019 18098 2780e4 18097->18098 18098->18019 18124 274d70 18099->18124 18108 288f00 std::_Throw_Cpp_error 2 API calls 18109 2773e6 18108->18109 18110 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 18109->18110 18111 277476 std::ios_base::_Ios_base_dtor 18109->18111 18112 2774c4 18110->18112 18111->18090 18113 2a4b78 ___std_exception_destroy RtlAllocateHeap 18112->18113 18114 277511 18113->18114 18115 2a4b78 ___std_exception_destroy RtlAllocateHeap 18114->18115 18116 277527 std::ios_base::_Ios_base_dtor 18115->18116 18116->18090 18118 28adb4 18117->18118 18119 288f00 std::_Throw_Cpp_error 2 API calls 18118->18119 18120 28adbf 18119->18120 18120->18092 18122 2a4b15 ___std_exception_copy 2 API calls 18121->18122 18123 27731a 18122->18123 18123->18096 18125 274da6 18124->18125 18126 274dd8 18125->18126 18127 273040 std::_Throw_Cpp_error 2 API calls 18125->18127 18128 28ac50 18126->18128 18127->18126 18129 28ac81 18128->18129 18129->18129 18130 28acd3 18129->18130 18131 28e8a0 2 API calls 18129->18131 18132 2773af 18131->18132 18133 28abb0 18132->18133 18134 28abe1 18133->18134 18134->18134 18135 288f00 std::_Throw_Cpp_error 2 API calls 18134->18135 18136 2773c2 18135->18136 18137 28ae20 18136->18137 18140 28e710 18137->18140 18139 2773d1 18139->18108 18141 28e753 18140->18141 18142 28e758 std::locale::_Locimp::_Locimp 18141->18142 18143 2732d0 std::_Throw_Cpp_error 2 API calls 18141->18143 18142->18139 18144 28e843 std::locale::_Locimp::_Locimp 18143->18144 18144->18139 18146 2b9e42 __Getctype RtlAllocateHeap 18145->18146 18147 2b1346 18146->18147 18148 2ba12d __Getctype RtlAllocateHeap 18147->18148 18149 29225f 18148->18149 18150 28fd70 18149->18150 18153 28fd84 18150->18153 18154 28fde4 18150->18154 18152 28ff6c 18152->18025 18157 28fdc2 18153->18157 18164 299e20 18153->18164 18160 28fe74 18154->18160 18186 2901e0 18154->18186 18157->18154 18158 299e20 2 API calls 18157->18158 18161 28fe58 18157->18161 18158->18161 18159 28fecc 18159->18152 18163 299e20 2 API calls 18159->18163 18190 2908f0 18159->18190 18160->18025 18161->18160 18182 291430 18161->18182 18163->18159 18165 299e62 18164->18165 18166 299f76 18164->18166 18167 299e7c 18165->18167 18169 299eca 18165->18169 18170 299eba 18165->18170 18168 273330 2 API calls 18166->18168 18172 2a3672 std::_Facet_Register 2 API calls 18167->18172 18171 299f7b 18168->18171 18175 2a3672 std::_Facet_Register 2 API calls 18169->18175 18179 299e9a std::locale::_Locimp::_Locimp 18169->18179 18170->18167 18170->18171 18173 272b50 Concurrency::cancel_current_task 2 API calls 18171->18173 18174 299e8f 18172->18174 18176 299f80 18173->18176 18174->18176 18174->18179 18175->18179 18177 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 18176->18177 18178 299f85 18177->18178 18180 2977d0 RtlAllocateHeap 18179->18180 18181 299f47 18180->18181 18181->18157 18183 291443 18182->18183 18184 291471 18183->18184 18185 299e20 2 API calls 18183->18185 18184->18154 18185->18184 18187 2901f0 18186->18187 18188 299e20 2 API calls 18187->18188 18189 290260 18187->18189 18188->18187 18189->18159 18191 291430 2 API calls 18190->18191 18194 2908fc 18191->18194 18192 299e20 RtlAllocateHeap RtlAllocateHeap 18196 290995 18192->18196 18193 29090a 18193->18159 18194->18193 18195 299e20 2 API calls 18194->18195 18194->18196 18195->18194 18196->18192 18196->18193 18198 28ec6d 18197->18198 18199 287ef0 2 API calls 18198->18199 18200 28ec8d 18199->18200 18302 2916c0 18200->18302 18202 28ecdf 18202->18031 18204 28ee46 18203->18204 18227 28ef1f std::ios_base::_Ios_base_dtor 18203->18227 18205 28f425 18204->18205 18208 28e8a0 2 API calls 18204->18208 18210 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 18205->18210 18206 288f00 std::_Throw_Cpp_error 2 API calls 18207 28ef5b 18206->18207 18209 28ef6a 18207->18209 18216 28f191 18207->18216 18211 28ee79 18208->18211 18212 28f440 3 API calls 18209->18212 18213 28f42f 18210->18213 18214 288f00 std::_Throw_Cpp_error 2 API calls 18211->18214 18215 28ef79 18212->18215 18217 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 18213->18217 18218 28ee93 18214->18218 18222 273040 std::_Throw_Cpp_error 2 API calls 18215->18222 18216->18216 18223 273040 std::_Throw_Cpp_error 2 API calls 18216->18223 18219 28f434 18217->18219 18220 288f00 std::_Throw_Cpp_error 2 API calls 18218->18220 18224 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 18219->18224 18221 28eee3 18220->18221 18221->18205 18221->18227 18225 28efba 18222->18225 18226 28f1c9 18223->18226 18248 28f375 std::ios_base::_Ios_base_dtor 18224->18248 18228 288f00 std::_Throw_Cpp_error 2 API calls 18225->18228 18229 28fbf0 2 API calls 18226->18229 18227->18206 18231 28efcd 18228->18231 18232 28f1e0 18229->18232 18230 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 18233 28f43e 18230->18233 18234 28e710 2 API calls 18231->18234 18235 288f00 std::_Throw_Cpp_error 2 API calls 18232->18235 18236 28f019 18234->18236 18239 28f22f std::ios_base::_Ios_base_dtor 18235->18239 18237 288f00 std::_Throw_Cpp_error 2 API calls 18236->18237 18238 28f032 18237->18238 18240 288f00 std::_Throw_Cpp_error 2 API calls 18238->18240 18239->18219 18243 28f161 std::ios_base::_Ios_base_dtor 18239->18243 18242 28f081 std::ios_base::_Ios_base_dtor 18240->18242 18241 273040 std::_Throw_Cpp_error 2 API calls 18244 28f30c 18241->18244 18242->18213 18242->18243 18243->18241 18249 28f3f2 std::ios_base::_Ios_base_dtor 18243->18249 18245 28fbf0 2 API calls 18244->18245 18246 28f323 18245->18246 18247 288f00 std::_Throw_Cpp_error 2 API calls 18246->18247 18247->18248 18248->18230 18248->18249 18249->18047 18371 274e30 18250->18371 18253 274e30 2 API calls 18254 27762b 18253->18254 18255 28ace0 2 API calls 18254->18255 18256 277640 18255->18256 18257 28abb0 2 API calls 18256->18257 18258 277656 18257->18258 18259 28e710 2 API calls 18258->18259 18261 27766d std::ios_base::_Ios_base_dtor 18259->18261 18260 277a09 18262 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 18260->18262 18261->18260 18263 27770a std::ios_base::_Ios_base_dtor 18261->18263 18264 277a0e 18262->18264 18267 277350 2 API calls 18263->18267 18265 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 18264->18265 18266 277a13 18265->18266 18268 2777a4 18267->18268 18269 288f00 std::_Throw_Cpp_error 2 API calls 18268->18269 18270 2777b9 18269->18270 18271 28e710 2 API calls 18270->18271 18272 27780c 18271->18272 18273 288f00 std::_Throw_Cpp_error 2 API calls 18272->18273 18274 277828 18273->18274 18275 28ad80 2 API calls 18274->18275 18277 277879 std::ios_base::_Ios_base_dtor 18275->18277 18276 277975 std::ios_base::_Ios_base_dtor 18278 2772b0 2 API calls 18276->18278 18277->18264 18277->18276 18279 2779ca 18278->18279 18279->18054 18281 28f630 18280->18281 18284 28f4c9 std::ios_base::_Ios_base_dtor std::locale::_Locimp::_Locimp 18280->18284 18281->18063 18283 28f647 18285 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 18283->18285 18284->18281 18284->18283 18286 288f00 std::_Throw_Cpp_error 2 API calls 18284->18286 18287 2732d0 std::_Throw_Cpp_error 2 API calls 18284->18287 18375 2734a0 18284->18375 18288 28f651 18285->18288 18286->18284 18287->18284 18288->18063 18290 2a4b78 ___std_exception_destroy RtlAllocateHeap 18289->18290 18291 277a61 18290->18291 18292 2a4b78 ___std_exception_destroy RtlAllocateHeap 18291->18292 18293 277a77 18292->18293 18293->18076 18295 2835d1 18294->18295 18296 2835f1 std::ios_base::_Ios_base_dtor 18294->18296 18295->18296 18297 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 18295->18297 18296->18065 18298 283625 18297->18298 18298->18065 18382 286590 18299->18382 18305 2917d0 18302->18305 18304 2916da std::locale::_Setgloballocale 18304->18202 18306 291809 18305->18306 18312 291838 18305->18312 18307 291923 18306->18307 18310 29181b 18306->18310 18322 291990 18307->18322 18310->18312 18313 299f90 18310->18313 18312->18304 18314 29a0a3 18313->18314 18315 299fc2 18313->18315 18316 273330 2 API calls 18314->18316 18332 29d190 18315->18332 18320 29a000 std::locale::_Locimp::_Locimp 18316->18320 18318 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 18319 29a0ad 18318->18319 18320->18318 18321 29a05f std::ios_base::_Ios_base_dtor 18320->18321 18321->18312 18323 2a1cea 2 API calls 18322->18323 18325 29199a 18323->18325 18324 291928 18325->18324 18326 272cf0 std::_Throw_Cpp_error 2 API calls 18325->18326 18327 291a03 18326->18327 18328 28ace0 2 API calls 18327->18328 18329 291a18 18328->18329 18340 277cf0 18329->18340 18331 291a2d Concurrency::cancel_current_task 18333 29d1d9 18332->18333 18335 29d199 18332->18335 18333->18333 18334 29d1b0 18336 29d1b9 18334->18336 18337 2a3672 std::_Facet_Register 2 API calls 18334->18337 18335->18333 18335->18334 18338 2a3672 std::_Facet_Register 2 API calls 18335->18338 18336->18320 18339 29d1d2 18337->18339 18338->18334 18339->18320 18341 277350 2 API calls 18340->18341 18342 277d80 18341->18342 18343 28ad80 2 API calls 18342->18343 18344 277d94 18343->18344 18345 277dcd std::ios_base::_Ios_base_dtor 18344->18345 18347 277e33 18344->18347 18346 2772b0 2 API calls 18345->18346 18348 277dfd 18346->18348 18349 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 18347->18349 18348->18331 18350 277e38 18349->18350 18351 277350 2 API calls 18350->18351 18352 277ece 18351->18352 18353 28ad80 2 API calls 18352->18353 18354 277ee2 18353->18354 18355 277f1b std::ios_base::_Ios_base_dtor 18354->18355 18357 277f81 18354->18357 18356 2772b0 2 API calls 18355->18356 18358 277f4b 18356->18358 18359 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 18357->18359 18358->18331 18360 277f86 18359->18360 18361 277350 2 API calls 18360->18361 18362 278029 18361->18362 18363 28ad80 2 API calls 18362->18363 18364 27803d 18363->18364 18365 278076 std::ios_base::_Ios_base_dtor 18364->18365 18367 2780df 18364->18367 18366 2772b0 2 API calls 18365->18366 18368 2780aa 18366->18368 18369 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 18367->18369 18368->18331 18370 2780e4 18369->18370 18370->18331 18372 274e66 18371->18372 18372->18372 18373 274ea8 18372->18373 18374 273040 std::_Throw_Cpp_error 2 API calls 18372->18374 18373->18253 18374->18373 18378 273380 18375->18378 18379 273399 18378->18379 18380 2b0dd7 2 API calls 18379->18380 18381 2733a7 18380->18381 18381->18284 18383 2a4b15 ___std_exception_copy 2 API calls 18382->18383 18384 2865ce 18383->18384 18385 2a4b15 ___std_exception_copy 2 API calls 18384->18385 18386 286601 18385->18386 18386->18057 18388 2c8e17 18387->18388 18389 2c8c08 18387->18389 18388->16907 18391 2c8d38 std::locale::_Setgloballocale 18389->18391 18394 2a87b0 18389->18394 18403 273130 18389->18403 18391->18388 18392 273130 2 API calls 18391->18392 18392->18391 18395 2a87e3 18394->18395 18399 2a87c7 18394->18399 18396 2b9e42 __Getctype RtlAllocateHeap 18395->18396 18397 2a87e8 18396->18397 18398 2ba12d __Getctype RtlAllocateHeap 18397->18398 18400 2a87f8 18398->18400 18399->18389 18400->18399 18401 2b9a39 2 API calls 18400->18401 18402 2a882a 18401->18402 18402->18389 18404 2732b3 18403->18404 18405 27316f 18403->18405 18406 273330 2 API calls 18404->18406 18407 2731c7 18405->18407 18409 273189 18405->18409 18410 2731d7 18405->18410 18408 2732b8 18406->18408 18407->18408 18407->18409 18411 272b50 Concurrency::cancel_current_task 2 API calls 18408->18411 18412 2a3672 std::_Facet_Register 2 API calls 18409->18412 18413 2a3672 std::_Facet_Register 2 API calls 18410->18413 18416 27319c std::locale::_Locimp::_Locimp 18410->18416 18411->18416 18412->18416 18413->18416 18414 2a8c70 std::_Throw_Cpp_error RtlAllocateHeap 18415 2732c2 18414->18415 18416->18414 18417 27326b std::ios_base::_Ios_base_dtor 18416->18417 18417->18389 18419 2a3077 18418->18419 18420 2a364d GetSystemTimePreciseAsFileTime 18418->18420 18419->16552 18420->18419 18422 4cc0276 GetCurrentHwProfileW 18423 4cc02a1 18422->18423 18581 4cc00b6 18582 4cc00c5 GetCurrentHwProfileW 18581->18582 18584 4cc02a1 18582->18584

                                  Control-flow Graph

                                  APIs
                                  • setsockopt.WS2_32(000003E0,0000FFFF,00001006,?,00000008), ref: 00337BA6
                                  • recv.WS2_32(?,00000004,00000002), ref: 00337BC1
                                  • recv.WS2_32(00000000,0000000C,00000002,00000000), ref: 00337C43
                                  • recv.WS2_32(00000000,0000000C,00000008), ref: 00337C64
                                    • Part of subcall function 00338590: WSAStartup.WS2_32 ref: 003385BA
                                    • Part of subcall function 00338590: socket.WS2_32(?,?,?,?,?,?,003F9328,?,?), ref: 0033865D
                                    • Part of subcall function 00338590: connect.WS2_32(00000000,003C9BFC,?,?,?,?,003F9328,?,?), ref: 00338671
                                    • Part of subcall function 00338590: closesocket.WS2_32(00000000), ref: 0033867D
                                  • recv.WS2_32(00000000,?,00000008), ref: 00337D1B
                                  • recv.WS2_32(?,00000004,00000008), ref: 00337E23
                                  • __Xtime_get_ticks.LIBCPMT ref: 00337E2A
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00337E38
                                  • Sleep.KERNELBASE(00000001,00000000,?,00002710,00000000), ref: 00337EB1
                                  • Sleep.KERNELBASE(00000064,?,00002710,00000000), ref: 00337EB9
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3453216308.0000000000271000.00000040.00000001.01000000.00000005.sdmp, Offset: 00270000, based on PE: true
                                  • Associated: 00000006.00000002.3453133325.0000000000270000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3453216308.00000000003F5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454293047.00000000003FA000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000003FD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.000000000066A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006A6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006AD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006BC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3455660710.00000000006BD000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3455989932.000000000085A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456041331.000000000085B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456110511.000000000085C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456157365.000000000085D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_270000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: recv$Sleep$StartupUnothrow_t@std@@@Xtime_get_ticks__ehfuncinfo$??2@closesocketconnectsetsockoptsocket
                                  • String ID:
                                  • API String ID: 56803616-0
                                  • Opcode ID: 07882220808ef02d25d173d0adfd1a331f33bb9ff3491f4a8c047d7119001435
                                  • Instruction ID: 6e88e2596ea480353adc92e049b3df65c15f7d898baf3cb82f0974d9b43bd8f6
                                  • Opcode Fuzzy Hash: 07882220808ef02d25d173d0adfd1a331f33bb9ff3491f4a8c047d7119001435
                                  • Instruction Fuzzy Hash: 5DB1CCB0D04308DFEB22DBA8CC89BADBBB5BF44300F204259E554AB2D2D7B45D84CB91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 58 338590-3385c2 WSAStartup 59 338696-33869f 58->59 60 3385c8-3385f2 call 35a420 * 2 58->60 65 3385f4-3385f8 60->65 66 3385fe-338644 60->66 65->59 65->66 68 338690 66->68 69 338646-33864c 66->69 68->59 70 3386a4-3386ae 69->70 71 33864e 69->71 70->68 75 3386b0-3386b8 70->75 72 338654-338668 socket 71->72 72->68 74 33866a-33867a connect 72->74 76 3386a0 74->76 77 33867c-338684 closesocket 74->77 76->70 77->72 78 338686-33868f 77->78 78->68
                                  APIs
                                  • WSAStartup.WS2_32 ref: 003385BA
                                  • socket.WS2_32(?,?,?,?,?,?,003F9328,?,?), ref: 0033865D
                                  • connect.WS2_32(00000000,003C9BFC,?,?,?,?,003F9328,?,?), ref: 00338671
                                  • closesocket.WS2_32(00000000), ref: 0033867D
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3453216308.0000000000271000.00000040.00000001.01000000.00000005.sdmp, Offset: 00270000, based on PE: true
                                  • Associated: 00000006.00000002.3453133325.0000000000270000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3453216308.00000000003F5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454293047.00000000003FA000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000003FD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.000000000066A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006A6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006AD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006BC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3455660710.00000000006BD000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3455989932.000000000085A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456041331.000000000085B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456110511.000000000085C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456157365.000000000085D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_270000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: Startupclosesocketconnectsocket
                                  • String ID:
                                  • API String ID: 3098855095-0
                                  • Opcode ID: d0ce7b0ec73892f75179ecefeaeb5ca3e8d2c02cee223630d0a992775c9b2da7
                                  • Instruction ID: 90eac93afa4c0809a83fd1c5b877a109403795b5a3c46b7a10b51818e5e7baa0
                                  • Opcode Fuzzy Hash: d0ce7b0ec73892f75179ecefeaeb5ca3e8d2c02cee223630d0a992775c9b2da7
                                  • Instruction Fuzzy Hash: 4C31F3B26057005BD7218F248C85B6BB7E5AFC5734F114F1AFAA8A32D0D7709D0486A7

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 80 279280-2792dd call 2863b0 83 279413-279521 call 272df0 call 35a420 80->83 84 2792e3-2792e9 80->84 100 279537-27953f call 288dc0 83->100 101 279523-279535 83->101 86 2792f0-279313 84->86 88 279315-27931f 86->88 89 279324-279331 86->89 90 279403-279406 88->90 91 279333-27933d 89->91 92 279342-27934f 89->92 94 279409-27940d 90->94 91->90 95 279351-27935b 92->95 96 279360-27936d 92->96 94->83 94->86 95->90 98 27936f-279379 96->98 99 27937e-27938b 96->99 98->90 102 27938d-279397 99->102 103 279399-2793a6 99->103 104 279544-279597 call 35a420 * 2 100->104 101->104 102->90 106 2793b4-2793c1 103->106 107 2793a8-2793b2 103->107 117 2795cb-2795e1 call 35a420 104->117 118 279599-2795c8 call 35a420 call 2a5270 104->118 109 2793c3-2793cd 106->109 110 2793cf-2793dc 106->110 107->90 109->90 112 2793de-2793e8 110->112 113 2793ea-2793f4 110->113 112->90 113->94 116 2793f6-2793ff 113->116 116->90 124 2795e7-2795ed 117->124 125 2796e2 117->125 118->117 127 2795f0-2796ce WSASend 124->127 128 2796e6-2796f0 125->128 147 2796d4-2796dc 127->147 148 27975f-279763 127->148 129 2796f2-2796fe 128->129 130 27971e-27973d 128->130 131 279714-27971b call 2a38f3 129->131 132 279700-27970e 129->132 133 27976f-279796 130->133 134 27973f-27974b 130->134 131->130 132->131 136 279797-2797fe call 2a8c70 call 272df0 * 2 132->136 138 279765-27976c call 2a38f3 134->138 139 27974d-27975b 134->139 138->133 139->136 141 27975d 139->141 141->138 147->125 147->127 148->128
                                  APIs
                                  • WSASend.WS2_32(?,?,00000001,00000000,00000000,00000000,00000000,?,?,?,?,003BD15C,00000000,74D723A0,-003F9880), ref: 002796C9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3453216308.0000000000271000.00000040.00000001.01000000.00000005.sdmp, Offset: 00270000, based on PE: true
                                  • Associated: 00000006.00000002.3453133325.0000000000270000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3453216308.00000000003F5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454293047.00000000003FA000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000003FD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.000000000066A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006A6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006AD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006BC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3455660710.00000000006BD000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3455989932.000000000085A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456041331.000000000085B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456110511.000000000085C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456157365.000000000085D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_270000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: Send
                                  • String ID: Ws2_32.dll
                                  • API String ID: 121738739-3093949381
                                  • Opcode ID: 527028127386127502a2c203da77353f7dca882e87147708b6865a7b8fe48c3b
                                  • Instruction ID: 902b516f2e11e8cbaada82e9ebffbdf5ac720692791cb2c9329838fc7fa35d1c
                                  • Opcode Fuzzy Hash: 527028127386127502a2c203da77353f7dca882e87147708b6865a7b8fe48c3b
                                  • Instruction Fuzzy Hash: 5602E1B0D14398DFDF25CF98C8907ADBBB0EF55314F248289E4896B286D7701986CF92

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 153 4cc0000-4cc0027 155 4cc002a-4cc006e 153->155 159 4cc0073-4cc0088 call 4cc0089 155->159 163 4cc008a-4cc0090 159->163 163->155 165 4cc0092-4cc0268 163->165 186 4cc0278-4cc0292 GetCurrentHwProfileW 165->186 187 4cc02a1-4cc04a8 call 4cc04b2 186->187 213 4cc04aa-4cc04b7 187->213 214 4cc04d5-4cc04d7 187->214 215 4cc04b8-4cc04d0 call 4cc04ca 213->215 214->215 216 4cc04d9-4cc04db 214->216 218 4cc04dd-4cc0567 call 4cc0569 215->218 216->218 229 4cc056e-4cc0624 218->229 230 4cc0569-4cc056c 218->230 230->229
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3463546272.0000000004CC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_4cc0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a05d1a932564353f35dff6bfa82e5ae03f5ab2a10c9930a6c2fe81ca5452588d
                                  • Instruction ID: f28a4618dee75cdf9dbfed2084b90042ba63a1fd6761b919334c6ebb1810eba0
                                  • Opcode Fuzzy Hash: a05d1a932564353f35dff6bfa82e5ae03f5ab2a10c9930a6c2fe81ca5452588d
                                  • Instruction Fuzzy Hash: 9491F2EB24C210FEA61286D72B54AF7AB6FE6C7730338846FF407D6502F2842A493171

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 239 4cc0017-4cc0027 241 4cc002a-4cc006e 239->241 245 4cc0073-4cc0088 call 4cc0089 241->245 249 4cc008a-4cc0090 245->249 249->241 251 4cc0092-4cc0268 249->251 272 4cc0278-4cc0292 GetCurrentHwProfileW 251->272 273 4cc02a1-4cc04a8 call 4cc04b2 272->273 299 4cc04aa-4cc04b7 273->299 300 4cc04d5-4cc04d7 273->300 301 4cc04b8-4cc04d0 call 4cc04ca 299->301 300->301 302 4cc04d9-4cc04db 300->302 304 4cc04dd-4cc0567 call 4cc0569 301->304 302->304 315 4cc056e-4cc0624 304->315 316 4cc0569-4cc056c 304->316 316->315
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3463546272.0000000004CC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_4cc0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 60e7326c2e3e3c61f3f7802895252c6864ba63dbfd55138af1bc12b63337d729
                                  • Instruction ID: edea94770c28637466aec1d73850a4cf6ff3808d31e90dfe2d29fdc41e7b9a6f
                                  • Opcode Fuzzy Hash: 60e7326c2e3e3c61f3f7802895252c6864ba63dbfd55138af1bc12b63337d729
                                  • Instruction Fuzzy Hash: 8F91BEEB24C210FEA11286C72B54AF76B6FE6C7730738846EF407D5902F6956A8A3171

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 325 4cc005c-4cc006c 327 4cc006e 325->327 328 4cc0073-4cc0088 call 4cc0089 325->328 327->328 332 4cc008a-4cc0090 328->332 334 4cc002a-4cc0056 332->334 335 4cc0092-4cc0268 332->335 334->327 358 4cc0278-4cc0292 GetCurrentHwProfileW 335->358 359 4cc02a1-4cc04a8 call 4cc04b2 358->359 385 4cc04aa-4cc04b7 359->385 386 4cc04d5-4cc04d7 359->386 387 4cc04b8-4cc04d0 call 4cc04ca 385->387 386->387 388 4cc04d9-4cc04db 386->388 390 4cc04dd-4cc0567 call 4cc0569 387->390 388->390 401 4cc056e-4cc0624 390->401 402 4cc0569-4cc056c 390->402 402->401
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3463546272.0000000004CC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_4cc0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: eb9d7ab458f51d15f5f62d07752ea3b7751e702e68a388184b511e868d2ad4f3
                                  • Instruction ID: 5dd3c6ed398245adccc623b1eebfeb9fea5a6171210094d1b02ba0637470f918
                                  • Opcode Fuzzy Hash: eb9d7ab458f51d15f5f62d07752ea3b7751e702e68a388184b511e868d2ad4f3
                                  • Instruction Fuzzy Hash: 2081B0EB24C210FEB21285D72B54AF76B6FE6C7730338846EF407D6502F6856A8A7171

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 411 4cc0035-4cc0056 412 4cc006e 411->412 413 4cc0073-4cc0088 call 4cc0089 412->413 417 4cc008a-4cc0090 413->417 419 4cc002a-4cc0056 417->419 420 4cc0092-4cc0268 417->420 419->412 443 4cc0278-4cc0292 GetCurrentHwProfileW 420->443 444 4cc02a1-4cc04a8 call 4cc04b2 443->444 470 4cc04aa-4cc04b7 444->470 471 4cc04d5-4cc04d7 444->471 472 4cc04b8-4cc04d0 call 4cc04ca 470->472 471->472 473 4cc04d9-4cc04db 471->473 475 4cc04dd-4cc0567 call 4cc0569 472->475 473->475 486 4cc056e-4cc0624 475->486 487 4cc0569-4cc056c 475->487 487->486
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3463546272.0000000004CC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_4cc0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1d0b2d65cb9784deedf64938d63fa2d6c263e188f290a6f298328b1e81d2bf38
                                  • Instruction ID: 97961560e908855628ac402637a8d3c7e9bb475d7bb2aa445460849afa1959eb
                                  • Opcode Fuzzy Hash: 1d0b2d65cb9784deedf64938d63fa2d6c263e188f290a6f298328b1e81d2bf38
                                  • Instruction Fuzzy Hash: B481D1EB34C210FEA60286D72B54AF7AB6FE6C7730738846EF407D6502F6852A497171

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 496 4cc00a6-4cc00a7 497 4cc00a9 496->497 498 4cc0046-4cc0049 496->498 500 4cc00ab-4cc0268 497->500 499 4cc0054-4cc006e 498->499 503 4cc0073-4cc0088 call 4cc0089 499->503 530 4cc0278-4cc0292 GetCurrentHwProfileW 500->530 510 4cc008a-4cc0090 503->510 514 4cc002a-4cc0049 510->514 515 4cc0092-4cc00a0 510->515 514->499 515->500 531 4cc02a1-4cc04a8 call 4cc04b2 530->531 557 4cc04aa-4cc04b7 531->557 558 4cc04d5-4cc04d7 531->558 559 4cc04b8-4cc04d0 call 4cc04ca 557->559 558->559 560 4cc04d9-4cc04db 558->560 562 4cc04dd-4cc0567 call 4cc0569 559->562 560->562 573 4cc056e-4cc0624 562->573 574 4cc0569-4cc056c 562->574 574->573
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3463546272.0000000004CC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_4cc0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3c92a40eaee59ebd3520d87bf859794e8468e201d1c538dd2d6c8d6ca62cb62a
                                  • Instruction ID: 6484b779e19e2823a9fdc799cec3c4ed61314c61a5afdb0dd0043d422a35ac1a
                                  • Opcode Fuzzy Hash: 3c92a40eaee59ebd3520d87bf859794e8468e201d1c538dd2d6c8d6ca62cb62a
                                  • Instruction Fuzzy Hash: 0581BFEB34C210FEB11286C72B54AF76A6FE6C7730338846EF407D6502F6956A8A7171

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 583 4cc00cc-4cc00d0 584 4cc0095-4cc00c7 583->584 585 4cc00d2-4cc0268 583->585 584->585 604 4cc0278-4cc0292 GetCurrentHwProfileW 585->604 605 4cc02a1-4cc04a8 call 4cc04b2 604->605 631 4cc04aa-4cc04b7 605->631 632 4cc04d5-4cc04d7 605->632 633 4cc04b8-4cc04d0 call 4cc04ca 631->633 632->633 634 4cc04d9-4cc04db 632->634 636 4cc04dd-4cc0567 call 4cc0569 633->636 634->636 647 4cc056e-4cc0624 636->647 648 4cc0569-4cc056c 636->648 648->647
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3463546272.0000000004CC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_4cc0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6cf149878d00038f4236463c4d3ea5231b8fe1add90f0e39bb46442d36dab132
                                  • Instruction ID: 9fa62081408d7926122426054ebfcdd01a3efa4d5ea7807263f5adad108251d2
                                  • Opcode Fuzzy Hash: 6cf149878d00038f4236463c4d3ea5231b8fe1add90f0e39bb46442d36dab132
                                  • Instruction Fuzzy Hash: 54818DEB34C120FEB11285C72B54AF7AA6FE6C7730738842EF407D5602F6956A8A3171

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 657 4cc0089-4cc0268 677 4cc0278-4cc0292 GetCurrentHwProfileW 657->677 678 4cc02a1-4cc04a8 call 4cc04b2 677->678 704 4cc04aa-4cc04b7 678->704 705 4cc04d5-4cc04d7 678->705 706 4cc04b8-4cc04d0 call 4cc04ca 704->706 705->706 707 4cc04d9-4cc04db 705->707 709 4cc04dd-4cc0567 call 4cc0569 706->709 707->709 720 4cc056e-4cc0624 709->720 721 4cc0569-4cc056c 709->721 721->720
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04CC028B
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3463546272.0000000004CC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_4cc0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 2ad9578521106cb65fccfaa57c4e77a28739c4ce39f24bbc639e12d24382d3a1
                                  • Instruction ID: 012e3aecd362b08f6c0c1db9a640f3a1947b25b7fa451dcd0f66bca7a50fd597
                                  • Opcode Fuzzy Hash: 2ad9578521106cb65fccfaa57c4e77a28739c4ce39f24bbc639e12d24382d3a1
                                  • Instruction Fuzzy Hash: FC818CEB24C220FEB11285D72B54AF7AB6FE6C7730738846EF407D5502F6952A4A7131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 730 4cc00e1-4cc00f3 731 4cc00f5-4cc0102 730->731 732 4cc0120-4cc0122 730->732 734 4cc0103-4cc0114 731->734 733 4cc0124 732->733 732->734 735 4cc0126-4cc0268 733->735 734->735 749 4cc0278-4cc0292 GetCurrentHwProfileW 735->749 750 4cc02a1-4cc04a8 call 4cc04b2 749->750 776 4cc04aa-4cc04b7 750->776 777 4cc04d5-4cc04d7 750->777 778 4cc04b8-4cc04d0 call 4cc04ca 776->778 777->778 779 4cc04d9-4cc04db 777->779 781 4cc04dd-4cc0567 call 4cc0569 778->781 779->781 792 4cc056e-4cc0624 781->792 793 4cc0569-4cc056c 781->793 793->792
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3463546272.0000000004CC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_4cc0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8c89122123daecaeac2d773343b5ac39fc13446f21209e75135602dfb10aeaa3
                                  • Instruction ID: 39b65b7b03e43db2e5ebda3502127d85445afd2a2aeedc5c82f9528eb84e747e
                                  • Opcode Fuzzy Hash: 8c89122123daecaeac2d773343b5ac39fc13446f21209e75135602dfb10aeaa3
                                  • Instruction Fuzzy Hash: C4819DEB24C160FEB10285D72B54AF7AB6FE6C7730738846EF407D5902F6852B4A6171

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 802 4cc00b6-4cc0268 820 4cc0278-4cc0292 GetCurrentHwProfileW 802->820 821 4cc02a1-4cc04a8 call 4cc04b2 820->821 847 4cc04aa-4cc04b7 821->847 848 4cc04d5-4cc04d7 821->848 849 4cc04b8-4cc04d0 call 4cc04ca 847->849 848->849 850 4cc04d9-4cc04db 848->850 852 4cc04dd-4cc0567 call 4cc0569 849->852 850->852 863 4cc056e-4cc0624 852->863 864 4cc0569-4cc056c 852->864 864->863
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04CC028B
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3463546272.0000000004CC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_4cc0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: e2ee33a0252fc14c0e5b73e2659de9f6352242a31619cdedf046a4af97543eb1
                                  • Instruction ID: 033e36aec4cb2ba851bc065a804bce008db7ddf3a41cc8b8c3b741c287f879da
                                  • Opcode Fuzzy Hash: e2ee33a0252fc14c0e5b73e2659de9f6352242a31619cdedf046a4af97543eb1
                                  • Instruction Fuzzy Hash: 84719DEB24C220FEB11285C72B54AF7AB6FE6C7730738846EF407D5902F6952A4A7171

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 873 4cc01b3-4cc0268 880 4cc0278-4cc0292 GetCurrentHwProfileW 873->880 881 4cc02a1-4cc04a8 call 4cc04b2 880->881 907 4cc04aa-4cc04b7 881->907 908 4cc04d5-4cc04d7 881->908 909 4cc04b8-4cc04d0 call 4cc04ca 907->909 908->909 910 4cc04d9-4cc04db 908->910 912 4cc04dd-4cc0567 call 4cc0569 909->912 910->912 923 4cc056e-4cc0624 912->923 924 4cc0569-4cc056c 912->924 924->923
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3463546272.0000000004CC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_4cc0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8fec668aa2a0b92abc67992909a9732df6e8c662c8af36d00e210c8904d14512
                                  • Instruction ID: b1e82d61b707ca767ed1dd6e065c250ba9f6a8e4e9378a1221879eb13ff648b3
                                  • Opcode Fuzzy Hash: 8fec668aa2a0b92abc67992909a9732df6e8c662c8af36d00e210c8904d14512
                                  • Instruction Fuzzy Hash: 6271AEEB24C220FEB11285C72B54AF7AB6FE6C7730338846EF407D5502E6855B8A7171

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 933 4cc011b-4cc0122 934 4cc0124 933->934 935 4cc0103-4cc0114 933->935 936 4cc0126-4cc0268 934->936 935->936 950 4cc0278-4cc0292 GetCurrentHwProfileW 936->950 951 4cc02a1-4cc04a8 call 4cc04b2 950->951 977 4cc04aa-4cc04b7 951->977 978 4cc04d5-4cc04d7 951->978 979 4cc04b8-4cc04d0 call 4cc04ca 977->979 978->979 980 4cc04d9-4cc04db 978->980 982 4cc04dd-4cc0567 call 4cc0569 979->982 980->982 993 4cc056e-4cc0624 982->993 994 4cc0569-4cc056c 982->994 994->993
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3463546272.0000000004CC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_4cc0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 06b06bdfba5f2f68168e96147d97a0f3118268552c141e767f6f587a3bb118e5
                                  • Instruction ID: e5a1ee6bb5f65b6db491f9612343da42f314cc29c5d41a40d858fed29afd26f8
                                  • Opcode Fuzzy Hash: 06b06bdfba5f2f68168e96147d97a0f3118268552c141e767f6f587a3bb118e5
                                  • Instruction Fuzzy Hash: 98718CEB24C120FDB11285C72B54AF7AA6FE6C7730738842EF407D5906F6856B8A3171

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1003 4cc0137-4cc0268 1014 4cc0278-4cc0292 GetCurrentHwProfileW 1003->1014 1015 4cc02a1-4cc04a8 call 4cc04b2 1014->1015 1041 4cc04aa-4cc04b7 1015->1041 1042 4cc04d5-4cc04d7 1015->1042 1043 4cc04b8-4cc04d0 call 4cc04ca 1041->1043 1042->1043 1044 4cc04d9-4cc04db 1042->1044 1046 4cc04dd-4cc0567 call 4cc0569 1043->1046 1044->1046 1057 4cc056e-4cc0624 1046->1057 1058 4cc0569-4cc056c 1046->1058 1058->1057
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04CC028B
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3463546272.0000000004CC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_4cc0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 1720828fcb7f2c45f3c4899b15d19f3b6646c941e55a94c87cd532ebe513e0b9
                                  • Instruction ID: b06011f51c89d236e25b4867fab1b5c8d1411f087cdee9f915f230809756d438
                                  • Opcode Fuzzy Hash: 1720828fcb7f2c45f3c4899b15d19f3b6646c941e55a94c87cd532ebe513e0b9
                                  • Instruction Fuzzy Hash: 4E618CEB24C120FEB15285C72B14AF7AA6FE6C7730738842EF407D5906F6856B8A3071
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04CC028B
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3463546272.0000000004CC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_4cc0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: b46365dbc5cdaf13d737de27f0f56e5628ebbb6798885a3335b377a20ae63b05
                                  • Instruction ID: 3ec41a03c80beef25e2f3f22cbb61105bfe76220754bf2b9c9e1761e231b55ee
                                  • Opcode Fuzzy Hash: b46365dbc5cdaf13d737de27f0f56e5628ebbb6798885a3335b377a20ae63b05
                                  • Instruction Fuzzy Hash: 82617BEB24C120FDB15285C72B54AF7AA6FE6C7730738842EF407D5902F6856B8A3171
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04CC028B
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3463546272.0000000004CC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_4cc0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: b08f426274b6b9aad88bd5dd7fa1844443aa815c3651b6ccd9827175385ea082
                                  • Instruction ID: 6d4171ed7da8bfcd477a027cd2b79bb5648644146287141a7093c467979b22af
                                  • Opcode Fuzzy Hash: b08f426274b6b9aad88bd5dd7fa1844443aa815c3651b6ccd9827175385ea082
                                  • Instruction Fuzzy Hash: 0B617BEB24C120FEB11285C72B54AF7AA6FE6C7730738846EF407D5906F6852B8A3071
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04CC028B
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3463546272.0000000004CC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_4cc0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: f9a9e2e710f44e69fb3b408bd109b99d65dd6e0ab6bdc946483b029c74fe7dff
                                  • Instruction ID: 700e53e4ef3092452fc1e84faec7217fa337ffb1a0c9cab7c98e733403dd2d0e
                                  • Opcode Fuzzy Hash: f9a9e2e710f44e69fb3b408bd109b99d65dd6e0ab6bdc946483b029c74fe7dff
                                  • Instruction Fuzzy Hash: FD618EEB24C220FEB15281C72B54AF7AA6FE5C7770338846EF807D5906F6855B8A3171
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04CC028B
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3463546272.0000000004CC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_4cc0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 21162643eb4028e4a18aaa8a18ba4b9f2f0d7c76947c3bedb13152f0dad9db62
                                  • Instruction ID: 3bc6187eb136968304a246006a673d0fd15a18beec4d0aad5294f09927ec5e23
                                  • Opcode Fuzzy Hash: 21162643eb4028e4a18aaa8a18ba4b9f2f0d7c76947c3bedb13152f0dad9db62
                                  • Instruction Fuzzy Hash: B8618EEB24C120FEB15281C72B54AF7AA6FE6C7730338846EF807D5906F6855B8A7171
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04CC028B
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3463546272.0000000004CC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_4cc0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 26d1a1302c9caee45530ac598a6c95eac325dac84f950f20fb7afbb414fb0056
                                  • Instruction ID: 5eae1560e165ca1724ae8d3494a032d725f052b7e576af785b75d13da701f345
                                  • Opcode Fuzzy Hash: 26d1a1302c9caee45530ac598a6c95eac325dac84f950f20fb7afbb414fb0056
                                  • Instruction Fuzzy Hash: BA618DEB24C120FEB51282C72B54AF76B6FE6C7730338846EF807D5502E6856B8A7171
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04CC028B
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3463546272.0000000004CC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_4cc0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: ab7da1066dd979e3661fb9f773d205287c4a67304c7ad98fd4d45b173bdae7f2
                                  • Instruction ID: 8c8dffbe4b4ed3f159110beac98beccffa684d63944d48bba538fb873595b8bb
                                  • Opcode Fuzzy Hash: ab7da1066dd979e3661fb9f773d205287c4a67304c7ad98fd4d45b173bdae7f2
                                  • Instruction Fuzzy Hash: 7C516CEB24C120FEB15291C72B14AF76B6FE6C7730338846AF407D5502F6856B4A7171
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04CC028B
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3463546272.0000000004CC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_4cc0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 800c6a99f03d0818131ee2567fad102bdca4b3e496fc7150ca92d963ad656ac9
                                  • Instruction ID: db590f2dc2f3af816aaf56d812136549c6e214e1cee31174d249d21b084abf2f
                                  • Opcode Fuzzy Hash: 800c6a99f03d0818131ee2567fad102bdca4b3e496fc7150ca92d963ad656ac9
                                  • Instruction Fuzzy Hash: 7A518BEB24C120FEA20292D72B54AF76B6FE6C7730338846EF407D5606F6856B4A7071
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04CC028B
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3463546272.0000000004CC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_4cc0000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 8134bbd198e5a7428ccdca5db0a83c7ac5ae30a08d14c373b45c6c28051379e4
                                  • Instruction ID: aa09cbd4dd5243427063fd3b0616ecd55eccfa9dd734a955416ce68e744ac052
                                  • Opcode Fuzzy Hash: 8134bbd198e5a7428ccdca5db0a83c7ac5ae30a08d14c373b45c6c28051379e4
                                  • Instruction Fuzzy Hash: 08519EEB24C120FEA10292D72B54AF76B6FE6C7730338846EF407D5902F6856B4A7171
                                  APIs
                                  • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,?,?,?,?,?,?,?,00000000,?), ref: 002B990E
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3453216308.0000000000271000.00000040.00000001.01000000.00000005.sdmp, Offset: 00270000, based on PE: true
                                  • Associated: 00000006.00000002.3453133325.0000000000270000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3453216308.00000000003F5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454293047.00000000003FA000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000003FD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.000000000066A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006A6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006AD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006BC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3455660710.00000000006BD000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3455989932.000000000085A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456041331.000000000085B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456110511.000000000085C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456157365.000000000085D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_270000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: FileWrite
                                  • String ID:
                                  • API String ID: 3934441357-0
                                  • Opcode ID: 17d2447457f2b5972642c0dba88c9f4a1db1be814fefd16fa32d2a992341c8ff
                                  • Instruction ID: c2da066cc9468347704bc3e6611057c5761a53c3bea418ff2594bf5fdf349586
                                  • Opcode Fuzzy Hash: 17d2447457f2b5972642c0dba88c9f4a1db1be814fefd16fa32d2a992341c8ff
                                  • Instruction Fuzzy Hash: 3961C8B1C2411ABFDF11DFA8C840EEEBFB9AF49344F140149EA00A7256D771D9A1CB60
                                  APIs
                                  • SetFilePointerEx.KERNELBASE(00000000,?,?,?,?,?,00000000,?,?,?,002B2626,?,?,?,?,?), ref: 002B2558
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3453216308.0000000000271000.00000040.00000001.01000000.00000005.sdmp, Offset: 00270000, based on PE: true
                                  • Associated: 00000006.00000002.3453133325.0000000000270000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3453216308.00000000003F5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454293047.00000000003FA000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000003FD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.000000000066A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006A6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006AD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006BC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3455660710.00000000006BD000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3455989932.000000000085A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456041331.000000000085B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456110511.000000000085C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456157365.000000000085D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_270000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: FilePointer
                                  • String ID:
                                  • API String ID: 973152223-0
                                  • Opcode ID: 8265e3baa2c4e3021c2f65404f8c77ef4c0cc2b7348179fbfa2a98928ea9aa75
                                  • Instruction ID: 760603478982777a4a3961bc587235d06c39bfcf0b194627a74c49fa616ea0a5
                                  • Opcode Fuzzy Hash: 8265e3baa2c4e3021c2f65404f8c77ef4c0cc2b7348179fbfa2a98928ea9aa75
                                  • Instruction Fuzzy Hash: D4014932620619AFCF2DCF19CC21CDE7B69DF85370B380108F811AB2A0E671ED618B90
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0027331F
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3453216308.0000000000271000.00000040.00000001.01000000.00000005.sdmp, Offset: 00270000, based on PE: true
                                  • Associated: 00000006.00000002.3453133325.0000000000270000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3453216308.00000000003F5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454293047.00000000003FA000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000003FD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.000000000066A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006A6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006AD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006BC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3455660710.00000000006BD000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3455989932.000000000085A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456041331.000000000085B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456110511.000000000085C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456157365.000000000085D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_270000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID:
                                  • API String ID: 118556049-0
                                  • Opcode ID: 0fd589d96c9d07b1efa01aec19e4ff46bb0766daf2056f60d33bc81ca57302d3
                                  • Instruction ID: 0ac005857ee6407b8a2d41b35a0a975707a6a027ac5cba7ce810bafe7a2ed3a8
                                  • Opcode Fuzzy Hash: 0fd589d96c9d07b1efa01aec19e4ff46bb0766daf2056f60d33bc81ca57302d3
                                  • Instruction Fuzzy Hash: 0AF024325201019BDB28AF60E4055EAB3ECEF2436175048BBF88CC7612EF36DA609BC0
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000008,?,00000001,?,002B9FE0,00000001,00000364,00000001,00000006,000000FF,?,002A4B3F,?,?,74D723A0,?), ref: 002BA69C
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3453216308.0000000000271000.00000040.00000001.01000000.00000005.sdmp, Offset: 00270000, based on PE: true
                                  • Associated: 00000006.00000002.3453133325.0000000000270000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3453216308.00000000003F5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454293047.00000000003FA000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000003FD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.000000000066A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006A6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006AD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006BC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3455660710.00000000006BD000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3455989932.000000000085A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456041331.000000000085B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456110511.000000000085C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456157365.000000000085D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_270000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 016ebd4c37db6ebe38260baa3052aaed6ed1655ae21682b0818a503a81bbed62
                                  • Instruction ID: 10aeeba61009670bfae316ee75eb6bbc93b4eadbdf05269592c132c35147e8fd
                                  • Opcode Fuzzy Hash: 016ebd4c37db6ebe38260baa3052aaed6ed1655ae21682b0818a503a81bbed62
                                  • Instruction Fuzzy Hash: 95F0E9711315226A9F256E65DC01BEA374DAF413E0F1C8111EC14EA080CE30DC3089E6
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000000,00000001,?,?,002A4B3F,?,?,74D723A0,?,?,00273522,?,?), ref: 002BB0C7
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3453216308.0000000000271000.00000040.00000001.01000000.00000005.sdmp, Offset: 00270000, based on PE: true
                                  • Associated: 00000006.00000002.3453133325.0000000000270000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3453216308.00000000003F5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454293047.00000000003FA000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000003FD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.000000000066A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006A6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006AD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006BC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3455660710.00000000006BD000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3455989932.000000000085A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456041331.000000000085B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456110511.000000000085C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456157365.000000000085D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_270000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 9c76f0b8d261aa3207285c4237837d9393cd5e1ee2516b5225648fd826ed3fff
                                  • Instruction ID: 6f0a7fbd7ef7c7ce7723c9c514ef6a283c3e942db96374ea85f181cac2497d7d
                                  • Opcode Fuzzy Hash: 9c76f0b8d261aa3207285c4237837d9393cd5e1ee2516b5225648fd826ed3fff
                                  • Instruction Fuzzy Hash: A1E065311316226ADA333B659C11BFB764D9F423E1F550A11AC24A61C1DBE1DC3085E5
                                  APIs
                                  • CloseHandle.KERNELBASE(00000000,00000000,?,?,002B8CE6,00000000,?,003EA178,0000000C,002B8DA2,?,?,?), ref: 002B8E55
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3453216308.0000000000271000.00000040.00000001.01000000.00000005.sdmp, Offset: 00270000, based on PE: true
                                  • Associated: 00000006.00000002.3453133325.0000000000270000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3453216308.00000000003F5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454293047.00000000003FA000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000003FD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.000000000066A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006A6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006AD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006BC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3455660710.00000000006BD000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3455989932.000000000085A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456041331.000000000085B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456110511.000000000085C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456157365.000000000085D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_270000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CloseHandle
                                  • String ID:
                                  • API String ID: 2962429428-0
                                  • Opcode ID: 275887d1110631617db0cc4eb70b81f6abe8236baccbc3f7c48844cab9b384af
                                  • Instruction ID: adeb29b6794b4e358cda69c12020fad0074c766e59eb31b33e60d2169d412ef6
                                  • Opcode Fuzzy Hash: 275887d1110631617db0cc4eb70b81f6abe8236baccbc3f7c48844cab9b384af
                                  • Instruction Fuzzy Hash: 5C116B3363552516EA2936345841BFE678D4F827F4F2E0659F91C9B0D2DEB0DCB1C151
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3453216308.0000000000271000.00000040.00000001.01000000.00000005.sdmp, Offset: 00270000, based on PE: true
                                  • Associated: 00000006.00000002.3453133325.0000000000270000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3453216308.00000000003F5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454293047.00000000003FA000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000003FD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.000000000066A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006A6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006AD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006BC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3455660710.00000000006BD000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3455989932.000000000085A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456041331.000000000085B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456110511.000000000085C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456157365.000000000085D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_270000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 333d4b6d5425d6f9d03797ee82114c3711da98524c03317fffdb5ec62fb2b380
                                  • Instruction ID: 80b3fa339f82122b0e9e544e827fcabe06d761cf03f4fdff635df8208b6c9988
                                  • Opcode Fuzzy Hash: 333d4b6d5425d6f9d03797ee82114c3711da98524c03317fffdb5ec62fb2b380
                                  • Instruction Fuzzy Hash: FE023C71E1121A9BDF14CFA9C9807AEFBB1FF49314F24826AD919E7340DB31A951CB90
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0028A09D
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0028A0BF
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0028A0E7
                                  • __Getctype.LIBCPMT ref: 0028A1C5
                                  • std::_Facet_Register.LIBCPMT ref: 0028A1F9
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0028A223
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3453216308.0000000000271000.00000040.00000001.01000000.00000005.sdmp, Offset: 00270000, based on PE: true
                                  • Associated: 00000006.00000002.3453133325.0000000000270000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3453216308.00000000003F5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454293047.00000000003FA000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000003FD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.000000000066A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006A6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006AD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006BC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3455660710.00000000006BD000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3455989932.000000000085A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456041331.000000000085B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456110511.000000000085C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456157365.000000000085D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_270000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetctypeRegister
                                  • String ID: PD'$PG'$E'
                                  • API String ID: 1102183713-296772504
                                  • Opcode ID: 60d84625269c321870243de85b1db2f6c70b5fe39c8d606c73e0e90eee090758
                                  • Instruction ID: eff3a569e27ae02317733a737fe9287f19c6946f03623e1f42262a434fcfa0a8
                                  • Opcode Fuzzy Hash: 60d84625269c321870243de85b1db2f6c70b5fe39c8d606c73e0e90eee090758
                                  • Instruction Fuzzy Hash: 3B51CAB4D11205CFDB12DF58C845BAEBBB4BB01710F14815AE845AB391DB74AE14CB92
                                  APIs
                                  • _ValidateLocalCookies.LIBCMT ref: 002A7307
                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 002A730F
                                  • _ValidateLocalCookies.LIBCMT ref: 002A7398
                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 002A73C3
                                  • _ValidateLocalCookies.LIBCMT ref: 002A7418
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3453216308.0000000000271000.00000040.00000001.01000000.00000005.sdmp, Offset: 00270000, based on PE: true
                                  • Associated: 00000006.00000002.3453133325.0000000000270000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3453216308.00000000003F5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454293047.00000000003FA000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000003FD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.000000000066A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006A6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006AD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006BC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3455660710.00000000006BD000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3455989932.000000000085A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456041331.000000000085B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456110511.000000000085C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456157365.000000000085D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_270000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                  • String ID: `-'$csm
                                  • API String ID: 1170836740-83844572
                                  • Opcode ID: eb5129a1509aeb7940f5fdea42eabb246665db7eed828f8fb3404deb1bd0632f
                                  • Instruction ID: e7130925ce2521ba356c3b8b9291d5350d115f62cea08ebb7c7193a0d9533b34
                                  • Opcode Fuzzy Hash: eb5129a1509aeb7940f5fdea42eabb246665db7eed828f8fb3404deb1bd0632f
                                  • Instruction Fuzzy Hash: 7041B334A2420A9FCF10DF68CC81AAE7FB5AF46314F148195ED149B391DF31A921CF95
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0028C45A
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0028C47C
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0028C4A4
                                  • std::_Facet_Register.LIBCPMT ref: 0028C59A
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0028C5C4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3453216308.0000000000271000.00000040.00000001.01000000.00000005.sdmp, Offset: 00270000, based on PE: true
                                  • Associated: 00000006.00000002.3453133325.0000000000270000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3453216308.00000000003F5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454293047.00000000003FA000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000003FD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.000000000066A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006A6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006AD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006BC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3455660710.00000000006BD000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3455989932.000000000085A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456041331.000000000085B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456110511.000000000085C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456157365.000000000085D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_270000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                  • String ID: E'$PD'
                                  • API String ID: 459529453-207005594
                                  • Opcode ID: 099c9abab4cb4a0b3a7949531a80820e266761042ad5f7d9ebeece61937255ba
                                  • Instruction ID: 04638ea25e28e67670dd8d25aa7a6da063081b823bc7dd7e8df3b0e003af22aa
                                  • Opcode Fuzzy Hash: 099c9abab4cb4a0b3a7949531a80820e266761042ad5f7d9ebeece61937255ba
                                  • Instruction Fuzzy Hash: 2E51EDB4911245DFDB12EF58C840BAEBBF4FB01314F24815DE845AB381DBB5AE04CBA0
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3453216308.0000000000271000.00000040.00000001.01000000.00000005.sdmp, Offset: 00270000, based on PE: true
                                  • Associated: 00000006.00000002.3453133325.0000000000270000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3453216308.00000000003F5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454293047.00000000003FA000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000003FD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.000000000066A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006A6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006AD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006BC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3455660710.00000000006BD000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3455989932.000000000085A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456041331.000000000085B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456110511.000000000085C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456157365.000000000085D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_270000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: _strrchr
                                  • String ID:
                                  • API String ID: 3213747228-0
                                  • Opcode ID: 785c90e8ff89e0f1a3d98e37725974d6f6ea20f06d45e48120c47f1ca5a82ffe
                                  • Instruction ID: cdc596237ba662f3ce77e08062660e67d6033201eb08cb3056a373a9ec18004e
                                  • Opcode Fuzzy Hash: 785c90e8ff89e0f1a3d98e37725974d6f6ea20f06d45e48120c47f1ca5a82ffe
                                  • Instruction Fuzzy Hash: 8FB148729202569FDB13CF24CC81BEEBBA5EF55390F144156E944AF282D7F4E921CBA0
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 002A2730
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 002A273B
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 002A27A9
                                    • Part of subcall function 002A288C: std::locale::_Locimp::_Locimp.LIBCPMT ref: 002A28A4
                                  • std::locale::_Setgloballocale.LIBCPMT ref: 002A2756
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3453216308.0000000000271000.00000040.00000001.01000000.00000005.sdmp, Offset: 00270000, based on PE: true
                                  • Associated: 00000006.00000002.3453133325.0000000000270000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3453216308.00000000003F5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454293047.00000000003FA000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000003FD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.000000000066A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006A6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006AD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006BC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3455660710.00000000006BD000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3455989932.000000000085A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456041331.000000000085B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456110511.000000000085C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456157365.000000000085D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_270000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                                  • String ID: `-'
                                  • API String ID: 677527491-850853302
                                  • Opcode ID: 9c1c91dffb11d4b22cd92066b52ef04e143a079d96b08b275b38dbe2b69bfb77
                                  • Instruction ID: d3a84ff1dd501f7cea3147f817d6d549f2981559e4c0be2a6c39d19b810baa03
                                  • Opcode Fuzzy Hash: 9c1c91dffb11d4b22cd92066b52ef04e143a079d96b08b275b38dbe2b69bfb77
                                  • Instruction Fuzzy Hash: D401B179A20111CFC70AEF24D84197D7BB5BF86750B14000AF81157391CF34AE16CF91
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 0027750C
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00277522
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3453216308.0000000000271000.00000040.00000001.01000000.00000005.sdmp, Offset: 00270000, based on PE: true
                                  • Associated: 00000006.00000002.3453133325.0000000000270000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3453216308.00000000003F5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454293047.00000000003FA000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000003FD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.000000000066A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006A6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006AD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006BC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3455660710.00000000006BD000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3455989932.000000000085A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456041331.000000000085B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456110511.000000000085C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456157365.000000000085D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_270000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: )'$[json.exception.
                                  • API String ID: 4194217158-3484975215
                                  • Opcode ID: 253e77879df66892f0db02ee0fff639805cb4dc6d71a2beeb379d08c5deda496
                                  • Instruction ID: c52d74661e54674c008a959a49d2695ae2ce487d2c0002feb8a137af747c28cd
                                  • Opcode Fuzzy Hash: 253e77879df66892f0db02ee0fff639805cb4dc6d71a2beeb379d08c5deda496
                                  • Instruction Fuzzy Hash: D351F1B1C15748DFDB11DFA8C905B9EBBB4EF11314F108269E854A7382DBB85A44CBE1
                                  APIs
                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 0027499F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3453216308.0000000000271000.00000040.00000001.01000000.00000005.sdmp, Offset: 00270000, based on PE: true
                                  • Associated: 00000006.00000002.3453133325.0000000000270000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3453216308.00000000003F5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454293047.00000000003FA000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000003FD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.000000000066A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006A6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006AD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006BC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3455660710.00000000006BD000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3455989932.000000000085A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456041331.000000000085B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456110511.000000000085C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456157365.000000000085D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_270000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: Ios_base_dtorstd::ios_base::_
                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                  • API String ID: 323602529-1866435925
                                  • Opcode ID: 604716ef037de747dfa135c380a61004ca7c0cb3d6f9715772cdc66060f54691
                                  • Instruction ID: eadcf8f316b9aaabeb78b9665c21b7e47094956d9c1fe35f325af4cfee47fe99
                                  • Opcode Fuzzy Hash: 604716ef037de747dfa135c380a61004ca7c0cb3d6f9715772cdc66060f54691
                                  • Instruction Fuzzy Hash: D9112C73924644EBC711EE5CDC42BA77398D706710F04862AFE5C872C1EB75A9258B92
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00273819
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 002738F0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3453216308.0000000000271000.00000040.00000001.01000000.00000005.sdmp, Offset: 00270000, based on PE: true
                                  • Associated: 00000006.00000002.3453133325.0000000000270000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3453216308.00000000003F5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454293047.00000000003FA000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000003FD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.000000000066A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006A6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006AD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006BC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3455660710.00000000006BD000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3455989932.000000000085A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456041331.000000000085B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456110511.000000000085C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456157365.000000000085D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_270000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: ___std_exception_copy___std_exception_destroy
                                  • String ID: )'
                                  • API String ID: 2970364248-641774962
                                  • Opcode ID: 8996ea3b7b77475126a7e0c08eccd432abd4ee941a668fa86889af7834bf8f05
                                  • Instruction ID: 58a5256877885751e01093c811ef01a7015b09f847f7305146640162b8b519d6
                                  • Opcode Fuzzy Hash: 8996ea3b7b77475126a7e0c08eccd432abd4ee941a668fa86889af7834bf8f05
                                  • Instruction Fuzzy Hash: 1A61ABB1C01248DFDB11DF98C845BDDFBB4FF19324F14825AE818AB282D7B55A54CBA1
                                  APIs
                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 0027499F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3453216308.0000000000271000.00000040.00000001.01000000.00000005.sdmp, Offset: 00270000, based on PE: true
                                  • Associated: 00000006.00000002.3453133325.0000000000270000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3453216308.00000000003F5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454293047.00000000003FA000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000003FD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.000000000066A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006A6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006AD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006BC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3455660710.00000000006BD000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3455989932.000000000085A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456041331.000000000085B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456110511.000000000085C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456157365.000000000085D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_270000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: Ios_base_dtorstd::ios_base::_
                                  • String ID: ios_base::badbit set$ios_base::failbit set
                                  • API String ID: 323602529-1240500531
                                  • Opcode ID: 1752f2705687943523609b8749fc7f0d92bff2e29829d02c3c42ea6421dcbdd0
                                  • Instruction ID: 15d42b873b51aa764f1ed3b13278ebe1b71469e63501a1f1ac471d2e9c3a28b2
                                  • Opcode Fuzzy Hash: 1752f2705687943523609b8749fc7f0d92bff2e29829d02c3c42ea6421dcbdd0
                                  • Instruction Fuzzy Hash: 7F4106B1D10248EFCB04EF58CC45BAEB7B8EB05710F14825EF558A7381DB755A10CBA1
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00274061
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 002740C4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3453216308.0000000000271000.00000040.00000001.01000000.00000005.sdmp, Offset: 00270000, based on PE: true
                                  • Associated: 00000006.00000002.3453133325.0000000000270000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3453216308.00000000003F5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454293047.00000000003FA000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000003FD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.000000000066A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006A6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006AD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006BC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3455660710.00000000006BD000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3455989932.000000000085A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456041331.000000000085B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456110511.000000000085C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456157365.000000000085D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_270000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                  • String ID: bad locale name
                                  • API String ID: 3988782225-1405518554
                                  • Opcode ID: a9cc83db2e2213766dee099c76c83250dcceeaeb1161b38aa4111445d6b51c45
                                  • Instruction ID: 7faac44741581b92729de6deaa50b25d08920131feda2a594f5cbbb5b62b3fdc
                                  • Opcode Fuzzy Hash: a9cc83db2e2213766dee099c76c83250dcceeaeb1161b38aa4111445d6b51c45
                                  • Instruction Fuzzy Hash: 9411D370805B84EFD721CF68C50474BBFF4AF16714F14868DE0959BB81D3B95A04CBA1
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 002865C9
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 002865FC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3453216308.0000000000271000.00000040.00000001.01000000.00000005.sdmp, Offset: 00270000, based on PE: true
                                  • Associated: 00000006.00000002.3453133325.0000000000270000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3453216308.00000000003F5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454293047.00000000003FA000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000003FD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.000000000066A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006A6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006AD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006BC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3455660710.00000000006BD000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3455989932.000000000085A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456041331.000000000085B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456110511.000000000085C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456157365.000000000085D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_270000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: )'
                                  • API String ID: 2659868963-641774962
                                  • Opcode ID: 123be6cf39f18f8d199e1f8907df87c2684ebc01a62f92d8328519941ec621ad
                                  • Instruction ID: e2f976665c31f7f803b90caa95c2baf1acf2e14e2a92afb9d0b02c9e7bcc2375
                                  • Opcode Fuzzy Hash: 123be6cf39f18f8d199e1f8907df87c2684ebc01a62f92d8328519941ec621ad
                                  • Instruction Fuzzy Hash: DC1133B6910748EBC711DF59C980B85F7F8FF0A724F10876AF91497641E774A9448BA0
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00277A5C
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00277A72
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3453216308.0000000000271000.00000040.00000001.01000000.00000005.sdmp, Offset: 00270000, based on PE: true
                                  • Associated: 00000006.00000002.3453133325.0000000000270000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3453216308.00000000003F5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454293047.00000000003FA000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000003FD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.0000000000584000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.000000000066A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006A6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006AD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3454414581.00000000006BC000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3455660710.00000000006BD000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3455989932.000000000085A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456041331.000000000085B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456110511.000000000085C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.3456157365.000000000085D000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_270000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: )'
                                  • API String ID: 4194217158-641774962
                                  • Opcode ID: a42d6aa48fbe70f0ad7044525cff6f328afa84e1345691169a26e7f23dbabe79
                                  • Instruction ID: 8aaf9455f6e72a9519bef7e15fdd8e30fe2b849b97671001748982469209d337
                                  • Opcode Fuzzy Hash: a42d6aa48fbe70f0ad7044525cff6f328afa84e1345691169a26e7f23dbabe79
                                  • Instruction Fuzzy Hash: 0EF04FB1845648DFC711DF98C901B89BBF8EB06728F50066EE414A3680D7B59A048BA1

                                  Control-flow Graph

                                  APIs
                                  • setsockopt.WS2_32(00000404,0000FFFF,00001006,?,00000008), ref: 00DE7BA6
                                  • recv.WS2_32(?,00000004,00000002), ref: 00DE7BC1
                                  • recv.WS2_32(00000000,0000000C,00000002,00000000), ref: 00DE7C43
                                  • recv.WS2_32(00000000,0000000C,00000008), ref: 00DE7C64
                                    • Part of subcall function 00DE8590: WSAStartup.WS2_32 ref: 00DE85BA
                                    • Part of subcall function 00DE8590: socket.WS2_32(?,?,?,?,?,?,00EA9328,?,?), ref: 00DE865E
                                    • Part of subcall function 00DE8590: connect.WS2_32(00000000,00E79BFC,?,?,?,?,00EA9328,?,?), ref: 00DE8671
                                    • Part of subcall function 00DE8590: closesocket.WS2_32(00000000), ref: 00DE867D
                                  • recv.WS2_32(00000000,?,00000008), ref: 00DE7D1B
                                  • recv.WS2_32(?,00000004,00000008), ref: 00DE7E23
                                  • __Xtime_get_ticks.LIBCPMT ref: 00DE7E2A
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00DE7E38
                                  • Sleep.KERNELBASE(00000001,00000000,?,00002710,00000000), ref: 00DE7EB1
                                  • Sleep.KERNELBASE(00000064,?,00002710,00000000), ref: 00DE7EB9
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3453305471.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000007.00000002.3453259385.0000000000D20000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453305471.0000000000EA5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453559138.0000000000EAA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000000EAD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000001034000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000111A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000001156000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000115D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000116C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454060819.000000000116D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454305024.000000000130A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454349675.000000000130B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454385676.000000000130C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454406329.000000000130D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_d20000_RageMP131.jbxd
                                  Similarity
                                  • API ID: recv$Sleep$StartupUnothrow_t@std@@@Xtime_get_ticks__ehfuncinfo$??2@closesocketconnectsetsockoptsocket
                                  • String ID:
                                  • API String ID: 56803616-0
                                  • Opcode ID: d79d5559512d96c5841a2a436169761a674c0725812c8840720a25889d355715
                                  • Instruction ID: b2682809752611a262af9d7f922c3cfa6389c30f193784cd721d1c5e0f4f52fb
                                  • Opcode Fuzzy Hash: d79d5559512d96c5841a2a436169761a674c0725812c8840720a25889d355715
                                  • Instruction Fuzzy Hash: F5B1AD71D04348DFEB14EBA5CC89BADBBB1EB49710F144258E444BB2D2D7746D48CBA1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 58 de8590-de85c2 WSAStartup 59 de85c8-de85f2 call e0a420 * 2 58->59 60 de8696-de869f 58->60 65 de85fe-de8644 59->65 66 de85f4-de85f8 59->66 68 de8646-de864c 65->68 69 de8690 65->69 66->60 66->65 70 de864e 68->70 71 de86a4-de86ae 68->71 69->60 72 de8654-de8668 socket 70->72 71->69 75 de86b0-de86b8 71->75 72->69 74 de866a-de867a connect 72->74 76 de867c-de8684 closesocket 74->76 77 de86a0 74->77 76->72 78 de8686-de868f 76->78 77->71 78->69
                                  APIs
                                  • WSAStartup.WS2_32 ref: 00DE85BA
                                  • socket.WS2_32(?,?,?,?,?,?,00EA9328,?,?), ref: 00DE865E
                                  • connect.WS2_32(00000000,00E79BFC,?,?,?,?,00EA9328,?,?), ref: 00DE8671
                                  • closesocket.WS2_32(00000000), ref: 00DE867D
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3453305471.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000007.00000002.3453259385.0000000000D20000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453305471.0000000000EA5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453559138.0000000000EAA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000000EAD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000001034000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000111A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000001156000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000115D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000116C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454060819.000000000116D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454305024.000000000130A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454349675.000000000130B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454385676.000000000130C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454406329.000000000130D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_d20000_RageMP131.jbxd
                                  Similarity
                                  • API ID: Startupclosesocketconnectsocket
                                  • String ID:
                                  • API String ID: 3098855095-0
                                  • Opcode ID: 150c35779cc8fe57d1e25c35e8c68082f3bd3d6ef85b85d2d0e664720bf251ed
                                  • Instruction ID: 506f9ad7b51feaa42d9aa1244e1e701daab22f47efbc2ddbc873f647fc77c965
                                  • Opcode Fuzzy Hash: 150c35779cc8fe57d1e25c35e8c68082f3bd3d6ef85b85d2d0e664720bf251ed
                                  • Instruction Fuzzy Hash: 543101725053406BD7209F258C4462FB7E5AFCA734F181F1EF9ACA22D0D730980496B3

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 80 d29280-d292dd call d363b0 83 d29413-d29521 call d22df0 call e0a420 80->83 84 d292e3-d292e9 80->84 100 d29523-d29535 83->100 101 d29537-d2953f call d38dc0 83->101 86 d292f0-d29313 84->86 88 d29324-d29331 86->88 89 d29315-d2931f 86->89 90 d29342-d2934f 88->90 91 d29333-d2933d 88->91 93 d29403-d29406 89->93 95 d29360-d2936d 90->95 96 d29351-d2935b 90->96 91->93 94 d29409-d2940d 93->94 94->83 94->86 98 d2937e-d2938b 95->98 99 d2936f-d29379 95->99 96->93 102 d29399-d293a6 98->102 103 d2938d-d29397 98->103 99->93 104 d29544-d29597 call e0a420 * 2 100->104 101->104 106 d293b4-d293c1 102->106 107 d293a8-d293b2 102->107 103->93 117 d295cb-d295e1 call e0a420 104->117 118 d29599-d295c8 call e0a420 call d55270 104->118 109 d293c3-d293cd 106->109 110 d293cf-d293dc 106->110 107->93 109->93 112 d293ea-d293f4 110->112 113 d293de-d293e8 110->113 112->94 116 d293f6-d293ff 112->116 113->93 116->93 124 d296e2 117->124 125 d295e7-d295ed 117->125 118->117 128 d296e6-d296f0 124->128 127 d295f0-d296ce WSASend 125->127 146 d296d4-d296dc 127->146 147 d2975f-d29763 127->147 129 d296f2-d296fe 128->129 130 d2971e-d2973d 128->130 131 d29700-d2970e 129->131 132 d29714-d2971b call d538f3 129->132 133 d2976f-d29796 130->133 134 d2973f-d2974b 130->134 131->132 136 d29797-d297fe call d58c70 call d22df0 * 2 131->136 132->130 138 d29765-d2976c call d538f3 134->138 139 d2974d-d2975b 134->139 138->133 139->136 141 d2975d 139->141 141->138 146->124 146->127 147->128
                                  APIs
                                  • WSASend.WS2_32(?,?,00000001,00000000,00000000,00000000,00000000,?,?,?,?,00E6D15C,00000000,74D723A0,-00EA9880), ref: 00D296C9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3453305471.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000007.00000002.3453259385.0000000000D20000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453305471.0000000000EA5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453559138.0000000000EAA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000000EAD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000001034000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000111A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000001156000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000115D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000116C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454060819.000000000116D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454305024.000000000130A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454349675.000000000130B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454385676.000000000130C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454406329.000000000130D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_d20000_RageMP131.jbxd
                                  Similarity
                                  • API ID: Send
                                  • String ID: Ws2_32.dll
                                  • API String ID: 121738739-3093949381
                                  • Opcode ID: 5e62cb732c9a34f992958ff493cabc64d1def0b447639514954c6eb1fa98fac7
                                  • Instruction ID: 6593d0159fc3fe4e77f951e5a72011be6c1299ba025e000ef0538927c3d6de15
                                  • Opcode Fuzzy Hash: 5e62cb732c9a34f992958ff493cabc64d1def0b447639514954c6eb1fa98fac7
                                  • Instruction Fuzzy Hash: A002E170D04298DFDF25CFA4D8A07ACFBB0EF65314F24429DE4856B286D7701986CBA2

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 153 d69789-d697ab 154 d697b1-d697b3 153->154 155 d6999e 153->155 157 d697b5-d697d4 call d58be3 154->157 158 d697df-d69802 154->158 156 d699a0-d699a4 155->156 166 d697d7-d697da 157->166 159 d69804-d69806 158->159 160 d69808-d6980e 158->160 159->160 162 d69810-d69821 159->162 160->157 160->162 164 d69834-d69844 call d692ce 162->164 165 d69823-d69831 call d6263d 162->165 171 d69846-d6984c 164->171 172 d6988d-d6989f 164->172 165->164 166->156 175 d69875-d6988b call d68e9f 171->175 176 d6984e-d69851 171->176 173 d698f6-d69916 WriteFile 172->173 174 d698a1-d698a7 172->174 177 d69921 173->177 178 d69918-d6991e 173->178 180 d698e2-d698f4 call d6934b 174->180 181 d698a9-d698ac 174->181 192 d6986e-d69870 175->192 182 d69853-d69856 176->182 183 d6985c-d6986b call d69266 176->183 185 d69924-d6992f 177->185 178->177 200 d698c9-d698cc 180->200 186 d698ce-d698e0 call d6950f 181->186 187 d698ae-d698b1 181->187 182->183 188 d69936-d69939 182->188 183->192 193 d69931-d69934 185->193 194 d69999-d6999c 185->194 186->200 195 d698b7-d698c4 call d69426 187->195 196 d6993c-d6993e 187->196 188->196 192->185 193->188 194->156 195->200 202 d69940-d69945 196->202 203 d6996c-d69978 196->203 200->192 205 d69947-d69959 202->205 206 d6995e-d69967 call d616c8 202->206 207 d69982-d69994 203->207 208 d6997a-d69980 203->208 205->166 206->166 207->166 208->155 208->207
                                  APIs
                                  • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00D6990E
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3453305471.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000007.00000002.3453259385.0000000000D20000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453305471.0000000000EA5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453559138.0000000000EAA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000000EAD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000001034000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000111A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000001156000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000115D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000116C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454060819.000000000116D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454305024.000000000130A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454349675.000000000130B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454385676.000000000130C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454406329.000000000130D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_d20000_RageMP131.jbxd
                                  Similarity
                                  • API ID: FileWrite
                                  • String ID:
                                  • API String ID: 3934441357-0
                                  • Opcode ID: 2f79c2376e9820dde3e141e22411618e7a831796153208606338c48f6299d32d
                                  • Instruction ID: 0ec0b9e8a565508db847f842fde7fcb4c66231fbe16576b9ff33ad20a6deea82
                                  • Opcode Fuzzy Hash: 2f79c2376e9820dde3e141e22411618e7a831796153208606338c48f6299d32d
                                  • Instruction Fuzzy Hash: 8761AFB1D04119BFDF11DFA8C894AAEFBBDAF4A314F18014AE940A7256D732D905CBB1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 211 56e0b59-56e0b5a 212 56e0b5c-56e0b5e 211->212 213 56e0af9-56e0b38 call 56e0b3a 211->213 212->213 215 56e0b60-56e0b69 GetCurrentHwProfileW 212->215 213->211 218 56e0b79-56e0d51 215->218 242 56e0d52-56e0dc4 218->242 248 56e0ddd-56e0df5 call 56e0dfd 242->248 251 56e0dba-56e0dc4 248->251 252 56e0df7-56e0df8 248->252 251->248 253 56e0dfa-56e0e0e 252->253 254 56e0db8 252->254 254->242 254->251
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 056E0B64
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3460116758.00000000056E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_56e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 6d13af870a5f5b11a061c0506cc9d893e6fc93cbd254a31c2c49ff6f6df85efe
                                  • Instruction ID: dd410315132855d39507068663cdbcbf1f49c8cbe9f9d7ebcf182603113ac68f
                                  • Opcode Fuzzy Hash: 6d13af870a5f5b11a061c0506cc9d893e6fc93cbd254a31c2c49ff6f6df85efe
                                  • Instruction Fuzzy Hash: 424156EB14F121BDA603C1452B5CAF22BAFF6DA7307308067F407DA605E6E51A8BC631

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 255 56e0b3a-56e0b3f 256 56e0b51-56e0b69 GetCurrentHwProfileW 255->256 258 56e0b79-56e0d51 256->258 280 56e0d52-56e0dc4 258->280 286 56e0ddd-56e0df5 call 56e0dfd 280->286 289 56e0dba-56e0dc4 286->289 290 56e0df7-56e0df8 286->290 289->286 291 56e0dfa-56e0e0e 290->291 292 56e0db8 290->292 292->280 292->289
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 056E0B64
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3460116758.00000000056E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_56e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 19fa6575ceabb0379a8ff8e67cae5b1fd24759a75c245e1b854ecc8f2c0d404a
                                  • Instruction ID: ec0c22e3240977edbd74ebbb9c13b75f605fd39ba05bb4329deeaf686f528947
                                  • Opcode Fuzzy Hash: 19fa6575ceabb0379a8ff8e67cae5b1fd24759a75c245e1b854ecc8f2c0d404a
                                  • Instruction Fuzzy Hash: 0A3135EF14F111BDB642C5512B5CAF22BAFF6D67307308466F807DA606E2E51A4BC231

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 293 56e0b85-56e0b86 294 56e0b88-56e0b8a 293->294 295 56e0b46-56e0b69 GetCurrentHwProfileW 293->295 296 56e0b8b-56e0d51 294->296 300 56e0b79-56e0b7d 295->300 320 56e0d52-56e0dc4 296->320 300->296 326 56e0ddd-56e0df5 call 56e0dfd 320->326 329 56e0dba-56e0dc4 326->329 330 56e0df7-56e0df8 326->330 329->326 331 56e0dfa-56e0e0e 330->331 332 56e0db8 330->332 332->320 332->329
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 056E0B64
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3460116758.00000000056E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_56e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 67e2332d3b3992d531e1731989259f67508488b25cd855091fe59bd28cdd841d
                                  • Instruction ID: 7f27ffacc859f80a0e149afadf892e164aa2e746b0e689c68ab8f2601ba6c867
                                  • Opcode Fuzzy Hash: 67e2332d3b3992d531e1731989259f67508488b25cd855091fe59bd28cdd841d
                                  • Instruction Fuzzy Hash: 0A3144EF50F111BCA602C5512B5CEF22BAFF6D6B307308466F847DA605E2E51A87C631

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 333 56e0b44-56e0b4f 335 56e0b51-56e0b69 GetCurrentHwProfileW 333->335 337 56e0b79-56e0d51 335->337 359 56e0d52-56e0dc4 337->359 365 56e0ddd-56e0df5 call 56e0dfd 359->365 368 56e0dba-56e0dc4 365->368 369 56e0df7-56e0df8 365->369 368->365 370 56e0dfa-56e0e0e 369->370 371 56e0db8 369->371 371->359 371->368
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 056E0B64
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3460116758.00000000056E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_56e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: b7e3723a78ee530cdd041a707933db34205f47d0e08806b5608e874adc4c7141
                                  • Instruction ID: af4e58dc84044752830885bc9546813ade57148dd5ee26fea417b5f2dd0ccef4
                                  • Opcode Fuzzy Hash: b7e3723a78ee530cdd041a707933db34205f47d0e08806b5608e874adc4c7141
                                  • Instruction Fuzzy Hash: 293131EF50F211BDA202C5512B5CAF62BAFF6D6B307308467F807DA605E2E51A87C631

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 372 d6251c-d62534 call d6e940 375 d62536-d6253d 372->375 376 d6254a-d62560 SetFilePointerEx 372->376 377 d62544-d62548 375->377 378 d62575-d6257f 376->378 379 d62562-d62573 call d616c8 376->379 380 d6259b-d6259e 377->380 378->377 381 d62581-d62596 378->381 379->377 381->380
                                  APIs
                                  • SetFilePointerEx.KERNELBASE(00000000,?,?,?,?,?,00000000,?,?,?,00D62626,?,?,?,?,?), ref: 00D62558
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3453305471.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000007.00000002.3453259385.0000000000D20000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453305471.0000000000EA5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453559138.0000000000EAA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000000EAD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000001034000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000111A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000001156000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000115D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000116C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454060819.000000000116D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454305024.000000000130A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454349675.000000000130B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454385676.000000000130C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454406329.000000000130D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_d20000_RageMP131.jbxd
                                  Similarity
                                  • API ID: FilePointer
                                  • String ID:
                                  • API String ID: 973152223-0
                                  • Opcode ID: 4d2ecef463f37cd906eaac71761115cbdfb37144e1b5e33a4df8d808ce6d7365
                                  • Instruction ID: 03e34f11102db00d8d55830b91c4c926614fa088533da43439f00e13926f1957
                                  • Opcode Fuzzy Hash: 4d2ecef463f37cd906eaac71761115cbdfb37144e1b5e33a4df8d808ce6d7365
                                  • Instruction Fuzzy Hash: E4012232610605AFCF19DF69CC15CAE7B69EB85330B280208F8519B2A1EA71ED418BB0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 385 d232d0-d232e0 386 d232e2-d232e7 385->386 387 d23306-d23308 385->387 390 d232e9-d232ea call d53672 386->390 391 d2331f call d22b50 386->391 388 d2330a-d23317 call d53672 387->388 389 d23318-d2331e 387->389 395 d232ef-d232f6 390->395 397 d23324-d23329 call d58c70 391->397 395->397 398 d232f8-d23305 395->398
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00D2331F
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3453305471.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000007.00000002.3453259385.0000000000D20000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453305471.0000000000EA5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453559138.0000000000EAA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000000EAD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000001034000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000111A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000001156000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000115D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000116C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454060819.000000000116D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454305024.000000000130A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454349675.000000000130B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454385676.000000000130C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454406329.000000000130D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_d20000_RageMP131.jbxd
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID:
                                  • API String ID: 118556049-0
                                  • Opcode ID: 0fd589d96c9d07b1efa01aec19e4ff46bb0766daf2056f60d33bc81ca57302d3
                                  • Instruction ID: 984c53d920273aa7d6f5b707e195fd496de202d6d9244376501c68c92e223d37
                                  • Opcode Fuzzy Hash: 0fd589d96c9d07b1efa01aec19e4ff46bb0766daf2056f60d33bc81ca57302d3
                                  • Instruction Fuzzy Hash: BEF0B4725001249BDF14AF64E4155E9B3E8DF343A6754097EEC8DC7212EF2ADB5487B0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 401 d6a65a-d6a665 402 d6a667-d6a671 401->402 403 d6a673-d6a679 401->403 402->403 404 d6a6a7-d6a6b2 call d616ff 402->404 405 d6a692-d6a6a3 RtlAllocateHeap 403->405 406 d6a67b-d6a67c 403->406 410 d6a6b4-d6a6b6 404->410 407 d6a6a5 405->407 408 d6a67e-d6a685 call d68280 405->408 406->405 407->410 408->404 414 d6a687-d6a690 call d65a89 408->414 414->404 414->405
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000008,?,00000001,?,00D69FE0,00000001,00000364,00000001,00000006,000000FF,?,00D54B3F,?,?,74D723A0,?), ref: 00D6A69B
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3453305471.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000007.00000002.3453259385.0000000000D20000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453305471.0000000000EA5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453559138.0000000000EAA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000000EAD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000001034000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000111A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000001156000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000115D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000116C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454060819.000000000116D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454305024.000000000130A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454349675.000000000130B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454385676.000000000130C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454406329.000000000130D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_d20000_RageMP131.jbxd
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: c09b7f60a3657a07eaa8522c4d1934abd092fcb10590909aa8be2389356007f7
                                  • Instruction ID: 6cd90ebfda477ddda6ff3f38fdb8ea06b99017dc23f6000f61ba745b02f0f439
                                  • Opcode Fuzzy Hash: c09b7f60a3657a07eaa8522c4d1934abd092fcb10590909aa8be2389356007f7
                                  • Instruction Fuzzy Hash: CFF0E232111D216F9B216AEEDC01A6A378DAF417A0F1D8162ECC4FB084CA30EC008EF6

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 417 d6b094-d6b0a0 418 d6b0d2-d6b0dd call d616ff 417->418 419 d6b0a2-d6b0a4 417->419 427 d6b0df-d6b0e1 418->427 421 d6b0a6-d6b0a7 419->421 422 d6b0bd-d6b0ce RtlAllocateHeap 419->422 421->422 423 d6b0d0 422->423 424 d6b0a9-d6b0b0 call d68280 422->424 423->427 424->418 429 d6b0b2-d6b0bb call d65a89 424->429 429->418 429->422
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000000,00000001,?,?,00D54B3F,?,?,74D723A0,?,?,00D23522,?,?), ref: 00D6B0C6
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3453305471.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000007.00000002.3453259385.0000000000D20000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453305471.0000000000EA5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453559138.0000000000EAA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000000EAD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000001034000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000111A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000001156000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000115D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000116C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454060819.000000000116D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454305024.000000000130A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454349675.000000000130B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454385676.000000000130C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454406329.000000000130D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_d20000_RageMP131.jbxd
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 0ec0385ec128c6bbc4763d8c169991d2f041cd48539964b8534e98f8c19a6a7c
                                  • Instruction ID: d7db45ca4d1ca2dd76c94f6d4cb31b54ebb14e674ee707954abeb1f7e5f228ee
                                  • Opcode Fuzzy Hash: 0ec0385ec128c6bbc4763d8c169991d2f041cd48539964b8534e98f8c19a6a7c
                                  • Instruction Fuzzy Hash: 69E092322416206BEB3136A59C11B5B7E4DDF433B0F1D0222FC64E61D2DB21DC9486B5

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 432 d68dff-d68e13 call d6e940 435 d68e15-d68e17 432->435 436 d68e19-d68e21 432->436 437 d68e67-d68e87 call d6e8af 435->437 438 d68e23-d68e2a 436->438 439 d68e2c-d68e2f 436->439 449 d68e99 437->449 450 d68e89-d68e97 call d616c8 437->450 438->439 441 d68e37-d68e4b call d6e940 * 2 438->441 442 d68e31-d68e35 439->442 443 d68e4d-d68e5d call d6e940 CloseHandle 439->443 441->435 441->443 442->441 442->443 443->435 453 d68e5f-d68e65 443->453 451 d68e9b-d68e9e 449->451 450->451 453->437
                                  APIs
                                  • CloseHandle.KERNELBASE(00000000,00000000,?,?,00D68CE6,00000000,?,00E9A178,0000000C,00D68DA2,?,?,?), ref: 00D68E55
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3453305471.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000007.00000002.3453259385.0000000000D20000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453305471.0000000000EA5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453559138.0000000000EAA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000000EAD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000001034000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000111A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000001156000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000115D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000116C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454060819.000000000116D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454305024.000000000130A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454349675.000000000130B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454385676.000000000130C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454406329.000000000130D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_d20000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CloseHandle
                                  • String ID:
                                  • API String ID: 2962429428-0
                                  • Opcode ID: e538caa12f632b65068e07f7b13231ee8825cb37cf1ef33566c3421febb3e6aa
                                  • Instruction ID: 9425f3acac08b2bd99fe086af927406bde04f7d5580b3636032bafbe10ae8ceb
                                  • Opcode Fuzzy Hash: e538caa12f632b65068e07f7b13231ee8825cb37cf1ef33566c3421febb3e6aa
                                  • Instruction Fuzzy Hash: F3116637A051206BCB252335A845B7E67898F92734F3D071EF9189B0C3EE63DC81A276
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3460190907.00000000056F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 056F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_56f0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a22b0349266ad2c589a872fd87a8a6e537b4f355e143f1539ef7fdba8be12a93
                                  • Instruction ID: 253a7c25e41fc755ce231742e1a472d9c5b6bb10aac1dd0158be78500cb3e22d
                                  • Opcode Fuzzy Hash: a22b0349266ad2c589a872fd87a8a6e537b4f355e143f1539ef7fdba8be12a93
                                  • Instruction Fuzzy Hash: C811B1FB98C120BD6502C981AB1C9FA7B2FE5D33303318426FA43D6403E2818A4BA371
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3460190907.00000000056F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 056F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_56f0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f20fac0800f06922e482a6db71ca1ebc1b7a23af31d920b22ac3a74e95112e4d
                                  • Instruction ID: 26994597e9279be7d7c110142698b2801ef0ea52db50efc8ce7ef95f08b363c8
                                  • Opcode Fuzzy Hash: f20fac0800f06922e482a6db71ca1ebc1b7a23af31d920b22ac3a74e95112e4d
                                  • Instruction Fuzzy Hash: D4116AFB58D220BD7112C5827B18AFA6B6FE5D67303308436FA07D6507E2D54A4FA272
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3460190907.00000000056F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 056F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_56f0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c1c32941fa1242d4acae3b643b2a7bcf1c67c539e9a86012daedf958062357a1
                                  • Instruction ID: cc81ff3433530b95332434d3781433b47ca4c7ddd4830ad5b527275c929b6bfe
                                  • Opcode Fuzzy Hash: c1c32941fa1242d4acae3b643b2a7bcf1c67c539e9a86012daedf958062357a1
                                  • Instruction Fuzzy Hash: 4511BFEB58C211BEA153D0526B189FABA2FE1D76B03308076F943D7647E2C54A4FA231
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3460190907.00000000056F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 056F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_56f0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2ca93e66441c97d9013a6b609af7ba0945fab0a629ebe54d43d04c6fcc3e02ce
                                  • Instruction ID: 801fca02c10d66313a4548f62d83932b892cbe99ef044b64cdbfe2721812f369
                                  • Opcode Fuzzy Hash: 2ca93e66441c97d9013a6b609af7ba0945fab0a629ebe54d43d04c6fcc3e02ce
                                  • Instruction Fuzzy Hash: 23117CFB58C120BD6112C5816B189FA7B6FE5D77303308076FA47D6507E2C54A4BA371
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3460190907.00000000056F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 056F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_56f0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 43ff2fe18122114b48bdb76fa07bc9d6b9175574fae3ec263aee97eb3006480e
                                  • Instruction ID: 1daf85b217261e80356fe82612a7343efb0d0786e97918ba9a5edbba7c8c14c8
                                  • Opcode Fuzzy Hash: 43ff2fe18122114b48bdb76fa07bc9d6b9175574fae3ec263aee97eb3006480e
                                  • Instruction Fuzzy Hash: 94118EBB98D110BDA112C5816B189FE6B6FE5E23307308437FA47D7507E2855A4EA372
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3460190907.00000000056F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 056F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_56f0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b09e95dd80c697bbf67af26c3771391e7022638104143bbe5c744b80e0e20bea
                                  • Instruction ID: 0aa83c73ac9344ec6ccb0359e6e59adf386b7ba54162968d8f05d33bba50bda2
                                  • Opcode Fuzzy Hash: b09e95dd80c697bbf67af26c3771391e7022638104143bbe5c744b80e0e20bea
                                  • Instruction Fuzzy Hash: 3701C0FB94C110BD6152C5817B189FA7B6FE5D27303308036FA43D6507E2C55A4EA371
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3460190907.00000000056F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 056F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_56f0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3090ca72b32042cf959336f7b3cdee8bfc5a5bcf785bc28f6e1fcbe933fd3c00
                                  • Instruction ID: a4fb662f34b3f9488b0bd14c2a0f74fec44614fc1c7aaf550395dc64d010ef21
                                  • Opcode Fuzzy Hash: 3090ca72b32042cf959336f7b3cdee8bfc5a5bcf785bc28f6e1fcbe933fd3c00
                                  • Instruction Fuzzy Hash: DA019EBB50C110BDB652C4417B089FA2B6FD5D2330331842AFA47C6107D2960A4AA332
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3460190907.00000000056F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 056F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_56f0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e4ca7b0c2b7035f7d6540fbad9f519bf1a55ac314e9f8c67634b567a05dcc56f
                                  • Instruction ID: 67eddb570b8bd6c1195bdfe5a4915f451744b648a04c8175faa579e7e2c012d4
                                  • Opcode Fuzzy Hash: e4ca7b0c2b7035f7d6540fbad9f519bf1a55ac314e9f8c67634b567a05dcc56f
                                  • Instruction Fuzzy Hash: E801ADBB50D120BDB552C4827B149FE675FE5E23303308427FA43C2107D6851A4AA332
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3460190907.00000000056F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 056F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_56f0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 20b44c2392f8f00b398b7d946f4a423546b74b5d5f6a8e24365ab2be6ea97038
                                  • Instruction ID: f1a11e0509dd7517c6370e2b50d0392bb7e2a7f2afe45f7cd91a95d49c90f98f
                                  • Opcode Fuzzy Hash: 20b44c2392f8f00b398b7d946f4a423546b74b5d5f6a8e24365ab2be6ea97038
                                  • Instruction Fuzzy Hash: F5F0F6FB40D210AEB151D1527F189FA779FD6E27303308427F547C3507D1941A8BA232
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3460190907.00000000056F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 056F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_56f0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 952f54fd97a4e7b4614ff1b049e7400b7ce50045783c8c34ae94387f22f6ad92
                                  • Instruction ID: 8eea4800e8247f03dd21a16efb40feb1976f78e344b1816b500fb1038c42cb4c
                                  • Opcode Fuzzy Hash: 952f54fd97a4e7b4614ff1b049e7400b7ce50045783c8c34ae94387f22f6ad92
                                  • Instruction Fuzzy Hash: 4EF0E9F750D100FEB251C1427B449FA77AED6D1730330C46BF543D3406D6940A8AA331
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3460190907.00000000056F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 056F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_56f0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d39384faa6bd2701122c57ce619cdb45b08de3d2b3496292e145fdb0938fd6a1
                                  • Instruction ID: 7c422cfd35219b335beb0acf5ef46c66c6f0da0db2ad241d9382841111c121ab
                                  • Opcode Fuzzy Hash: d39384faa6bd2701122c57ce619cdb45b08de3d2b3496292e145fdb0938fd6a1
                                  • Instruction Fuzzy Hash: 62E0CDA344D101D9D7A2D0D163485B83B4B97D73717304077F547CB643D5D6469B5331
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3453305471.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000007.00000002.3453259385.0000000000D20000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453305471.0000000000EA5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453559138.0000000000EAA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000000EAD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000001034000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000111A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000001156000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000115D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000116C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454060819.000000000116D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454305024.000000000130A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454349675.000000000130B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454385676.000000000130C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454406329.000000000130D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_d20000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 333d4b6d5425d6f9d03797ee82114c3711da98524c03317fffdb5ec62fb2b380
                                  • Instruction ID: e1f9adda3281e937fb19cf12b0e3b06702adfca8d545d5348acbeeb9fe1e1ff4
                                  • Opcode Fuzzy Hash: 333d4b6d5425d6f9d03797ee82114c3711da98524c03317fffdb5ec62fb2b380
                                  • Instruction Fuzzy Hash: 59020A71E112199FDF14CFA9D8806AEBBF1EF48315F24826AED19E7340D731A945CBA0
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3453305471.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000007.00000002.3453259385.0000000000D20000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453305471.0000000000EA5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453559138.0000000000EAA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000000EAD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000001034000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000111A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000001156000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000115D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000116C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454060819.000000000116D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454305024.000000000130A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454349675.000000000130B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454385676.000000000130C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454406329.000000000130D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_d20000_RageMP131.jbxd
                                  Similarity
                                  • API ID: _strrchr
                                  • String ID:
                                  • API String ID: 3213747228-0
                                  • Opcode ID: 785c90e8ff89e0f1a3d98e37725974d6f6ea20f06d45e48120c47f1ca5a82ffe
                                  • Instruction ID: 5f07a9cc17a5fe40273eb4ccb491e402edea27f6b491e74b4ec869f85a0cf407
                                  • Opcode Fuzzy Hash: 785c90e8ff89e0f1a3d98e37725974d6f6ea20f06d45e48120c47f1ca5a82ffe
                                  • Instruction Fuzzy Hash: 3AB17832A006559FDB118F68CC82BEE7BA5EF55320F184166E905EF282D774D981CBB0
                                  APIs
                                  • _ValidateLocalCookies.LIBCMT ref: 00D57307
                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 00D5730F
                                  • _ValidateLocalCookies.LIBCMT ref: 00D57398
                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 00D573C3
                                  • _ValidateLocalCookies.LIBCMT ref: 00D57418
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3453305471.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000007.00000002.3453259385.0000000000D20000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453305471.0000000000EA5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453559138.0000000000EAA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000000EAD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000001034000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000111A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000001156000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000115D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000116C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454060819.000000000116D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454305024.000000000130A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454349675.000000000130B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454385676.000000000130C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454406329.000000000130D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_d20000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                  • String ID: csm
                                  • API String ID: 1170836740-1018135373
                                  • Opcode ID: 4a4b8f2c91ec0e06f27e67b16365908ff09f655c680a5a97bd1c97b041c34fe3
                                  • Instruction ID: a78fb8560ce09f0e251e3656b7759b763f806b20bc8548dc48df563f8c86aab5
                                  • Opcode Fuzzy Hash: 4a4b8f2c91ec0e06f27e67b16365908ff09f655c680a5a97bd1c97b041c34fe3
                                  • Instruction Fuzzy Hash: 3141E730A042099FCF10DF68D885A9EBFA5EF04325F288095FC18AB351DB31E949DBB1
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D3A09D
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D3A0BF
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D3A0E7
                                  • __Getctype.LIBCPMT ref: 00D3A1C5
                                  • std::_Facet_Register.LIBCPMT ref: 00D3A1F9
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D3A223
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3453305471.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000007.00000002.3453259385.0000000000D20000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453305471.0000000000EA5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453559138.0000000000EAA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000000EAD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000001034000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000111A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000001156000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000115D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000116C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454060819.000000000116D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454305024.000000000130A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454349675.000000000130B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454385676.000000000130C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454406329.000000000130D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_d20000_RageMP131.jbxd
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetctypeRegister
                                  • String ID:
                                  • API String ID: 1102183713-0
                                  • Opcode ID: 1fbdbc8f9c28f396f5fd5d52795b5b2b396d6b67ebfd8463ea489037c77ad661
                                  • Instruction ID: c69343f9229523ec0b8ab892a575373eef151b07c4a149cd453993da77223162
                                  • Opcode Fuzzy Hash: 1fbdbc8f9c28f396f5fd5d52795b5b2b396d6b67ebfd8463ea489037c77ad661
                                  • Instruction Fuzzy Hash: F3519AB0E00345DFCB11CF58C9417AEBBB0FB15714F188258D895AB391DB75AA48CBA2
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D3C45A
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D3C47C
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D3C4A4
                                  • std::_Facet_Register.LIBCPMT ref: 00D3C59A
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D3C5C4
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3453305471.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000007.00000002.3453259385.0000000000D20000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453305471.0000000000EA5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453559138.0000000000EAA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000000EAD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000001034000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000111A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000001156000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000115D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000116C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454060819.000000000116D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454305024.000000000130A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454349675.000000000130B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454385676.000000000130C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454406329.000000000130D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_d20000_RageMP131.jbxd
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                  • String ID:
                                  • API String ID: 459529453-0
                                  • Opcode ID: 78cc96c51a16e02aeac93ecb29a0e06f219c707376dc9b2817eb8f5b9595ca69
                                  • Instruction ID: 539c1388c8f25b3c02965ff1e45adb225592dacf381d3c7ae112feb103cf2544
                                  • Opcode Fuzzy Hash: 78cc96c51a16e02aeac93ecb29a0e06f219c707376dc9b2817eb8f5b9595ca69
                                  • Instruction Fuzzy Hash: EE51BBB0900258DFDB11DF58D845BAEBBF0FF16354F288158E845BB381D7B5AA09CBA0
                                  APIs
                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 00D2499F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3453305471.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000007.00000002.3453259385.0000000000D20000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453305471.0000000000EA5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453559138.0000000000EAA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000000EAD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000001034000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000111A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000001156000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000115D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000116C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454060819.000000000116D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454305024.000000000130A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454349675.000000000130B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454385676.000000000130C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454406329.000000000130D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_d20000_RageMP131.jbxd
                                  Similarity
                                  • API ID: Ios_base_dtorstd::ios_base::_
                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                  • API String ID: 323602529-1866435925
                                  • Opcode ID: 3837ce1bec01d91ab6ee95856e00fa86612cc9806b0385423e40edbb017f6479
                                  • Instruction ID: 0bdcf26b321493409eea738f648d42cbc498d144f2e7f7639bd62e511d89abbb
                                  • Opcode Fuzzy Hash: 3837ce1bec01d91ab6ee95856e00fa86612cc9806b0385423e40edbb017f6479
                                  • Instruction Fuzzy Hash: 07117A72804B54ABCB10EA18AC03B663388DB01714F08462CFD689B281EB3498008BB2
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 00D52730
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D5273B
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D527A9
                                    • Part of subcall function 00D5288C: std::locale::_Locimp::_Locimp.LIBCPMT ref: 00D528A4
                                  • std::locale::_Setgloballocale.LIBCPMT ref: 00D52756
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3453305471.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000007.00000002.3453259385.0000000000D20000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453305471.0000000000EA5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453559138.0000000000EAA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000000EAD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000001034000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000111A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000001156000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000115D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000116C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454060819.000000000116D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454305024.000000000130A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454349675.000000000130B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454385676.000000000130C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454406329.000000000130D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_d20000_RageMP131.jbxd
                                  Similarity
                                  • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                                  • String ID:
                                  • API String ID: 677527491-0
                                  • Opcode ID: ca5b4d31c70d3d020939022c7dfd23f83a9f8578c4e2217166550f2d1202e342
                                  • Instruction ID: 48e301aaaadb3b8e9450fc4daa293293f47bc1c96f5b68eafef566897edf335c
                                  • Opcode Fuzzy Hash: ca5b4d31c70d3d020939022c7dfd23f83a9f8578c4e2217166550f2d1202e342
                                  • Instruction Fuzzy Hash: EE018875A002109FCB0AEB20984153D7BA1FF8A751B184009EC1527281CF34AA4ECBB1
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00D2750C
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00D27522
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3453305471.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000007.00000002.3453259385.0000000000D20000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453305471.0000000000EA5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453559138.0000000000EAA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000000EAD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000001034000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000111A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000001156000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000115D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000116C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454060819.000000000116D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454305024.000000000130A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454349675.000000000130B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454385676.000000000130C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454406329.000000000130D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_d20000_RageMP131.jbxd
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: [json.exception.
                                  • API String ID: 4194217158-791563284
                                  • Opcode ID: 4954a6ca1b167a583f684f716c925e4412b330e127eec57c712bf9d69d96b0f6
                                  • Instruction ID: a2f792a603864cf12f5f574fa297fad6499b127799029ffde3095f90aa3857ae
                                  • Opcode Fuzzy Hash: 4954a6ca1b167a583f684f716c925e4412b330e127eec57c712bf9d69d96b0f6
                                  • Instruction Fuzzy Hash: 2351EFB1D047489FDB10DFA8D906BAEBBB4EF21314F148259E854A7282EBB45A44C7F1
                                  APIs
                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 00D2499F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3453305471.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000007.00000002.3453259385.0000000000D20000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453305471.0000000000EA5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453559138.0000000000EAA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000000EAD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000001034000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000111A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000001156000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000115D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000116C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454060819.000000000116D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454305024.000000000130A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454349675.000000000130B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454385676.000000000130C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454406329.000000000130D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_d20000_RageMP131.jbxd
                                  Similarity
                                  • API ID: Ios_base_dtorstd::ios_base::_
                                  • String ID: ios_base::badbit set$ios_base::failbit set
                                  • API String ID: 323602529-1240500531
                                  • Opcode ID: bbd0bbe7c5e06df7a983a84388ae48632adfa9fe90034e72b81f91d24308c0ed
                                  • Instruction ID: 4a936c63177c90b7b85c70d796d49411eb7665653267e9575a2e2c11dbabb3be
                                  • Opcode Fuzzy Hash: bbd0bbe7c5e06df7a983a84388ae48632adfa9fe90034e72b81f91d24308c0ed
                                  • Instruction Fuzzy Hash: E64145B1C00244ABCB00DF58DC42BAEBBB8EF45314F18825DF954AB381DB759A00CBB1
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D24061
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00D240C4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.3453305471.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000007.00000002.3453259385.0000000000D20000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453305471.0000000000EA5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453559138.0000000000EAA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000000EAD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000001034000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000111A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.0000000001156000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000115D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3453590114.000000000116C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454060819.000000000116D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454305024.000000000130A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454349675.000000000130B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454385676.000000000130C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.3454406329.000000000130D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_d20000_RageMP131.jbxd
                                  Similarity
                                  • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                  • String ID: bad locale name
                                  • API String ID: 3988782225-1405518554
                                  • Opcode ID: 70ee5c88f2ad0719cd9fe007a3d878664de4946e3cf75c32c0b4f00a81fb30ff
                                  • Instruction ID: 111f3d04fbd649ca44a9f2cf6be023f8faa7ced57c5dd20a56e0fbcdfe772cc8
                                  • Opcode Fuzzy Hash: 70ee5c88f2ad0719cd9fe007a3d878664de4946e3cf75c32c0b4f00a81fb30ff
                                  • Instruction Fuzzy Hash: 1311E670805B84EED721CFA8C50475BBFF4EF25714F14868DD89597781D3B95608C7A1

                                  Control-flow Graph

                                  APIs
                                  • setsockopt.WS2_32(000003CC,0000FFFF,00001006,?,00000008), ref: 00DE7BA7
                                  • recv.WS2_32(?,00000004,00000002), ref: 00DE7BC1
                                  • recv.WS2_32(00000000,0000000C,00000002,00000000), ref: 00DE7C43
                                  • recv.WS2_32(00000000,0000000C,00000008), ref: 00DE7C64
                                    • Part of subcall function 00DE8590: WSAStartup.WS2_32 ref: 00DE85BB
                                    • Part of subcall function 00DE8590: socket.WS2_32(?,?,?,?,?,?,00EA9328,?,?), ref: 00DE865E
                                    • Part of subcall function 00DE8590: connect.WS2_32(00000000,00E79BFC,?,?,?,?,00EA9328,?,?), ref: 00DE8672
                                    • Part of subcall function 00DE8590: closesocket.WS2_32(00000000), ref: 00DE867D
                                  • recv.WS2_32(00000000,?,00000008), ref: 00DE7D1B
                                  • recv.WS2_32(?,00000004,00000008), ref: 00DE7E23
                                  • __Xtime_get_ticks.LIBCPMT ref: 00DE7E2A
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00DE7E38
                                  • Sleep.KERNELBASE(00000001,00000000,?,00002710,00000000), ref: 00DE7EB1
                                  • Sleep.KERNELBASE(00000064,?,00002710,00000000), ref: 00DE7EB9
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.3453097183.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 0000000B.00000002.3452807186.0000000000D20000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3453097183.0000000000EA5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454183871.0000000000EAA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000000EAD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000001034000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000111A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000001156000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000115D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000116C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455605505.000000000116D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455904393.000000000130A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455966053.000000000130B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3456038097.000000000130C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3456092776.000000000130D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_d20000_RageMP131.jbxd
                                  Similarity
                                  • API ID: recv$Sleep$StartupUnothrow_t@std@@@Xtime_get_ticks__ehfuncinfo$??2@closesocketconnectsetsockoptsocket
                                  • String ID:
                                  • API String ID: 56803616-0
                                  • Opcode ID: a78e864d4deed7432dee18c27206e5a3782aff44cd21b8f4ef8238a8e4fb3220
                                  • Instruction ID: 203f9fc486e181189f4c6d421a3b6948662a38376f9561368e7a19668f008480
                                  • Opcode Fuzzy Hash: a78e864d4deed7432dee18c27206e5a3782aff44cd21b8f4ef8238a8e4fb3220
                                  • Instruction Fuzzy Hash: 45B1BD71D04348DFEB14EBA5CC89BADBBB1EB49700F144258E444BB2D2D7746D88DBA1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 58 de8590-de85c2 WSAStartup 59 de85c8-de85f2 call e0a420 * 2 58->59 60 de8696-de869f 58->60 65 de85fe-de8644 59->65 66 de85f4-de85f8 59->66 68 de8646-de864c 65->68 69 de8690-de8695 65->69 66->60 66->65 70 de864e 68->70 71 de86a4-de86ae 68->71 69->60 72 de8654-de8668 socket 70->72 71->69 76 de86b0-de86b8 71->76 72->69 75 de866a-de867a connect 72->75 77 de867c-de8684 closesocket 75->77 78 de86a0 75->78 77->72 79 de8686-de868a 77->79 78->71 79->69
                                  APIs
                                  • WSAStartup.WS2_32 ref: 00DE85BB
                                  • socket.WS2_32(?,?,?,?,?,?,00EA9328,?,?), ref: 00DE865E
                                  • connect.WS2_32(00000000,00E79BFC,?,?,?,?,00EA9328,?,?), ref: 00DE8672
                                  • closesocket.WS2_32(00000000), ref: 00DE867D
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.3453097183.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 0000000B.00000002.3452807186.0000000000D20000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3453097183.0000000000EA5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454183871.0000000000EAA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000000EAD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000001034000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000111A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000001156000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000115D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000116C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455605505.000000000116D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455904393.000000000130A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455966053.000000000130B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3456038097.000000000130C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3456092776.000000000130D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_d20000_RageMP131.jbxd
                                  Similarity
                                  • API ID: Startupclosesocketconnectsocket
                                  • String ID:
                                  • API String ID: 3098855095-0
                                  • Opcode ID: eb4a4ef56f16a8534ab8d8a13c04a7fcb0ab3340990da01bef428f8f3ca500fd
                                  • Instruction ID: f1e4d74f1662ffe2f84777f5e3c586f1c05fb023ac73640bab05d7e723d3f3b8
                                  • Opcode Fuzzy Hash: eb4a4ef56f16a8534ab8d8a13c04a7fcb0ab3340990da01bef428f8f3ca500fd
                                  • Instruction Fuzzy Hash: FD31E4725057405BD7209F258C4462FB7E5EFCA364F044F1EFAACA22D0E770990496A3

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 80 d29280-d292dd call d363b0 83 d29413-d29521 call d22df0 call e0a420 80->83 84 d292e3-d292e9 80->84 100 d29523-d29535 83->100 101 d29537-d2953f call d38dc0 83->101 85 d292f0-d29313 84->85 87 d29324-d29331 85->87 88 d29315-d2931f 85->88 92 d29342-d2934f 87->92 93 d29333-d2933d 87->93 91 d29403-d29406 88->91 95 d29409-d2940d 91->95 96 d29360-d2936d 92->96 97 d29351-d2935b 92->97 93->91 95->83 95->85 98 d2937e-d2938b 96->98 99 d2936f-d29379 96->99 97->91 102 d29399-d293a6 98->102 103 d2938d-d29397 98->103 99->91 104 d29544-d29597 call e0a420 * 2 100->104 101->104 106 d293b4-d293c1 102->106 107 d293a8-d293b2 102->107 103->91 117 d295cb-d295e1 call e0a420 104->117 118 d29599-d295c8 call e0a420 call d55270 104->118 109 d293c3-d293cd 106->109 110 d293cf-d293dc 106->110 107->91 109->91 112 d293ea-d293f4 110->112 113 d293de-d293e8 110->113 112->95 116 d293f6-d293ff 112->116 113->91 116->91 123 d296e2 117->123 124 d295e7-d295ed 117->124 118->117 127 d296e6-d296f0 123->127 126 d295f0-d296ce WSASend 124->126 146 d296d4-d296dc 126->146 147 d2975f-d29763 126->147 129 d296f2-d296fe 127->129 130 d2971e-d2973d 127->130 134 d29700-d2970e 129->134 135 d29714-d2971b call d538f3 129->135 131 d2976f-d29796 130->131 132 d2973f-d2974b 130->132 136 d29765-d2976c call d538f3 132->136 137 d2974d-d2975b 132->137 134->135 138 d29797-d297fe call d58c70 call d22df0 * 2 134->138 135->130 136->131 137->138 140 d2975d 137->140 140->136 146->123 146->126 147->127
                                  APIs
                                  • WSASend.WS2_32(?,?,00000001,00000000,00000000,00000000,00000000,?,?,?,?,00E6D15C,00000000,74D723A0,-00EA9880), ref: 00D296C9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.3453097183.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 0000000B.00000002.3452807186.0000000000D20000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3453097183.0000000000EA5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454183871.0000000000EAA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000000EAD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000001034000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000111A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000001156000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000115D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000116C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455605505.000000000116D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455904393.000000000130A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455966053.000000000130B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3456038097.000000000130C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3456092776.000000000130D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_d20000_RageMP131.jbxd
                                  Similarity
                                  • API ID: Send
                                  • String ID: Ws2_32.dll
                                  • API String ID: 121738739-3093949381
                                  • Opcode ID: 385f5493dd4d7cc9a044049ce9af8bae22fc3a164e80f94aa0e179572a70811f
                                  • Instruction ID: 809cdb777cf377856743dfa59997f496825b574d8286debc23098af782abb3cc
                                  • Opcode Fuzzy Hash: 385f5493dd4d7cc9a044049ce9af8bae22fc3a164e80f94aa0e179572a70811f
                                  • Instruction Fuzzy Hash: CA02E170D04298DFDF25CFA4D8A07ADFBB0EF65314F24429DE4856B286D7701986CBA2

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 153 58b099b-58b0b30 169 58b0b3b-58b0b4f GetCurrentHwProfileW 153->169 170 58b0b64-58b0da5 call 58b0d7a 169->170
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 058B0B3D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.3463147741.00000000058B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_58b0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID: Y>
                                  • API String ID: 2104809126-159164770
                                  • Opcode ID: 61e1a3cb27d88c8505c7c894bd648c86245afedf9a3605044de5726ffac50db8
                                  • Instruction ID: 72dc83264b5f9a214ce8e26eb25f6ed42ebf181afda81a208f2b0cbaf141fd29
                                  • Opcode Fuzzy Hash: 61e1a3cb27d88c8505c7c894bd648c86245afedf9a3605044de5726ffac50db8
                                  • Instruction Fuzzy Hash: 00518DEB24D219FDB102C1866B28AFB677FE6C6778730992AFC07D6642E3D40E495131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 198 58b0a0f-58b0a12 199 58b0a60-58b0a6d 198->199 200 58b0a14-58b0a57 198->200 202 58b0a6f-58b0b30 199->202 200->202 213 58b0b3b-58b0b4f GetCurrentHwProfileW 202->213 214 58b0b64-58b0da5 call 58b0d7a 213->214
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 058B0B3D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.3463147741.00000000058B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_58b0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID: Y>
                                  • API String ID: 2104809126-159164770
                                  • Opcode ID: 51b5df300beeedf58be59a8431e7dfbe8d59ea309e3b3faa3e2df10914288991
                                  • Instruction ID: f880303b10eaabd4c3ce1559ae59649db54002573367fd98e829c5ca06efb360
                                  • Opcode Fuzzy Hash: 51b5df300beeedf58be59a8431e7dfbe8d59ea309e3b3faa3e2df10914288991
                                  • Instruction Fuzzy Hash: 9541AFEB249219FDB102C0856B28AFB67AEE6D67387309926FC07D6342E3D00E895130

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 242 58b0a51-58b0a52 243 58b09f1-58b0a4b 242->243 244 58b0a54 242->244 246 58b0a56-58b0b30 243->246 244->246 258 58b0b3b-58b0b4f GetCurrentHwProfileW 246->258 259 58b0b64-58b0da5 call 58b0d7a 258->259
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 058B0B3D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.3463147741.00000000058B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_58b0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID: Y>
                                  • API String ID: 2104809126-159164770
                                  • Opcode ID: 46bba515487846379bd40ca1fd8a5f43d2962b4a50ef014a8bfd36914fc17a28
                                  • Instruction ID: 66b9f6190a391b44da931f0329d28b852895b336febc4d32f2b87c8af6c0ceaa
                                  • Opcode Fuzzy Hash: 46bba515487846379bd40ca1fd8a5f43d2962b4a50ef014a8bfd36914fc17a28
                                  • Instruction Fuzzy Hash: 275190EB64D219FDB202C0856B28AFB676FE6D67387309966FD07C6342E7D00E495130

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 287 58b0a7b-58b0a7c 288 58b0a7e-58b0a89 287->288 289 58b0a3c-58b0a74 287->289 290 58b0a8b-58b0b30 288->290 289->290 300 58b0b3b-58b0b4f GetCurrentHwProfileW 290->300 301 58b0b64-58b0da5 call 58b0d7a 300->301
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 058B0B3D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.3463147741.00000000058B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_58b0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID: Y>
                                  • API String ID: 2104809126-159164770
                                  • Opcode ID: a5653fb004fa378dc444c02c7e232b030666437f969a5565c9b77fcb5e39c414
                                  • Instruction ID: e1d50c44698765f001be50db5870f8be7a22c3ae55179ccbc03b5c26808b21ef
                                  • Opcode Fuzzy Hash: a5653fb004fa378dc444c02c7e232b030666437f969a5565c9b77fcb5e39c414
                                  • Instruction Fuzzy Hash: EB41B1EB24C219FDB602C0852B68AFB67AFE6D67783309966FC07C6346E7D04E495130

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 329 58b09ff-58b0b30 343 58b0b3b-58b0b4f GetCurrentHwProfileW 329->343 344 58b0b64-58b0da5 call 58b0d7a 343->344
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 058B0B3D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.3463147741.00000000058B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_58b0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID: Y>
                                  • API String ID: 2104809126-159164770
                                  • Opcode ID: d7bf555fecd454bdc8aea1b2e5f15864a1a769879d077d13cffff258054014fa
                                  • Instruction ID: 2cc577b818f4e394b2789ca063d03fb8dcbd8fb4bd03afb5093f2d534df62ed3
                                  • Opcode Fuzzy Hash: d7bf555fecd454bdc8aea1b2e5f15864a1a769879d077d13cffff258054014fa
                                  • Instruction Fuzzy Hash: 1541BFEB24D219FDB202C0856B28AFB676FE6D67387309926FD07C6342E3D40E495130

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 372 58b0a20-58b0a22 373 58b0a29-58b0b30 372->373 374 58b0a24-58b0a28 372->374 386 58b0b3b-58b0b4f GetCurrentHwProfileW 373->386 374->373 387 58b0b64-58b0da5 call 58b0d7a 386->387
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 058B0B3D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.3463147741.00000000058B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_58b0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID: Y>
                                  • API String ID: 2104809126-159164770
                                  • Opcode ID: 891e5b022816bff8a10b8f82abec7315c54a5ddb8dd96ce106acfb6340ad1a8e
                                  • Instruction ID: 7df76e16d2b08ce7f16cf7e305048b83c6aeb69ca2ba48cad5484ea81dcfa69c
                                  • Opcode Fuzzy Hash: 891e5b022816bff8a10b8f82abec7315c54a5ddb8dd96ce106acfb6340ad1a8e
                                  • Instruction Fuzzy Hash: 73419FEB24D219FDB102C0852B68AFB67BEE6D67387308566FD07C6342E7D40E495131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 415 58b0a3a-58b0b30 427 58b0b3b-58b0b4f GetCurrentHwProfileW 415->427 428 58b0b64-58b0da5 call 58b0d7a 427->428
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 058B0B3D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.3463147741.00000000058B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_58b0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID: Y>
                                  • API String ID: 2104809126-159164770
                                  • Opcode ID: c7c25fb26dfeb6e045893c9f579b18dd9deae2076bcb44e08b4e2123be5bb5e8
                                  • Instruction ID: a3a9cc379ba2e24633e6f44fa0d64d8f8a9cffc5c45d9c6242cb58648d468922
                                  • Opcode Fuzzy Hash: c7c25fb26dfeb6e045893c9f579b18dd9deae2076bcb44e08b4e2123be5bb5e8
                                  • Instruction Fuzzy Hash: 76418FEB24C219FDB102C0852B28AFB676EE6D67783308926FD07C6346E7D04E495130

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 456 58b0a5c-58b0b30 465 58b0b3b-58b0b4f GetCurrentHwProfileW 456->465 466 58b0b64-58b0da5 call 58b0d7a 465->466
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 058B0B3D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.3463147741.00000000058B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_58b0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID: Y>
                                  • API String ID: 2104809126-159164770
                                  • Opcode ID: 0ef90d0a47c978f0bede79391fc1ee2a7c0f32386eca6c9ba7f5a069e53051cf
                                  • Instruction ID: cbc2d1aef760c433e758ff556ae6b0a030a73eaa5fba17182a510677ff2af0b6
                                  • Opcode Fuzzy Hash: 0ef90d0a47c978f0bede79391fc1ee2a7c0f32386eca6c9ba7f5a069e53051cf
                                  • Instruction Fuzzy Hash: AC41A0EB24C219FDB102D0852B28AFB67BEE6D6774730896AFD07D6342E3D00E495130

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 494 58b0ae1-58b0b30 497 58b0b3b-58b0b4f GetCurrentHwProfileW 494->497 498 58b0b64-58b0da5 call 58b0d7a 497->498
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 058B0B3D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.3463147741.00000000058B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_58b0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID: Y>
                                  • API String ID: 2104809126-159164770
                                  • Opcode ID: 11cea63725411a9450b18e433647b57b2d747d791497bb79e7d2e51be5a53098
                                  • Instruction ID: 3a691797455efb99ba32705da7363abebd6352eb8a89eb7108f96e752daf0a7e
                                  • Opcode Fuzzy Hash: 11cea63725411a9450b18e433647b57b2d747d791497bb79e7d2e51be5a53098
                                  • Instruction Fuzzy Hash: E4417EEB248219FDB602D0862B28AFB67BEE6C67743308467FD07C6346E7D40E495171

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 526 58b0b1d-58b0b4f GetCurrentHwProfileW 527 58b0b64-58b0da5 call 58b0d7a 526->527
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 058B0B3D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.3463147741.00000000058B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_58b0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID: Y>
                                  • API String ID: 2104809126-159164770
                                  • Opcode ID: ef16b7a8b4ea711f2c35d0bf49a847b246469ce80502fb2bcb3a737c17a602d6
                                  • Instruction ID: 1ec3d382d8e34c95249ec2ae6e4852709c73b7b397dcdd4c0d4ac29a27fd13cc
                                  • Opcode Fuzzy Hash: ef16b7a8b4ea711f2c35d0bf49a847b246469ce80502fb2bcb3a737c17a602d6
                                  • Instruction Fuzzy Hash: DE31C3EB648219FEB202D1852A68AFB677ED6C6734330846AFC07D6242E7D10E495170

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 555 d69789-d697ab 556 d697b1-d697b3 555->556 557 d6999e 555->557 558 d697b5-d697d4 call d58be3 556->558 559 d697df-d69802 556->559 560 d699a0-d699a4 557->560 566 d697d7-d697da 558->566 562 d69804-d69806 559->562 563 d69808-d6980e 559->563 562->563 565 d69810-d69821 562->565 563->558 563->565 567 d69834-d69844 call d692ce 565->567 568 d69823-d69831 call d6263d 565->568 566->560 573 d69846-d6984c 567->573 574 d6988d-d6989f 567->574 568->567 575 d69875-d6988b call d68e9f 573->575 576 d6984e-d69851 573->576 577 d698f6-d69916 WriteFile 574->577 578 d698a1-d698a7 574->578 596 d6986e-d69870 575->596 579 d69853-d69856 576->579 580 d6985c-d6986b call d69266 576->580 582 d69921 577->582 583 d69918-d6991e 577->583 584 d698e2-d698f4 call d6934b 578->584 585 d698a9-d698ac 578->585 579->580 586 d69936-d69939 579->586 580->596 590 d69924-d6992f 582->590 583->582 603 d698c9-d698cc 584->603 591 d698ce-d698e0 call d6950f 585->591 592 d698ae-d698b1 585->592 601 d6993c-d6993e 586->601 598 d69931-d69934 590->598 599 d69999-d6999c 590->599 591->603 600 d698b7-d698c4 call d69426 592->600 592->601 596->590 598->586 599->560 600->603 605 d69940-d69945 601->605 606 d6996c-d69978 601->606 603->596 607 d69947-d69959 605->607 608 d6995e-d69967 call d616c8 605->608 609 d69982-d69994 606->609 610 d6997a-d69980 606->610 607->566 608->566 609->566 610->557 610->609
                                  APIs
                                  • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00D6990E
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.3453097183.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 0000000B.00000002.3452807186.0000000000D20000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3453097183.0000000000EA5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454183871.0000000000EAA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000000EAD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000001034000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000111A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000001156000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000115D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000116C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455605505.000000000116D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455904393.000000000130A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455966053.000000000130B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3456038097.000000000130C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3456092776.000000000130D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_d20000_RageMP131.jbxd
                                  Similarity
                                  • API ID: FileWrite
                                  • String ID:
                                  • API String ID: 3934441357-0
                                  • Opcode ID: 54d1df9dc3cd49a2c573be7b70e7697fbc9748c3f6d8a60caf79bb356e82f9e9
                                  • Instruction ID: 6942448e014ac597b9a17791f89b7d05d72f83fbcaea1c2f040100fbef18ee7b
                                  • Opcode Fuzzy Hash: 54d1df9dc3cd49a2c573be7b70e7697fbc9748c3f6d8a60caf79bb356e82f9e9
                                  • Instruction Fuzzy Hash: 826190B1D04119BFDF11DFA8C894AAEFBBDAF4A304F18014AE940A7256D732D905DBB1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 613 d6251c-d62534 call d6e940 616 d62536-d6253d 613->616 617 d6254a-d62560 SetFilePointerEx 613->617 618 d62544-d62548 616->618 619 d62575-d6257f 617->619 620 d62562-d62573 call d616c8 617->620 621 d6259b-d6259e 618->621 619->618 622 d62581-d62596 619->622 620->618 622->621
                                  APIs
                                  • SetFilePointerEx.KERNELBASE(00000000,?,?,?,?,?,00000000,?,?,?,00D62626,?,?,?,?,?), ref: 00D62558
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.3453097183.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 0000000B.00000002.3452807186.0000000000D20000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3453097183.0000000000EA5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454183871.0000000000EAA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000000EAD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000001034000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000111A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000001156000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000115D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000116C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455605505.000000000116D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455904393.000000000130A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455966053.000000000130B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3456038097.000000000130C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3456092776.000000000130D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_d20000_RageMP131.jbxd
                                  Similarity
                                  • API ID: FilePointer
                                  • String ID:
                                  • API String ID: 973152223-0
                                  • Opcode ID: 8d405d26a69ca3f753616799157ea8811d834c54dd990a427fea83b6d95a88cc
                                  • Instruction ID: c31e598a2e5bbf8ea1c3e27755d5233a6c90a3685dd0999de3ab16fd82f25cff
                                  • Opcode Fuzzy Hash: 8d405d26a69ca3f753616799157ea8811d834c54dd990a427fea83b6d95a88cc
                                  • Instruction Fuzzy Hash: 4A014932600648AFCF19DF59CC15CAE7B29DF85330B380208F8419B2A0EA71ED418BB0
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00D2331F
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.3453097183.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 0000000B.00000002.3452807186.0000000000D20000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3453097183.0000000000EA5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454183871.0000000000EAA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000000EAD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000001034000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000111A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000001156000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000115D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000116C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455605505.000000000116D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455904393.000000000130A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455966053.000000000130B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3456038097.000000000130C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3456092776.000000000130D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_d20000_RageMP131.jbxd
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID:
                                  • API String ID: 118556049-0
                                  • Opcode ID: 0fd589d96c9d07b1efa01aec19e4ff46bb0766daf2056f60d33bc81ca57302d3
                                  • Instruction ID: 984c53d920273aa7d6f5b707e195fd496de202d6d9244376501c68c92e223d37
                                  • Opcode Fuzzy Hash: 0fd589d96c9d07b1efa01aec19e4ff46bb0766daf2056f60d33bc81ca57302d3
                                  • Instruction Fuzzy Hash: BEF0B4725001249BDF14AF64E4155E9B3E8DF343A6754097EEC8DC7212EF2ADB5487B0
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000008,?,00000001,?,00D69FE0,00000001,00000364,00000001,00000006,000000FF,?,00D54B3F,?,?,74D723A0,?), ref: 00D6A69B
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.3453097183.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 0000000B.00000002.3452807186.0000000000D20000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3453097183.0000000000EA5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454183871.0000000000EAA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000000EAD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000001034000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000111A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000001156000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000115D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000116C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455605505.000000000116D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455904393.000000000130A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455966053.000000000130B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3456038097.000000000130C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3456092776.000000000130D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_d20000_RageMP131.jbxd
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: d616996c32d6e6b1da655f6594052894a09903e382972b36b66dffa47e0b035f
                                  • Instruction ID: 6cd90ebfda477ddda6ff3f38fdb8ea06b99017dc23f6000f61ba745b02f0f439
                                  • Opcode Fuzzy Hash: d616996c32d6e6b1da655f6594052894a09903e382972b36b66dffa47e0b035f
                                  • Instruction Fuzzy Hash: CFF0E232111D216F9B216AEEDC01A6A378DAF417A0F1D8162ECC4FB084CA30EC008EF6
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000000,00000001,?,?,00D54B3F,?,?,74D723A0,?,?,00D23522,?,?), ref: 00D6B0C7
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.3453097183.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 0000000B.00000002.3452807186.0000000000D20000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3453097183.0000000000EA5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454183871.0000000000EAA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000000EAD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000001034000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000111A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000001156000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000115D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000116C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455605505.000000000116D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455904393.000000000130A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455966053.000000000130B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3456038097.000000000130C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3456092776.000000000130D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_d20000_RageMP131.jbxd
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: e7f2ad84ff4f40e5c93959ec6735a95c2d2d4fe906f40f2d1c9dd43c23f87161
                                  • Instruction ID: a9bf65d9de2aa9efdd69fe9491accb7e5144e05746a6f78f16eb253d5eef1747
                                  • Opcode Fuzzy Hash: e7f2ad84ff4f40e5c93959ec6735a95c2d2d4fe906f40f2d1c9dd43c23f87161
                                  • Instruction Fuzzy Hash: F1E092312416216BEB3136A59C11B5B7E4DDF433B1F1D0212FC64E61C2DB21DC9486F5
                                  APIs
                                  • CloseHandle.KERNELBASE(00000000,00000000,?,?,00D68CE6,00000000,?,00E9A178,0000000C,00D68DA2,?,?,?), ref: 00D68E55
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.3453097183.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 0000000B.00000002.3452807186.0000000000D20000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3453097183.0000000000EA5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454183871.0000000000EAA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000000EAD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000001034000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000111A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000001156000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000115D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000116C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455605505.000000000116D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455904393.000000000130A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455966053.000000000130B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3456038097.000000000130C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3456092776.000000000130D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_d20000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CloseHandle
                                  • String ID:
                                  • API String ID: 2962429428-0
                                  • Opcode ID: da0a2699d77dadcbc751361e83aa879b6b648cb695f20bd07eaf4d7a0e04bee1
                                  • Instruction ID: e759ea42ccfa96ef364e3f56d88076b63b4ff01b3d64ee9408f298d7c56eefe3
                                  • Opcode Fuzzy Hash: da0a2699d77dadcbc751361e83aa879b6b648cb695f20bd07eaf4d7a0e04bee1
                                  • Instruction Fuzzy Hash: 62112B37A051146BC72523359C49B7E67498F92734F2D071DF9189B1D3EE63DC816171
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.3463282198.00000000058C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_58c0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3353eec61dc6875b7050587dbd3c956e87c3a65fdc54bca37c0a2bf6b02374a7
                                  • Instruction ID: 21e80c90e2b90b8417eb95924211c0ace80e45a2549d505d47fc6db237e3b4d7
                                  • Opcode Fuzzy Hash: 3353eec61dc6875b7050587dbd3c956e87c3a65fdc54bca37c0a2bf6b02374a7
                                  • Instruction Fuzzy Hash: 2F113A9240C30CEF8202D6B8478D6BD7F6B67563F872485EDFC07DA502C274DE058222
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.3463282198.00000000058C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_58c0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: cd6ca9743c89232b0583f84cdfd5a0129c98a6ce1918bf0b0a93bc2aa3000e91
                                  • Instruction ID: e26ba9690ad6b1e8afa6d9343c3bc793787921af220ad77c7204792988dc9dc0
                                  • Opcode Fuzzy Hash: cd6ca9743c89232b0583f84cdfd5a0129c98a6ce1918bf0b0a93bc2aa3000e91
                                  • Instruction Fuzzy Hash: 621199A240C31CEF8202E679468D2BDAF5327122F472485BDAC03D7942D674DA099112
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.3463282198.00000000058C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_58c0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3ee4158dab11e08e853d45d98e976aead0fdbd78d38e61d0a5affcb4df96ca68
                                  • Instruction ID: fbd4bf91e5a85c92f8c0e285018fb684672080b3ab9b8f894a570204f52e9afd
                                  • Opcode Fuzzy Hash: 3ee4158dab11e08e853d45d98e976aead0fdbd78d38e61d0a5affcb4df96ca68
                                  • Instruction Fuzzy Hash: E11129A240C30CEF8102D6B9978D6BD7F6A67563F872085EDFC07D6502D274EE059122
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.3463282198.00000000058C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_58c0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f059b53ea43314c62b8b03813d7f2627f7492141aa4f87a0c052180e81f68230
                                  • Instruction ID: 128715879686f9fe9975674c20905f457045d045b259d2915551dd9c3227e6d3
                                  • Opcode Fuzzy Hash: f059b53ea43314c62b8b03813d7f2627f7492141aa4f87a0c052180e81f68230
                                  • Instruction Fuzzy Hash: FC11299650C31CEF8602D675568D2FD6F5667532F832485EDEC07D6902C1B4DE059122
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.3463282198.00000000058C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_58c0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fc4c47adf77587b61f5e1c210dd15e77b9f5966e70c2075db0589e901491051d
                                  • Instruction ID: 282cdedcfd277767da1abce0905d275997ce49e0c2d87ddc346d4151407fe513
                                  • Opcode Fuzzy Hash: fc4c47adf77587b61f5e1c210dd15e77b9f5966e70c2075db0589e901491051d
                                  • Instruction Fuzzy Hash: 0701686740D718EFC202DA75964DABC7F62BA436F433489EEEC07C6901E174DE4A5121
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.3463282198.00000000058C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_58c0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 59729142d40071210a5c990b3bfb776cb5c77030da5e96e3cfa29cd1835c1f81
                                  • Instruction ID: 3c76e1e1e9693269c57c347a1b86a809159eeeda83ba5372976772576e9bf73d
                                  • Opcode Fuzzy Hash: 59729142d40071210a5c990b3bfb776cb5c77030da5e96e3cfa29cd1835c1f81
                                  • Instruction Fuzzy Hash: 7C01689640C31CEF8602E679574D2FC6F6267122F87348AEDEC03D6542C6B4DE499122
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.3463282198.00000000058C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_58c0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1732b8f8a5f7cf56cbce86a2746ae05b0dc0f9b8e3a6b02267761374b0f69836
                                  • Instruction ID: cf1ea061082afb4140765de78f00c0337e8378851ed1e99c12554b9c0fa46c1f
                                  • Opcode Fuzzy Hash: 1732b8f8a5f7cf56cbce86a2746ae05b0dc0f9b8e3a6b02267761374b0f69836
                                  • Instruction Fuzzy Hash: 080128A640D31CDB8601E675578D2FDBF616B022F473489EDEC03D7542D5B49E499222
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.3463282198.00000000058C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_58c0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5c27ecccb8fba897e1479dfa44aa2314d16f48e998c723df2c3ebc0cbb261cde
                                  • Instruction ID: e1f2c52e90f971c6afa61ddaadc959d7f733987fd4e625783a886ddb5facb204
                                  • Opcode Fuzzy Hash: 5c27ecccb8fba897e1479dfa44aa2314d16f48e998c723df2c3ebc0cbb261cde
                                  • Instruction Fuzzy Hash: 3D017B2611D714EBC602EA78564D9FD7F21BA925F433899DFD883CA402D130DD4A86A1
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.3463282198.00000000058C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_58c0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 757c2fd72cdd8228c9af952da58d8c22905a7ff6bc52288172ea2f86f4f7b95f
                                  • Instruction ID: 2e305aa981256fc62d29153d2851257f0f20a8095dd6c3432900b29d5386cf94
                                  • Opcode Fuzzy Hash: 757c2fd72cdd8228c9af952da58d8c22905a7ff6bc52288172ea2f86f4f7b95f
                                  • Instruction Fuzzy Hash: 1B0147A640C30CEF8201E6B5578D2FDAF6166122F473489ADEC03D7542C5B48A099122
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.3463282198.00000000058C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_58c0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 40cb177053dd65d8c3ec6696f45005e5adea29b4237981b74c4ff07c1a635795
                                  • Instruction ID: 86cce770bc0cf5c4d2691033cd1f92a158839d79405c5e5519289c3ef1757c1a
                                  • Opcode Fuzzy Hash: 40cb177053dd65d8c3ec6696f45005e5adea29b4237981b74c4ff07c1a635795
                                  • Instruction Fuzzy Hash: A0012BA610831CEFC201D7B5578D2FDBF6167026F473489EDEC47D7542D5B48A499222
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.3463282198.00000000058C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_58c0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9a578c53486a5ec19ab826648acd67de5d240d0c4cf275d2dbe4638cf11038c1
                                  • Instruction ID: 7b5dfd775d997ad9ae4f51a7f81b708442bfe000353e247b815299892902ce08
                                  • Opcode Fuzzy Hash: 9a578c53486a5ec19ab826648acd67de5d240d0c4cf275d2dbe4638cf11038c1
                                  • Instruction Fuzzy Hash: F0F04C6740D308EFC601CAB9974D4BCBF6176462B8334C9FEEC53D6502D574C609A223
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.3463282198.00000000058C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_58c0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 538e30ba780ccc59518ab3a3afe33b815d1e7ec18bcfdca6396b24982254f49e
                                  • Instruction ID: 50e070410c8e3abca64102d973d4384a132bfbd5f7bb8d6091813f5cd688167d
                                  • Opcode Fuzzy Hash: 538e30ba780ccc59518ab3a3afe33b815d1e7ec18bcfdca6396b24982254f49e
                                  • Instruction Fuzzy Hash: FCF04C6740D308EFD201CAB9574D57CBF6175422F8334C9EEEC53D5502D574CA09A223
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.3463282198.00000000058C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_58c0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7f2fba13a5143a719b3ed8b61385d7e107ce061f2ba63fc3de62a15784f49b64
                                  • Instruction ID: 3c2ed950e22ced8ba577dfc6aabc7e5426ab51d3bd8e426e2c2c16688c6e092e
                                  • Opcode Fuzzy Hash: 7f2fba13a5143a719b3ed8b61385d7e107ce061f2ba63fc3de62a15784f49b64
                                  • Instruction Fuzzy Hash: F6F08BA350C318EBC201DA78174D1FC7FA5A6061B532489FEE847C5802D970CA0A9622
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.3463282198.00000000058C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_58c0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ce400e54d7f63c552e5dc2c1865b95b04bd1446dd822eda374fdf320935df784
                                  • Instruction ID: d129c19a2a1b08b9c5965339c1912a66f0a0b95b0e9b792d57e62a98e4cf71d6
                                  • Opcode Fuzzy Hash: ce400e54d7f63c552e5dc2c1865b95b04bd1446dd822eda374fdf320935df784
                                  • Instruction Fuzzy Hash: 25F0596740C318EF8201DAB5174D17CBE6275422F4334C9FEEC07D1902C5B4CE099222
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.3463282198.00000000058C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 058C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_58c0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 96d354f4d69b8cb273732246fc2a556f88550bfb409bf1b36b57e0d3a7f0e19f
                                  • Instruction ID: 6819b82d5e785462afb56e8077b97951445a88019338ffc4ee067da79ff9ec3e
                                  • Opcode Fuzzy Hash: 96d354f4d69b8cb273732246fc2a556f88550bfb409bf1b36b57e0d3a7f0e19f
                                  • Instruction Fuzzy Hash: 5CE0556650A308EFC201EAB46A4C5BD7BA569422B43348AFDE8A2C2882C674854E9321
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.3453097183.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 0000000B.00000002.3452807186.0000000000D20000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3453097183.0000000000EA5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454183871.0000000000EAA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000000EAD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000001034000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000111A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000001156000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000115D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000116C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455605505.000000000116D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455904393.000000000130A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455966053.000000000130B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3456038097.000000000130C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3456092776.000000000130D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_d20000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 333d4b6d5425d6f9d03797ee82114c3711da98524c03317fffdb5ec62fb2b380
                                  • Instruction ID: e1f9adda3281e937fb19cf12b0e3b06702adfca8d545d5348acbeeb9fe1e1ff4
                                  • Opcode Fuzzy Hash: 333d4b6d5425d6f9d03797ee82114c3711da98524c03317fffdb5ec62fb2b380
                                  • Instruction Fuzzy Hash: 59020A71E112199FDF14CFA9D8806AEBBF1EF48315F24826AED19E7340D731A945CBA0
                                  APIs
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.3453097183.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 0000000B.00000002.3452807186.0000000000D20000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3453097183.0000000000EA5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454183871.0000000000EAA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000000EAD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000001034000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000111A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000001156000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000115D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000116C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455605505.000000000116D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455904393.000000000130A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455966053.000000000130B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3456038097.000000000130C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3456092776.000000000130D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_d20000_RageMP131.jbxd
                                  Similarity
                                  • API ID: _strrchr
                                  • String ID:
                                  • API String ID: 3213747228-0
                                  • Opcode ID: 785c90e8ff89e0f1a3d98e37725974d6f6ea20f06d45e48120c47f1ca5a82ffe
                                  • Instruction ID: 5f07a9cc17a5fe40273eb4ccb491e402edea27f6b491e74b4ec869f85a0cf407
                                  • Opcode Fuzzy Hash: 785c90e8ff89e0f1a3d98e37725974d6f6ea20f06d45e48120c47f1ca5a82ffe
                                  • Instruction Fuzzy Hash: 3AB17832A006559FDB118F68CC82BEE7BA5EF55320F184166E905EF282D774D981CBB0
                                  APIs
                                  • _ValidateLocalCookies.LIBCMT ref: 00D57307
                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 00D5730F
                                  • _ValidateLocalCookies.LIBCMT ref: 00D57398
                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 00D573C3
                                  • _ValidateLocalCookies.LIBCMT ref: 00D57418
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.3453097183.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 0000000B.00000002.3452807186.0000000000D20000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3453097183.0000000000EA5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454183871.0000000000EAA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000000EAD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000001034000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000111A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000001156000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000115D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000116C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455605505.000000000116D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455904393.000000000130A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455966053.000000000130B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3456038097.000000000130C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3456092776.000000000130D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_d20000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                  • String ID: csm
                                  • API String ID: 1170836740-1018135373
                                  • Opcode ID: 4a4b8f2c91ec0e06f27e67b16365908ff09f655c680a5a97bd1c97b041c34fe3
                                  • Instruction ID: a78fb8560ce09f0e251e3656b7759b763f806b20bc8548dc48df563f8c86aab5
                                  • Opcode Fuzzy Hash: 4a4b8f2c91ec0e06f27e67b16365908ff09f655c680a5a97bd1c97b041c34fe3
                                  • Instruction Fuzzy Hash: 3141E730A042099FCF10DF68D885A9EBFA5EF04325F288095FC18AB351DB31E949DBB1
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D3A09D
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D3A0BF
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D3A0E7
                                  • __Getctype.LIBCPMT ref: 00D3A1C5
                                  • std::_Facet_Register.LIBCPMT ref: 00D3A1F9
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D3A223
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.3453097183.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 0000000B.00000002.3452807186.0000000000D20000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3453097183.0000000000EA5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454183871.0000000000EAA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000000EAD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000001034000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000111A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000001156000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000115D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000116C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455605505.000000000116D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455904393.000000000130A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455966053.000000000130B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3456038097.000000000130C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3456092776.000000000130D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_d20000_RageMP131.jbxd
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetctypeRegister
                                  • String ID:
                                  • API String ID: 1102183713-0
                                  • Opcode ID: 1fbdbc8f9c28f396f5fd5d52795b5b2b396d6b67ebfd8463ea489037c77ad661
                                  • Instruction ID: c69343f9229523ec0b8ab892a575373eef151b07c4a149cd453993da77223162
                                  • Opcode Fuzzy Hash: 1fbdbc8f9c28f396f5fd5d52795b5b2b396d6b67ebfd8463ea489037c77ad661
                                  • Instruction Fuzzy Hash: F3519AB0E00345DFCB11CF58C9417AEBBB0FB15714F188258D895AB391DB75AA48CBA2
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D3C45A
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D3C47C
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D3C4A4
                                  • std::_Facet_Register.LIBCPMT ref: 00D3C59A
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D3C5C4
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.3453097183.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 0000000B.00000002.3452807186.0000000000D20000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3453097183.0000000000EA5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454183871.0000000000EAA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000000EAD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000001034000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000111A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000001156000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000115D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000116C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455605505.000000000116D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455904393.000000000130A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455966053.000000000130B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3456038097.000000000130C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3456092776.000000000130D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_d20000_RageMP131.jbxd
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                  • String ID:
                                  • API String ID: 459529453-0
                                  • Opcode ID: 78cc96c51a16e02aeac93ecb29a0e06f219c707376dc9b2817eb8f5b9595ca69
                                  • Instruction ID: 539c1388c8f25b3c02965ff1e45adb225592dacf381d3c7ae112feb103cf2544
                                  • Opcode Fuzzy Hash: 78cc96c51a16e02aeac93ecb29a0e06f219c707376dc9b2817eb8f5b9595ca69
                                  • Instruction Fuzzy Hash: EE51BBB0900258DFDB11DF58D845BAEBBF0FF16354F288158E845BB381D7B5AA09CBA0
                                  APIs
                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 00D2499F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.3453097183.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 0000000B.00000002.3452807186.0000000000D20000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3453097183.0000000000EA5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454183871.0000000000EAA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000000EAD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000001034000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000111A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000001156000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000115D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000116C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455605505.000000000116D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455904393.000000000130A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455966053.000000000130B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3456038097.000000000130C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3456092776.000000000130D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_d20000_RageMP131.jbxd
                                  Similarity
                                  • API ID: Ios_base_dtorstd::ios_base::_
                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                  • API String ID: 323602529-1866435925
                                  • Opcode ID: 3837ce1bec01d91ab6ee95856e00fa86612cc9806b0385423e40edbb017f6479
                                  • Instruction ID: 0bdcf26b321493409eea738f648d42cbc498d144f2e7f7639bd62e511d89abbb
                                  • Opcode Fuzzy Hash: 3837ce1bec01d91ab6ee95856e00fa86612cc9806b0385423e40edbb017f6479
                                  • Instruction Fuzzy Hash: 07117A72804B54ABCB10EA18AC03B663388DB01714F08462CFD689B281EB3498008BB2
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 00D52730
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D5273B
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D527A9
                                    • Part of subcall function 00D5288C: std::locale::_Locimp::_Locimp.LIBCPMT ref: 00D528A4
                                  • std::locale::_Setgloballocale.LIBCPMT ref: 00D52756
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.3453097183.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 0000000B.00000002.3452807186.0000000000D20000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3453097183.0000000000EA5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454183871.0000000000EAA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000000EAD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000001034000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000111A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000001156000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000115D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000116C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455605505.000000000116D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455904393.000000000130A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455966053.000000000130B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3456038097.000000000130C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3456092776.000000000130D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_d20000_RageMP131.jbxd
                                  Similarity
                                  • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                                  • String ID:
                                  • API String ID: 677527491-0
                                  • Opcode ID: ca5b4d31c70d3d020939022c7dfd23f83a9f8578c4e2217166550f2d1202e342
                                  • Instruction ID: 48e301aaaadb3b8e9450fc4daa293293f47bc1c96f5b68eafef566897edf335c
                                  • Opcode Fuzzy Hash: ca5b4d31c70d3d020939022c7dfd23f83a9f8578c4e2217166550f2d1202e342
                                  • Instruction Fuzzy Hash: EE018875A002109FCB0AEB20984153D7BA1FF8A751B184009EC1527281CF34AA4ECBB1
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00D2750C
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00D27522
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.3453097183.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 0000000B.00000002.3452807186.0000000000D20000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3453097183.0000000000EA5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454183871.0000000000EAA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000000EAD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000001034000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000111A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000001156000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000115D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000116C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455605505.000000000116D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455904393.000000000130A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455966053.000000000130B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3456038097.000000000130C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3456092776.000000000130D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_d20000_RageMP131.jbxd
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: [json.exception.
                                  • API String ID: 4194217158-791563284
                                  • Opcode ID: 4954a6ca1b167a583f684f716c925e4412b330e127eec57c712bf9d69d96b0f6
                                  • Instruction ID: a2f792a603864cf12f5f574fa297fad6499b127799029ffde3095f90aa3857ae
                                  • Opcode Fuzzy Hash: 4954a6ca1b167a583f684f716c925e4412b330e127eec57c712bf9d69d96b0f6
                                  • Instruction Fuzzy Hash: 2351EFB1D047489FDB10DFA8D906BAEBBB4EF21314F148259E854A7282EBB45A44C7F1
                                  APIs
                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 00D2499F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.3453097183.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 0000000B.00000002.3452807186.0000000000D20000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3453097183.0000000000EA5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454183871.0000000000EAA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000000EAD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000001034000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000111A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000001156000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000115D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000116C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455605505.000000000116D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455904393.000000000130A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455966053.000000000130B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3456038097.000000000130C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3456092776.000000000130D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_d20000_RageMP131.jbxd
                                  Similarity
                                  • API ID: Ios_base_dtorstd::ios_base::_
                                  • String ID: ios_base::badbit set$ios_base::failbit set
                                  • API String ID: 323602529-1240500531
                                  • Opcode ID: bbd0bbe7c5e06df7a983a84388ae48632adfa9fe90034e72b81f91d24308c0ed
                                  • Instruction ID: 4a936c63177c90b7b85c70d796d49411eb7665653267e9575a2e2c11dbabb3be
                                  • Opcode Fuzzy Hash: bbd0bbe7c5e06df7a983a84388ae48632adfa9fe90034e72b81f91d24308c0ed
                                  • Instruction Fuzzy Hash: E64145B1C00244ABCB00DF58DC42BAEBBB8EF45314F18825DF954AB381DB759A00CBB1
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D24061
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00D240C4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.3453097183.0000000000D21000.00000040.00000001.01000000.00000006.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 0000000B.00000002.3452807186.0000000000D20000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3453097183.0000000000EA5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454183871.0000000000EAA000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000000EAD000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000001034000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000111A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.0000000001156000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000115D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3454307049.000000000116C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455605505.000000000116D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455904393.000000000130A000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3455966053.000000000130B000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3456038097.000000000130C000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.3456092776.000000000130D000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_d20000_RageMP131.jbxd
                                  Similarity
                                  • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                  • String ID: bad locale name
                                  • API String ID: 3988782225-1405518554
                                  • Opcode ID: 70ee5c88f2ad0719cd9fe007a3d878664de4946e3cf75c32c0b4f00a81fb30ff
                                  • Instruction ID: 111f3d04fbd649ca44a9f2cf6be023f8faa7ced57c5dd20a56e0fbcdfe772cc8
                                  • Opcode Fuzzy Hash: 70ee5c88f2ad0719cd9fe007a3d878664de4946e3cf75c32c0b4f00a81fb30ff
                                  • Instruction Fuzzy Hash: 1311E670805B84EED721CFA8C50475BBFF4EF25714F14868DD89597781D3B95608C7A1